{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:10:38Z","timestamp":1744902638531},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_10","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:03:25Z","timestamp":1563433405000},"page":"103-113","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Empirical Analysis of Defects in Handheld Device Applications"],"prefix":"10.1007","author":[{"given":"Mamta","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Ratnesh","family":"Litoriya","sequence":"additional","affiliation":[]},{"given":"Prateek","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"10_CR1","unstructured":"Vasquez, M.L., Moran, K., Poshyvanyk, D.: Continuous, evolutionary and large-scale: a new perspective for automated mobile app testing. In: International Conference on Software Maintenance and Evolution, pp. 399\u2013410 (2017)"},{"key":"10_CR2","unstructured":"Hess, S., Kiefer, F., Carbon, R.: Quality by construction through mConcAppt. In: 8th International Conference on the Quality of Information and Communications Technology, pp. 313\u2013318 (2012)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0164-1212(96)00175-6","volume":"36","author":"MJ Harrold","year":"1997","unstructured":"Harrold, M.J., Offutt, A.J., Tewary, K.: An approach to fault modeling and fault seeding using the program dependence graph. J. Syst. Softw. 36, 273\u2013295 (1997)","journal-title":"J. Syst. Softw."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, B., Neamtiu, I., Gupta, R.: A cross-platform analysis of bugs and bug-fixing in open source projects: desktop vs. Android vs. iOS. In: Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering (2015)","DOI":"10.1145\/2745802.2745808"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Kim, H., Choi, B., Wong, W.E.: Performance testing of mobile applications at the unit test level. In: 3rd International Conference on Secure Software Integration and Reliability Improvement, pp. 171\u2013180 (2009)","DOI":"10.1109\/SSIRI.2009.28"},{"key":"10_CR6","unstructured":"Liu, Z., Hu, Y., Cai, L.: Research on software security and compatibility test for mobile application. In: 4th Edition of the International Conference on the Innovative Computing Technology, pp. 140\u2013145 (2014)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Morgado, I.C., Paiva, A.C.: Testing approach for mobile applications through reverse engineering of UI patterns. In: 30th International Conference on Automated Software Engineering Workshop, pp. 42\u201349 (2015)","DOI":"10.1109\/ASEW.2015.11"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Shabaan, M.M., Hamza, H.S., Omar, Y.K.: Effects of FSM minimization techniques on number of test paths in mobile applications MBT. In: 15th International Conference on Software Engineering Research, Management and Applications, pp. 297\u2013302 (2017)","DOI":"10.1109\/SERA.2017.7965741"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Coelho, R., Almeida, L., Gousios, G., Deursen, A.V., Treude, C.: Exception handling bug hazards in Android results from a mining study and an exploratory survey. Technical Report Series, pp. 1\u201344. Delft University of Technology Software Engineering Research Group (2016)","DOI":"10.1007\/s10664-016-9443-7"},{"key":"10_CR10","first-page":"92","volume":"9","author":"C Gatou","year":"2012","unstructured":"Gatou, C., Politis, A., Zevgolis, D.: The importance of mobile interface icons on user interaction. Int. J. Comput. Sci. Appl. 9, 92\u2013107 (2012)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-68690-5_12","volume-title":"Formal Methods and Software Engineering","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Yang, H., Qin, S., Su, Z., Zhang, J., Yan, J.: Detecting energy bugs in Android apps using static analysis. In: Duan, Z., Ong, L. (eds.) ICFEM 2017. LNCS, vol. 10610, pp. 192\u2013208. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-68690-5_12"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviours for failure detection: a discriminative pattern mining approach. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 557\u2013566 (2009)","DOI":"10.1145\/1557019.1557083"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Chong, L.K., Chattopadhyay, S., Roychoudhury, A.: Detecting energy bugs and hotspots in mobile apps. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 588\u2013598 (2014)","DOI":"10.1145\/2635868.2635871"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bhattacharya, P., Ulanova, L., Neamtiu, L., Koduru, S.C.: An empirical analysis of bug reports and bug fixing in open source. In: Proceedings of 17th European Conference on Software Maintenance and Reengineering, pp. 133\u2013143 (2013)","DOI":"10.1109\/CSMR.2013.23"},{"key":"10_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering. An Introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. An Introduction. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1146\/annurev.ps.46.020195.003021","volume":"46","author":"JP Shaffer","year":"1995","unstructured":"Shaffer, J.P.: Multiple hypothesis testing. Ann. Rev. Psychol. 46, 561\u2013584 (1995)","journal-title":"Ann. Rev. Psychol."},{"issue":"2","key":"10_CR17","first-page":"91","volume":"6","author":"R Litoriya","year":"2013","unstructured":"Litoriya, R., Kothari, A.: Cost Estimation of web projects in context with Agile paradigm: improvements and validation. Int. J. Softw. Eng. 6(2), 91\u2013114 (2013)","journal-title":"Int. J. Softw. Eng."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:08:16Z","timestamp":1563433696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}