{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:32:28Z","timestamp":1771263148897,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10836-023-06086-3","type":"journal-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T07:02:13Z","timestamp":1700636533000},"page":"659-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Fault Detection by Test Case Prioritization via Test Case Selection"],"prefix":"10.1007","volume":"39","author":[{"given":"J. Paul","family":"Rajasingh","sequence":"first","affiliation":[]},{"given":"P. Senthil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,22]]},"reference":[{"issue":"2","key":"6086_CR1","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s11219-019-09463-4","volume":"28","author":"S Ali","year":"2020","unstructured":"Ali S, Hafeez Y, Hussain S, Yang S (2020) Enhanced regression testing technique for agile software development and continuous integration strategies. Software Qual J 28(2):397\u2013423. https:\/\/doi.org\/10.1007\/s11219-019-09463-4","journal-title":"Software Qual J"},{"key":"6086_CR2","doi-asserted-by":"publisher","first-page":"148007","DOI":"10.1109\/ACCESS.2020.3014671","volume":"8","author":"S Ali","year":"2020","unstructured":"Ali S, Hafeez Y, Jhanjhi NZ, Humayun M, Imran M, Nayyar A, Singh S, Ra I (2020) HTowards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based. IEEE Access 8:148007\u2013148020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3014671","journal-title":"IEEE Access"},{"issue":"3","key":"6086_CR3","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s10836-022-06008-9","volume":"38","author":"B Arasteh","year":"2022","unstructured":"Arasteh B, Imanzadeh P, Arasteh K, Gharehchopogh FS, Zarei B (2022) A source-code aware method for software mutation testing using artificial bee colony algorithm. J Electron Test 38(3):289\u2013302","journal-title":"J Electron Test"},{"issue":"2","key":"6086_CR4","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10836-022-05999-9","volume":"38","author":"B Arasteh","year":"2022","unstructured":"Arasteh B, Hosseini SMJ (2022) Traxtor: an automatic software test suit generation method inspired by imperialist competitive optimization algorithms. J Electron Test 38(2):205\u2013215","journal-title":"J Electron Test"},{"key":"6086_CR5","doi-asserted-by":"publisher","unstructured":"Bagherzadeh M, Kahani N, Briand L (2021) Reinforcement Learning for Test Case Prioritization.\u00a0IEEE Trans Softw Eng\u00a05589(c):1\u201321. https:\/\/doi.org\/10.1109\/TSE.2021.3070549","DOI":"10.1109\/TSE.2021.3070549"},{"key":"6086_CR6","doi-asserted-by":"publisher","unstructured":"Chi J, Qu Y, Zheng Q, Yang Z, Jin W, Cui D, Liu T (2020) Relation-based test case prioritization for regression testing.\u00a0J Syst Softw\u00a0163. https:\/\/doi.org\/10.1016\/j.jss.2020.110539","DOI":"10.1016\/j.jss.2020.110539"},{"key":"6086_CR7","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s13198-020-00955-2","volume":"11","author":"C Choudhary","year":"2020","unstructured":"Choudhary C, Kapur PK, Khatri SK, Muthukumar R, Shrivastava AK (2020) Effort based release time of software for detection and correction processes using MAUT. International Journal of System Assurance Engineering and Management 11:367\u2013378. https:\/\/doi.org\/10.1007\/s13198-020-00955-2","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"6086_CR8","doi-asserted-by":"publisher","first-page":"172296","DOI":"10.1109\/ACCESS.2020.3025460","volume":"8","author":"Z Cui","year":"2020","unstructured":"Cui Z, Jia M, Chen X, Zheng L, Liu X (2020) Improving software fault localization by combining spectrum and mutation. IEEE Access 8:172296\u2013172307. https:\/\/doi.org\/10.1109\/ACCESS.2020.3025460","journal-title":"IEEE Access"},{"key":"6086_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110485","volume":"162","author":"M Dadkhah","year":"2020","unstructured":"Dadkhah M, Araban S, Paydar S (2020) A systematic literature review on semantic web enabled software testing. J Syst Softw 162:110485. https:\/\/doi.org\/10.1016\/j.jss.2019.110485","journal-title":"J Syst Softw"},{"issue":"4","key":"6086_CR10","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1007\/s10664-019-09794-7","volume":"25","author":"B Danglot","year":"2020","unstructured":"Danglot B, Monperrus M, Rudametkin W, Baudry B (2020) An approach and benchmark to detect behavioral changes of commits in continuous integration. Empir Softw Eng 25(4):2379\u20132415. https:\/\/doi.org\/10.1007\/s10664-019-09794-7","journal-title":"Empir Softw Eng"},{"key":"6086_CR11","doi-asserted-by":"publisher","first-page":"38649","DOI":"10.1109\/ACCESS.2021.3064296","volume":"9","author":"K Gao","year":"2021","unstructured":"Gao K (2021) Simulated Software Testing Process and Its Optimization Considering Heterogeneous Debuggers and Release Time. IEEE Access 9:38649\u201338659. https:\/\/doi.org\/10.1109\/ACCESS.2021.3064296","journal-title":"IEEE Access"},{"key":"6086_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106321","volume":"126","author":"V Garousi","year":"2020","unstructured":"Garousi V, Bauer S, Felderer M (2020) NLP-assisted software testing: A systematic mapping of the literature. Inf Softw Technol 126:106321. https:\/\/doi.org\/10.1016\/j.infsof.2020.106321","journal-title":"Inf Softw Technol"},{"issue":"7","key":"6086_CR13","doi-asserted-by":"publisher","first-page":"5163","DOI":"10.1007\/s00500-020-05517-z","volume":"25","author":"N Gokilavani","year":"2021","unstructured":"Gokilavani N, Bharathi B (2021) Test case prioritization to examine software for fault detection using PCA extraction and K-means clustering with ranking. Soft Comput 25(7):5163\u20135172. https:\/\/doi.org\/10.1007\/s00500-020-05517-z","journal-title":"Soft Comput"},{"key":"6086_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110712","volume":"169","author":"R Huang","year":"2020","unstructured":"Huang R, Zhang Q, Towey D, Sun W, Chen J (2020) Regression test case prioritization by code combinations coverage. J Syst Softw 169:110712. https:\/\/doi.org\/10.1016\/j.jss.2020.110712","journal-title":"J Syst Softw"},{"issue":"8","key":"6086_CR15","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.1007\/s13369-020-04472-z","volume":"45","author":"H Jahan","year":"2020","unstructured":"Jahan H, Feng Z, Mahmud SMH (2020) Risk-Based Test Case Prioritization by Correlating System Methods and Their Associated Risks. Arab J Sci Eng 45(8):6125\u20136138. https:\/\/doi.org\/10.1007\/s13369-020-04472-z","journal-title":"Arab J Sci Eng"},{"key":"6086_CR16","doi-asserted-by":"publisher","first-page":"8341","DOI":"10.1007\/s00500-017-2780-7","volume":"22","author":"M Khari","year":"2018","unstructured":"Khari M, Kumar P, Burgos D, Crespo RG (2018) Optimized test suites for automated testing using different optimization techniques. Soft Comput 22:8341\u20138352","journal-title":"Soft Comput"},{"issue":"12","key":"6086_CR17","doi-asserted-by":"publisher","first-page":"9143","DOI":"10.1007\/s00500-019-04444-y","volume":"24","author":"M Khari","year":"2020","unstructured":"Khari M, Sinha A, Verdu E, Crespo RG (2020) Performance analysis of six meta-heuristic algorithms over automated test suite generation for path coverage-based optimization. Soft Comput 24(12):9143\u20139160","journal-title":"Soft Comput"},{"issue":"2","key":"6086_CR18","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TSE.2020.2992428","volume":"48","author":"JAP Lima","year":"2022","unstructured":"Lima JAP, Vergilio SR (2022) A Multi-Armed Bandit Approach for Test Case Prioritization in Continuous Integration Environments. IEEE Trans Software Eng 48(2):453\u2013465. https:\/\/doi.org\/10.1109\/TSE.2020.2992428","journal-title":"IEEE Trans Software Eng"},{"key":"6086_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2019.106505","volume":"168","author":"G Lin","year":"2020","unstructured":"Lin G, Kramer H, Granderson J (2020) Building fault detection and diagnostics: Achieved savings, and methods to evaluate algorithm performance. Build Environ 168:106505. https:\/\/doi.org\/10.1016\/j.buildenv.2019.106505","journal-title":"Build Environ"},{"key":"6086_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110769","volume":"170","author":"P Ma","year":"2020","unstructured":"Ma P, Cheng H, Zhang J, Xuan J (2020) Can this fault be detected: A study on fault detection via automated test generation. J Syst Softw 170:110769. https:\/\/doi.org\/10.1016\/j.jss.2020.110769","journal-title":"J Syst Softw"},{"issue":"January","key":"6086_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106269","volume":"121","author":"M Mahdieh","year":"2020","unstructured":"Mahdieh M, Mirian-Hosseinabadi SH, Etemadi K, Nosrati A, Jalali S (2020) Incorporating fault-proneness estimations into coverage-based test case prioritization methods. Inf Softw Technol 121(January):106269. https:\/\/doi.org\/10.1016\/j.infsof.2020.106269","journal-title":"Inf Softw Technol"},{"issue":"9","key":"6086_CR22","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1016\/j.jksuci.2018.09.005","volume":"33","author":"R Mukherjee","year":"2021","unstructured":"Mukherjee R, Patnaik KS (2021) A survey on different approaches for software test case prioritization. J King Saud Univ Comput Inf Sci 33(9):1041\u20131054. https:\/\/doi.org\/10.1016\/j.jksuci.2018.09.005","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"6086_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110643","volume":"168","author":"V Nagaraju","year":"2020","unstructured":"Nagaraju V, Jayasinghe C, Fiondella L (2020) Optimal test activity allocation for covariate software reliability and security models. J Syst Softw 168:110643. https:\/\/doi.org\/10.1016\/j.jss.2020.110643","journal-title":"J Syst Softw"},{"issue":"17","key":"6086_CR24","doi-asserted-by":"publisher","first-page":"12981","DOI":"10.1007\/s00500-020-04719-9","volume":"24","author":"TM Nithya","year":"2020","unstructured":"Nithya TM, Chitra S (2020) Soft computing-based semi-automated test case selection using gradient-based techniques. Soft Comput 24(17):12981\u201312987. https:\/\/doi.org\/10.1007\/s00500-020-04719-9","journal-title":"Soft Comput"},{"key":"6086_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106268","volume":"121","author":"LJ Prado","year":"2020","unstructured":"Prado LJ, A & Vergilio S. R. (2020) Test Case Prioritization in Continuous Integration environments: A systematic mapping study. Inf Softw Technol 121:106268. https:\/\/doi.org\/10.1016\/j.infsof.2020.106268","journal-title":"Inf Softw Technol"},{"issue":"3","key":"6086_CR26","first-page":"389","volume":"74","author":"S Raju","year":"2012","unstructured":"Raju S, Uma GV (2012) Factors oriented test case prioritization technique in regression testing using genetic algorithm. Eur J Sci Res 74(3):389\u2013402","journal-title":"Eur J Sci Res"},{"key":"6086_CR27","doi-asserted-by":"publisher","unstructured":"Santos I, Melo SM, Lopes De Souza PS, Souza SRS (2020) Towards a unified catalog of attributes to guide industry in software testing technique selection. Proceedings - 2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2020 pp. 398\u2013407. https:\/\/doi.org\/10.1109\/ICSTW50294.2020.00071","DOI":"10.1109\/ICSTW50294.2020.00071"},{"key":"6086_CR28","doi-asserted-by":"publisher","unstructured":"Shrivastava AK, Kumar V, Kapur PK, Singh O (2020) Software release and testing stop time decision with change point.\u00a0Int J Syst Assur Eng Manag\u00a011:196\u2013207. https:\/\/doi.org\/10.1007\/s13198-020-00988-7","DOI":"10.1007\/s13198-020-00988-7"},{"key":"6086_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106491","volume":"94","author":"H Xiao","year":"2020","unstructured":"Xiao H, Cao M, Peng R (2020) Artificial neural network based software fault detection and correction prediction models considering testing effort. Appl Soft Comput J 94:106491. https:\/\/doi.org\/10.1016\/j.asoc.2020.106491","journal-title":"Applied Soft Computing Journal"},{"issue":"4","key":"6086_CR30","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.jestch.2019.10.005","volume":"23","author":"F Yucalar","year":"2020","unstructured":"Yucalar F, Ozcift A, Borandag E, Kilinc D (2020) Multiple-classifiers in software quality engineering: Combining predictors to improve software fault prediction ability. Eng Sci Technol 23(4):938\u2013950. https:\/\/doi.org\/10.1016\/j.jestch.2019.10.005","journal-title":"Engineering Science and Technology, an International Journal"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06086-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06086-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06086-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T05:06:05Z","timestamp":1705899965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06086-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":30,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["6086"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06086-3","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,22]]},"assertion":[{"value":"2 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of Publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}