{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:05:22Z","timestamp":1756310722700,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493809"},{"type":"electronic","value":"9783662493816"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49381-6_23","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T18:24:06Z","timestamp":1457375046000},"page":"235-244","source":"Crossref","is-referenced-by-count":13,"title":["Higher Order Mutation Testing to Drive Development of New Test Cases: An Empirical Comparison of Three Strategies"],"prefix":"10.1007","author":[{"given":"Quang Vu","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Lech","family":"Madeyski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"23_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"RA DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: help for the practicing programmer. IEEE Comput. 11(4), 34\u201341 (1978)","journal-title":"IEEE Comput."},{"issue":"4","key":"23_CR2","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"SE-3","author":"RG Hamlet","year":"1977","unstructured":"Hamlet, R.G.: Testing programs with the aid of a compiler. IEEE Trans. Softw. Eng. SE-3(4), 279\u2013290 (1977)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1016\/j.infsof.2009.04.016","volume":"51","author":"Y Jia","year":"2009","unstructured":"Jia, Y., Harman, M.: Higher order mutation testing. Inf. Softw. Technol. 51, 1379\u20131393 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Harman, M., Jia, Y., Langdon, W.B.: A manifesto for higher order mutation testing. In: Third International Conference on Software Testing, Verification, and Validation Workshops, (2010)","DOI":"10.1109\/ICSTW.2010.13"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"2416","DOI":"10.1016\/j.jss.2010.07.027","volume":"83","author":"WB Langdon","year":"2010","unstructured":"Langdon, W.B., Harman, M., Jia, Y.: Efficient multi-objective higher order mutation testing with genetic programming. J. Syst. Softw. 83, 2416\u20132430 (2010)","journal-title":"J. Syst. Softw."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Jia, Y., Harman, M.: Constructing subtle faults using higher order mutation testing. In: Proceedings of the Eighth International Working Conference Source Code Analysis and Manipulation (2008)","DOI":"10.1109\/SCAM.2008.36"},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.2013.44","volume":"40","author":"L Madeyski","year":"2014","unstructured":"Madeyski, L., Orzeszyna, W., Torkar, R., J\u00f3zala, M.: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation. IEEE Trans. Softw. Eng. 40(1), 23\u201342 (2014). doi:10.1109\/TSE.2013.44","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"23_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<205::AID-STVR186>3.0.CO;2-X","volume":"9","author":"ES Mresa","year":"1999","unstructured":"Mresa, E.S., Bottaci, L.: Efficiency of mutation operators and selective mutation strategies: an empirical study. Softw. Test. Verification Reliab. 9(4), 205\u2013232 (1999)","journal-title":"Softw. Test. Verification Reliab."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Papadakis, M., Malevris, N.: An empirical evaluation of the first and second order mutation testing strategies. In: Proceedings of the 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, ser. ICSTW 2010, IEEE Computer Society, pp. 90\u201399 (2010)","DOI":"10.1109\/ICSTW.2010.50"},{"issue":"6","key":"23_CR10","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1142\/S021819400200113X","volume":"12","author":"AMR Vincenzi","year":"2002","unstructured":"Vincenzi, A.M.R., Nakagawa, E.Y., Maldonado, J.C., Delamaro, M.E., Romero, R.A.F.: Bayesian-learning based guidelines to determine equivalent mutants. Int. J. Softw. Eng. Knowl. Eng. 12(6), 675\u2013690 (2002)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/stvr.392","volume":"19","author":"M Polo","year":"2008","unstructured":"Polo, M., Piattini, M., Garcia-Rodriguez, I.: Decreasing the cost of mutation testing with second-order mutants. Softw. Test. Verification Reliab. 19(2), 111\u2013131 (2008)","journal-title":"Softw. Test. Verification Reliab."},{"key":"23_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-06569-4_12","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"QV Nguyen","year":"2014","unstructured":"Nguyen, Q.V., Madeyski, L.: Problems of mutation testing and higher order mutation testing. In: van Do, T., Thi, H.A.L., Nguyen, N.T. (eds.) Advanced Computational Methods for Knowledge Engineering. AISC, vol. 282, pp. 157\u2013172. Springer, Heidelberg (2014). doi:10.1007\/978-3-319-06569-4_12"},{"issue":"4","key":"23_CR13","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A.V., May, J.H.R.: Software Unit Test Coverage and Adequacy. ACM Comput. Surv. 29(4), 366\u2013427 (1997)","journal-title":"ACM Comput. Surv."},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-73460-4_20","volume-title":"Product-Focused Software Process Improvement","author":"L Madeyski","year":"2007","unstructured":"Madeyski, L.: On the effects of pair programming on thoroughness and fault-finding effectiveness of unit tests. In: M\u00fcnch, J., Abrahamsson, P. (eds.) PROFES 2007. LNCS, vol. 4589, pp. 207\u2013221. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73460-4_20"},{"issue":"3","key":"23_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/spip.382","volume":"13","author":"L Madeyski","year":"2008","unstructured":"Madeyski, L.: The impact of pair programming on thoroughness and fault detection effectiveness of unit tests suites. Softw. Process: Improv. Pract. 13(3), 281\u2013295 (2008). doi:10.1002\/spip.382","journal-title":"Softw. Process: Improv. Pract."},{"issue":"2","key":"23_CR16","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.infsof.2009.08.007","volume":"52","author":"L Madeyski","year":"2010","unstructured":"Madeyski, L.: The impact of test-first programming on branch coverage and mutation score indicator of unit tests: An experiment. Inf. Softw. Technol. 52(2), 169\u2013184 (2010). doi:10.1016\/j.infsof.2009.08.007","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"23_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1049\/iet-sen.2008.0038","volume":"4","author":"L Madeyski","year":"2010","unstructured":"Madeyski, L., Radyk, N.: Judy - a mutation testing tool for Java. IET Softw. 4(1), 32\u201342 (2010). doi:10.1049\/iet-sen.2008.0038","journal-title":"IET Softw."},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multi objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"23_CR19","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TEVC.2013.2281535","volume":"18","author":"K Deb","year":"2014","unstructured":"Deb, K., Jain, H.: An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, Part I: solving problems with box constraints. IEEE Trans. Evol. Comput. 18(4), 577\u2013601 (2014)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Kollat, J.B., Reed, P.M., The value of online adaptive search: a performance comparison of NSGAII, \u03b5-NSGAII and \u03b5-MOEA. In: Coello Coello, C.A., Aguirre, A.H., Zitzler, E. (Eds.), Evolutionary Multi-Criterion Optimization, Third International Conference, EMO 2005 Guanajuato, Mexico, March 9\u201311 (2005)","DOI":"10.1007\/978-3-540-31880-4_27"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Deb, K., Mohan, M., Mishra, S.: A fast multi-objective evolutionary algorithm for finding well-spread pareto-optimal solutions. KenGAL, Report No. 2003002. Indian Institute of Technology, Kanpur, India (2003)","DOI":"10.1007\/3-540-36970-8_16"},{"key":"23_CR22","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-319-17996-4_35","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"QV Nguyen","year":"2015","unstructured":"Nguyen, Q.V., Madeyski, L.: Searching for strongly subsuming higher order mutants by applying multi-objective optimization algorithm. In: Le Thi, H.A., Nguyen, N.T., Do, T.V. (eds.) Advanced Computational Methods for Knowledge Engineering. AISC, vol. 358, pp. 391\u2013402. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-17996-4_35"},{"issue":"6","key":"23_CR23","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R Purushothaman","year":"2005","unstructured":"Purushothaman, R., Perry, D.E.: Toward Understanding the Rhetoric of small source code changes. IEEE Trans. Softw. Eng. 31(6), 511\u2013526 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"23_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11219-014-9241-7","volume":"23","author":"L Madeyski","year":"2015","unstructured":"Madeyski, L., Jureczko, M.: Which process metrics can significantly improve defect prediction models? An empirical study. Softw. Qual. J. 23(3), 393\u2013422 (2015). doi:10.1007\/s11219-014-9241-7","journal-title":"Softw. Qual. J."},{"issue":"5","key":"23_CR25","first-page":"133","volume":"30","author":"M Jureczko","year":"2011","unstructured":"Jureczko, M., Madeyski, L.: A review of process metrics in defect prediction studies. Metody Informatyki Stosowanej 30(5), 133\u2013145 (2011). http:\/\/madeyski.e-informatyka.pl\/download\/Madeyski11.pdf","journal-title":"Metody Informatyki Stosowanej"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Jureczko, M., Madeyski, L.: Towards identifying software project clusters with regard to defect prediction. In: Proceedings of the 6th International Conference on Predictive Models in Software Engineering (PROMISE 2010). ACM, New York, NY, USA, Article 9, 9:1\u20139:10. doi: 10.1145\/1868328.1868342","DOI":"10.1145\/1868328.1868342"},{"issue":"4","key":"23_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.2478\/fcds-2014-0014","volume":"39","author":"L Madeyski","year":"2014","unstructured":"Madeyski, L., Majchrzak, M.: Software measurement and defect prediction with DePress extensible framework. Found. Comput. Decis. Sci. 39(4), 249\u2013270 (2014). doi:10.2478\/fcds-2014-0014","journal-title":"Found. Comput. Decis. Sci."},{"issue":"1","key":"23_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1515\/fcds-2015-0002","volume":"40","author":"J Hryszko","year":"2015","unstructured":"Hryszko, J., Madeyski, L.: Bottlenecks in software defect prediction implementation in industrial projects. Found. Comput. Decis. Sci. 40(1), 17\u201333 (2015). doi:10.1515\/fcds-2015-0002","journal-title":"Found. Comput. Decis. Sci."},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"Nguyen, Q.V., Madeyski, L.: Empirical evaluation of multi-objective optimization algorithms searching for higher order mutants. Cybern. Syst. Int. J. (Accepted 2016). DOI: 10.1080\/01969722.2016.1128763 URL: http:\/\/madeyski.e-informatyka.pl\/download\/NguyenMadeyski16CS.pdf","DOI":"10.1080\/01969722.2016.1128763"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49381-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T12:44:41Z","timestamp":1720788281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-49381-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493809","9783662493816"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49381-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}