{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:50:34Z","timestamp":1740124234341,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T00:00:00Z","timestamp":1560211200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T00:00:00Z","timestamp":1560211200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1564238"],"award-info":[{"award-number":["1564238"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11219-019-09449-2","type":"journal-article","created":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T04:55:09Z","timestamp":1560228909000},"page":"1383-1417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient regression testing approach for PHP Web applications using test selection and reusable constraints"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7086-9172","authenticated-orcid":false,"given":"Ravi","family":"Eda","sequence":"first","affiliation":[]},{"given":"Hyunsook","family":"Do","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,11]]},"reference":[{"key":"9449_CR1","unstructured":"Alshahwan, N., & Harman, M. (2012). State aware test case regeneration for improving web application test suite coverage and fault detection. In Proceedings of the 2012 international symposium on software testing and analysis, ISSTA 2012 (pp. 45\u201355). Minneapolis: ACM."},{"key":"9449_CR2","unstructured":"Andrews, J.H., Briand, L.C., Labiche, Y. (2005). Is mutation an appropriate tool for testing experiments?. In Proceedings of the 27th international conference on software engineering, ICSE \u201905 (pp. 402\u2013411). St. Louis: ACM."},{"key":"9449_CR3","unstructured":"Apiwattanapong, T., Santelices, R., Chittimalli, P.K., Orso, A., Harrold, M.J. (2006). Matrix: maintenance-oriented testing requirements identifier and examiner. In Proceedings of the testing: academic & industrial conference on practice and research techniques, TAIC-PART \u201906 (pp. 137\u2013146)."},{"key":"9449_CR4","doi-asserted-by":"crossref","unstructured":"Arnold, R.S., & Bohner, S.A. (1993). Impact analysis - towards a framework for comparison. In Proceedings of the conference on software maintenance, ICSM \u201993 (pp. 292\u2013301). IEEE.","DOI":"10.1109\/ICSM.1993.366933"},{"key":"9449_CR5","doi-asserted-by":"crossref","unstructured":"Artzi, S., Dolby, J., Tip, F., Pistoia, M. (2010). Practical fault localization for dynamic web applications. In Proceedings of the 32Nd ACM\/IEEE international conference on software engineering - vol. 1, ICSE \u201910 (pp. 265\u2013274). ACM.","DOI":"10.1145\/1806799.1806840"},{"key":"9449_CR6","unstructured":"Bell, J., Legunsen, O., Hilton, M., Eloussi, L., Yung, T., Marinov, D. (2018). Deflaker: automatically detecting flaky tests. In Proceedings of the 40th international conference on software engineering, ICSE\u201918 (pp. 433\u2013444). Gothenburg: ACM."},{"key":"9449_CR7","unstructured":"Boggs, R., Bozman, J., Perry, R. (2018). Reducing downtime and business loss: addressing business risk with effective technology. Technical report, International Data Corporation (IDC), 2009 Accessed October 2018."},{"key":"9449_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Probert, R.L., Ural, H. (2007). Model-based regression test suite generation using dependence analysis. In Proceedings of the 3rd international workshop on advances in model-based testing, A-MOST \u201907 (pp. 54\u201362). ACM.","DOI":"10.1145\/1291535.1291541"},{"key":"9449_CR9","unstructured":"Choco. (2018). \nhttp:\/\/www.emn.fr\/z-info\/choco-solver\/\n\n. Accessed October 2018."},{"key":"9449_CR10","unstructured":"Dallmeier, V., Burger, M., Orth, T., Zeller, A. (2012). Webmate: a tool for testing web 2.0 applications. In Proceedings of the workshop on javascript tools, JSTools\u201912 (pp. 11\u201315). Beijing: ACM."},{"key":"9449_CR11","unstructured":"Deng, Y., Frankl, P., Chays, D. (2005). Testing database transactions with agenda. In Proceedings of the 27th international conference on software engineering, ICSE \u201905 (pp. 78\u201387): ACM."},{"key":"9449_CR12","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1002\/stvr.1540","volume":"24","author":"H Do","year":"2014","unstructured":"Do, H., & Hossain, Md. (2014). An efficient regression testing approach for php web applications: a controlled experiment. Journal of Software Testing, Verification and Reliability, 24, 367\u2013385.","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"9449_CR13","doi-asserted-by":"crossref","unstructured":"Elbaum, S., Malishevsky, A., Rothermel, G. (2001). Incorporating varying test costs and fault severities into test case prioritization. In Proceedings of the 23rd international conference on software engineering, ICSE \u201901 (pp. 329\u2013338). IEEE.","DOI":"10.1109\/ICSE.2001.919106"},{"key":"9449_CR14","doi-asserted-by":"crossref","unstructured":"Emmi, M., Majumdar, R., Sen, K. (2007). Dynamic test input generation for database applications. In Proceedings of the 2007 international symposium on software testing and analysis, ISSTA \u201907 (pp. 151\u2013162). ACM.","DOI":"10.1145\/1273463.1273484"},{"key":"9449_CR15","doi-asserted-by":"crossref","unstructured":"Engstr\u00f6m, E., Skoglund, M., Runeson, P. (2008). Empirical evaluations of regression test selection techniques: a systematic review. In Proceedings of the second ACM-IEEE international symposium on empirical software engineering and measurement, ESEM \u201908 (pp. 22\u201331). ACM.","DOI":"10.1145\/1414004.1414011"},{"key":"9449_CR16","unstructured":"Faqforge. (2018). Web page. \nhttps:\/\/sourceforge.net\/projects\/faqforge\/\n\n. Accessed October 2018."},{"key":"9449_CR17","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Anand, S., Orso, A. (2009). Precise interface identification to improve testing and analysis of web applications. In Proceedings of the eighteenth international symposium on software testing and analysis, ISSTA \u201909 (pp. 285\u2013296). ACM.","DOI":"10.1145\/1572272.1572305"},{"key":"9449_CR18","unstructured":"Herzig, K., Greiler, M., Czerwonka, J., Murphy, B. (2015). The art of testing less without sacrificing quality. In Proceedings of the 37th international conference on software engineering - vol. 1, ICSE\u201915 (pp. 483\u2013493). Florence: IEEE."},{"key":"9449_CR19","doi-asserted-by":"crossref","unstructured":"Hooimeijer, P., & Weimer, W. (2010). Solving string constraints lazily. In Proceedings of the IEEE\/ACM international conference on automated software engineering, ASE \u201910 (pp. 377\u2013386). ACM.","DOI":"10.1145\/1858996.1859080"},{"key":"9449_CR20","doi-asserted-by":"crossref","unstructured":"Hossain, Md., Do, H., Eda, R. (2014). Regression testing for web applications using reusable constraint values. In Proceedings of the fourth international workshop on regression testing (Regression 2014), Cleveland, USA (pp. 312\u2013321).","DOI":"10.1109\/ICSTW.2014.35"},{"key":"9449_CR21","unstructured":"Humbug. (2018). Mutation testing for php. \nhttps:\/\/github.com\/humbug\/humbug\/\n\n. Accessed October 2018."},{"key":"9449_CR22","doi-asserted-by":"crossref","unstructured":"Jia, X., Ghezzi, C., Ying, S. (2015). Enhancing reuse of constraint solutions to improve symbolic execution. In Proceedings of the 2015 international symposium on software testing and analysis, ISSTA 2015 (pp. 177\u2013187). ACM.","DOI":"10.1145\/2771783.2771806"},{"key":"9449_CR23","unstructured":"Just, R., Jalali, D., Inozemtseva, L., Ernst, M.D., Holmes, R., Fraser, G. (2014). Are mutants a valid substitute for real faults in software testing?. In Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, FSE 2014 (pp. 654\u2013665). Hong Kong: ACM."},{"issue":"2","key":"9449_CR24","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/3057269","volume":"50","author":"R Kazmi","year":"2017","unstructured":"Kazmi, R., Jawawi, D.N.A., Mohamad, R., Ghani, I. (2017). Effective regression test case selection: a systematic literature review. ACM Computing Surveys, 50(2), 29:1\u201329:32.","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"9449_CR25","first-page":"25:1","volume":"21","author":"A Kiezun","year":"2013","unstructured":"Kiezun, A., Ganesh, V., Artzi, S., Guo, P.J., Hooimeijer, P., Ernst, M.D. (2013). Hampi: a solver for word equations over strings, regular expressions, and context-free grammars. ACM Transactions on Software Engineering and Methodology, 21(4), 25:1\u201325:28.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"9449_CR26","doi-asserted-by":"crossref","unstructured":"Kim, M., Cobb, J., Harrold, M.J., Kurc, T., Orso, A., Saltz, J., Post, A., Malhotra, K., Navathe, S.B. (2012). Efficient regression testing of ontology-driven systems. In Proceedings of the 2012 international symposium on software testing and analysis, ISSTA 2012 (pp. 320\u2013330). ACM.","DOI":"10.1145\/2338965.2336792"},{"issue":"8","key":"9449_CR27","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","volume":"28","author":"BA Kitchenham","year":"2002","unstructured":"Kitchenham, B.A., Pfleeger, S.L., Pickard, L.M., Jones, P.W., Hoaglin, D.C., El Emam, K., Rosenberg, J. (2002). Preliminary guidelines for empirical research in software engineering. IEEE Transactions on Software Engineering, 28(8), 721\u2013734.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9449_CR28","doi-asserted-by":"crossref","unstructured":"Klarlund, N. (1998). Mona & fido: the logic-automaton connection in practice. In Selected papers from the11th international workshop on computer science logic, CSL\u201997 (pp. 311\u2013326). Springer.","DOI":"10.1007\/BFb0028022"},{"key":"9449_CR29","unstructured":"Legunsen, O., Hariri, F., Shi, A., Lu, Y., Zhang, L., Marinov, D. (2016). An extensive study of static regression test selection in modern software evolution. In Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering, FSE 2016 (pp. 583\u2013594). Seattle: ACM."},{"key":"9449_CR30","unstructured":"Leung, H.K.N., & White, L. (1989). Insights into regression testing. In Proceedings of the conference on software maintenance (pp. 60\u201369). IEEE."},{"key":"9449_CR31","unstructured":"Log4php. (2018a). Web page. \nhttp:\/\/logging.apache.org\/log4php\/\n\n. Accessed October 2018."},{"key":"9449_CR32","unstructured":"Log4php. (2018b). Issue 133. \nhttps:\/\/issues.apache.org\/jira\/browse\/LOG4PHP-133\/\n\n. Accessed October 2018."},{"key":"9449_CR33","unstructured":"Mambo. (2018). Web page. \nhttp:\/\/mambo-foundation.org\/\n\n. Accessed October 2018."},{"key":"9449_CR34","unstructured":"Mantis. (2018). Web page. \nhttp:\/\/www.mantisbt.org\/\n\n. Accessed October 2018."},{"issue":"4","key":"9449_CR35","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TSE.2011.56","volume":"38","author":"S Mirarab","year":"2012","unstructured":"Mirarab, S., Akhlaghi, S., Tahvildari, L. (2012). Size-constrained regression test case selection using multicriteria optimization. IEEE Transactions on Software Engineering, 38(4), 936\u2013956.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9449_CR36","unstructured":"\u00d6qvist, J., Hedin, G., Magnusson, B. (2016). Extraction-based regression test selection. In Proceedings of the 13th international conference on principles and practices of programming on the Java platform: virtual machines, languages, and tools, PPPJ\u201916 (pp. 5:1\u20135:10). Lugano: ACM."},{"key":"9449_CR37","unstructured":"Oscommerce. (2018). Web page. \nhttps:\/\/www.oscommerce.com\/\n\n. Accessed October 2018."},{"key":"9449_CR38","unstructured":"Papadakis, M., Shin, D., Yoo, S., Bae, D.-H. (2018). Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults. In Proceedings of the 40th international conference on software engineering, ICSE\u201918 (pp. 537\u2013548). Gothenburg: ACM."},{"key":"9449_CR39","unstructured":"Phpscheduleit. (2018a). Web page. \nhttps:\/\/sourceforge.net\/projects\/phpscheduleit\/\n\n. Accessed October 2018."},{"key":"9449_CR40","unstructured":"Phpscheduleit. (2018b). Issue 18. \nhttps:\/\/sourceforge.net\/p\/phpscheduleit\/bugs\/18\/\n\n. Accessed October 2018."},{"key":"9449_CR41","unstructured":"Phpunit. (2018). Official site. \nhttp:\/\/phpunit.de\/\n\n. Accessed October 2018."},{"issue":"10","key":"9449_CR42","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/1035292.1029012","volume":"39","author":"X Ren","year":"2004","unstructured":"Ren, X., Shah, F., Tip, F., Ryder, B.G., Chesley, O. (2004). Chianti: a tool for change impact analysis of java programs. SIGPLAN Notices, 39(10), 432\u2013448.","journal-title":"SIGPLAN Notices"},{"key":"9449_CR43","doi-asserted-by":"crossref","unstructured":"Ricca, F., & Tonella, P. (2001). Analysis and testing of web applications. In Proceedings of the 23rd international conference on software engineering, ICSE \u201901 (pp. 25\u201334). IEEE.","DOI":"10.1109\/ICSE.2001.919078"},{"issue":"8","key":"9449_CR44","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/32.536955","volume":"22","author":"G Rothermel","year":"1996","unstructured":"Rothermel, G., & Harrold, M.J. (1996). Analyzing regression test selection techniques. IEEE Transactions on Software Engineering, 22(8), 529\u2013551.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9449_CR45","unstructured":"Rothermel, G., & Harrold, M.J. (1994). A framework for evaluating regression test selection techniques. In Proceedings of the 16th international conference on software engineering, ICSE \u201994 (pp. 201\u2013210): IEEE."},{"issue":"2","key":"9449_CR46","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1145\/248233.248262","volume":"6","author":"G Rothermel","year":"1997","unstructured":"Rothermel, G., & Harrold, M.J. (1997). A safe, efficient regression test selection technique. ACM Transactions on Software Engineering and Methodology, 6(2), 173\u2013210.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"9449_CR47","doi-asserted-by":"crossref","unstructured":"Rubinov, K., & Wuttke, J. (2012). Augmenting test suites automatically. In Proceedings of the 34th international conference on software engineering, ICSE \u201912 (pp. 1433\u20131434). IEEE.","DOI":"10.1109\/ICSE.2012.6227078"},{"key":"9449_CR48","doi-asserted-by":"crossref","unstructured":"Santelices, R., & Harrold, M.J. (2011). Applying aggressive propagation-based strategies for testing changes. In Proceedings of the 2011 fourth IEEE international conference on software testing, verification and validation, ICST \u201911 (pp. 11\u201320). IEEE.","DOI":"10.1109\/ICST.2011.46"},{"key":"9449_CR49","unstructured":"Seleniumhq. (2018). Official site. \nhttp:\/\/www.seleniumhq.org\/\n\n. Accessed October 2018."},{"key":"9449_CR50","doi-asserted-by":"crossref","unstructured":"Shi, A., Yung, T., Gyori, A., Marinov, D. (2015). Comparing and combining test-suite reduction and regression test selection. In Proceedings of the 2015 10th joint meeting on foundations of software engineering, ESEC\/FSE 2015 (pp. 237\u2013247). ACM.","DOI":"10.1145\/2786805.2786878"},{"issue":"C","key":"9449_CR51","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jss.2015.07.047","volume":"109","author":"X Sun","year":"2015","unstructured":"Sun, X., Li, B., Leung, H., Li, B., Zhu, J. (2015). Static change impact analysis techniques. Journal of Systems and Software, 109(C), 137\u2013149.","journal-title":"Journal of Systems and Software"},{"key":"9449_CR52","doi-asserted-by":"crossref","unstructured":"Taneja, K., Xie, T., Tillmann, N., de Halleux, J. (2011). Express: guided path exploration for efficient regression test generation. In Proceedings of the 2011 international symposium on software testing and analysis, ISSTA \u201911 (pp. 1\u201311). ACM.","DOI":"10.1145\/2001420.2001422"},{"issue":"6","key":"9449_CR53","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TSE.2003.1205178","volume":"29","author":"P Tonella","year":"2003","unstructured":"Tonella, P. (2003). Using a concept lattice of decomposition slices for program understanding and impact analysis. IEEE Transactions on Software Engineering, 29 (6), 495\u2013509.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9449_CR54","unstructured":"Visser, W., Geldenhuys, J., Dwyer, M.B. (2012). Green: reducing, reusing and recycling constraints in program analysis. In Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, FSE \u201912 (pp. 58:1\u201358:11). ACM."},{"issue":"6","key":"9449_CR55","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1273442.1250739","volume":"42","author":"G Wassermann","year":"2007","unstructured":"Wassermann, G., & Su, Z. (2007). Sound and precise analysis of web applications for injection vulnerabilities. SIGPLAN Notices, 42(6), 32\u201341.","journal-title":"SIGPLAN Notices"},{"key":"9449_CR56","doi-asserted-by":"crossref","unstructured":"Wassermann, G., Yu, D., Chander, A., Dhurjati, D., Inamura, H., Su, Z. (2008). Dynamic test input generation for web applications. In Proceedings of the 2008 international symposium on software testing and analysis, ISSTA \u201908 (pp. 249\u2013260). ACM.","DOI":"10.1145\/1390630.1390661"},{"issue":"1","key":"9449_CR57","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1039174.1039200","volume":"30","author":"L Xu","year":"2005","unstructured":"Xu, L., Xu, B., Jiang, J. (2005). Testing web applications focusing on their specialties. SIGSOFT Software Engineering Notes, 30(1), 10.","journal-title":"SIGSOFT Software Engineering Notes"},{"key":"9449_CR58","doi-asserted-by":"crossref","unstructured":"Xu, Z., Kim, Y., Kim, M., Rothermel, G. (2011). A hybrid directed test suite augmentation technique. In Proceedings of the 2011 IEEE 22nd international symposium on software reliability engineering, ISSRE \u201911 (pp. 150\u2013159). IEEE.","DOI":"10.1109\/ISSRE.2011.21"},{"key":"9449_CR59","doi-asserted-by":"crossref","unstructured":"Xu, Z., Kim, Y., Kim, M., Rothermel, G., Cohen, M.B. (2010). Directed test suite augmentation: techniques and tradeoffs. In Proceedings of the eighteenth ACM SIGSOFT international symposium on foundations of software engineering, FSE \u201910 (pp. 257\u2013266). ACM.","DOI":"10.1145\/1882291.1882330"},{"issue":"2","key":"9449_CR60","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo, S., & Harman, M. (2012). Regression testing minimization, selection and prioritization: a survey. Software Test Verification Reliability, 22(2), 67\u2013120.","journal-title":"Software Test Verification Reliability"},{"key":"9449_CR61","unstructured":"Ziftci, C., & Reardon, J. (2017). Who broke the build?: automatically identifying changes that induce test failures in continuous integration at google scale. In Proceedings of the 39th international conference on software engineering: software engineering in practice track, ICSE-SEIP \u201917 (pp. 113\u2013122). Buenos Aires: IEEE."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-019-09449-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-019-09449-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-019-09449-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T23:38:40Z","timestamp":1591745920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-019-09449-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,11]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9449"],"URL":"https:\/\/doi.org\/10.1007\/s11219-019-09449-2","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"type":"print","value":"0963-9314"},{"type":"electronic","value":"1573-1367"}],"subject":[],"published":{"date-parts":[[2019,6,11]]},"assertion":[{"value":"11 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}