{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:47Z","timestamp":1773840227429,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,9,22]],"date-time":"2017-09-22T00:00:00Z","timestamp":1506038400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11219-017-9388-0","type":"journal-article","created":{"date-parts":[[2017,9,21]],"date-time":"2017-09-21T19:37:07Z","timestamp":1506022627000},"page":"1571-1594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An assessment of operational coverage as both an adequacy and a selection criterion for operational profile based testing"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9608-9393","authenticated-orcid":false,"given":"Breno","family":"Miranda","sequence":"first","affiliation":[]},{"given":"Antonia","family":"Bertolino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,22]]},"reference":[{"key":"9388_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/9781316771273","volume-title":"Introduction to software testing","author":"P Ammann","year":"2016","unstructured":"Ammann, P., & Offutt, J. (2016). Introduction to software testing. Cambridge: Cambridge University Press."},{"key":"9388_CR2","doi-asserted-by":"publisher","unstructured":"Ball, T., Mataga, P., & Sagiv, M. (1998). Edge profiling versus path profiling: the showdown. In Proceedings of the 25th symposium on principles of programming languages, POPL\u201998 (pp. 134\u2013148). New York, NY, USA: ACM. \n                        https:\/\/doi.org\/10.1145\/268946.268958\n                        \n                    .","DOI":"10.1145\/268946.268958"},{"key":"9388_CR3","doi-asserted-by":"crossref","unstructured":"Bartolini, C., Bertolino, A., Elbaum, S., & Marchetti, E. (2009). Whitening SOA testing. In Proceedings of the ESEC\/FSE \u201909 (pp. 161\u2013170): ACM.","DOI":"10.1145\/1595696.1595721"},{"issue":"12","key":"9388_CR4","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TSE.1987.232881","volume":"13","author":"V Basili","year":"1987","unstructured":"Basili, V., & Selby, R. (1987). Comparing the effectiveness of software testing strategies. IEEE Trans. Softw. Eng. SE, 13(12), 1278\u20131296. \n                        https:\/\/doi.org\/10.1109\/TSE.1987.232881\n                        \n                    .","journal-title":"IEEE Trans. Softw. Eng. SE"},{"key":"9388_CR5","doi-asserted-by":"publisher","unstructured":"Bertolino, A. (2007). Software testing research: achievements, challenges, dreams. In 2007 future of software engineering, FOSE \u201907 (pp. 85\u2013103). Washington, DC, USA: IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/FOSE.2007.25\n                        \n                    .","DOI":"10.1109\/FOSE.2007.25"},{"key":"9388_CR6","doi-asserted-by":"publisher","unstructured":"Bertolino, A., Miranda, B., Pietrantuono, R., & Russo, S. (2017). Adaptive coverage and operational profile-based testing for reliability improvement. In Proceedings of the 39th international conference on software engineering, ICSE \u201917 (pp. 541\u2013551). Piscataway, NJ, USA: IEEE Press. \n                        https:\/\/doi.org\/10.1109\/ICSE.2017.56\n                        \n                    .","DOI":"10.1109\/ICSE.2017.56"},{"key":"9388_CR7","doi-asserted-by":"publisher","unstructured":"Del Frate, F., Garg, P., Mathur, A., & Pasquini, A. (1995). On the correlation between code coverage and software reliability. In Proceedings of the 6th international Symposium on sw reliability engineering (pp. 124\u2013132). \n                        https:\/\/doi.org\/10.1109\/ISSRE.1995.497650\n                        \n                    .","DOI":"10.1109\/ISSRE.1995.497650"},{"issue":"4","key":"9388_CR8","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do, H., Elbaum, S.G., & Rothermel, G. (2005). Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empirical Software Engineering, 10(4), 405\u2013435.","journal-title":"Empirical Software Engineering"},{"issue":"4","key":"9388_CR9","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TSE.2005.50","volume":"31","author":"S Elbaum","year":"2005","unstructured":"Elbaum, S., & Diep, M. (2005). Profiling deployed software: assessing strategies and testing opportunities. IEEE Transactions on Software Engineering, 31(4), 312\u2013327. \n                        https:\/\/doi.org\/10.1109\/TSE.2005.50\n                        \n                    .","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"9388_CR10","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10009-014-0330-5","volume":"16","author":"G Erdogan","year":"2014","unstructured":"Erdogan, G., Li, Y., Runde, R.K., Seehusen, F., & St\u00f8len, K. (2014). Approaches for the combined use of risk analysis and testing: a systematic literature review. International Journal on Software Tools for Technology Transfer, 16(5), 627\u2013642. \n                        https:\/\/doi.org\/10.1007\/s10009-014-0330-5\n                        \n                    .","journal-title":"International Journal on Software Tools for Technology Transfer"},{"issue":"3","key":"9388_CR11","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s11219-013-9226-y","volume":"22","author":"M Felderer","year":"2014","unstructured":"Felderer, M., & Ramler, R. (2014). Integrating risk-based testing in industrial test processes. Software Quality Journal, 22(3), 543\u2013575. \n                        https:\/\/doi.org\/10.1007\/s11219-013-9226-y\n                        \n                    .","journal-title":"Software Quality Journal"},{"issue":"8","key":"9388_CR12","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/32.707695","volume":"24","author":"P Frankl","year":"1998","unstructured":"Frankl, P., Hamlet, R., Littlewood, B., & Strigini, L. (1998). Evaluating testing methods by delivered reliability. IEEE Transactions on Software Engineering, 24(8), 586\u2013601. \n                        https:\/\/doi.org\/10.1109\/32.707695\n                        \n                    .","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9388_CR13","doi-asserted-by":"publisher","unstructured":"Gopinath, R., Jensen, C., & Groce, A. (2014). Code coverage for suite evaluation by developers. In Proceedings of the 36th international conference on software engineering, ICSE 2014 (pp. 72\u201382). New York, NY, USA: ACM. \n                        https:\/\/doi.org\/10.1145\/2568225.2568278\n                        \n                    .","DOI":"10.1145\/2568225.2568278"},{"key":"9388_CR14","doi-asserted-by":"crossref","unstructured":"Harder, M., Mellen, J., & Ernst, M.D. (2003). Improving test suites via operational abstraction. In Proceedings of the 25th international conference on software engineering (pp. 60\u201371): IEEE Computer Society.","DOI":"10.1109\/ICSE.2003.1201188"},{"key":"9388_CR15","doi-asserted-by":"publisher","unstructured":"Harrold, M.J., Rothermel, G., Wu, R., & Yi, L. (1998). An empirical investigation of program spectra. In Proceedings of the PASTE \u201998 (pp. 83\u201390). \n                        https:\/\/doi.org\/10.1145\/277631.277647\n                        \n                    .","DOI":"10.1145\/277631.277647"},{"key":"9388_CR16","doi-asserted-by":"crossref","unstructured":"Inozemtseva, L., & Holmes, R. (2014). Coverage is not strongly correlated with test suite effectiveness. In Proceedings of the 36th international conference on software engineering (pp. 435\u2013445): ACM.","DOI":"10.1145\/2568225.2568271"},{"key":"9388_CR17","doi-asserted-by":"crossref","unstructured":"Jin, W., & Orso, A. (2013). F3: fault localization for field failures. In Proceedings of the ISSTA (pp. 213\u2013223): ACM.","DOI":"10.1145\/2483760.2483763"},{"key":"9388_CR18","doi-asserted-by":"publisher","unstructured":"Kochhar, P., Thung, F., & Lo, D. (2015). Code coverage and test suite effectiveness: empirical study with real bugs in large systems. In Proceedings of the SANER (pp. 560\u2013564). \n                        https:\/\/doi.org\/10.1109\/SANER.2015.7081877\n                        \n                    .","DOI":"10.1109\/SANER.2015.7081877"},{"key":"9388_CR19","volume-title":"Handbook of software reliability engineering","author":"MR Lyu","year":"1996","unstructured":"Lyu, M. R., & et al. (1996). Handbook of software reliability engineering. CA: IEEE Computer Society Press."},{"key":"9388_CR20","unstructured":"Marick, B. (1999). How to misuse code coverage. In Proceedings of the 16th international conference on testing comp. sw. (pp. 16\u201318)."},{"key":"9388_CR21","doi-asserted-by":"publisher","unstructured":"Miranda, B. (2014). A proposal for revisiting coverage testing metrics. In ACM\/IEEE International conference on automated software engineering, ASE\u201914 (pp. 899\u2013902). \n                        https:\/\/doi.org\/10.1145\/2642937.2653471\n                        \n                    .","DOI":"10.1145\/2642937.2653471"},{"key":"9388_CR22","unstructured":"Miranda, B. (2016). Redefining and evaluating coverage criteria based on the testing scope. Ph.D. thesis, University of Pisa, Italy."},{"key":"9388_CR23","doi-asserted-by":"publisher","unstructured":"Miranda, B., & Bertolino, A. (2014). Social coverage for customized test adequacy and selection criteria. In 9Th international workshop on automation of software test, AST 2014 (pp. 22\u201328). \n                        https:\/\/doi.org\/10.1145\/2593501.2593505\n                        \n                    .","DOI":"10.1145\/2593501.2593505"},{"key":"9388_CR24","doi-asserted-by":"publisher","unstructured":"Miranda, B., & Bertolino, A. (2015). Improving test coverage measurement for reused software. In 41St euromicro conference on software engineering and advanced applications, SEAA 2015 (pp. 27\u201334). \n                        https:\/\/doi.org\/10.1109\/SEAA.2015.69\n                        \n                    .","DOI":"10.1109\/SEAA.2015.69"},{"key":"9388_CR25","doi-asserted-by":"publisher","unstructured":"Miranda, B., & Bertolino, A. (2016a). Does code coverage provide a good stopping rule for operational profile based testing?. In Proceedings of the 11th international workshop on automation of software test, AST \u201916 (pp. 22\u201328). New York, NY, USA: ACM. \n                        https:\/\/doi.org\/10.1145\/2896921.2896934\n                        \n                    .","DOI":"10.1145\/2896921.2896934"},{"key":"9388_CR26","doi-asserted-by":"publisher","unstructured":"Miranda, B., & Bertolino, A. (2016b). Scope-aided test prioritization, selection and minimization for software reuse Journal of Systems and Software. \n                        https:\/\/doi.org\/10.1016\/j.jss.2016.06.058\n                        \n                    , \n                        http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121216300875\n                        \n                    .","DOI":"10.1016\/j.jss.2016.06.058"},{"issue":"2","key":"9388_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/52.199724","volume":"10","author":"JD Musa","year":"1993","unstructured":"Musa, J.D. (1993). Operational profiles in software-reliability engineering. IEEE Software, 10(2), 14\u201332.","journal-title":"IEEE Software"},{"key":"9388_CR28","doi-asserted-by":"publisher","unstructured":"Orso, A. (2010). Monitoring, analysis, and testing of deployed software. In Proceedings of the FSE\/SDP workshop on future of software engineering research, FoSER \u201910 (pp. 263\u2013268). New York, NY, USA: ACM. \n                        https:\/\/doi.org\/10.1145\/1882362.1882417\n                        \n                    .","DOI":"10.1145\/1882362.1882417"},{"key":"9388_CR29","doi-asserted-by":"publisher","unstructured":"Orso, A., Liang, D., Harrold, M.J., & Lipton, R. (2002). Gamma system: continuous evolution of software after deployment. In Proceedings of the Int. Symp. on sw. Testing and analysis, ISSTA \u201902 (pp. 65\u201369): ACM. \n                        https:\/\/doi.org\/10.1145\/566172.566182\n                        \n                    .","DOI":"10.1145\/566172.566182"},{"key":"9388_CR30","doi-asserted-by":"publisher","unstructured":"Orso, A., Apiwattanapong, T., & Harrold, M.J. (2003). Leveraging field data for impact analysis and regression testing. In Proceedings of the ESEC\/FSE-11 (pp. 128\u2013137): ACM. \n                        https:\/\/doi.org\/10.1145\/940071.940089\n                        \n                    .","DOI":"10.1145\/940071.940089"},{"key":"9388_CR31","unstructured":"Staats, M., Gay, G., Whalen, M., & Heimdahl, M. (2012). On the danger of coverage directed test case generation. In FASE\u201912 (pp. 409\u2013424): Springer."},{"issue":"2","key":"9388_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/52.73748","volume":"8","author":"J Voas","year":"1991","unstructured":"Voas, J., Morell, L., & Miller, K. (1991). Predicting where faults can hide from testing. IEEE Software, 8(2), 41\u201348. \n                        https:\/\/doi.org\/10.1109\/52.73748\n                        \n                    .","journal-title":"IEEE Software"},{"key":"9388_CR33","unstructured":"Wei, Y., Meyer, B., & Oriol, M. (2012). Is branch coverage a good measure of testing effectiveness?. In Emp. sw. eng. and verification (pp. 194\u2013212): Springer."},{"key":"9388_CR34","doi-asserted-by":"publisher","unstructured":"Wong, W., Horgan, J., London, S., & Mathur, A. (1994). Effect of test set size and block coverage on the fault detection effectiveness. In Proceedings of the 5th international Symposium on software reliability engineering (pp. 230\u2013238). \n                        https:\/\/doi.org\/10.1109\/ISSRE.1994.341379\n                        \n                    .","DOI":"10.1109\/ISSRE.1994.341379"},{"issue":"8","key":"9388_CR35","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong, W.E., Gao, R., Li, Y., Abreu, R., & Wotawa, F. (2016). A survey on software fault localization. IEEE Transactions on Software Engineering, 42(8), 707\u2013740.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"9388_CR36","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1109\/TSE.2005.107","volume":"31","author":"T Xie","year":"2005","unstructured":"Xie, T., & Notkin, D. (2005). Checking inside the black box: regression testing by comparing value spectra. IEEE Transactions on Software Engineering, 31(10), 869\u2013883. \n                        https:\/\/doi.org\/10.1109\/TSE.2005.107\n                        \n                    .","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"9388_CR37","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A.V., & May, J.H.R. (1997). Software unit test coverage and adequacy. ACM Computing Surveys, 29(4), 366\u2013427. \n                        https:\/\/doi.org\/10.1145\/267580.267590\n                        \n                    .","journal-title":"ACM Computing Surveys"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-017-9388-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9388-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9388-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T11:39:01Z","timestamp":1540899541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-017-9388-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,22]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9388"],"URL":"https:\/\/doi.org\/10.1007\/s11219-017-9388-0","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,22]]}}}