{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:05Z","timestamp":1772119865481,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T00:00:00Z","timestamp":1737763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T00:00:00Z","timestamp":1737763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["88887.341243\/2019-00"],"award-info":[{"award-number":["88887.341243\/2019-00"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["308445\/2021-0"],"award-info":[{"award-number":["308445\/2021-0"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11219-025-09708-5","type":"journal-article","created":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T03:29:45Z","timestamp":1737775785000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Code change and smell techniques for regression test selection"],"prefix":"10.1007","volume":"33","author":[{"given":"Allan","family":"Mori","sequence":"first","affiliation":[]},{"given":"Ana C. R.","family":"Paiva","sequence":"additional","affiliation":[]},{"given":"Simone R. S.","family":"Souza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,25]]},"reference":[{"key":"9708_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273","volume-title":"Introduction to software testing","author":"P Ammann","year":"2016","unstructured":"Ammann, P., & Offutt, J. (2016). Introduction to software testing. Cambridge: Cambridge University Press. https:\/\/doi.org\/10.1017\/9781316771273"},{"key":"9708_CR2","doi-asserted-by":"publisher","unstructured":"Cairo, A.S., Carneiro, G., Resende, A., & Abreu, F.B. (2019). The influence of god class and long method in the occurrence of bugs in two open source software projects: an exploratory study. In: The 31st international conference on software engineering and knowledge engineering (pp. 199\u2013204). https:\/\/doi.org\/10.18293\/SEKE2019-084","DOI":"10.18293\/SEKE2019-084"},{"key":"9708_CR3","doi-asserted-by":"publisher","unstructured":"D\u2019Ambros, M., Bacchelli, A., Lanza, M. (2010). On the impact of design flaws on software defects. In: The 10th international conference on quality software (pp. 23\u201331). https:\/\/doi.org\/10.1109\/QSIC.2010.58","DOI":"10.1109\/QSIC.2010.58"},{"key":"9708_CR4","doi-asserted-by":"publisher","unstructured":"Danphitsanuphan, P., & Suwantada, T. (2012). Code smell detecting tool and code smell-structure bug relationship. In: 2012 spring congress on engineering and technology (pp. 1\u20135). https:\/\/doi.org\/10.1109\/SCET.2012.6342082","DOI":"10.1109\/SCET.2012.6342082"},{"key":"9708_CR5","doi-asserted-by":"publisher","unstructured":"Engstr\u00f6m, E., Runeson, P., & Skoglund, M. (2010). A systematic review on regression test selection techniques (vol. 52, pp. 14\u201330). https:\/\/doi.org\/10.1016\/j.infsof.2009.07.001","DOI":"10.1016\/j.infsof.2009.07.001"},{"key":"9708_CR6","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Vale, G., Sousa, L., Figueiredo, E., Garcia, A., & Lee, J. (2017). No code anomaly is an island: Anomaly agglomeration as sign of product line instabilities. In: Mastering scale and complexity in software reuse: 16th International Conference on Software Reuse, ICSR 2017, Salvador, Brazil, May 29-31, 2017, Proceedings 16 (pp. 48\u201364). Springer","DOI":"10.1007\/978-3-319-56856-0_4"},{"key":"9708_CR7","doi-asserted-by":"publisher","unstructured":"Fontana, F.A., Zanoni, M., Marino, A., & M\u00e4ntyl\u00e4, M.V. (2013). Code smell detection: Towards a machine learning-based approach. In: 29th International Conference on Software Maintenance (ICSM) (pp. 396\u2013399). https:\/\/doi.org\/10.1109\/ICSM.2013.56","DOI":"10.1109\/ICSM.2013.56"},{"key":"9708_CR8","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"2018","unstructured":"Fowler, M. (2018). Refactoring: Improving the Design of Existing Code (2nd ed.). Boston: Addison-Wesley Professional.","edition":"2"},{"key":"9708_CR9","doi-asserted-by":"publisher","unstructured":"Gradi\u0161nik, M., Berani\u010d, T., Karakati\u010d, S., & Mausa\u0161, G. (2019). Adapting god class thresholds for software defect prediction: a case study. In: 42nd international convention on information and communication technology, electronics and microelectronics (MIPRO) (pp. 1537\u20131542). https:\/\/doi.org\/10.23919\/MIPRO.2019.8757009","DOI":"10.23919\/MIPRO.2019.8757009"},{"issue":"2","key":"9708_CR10","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1145\/367008.367020","volume":"10","author":"TL Graves","year":"2001","unstructured":"Graves, T. L., Harrold, M. J., Kim, J.-M., Porter, A., & Rothermel, G. (2001). An empirical study of regression test selection techniques. ACM Transactions on Software Engineering and Methodology (TOSEM), 10(2), 184\u2013208.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"9708_CR11","doi-asserted-by":"publisher","unstructured":"IEEE. (1990). Ieee standard glossary of software engineering terminology (pp. 1\u201384). IEEE. https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064","DOI":"10.1109\/IEEESTD.1990.101064"},{"key":"9708_CR12","doi-asserted-by":"publisher","unstructured":"Just, R., Jalali, D., & Ernst, M.D. (2014) Defects4j: a database of existing faults to enable controlled testing studies for java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA) (pp. 437\u2013440). https:\/\/doi.org\/10.1145\/2610384.2628055","DOI":"10.1145\/2610384.2628055"},{"key":"9708_CR13","doi-asserted-by":"publisher","unstructured":"Kaur, K., & Kaur, P. (2017). Evaluation of sampling techniques in software fault prediction using metrics and code smells. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1377\u20131387). https:\/\/doi.org\/10.1109\/ICACCI.2017.8126033","DOI":"10.1109\/ICACCI.2017.8126033"},{"issue":"2","key":"9708_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057269","volume":"50","author":"R Kazmi","year":"2017","unstructured":"Kazmi, R., Jawawi, D. N., Mohamad, R., & Ghani, I. (2017). Effective regression test case selection: a systematic literature review. ACM Computing Surveys (CSUR), 50(2), 1\u201332.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"9708_CR15","doi-asserted-by":"publisher","unstructured":"Koru, A.G., & Liu, H. (2005). An investigation of the effect of module size on defect prediction using static measures (vol. 30, pp. 1\u20135). New York: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/1082983.1083172","DOI":"10.1145\/1082983.1083172"},{"key":"9708_CR16","unstructured":"Kung, D.C., Gao, J., Hsia, P., Lin, J., & Toyoshima, Y. (1995). Class firewall, test order, and regression testing of object-oriented programs (vol. 8, pp. 51\u201365)."},{"key":"9708_CR17","doi-asserted-by":"publisher","unstructured":"Legunsen, O., Hariri, F., Shi, A., Lu, Y., Zhang, L., & Marinov, D. (2016). An extensive study of static regression test selection in modern software evolution. In: Proceedings of the 24th ACM SIGSOFT international symposium on Foundations of Software Engineering (FSE) (pp. 583\u2013594). https:\/\/doi.org\/10.1145\/2950290.2950361","DOI":"10.1145\/2950290.2950361"},{"key":"9708_CR18","doi-asserted-by":"publisher","unstructured":"Li, W., & Shatnawi, R. (2007) An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution (vol. 80, pp. 1120\u20131128). https:\/\/doi.org\/10.1016\/j.jss.2006.10.018","DOI":"10.1016\/j.jss.2006.10.018"},{"key":"9708_CR19","doi-asserted-by":"publisher","unstructured":"Lou, Y., Chen, J., Zhang, L., & Hao, D. (2019). A survey on regression test-case prioritization. Advances in Computers (vol. 113, pp. 1\u201346). Elsevier. https:\/\/doi.org\/10.1016\/bs.adcom.2018.10.001","DOI":"10.1016\/bs.adcom.2018.10.001"},{"key":"9708_CR20","doi-asserted-by":"publisher","unstructured":"Mao, C., & Lu, Y. (2005). Regression testing for component-based software systems by enhancing change information. In: Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC\u201905). https:\/\/doi.org\/10.1109\/APSEC.2005.95","DOI":"10.1109\/APSEC.2005.95"},{"key":"9708_CR21","doi-asserted-by":"publisher","unstructured":"Mori, A., Paiva, A.C.R., & Souza, S.R.S. (2023) An approach to regression testing selection based on code changes and smells. In: Proceedings of the 8th brazilian symposium on Systematic and Automated Software Testing (SAST) (pp. 25\u201334). https:\/\/doi.org\/10.1145\/3624032.3624036","DOI":"10.1145\/3624032.3624036"},{"key":"9708_CR22","doi-asserted-by":"publisher","unstructured":"Mori, A., Vale, G., Viggiato, M., Oliveira, J., Figueiredo, E., Cirilo, E., Jamshidi, P., & Kastner, C. (2018). Evaluating domain-specific metric thresholds: an empirical study. In: Proceedings of the 1st international conference on technical debt (pp. 41\u201350). https:\/\/doi.org\/10.1145\/3194164.3194173","DOI":"10.1145\/3194164.3194173"},{"key":"9708_CR23","doi-asserted-by":"publisher","unstructured":"Myers, G.J., Sandler, C., & Badgett, T. (2012). The art of software testing (3rd ed.) Hoboken and N.J.: John Wiley & Sons. https:\/\/doi.org\/10.1002\/9781119202486","DOI":"10.1002\/9781119202486"},{"key":"9708_CR24","doi-asserted-by":"publisher","unstructured":"Nascimento, R., & Sant\u2019Anna, C. (2017) Investigating the relationship between bad smells and bugs in software systems. In: Proceedings of the 11th Brazilian symposium on Software Components, Architectures, and Reuse (SBCARS). https:\/\/doi.org\/10.1145\/3132498.3132513","DOI":"10.1145\/3132498.3132513"},{"key":"9708_CR25","unstructured":"Ngah, A., Munro, M., & Abdallah, M. (2017). An overview of regression testing (vol. 9, pp. 45\u201349)."},{"key":"9708_CR26","doi-asserted-by":"publisher","unstructured":"Oizumi, W., Garcia, A., Sousa, L.D.S., Cafeo, B., & Zhao, Y. (2016). Code anomalies flock together: exploring code anomaly agglomerations for locating design problems. In: Proceedings of the 38th International Conference on Software Engineering (ICSE) (pp. 440\u2013451). https:\/\/doi.org\/10.1145\/2884781.2884868","DOI":"10.1145\/2884781.2884868"},{"key":"9708_CR27","doi-asserted-by":"publisher","unstructured":"Olbrich, S.M., Cruzes, D.S., & Sjoberg, D.I.K. (2010) Are all code smells harmful? a study of god classes and brain classes in the evolution of three open source systems. In: Proceedings of the 26th International Conference on Software Maintenance (ICSM) (pp. 1\u201310). https:\/\/doi.org\/10.1109\/ICSM.2010.5609564","DOI":"10.1109\/ICSM.2010.5609564"},{"key":"9708_CR28","doi-asserted-by":"publisher","unstructured":"Orso, A., Shi, N., & Harrold, M.J. (2004) Scaling regression testing to large software systems (vol. 29, pp. 241\u2013251). https:\/\/doi.org\/10.1145\/1041685.1029928","DOI":"10.1145\/1041685.1029928"},{"key":"9708_CR29","doi-asserted-by":"publisher","unstructured":"Padilha, J., Pereira, J., Figueiredo, E., Almeida, J., Garcia, A., & Sant\u2019Anna, C. (2014). On the effectiveness of concern metrics to detect code smells: An empirical study. In: Proceedings of the 26th international Conference on Advanced Information Systems Engineering (CAiSE) (pp. 656\u2013671). https:\/\/doi.org\/10.1007\/978-3-319-07881-6_44","DOI":"10.1007\/978-3-319-07881-6_44"},{"key":"9708_CR30","doi-asserted-by":"publisher","unstructured":"Palomba, F., Bavota, G., Penta, M.D., Fasano, F., Oliveto, R., & Lucia, A.D. (2018). On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation (vol. 23, pp. 1188\u20131221). https:\/\/doi.org\/10.1007\/s10664-017-9535-z","DOI":"10.1007\/s10664-017-9535-z"},{"key":"9708_CR31","doi-asserted-by":"publisher","unstructured":"Pasala, A., & Bhowmick, A. (2005). An approach for test suite selection to validate applications on deployment of cots upgrades. In: Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC). https:\/\/doi.org\/10.1109\/APSEC.2005.31","DOI":"10.1109\/APSEC.2005.31"},{"key":"9708_CR32","volume-title":"Engenharia de Software","author":"RS Pressman","year":"2021","unstructured":"Pressman, R. S., & Maxim, B. R. (2021). Engenharia de Software (9th ed.). Brasil: McGraw Hill.","edition":"9"},{"key":"9708_CR33","doi-asserted-by":"crossref","unstructured":"Shi, A., Hadzi-Tanovic, M., Zhang, L., Marinov, D., & Legunsen, O. (2019). Reflection-aware static regression test selection. Proceedings of the ACM on programming languages (vol. 3, pp. 1\u201329). OOPSLA","DOI":"10.1145\/3360613"},{"key":"9708_CR34","doi-asserted-by":"publisher","unstructured":"Singh, S., & Kahlon, K.S. (2012). Effectiveness of refactoring metrics model to identify smelly and error prone classes in open source software (vol. 37, pp. 1\u201311). https:\/\/doi.org\/10.1145\/2108144.2108157","DOI":"10.1145\/2108144.2108157"},{"key":"9708_CR35","doi-asserted-by":"publisher","unstructured":"Skoglund, M., & Runeson, P. (2005). A case study of the class firewall regression test selection technique on a large scale distributed software system. In: International symposium on empirical software engineering. https:\/\/doi.org\/10.1109\/ISESE.2005.1541816","DOI":"10.1109\/ISESE.2005.1541816"},{"key":"9708_CR36","doi-asserted-by":"publisher","unstructured":"Skoglund, M., & Runeson, P. (2007). Improving class firewall regression test selection by removing the class firewall (vol. 17, pp. 359\u2013378). https:\/\/doi.org\/10.1142\/S0218194007003306","DOI":"10.1142\/S0218194007003306"},{"key":"9708_CR37","doi-asserted-by":"publisher","unstructured":"Soetens, Q.D., Demeyer, S., & Zaidman, A. (2013). Change-based test selection in the presence of developer tests. In: Proceedings of the 17th european conference on software maintenance and reengineering (pp. 101\u2013110). https:\/\/doi.org\/10.1109\/CSMR.2013.20","DOI":"10.1109\/CSMR.2013.20"},{"key":"9708_CR38","doi-asserted-by":"publisher","unstructured":"White, L., & Robinson, B. (2004) Industrial real-time regression testing and analysis using firewalls. In: Proceedings of the 20th International Conference on Software Maintenance (pp. 18\u201327). https:\/\/doi.org\/10.1109\/ICSM.2004.1357786","DOI":"10.1109\/ICSM.2004.1357786"},{"key":"9708_CR39","doi-asserted-by":"publisher","unstructured":"Xiao, Z., & Xiao, L. (2023). A systematic literature review on test case prioritization and regression test selection. In: Proceedings of the 21st international conference on Software Engineering Research, Management and Applications (SERA) (pp. 235\u2013242). https:\/\/doi.org\/10.1109\/SERA57763.2023.10197719","DOI":"10.1109\/SERA57763.2023.10197719"},{"issue":"2","key":"9708_CR40","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo, S., & Harman, M. (2012). Regression testing minimization, selection and prioritization: a survey. Software Testing Verification and Reliability, 22(2), 67\u2013120.","journal-title":"Software Testing Verification and Reliability"},{"key":"9708_CR41","doi-asserted-by":"publisher","unstructured":"Zazworka, N., Shaw, M.A., Shull, F., & Seaman, C. (2011) Investigating the impact of design debt on software quality. In: Proceedings of the 2nd workshop on Managing Technical Debt (MTD) (pp. 17\u201323). https:\/\/doi.org\/10.1145\/1985362.1985366","DOI":"10.1145\/1985362.1985366"},{"key":"9708_CR42","doi-asserted-by":"publisher","unstructured":"Zazworka, N., Vetro\u2019, A., Izurieta, C., Wong, S., Cai, Y., Seaman, C., & Shull, F. (2014). Comparing four approaches for technical debt identification (vol. 22, pp. 403\u2013426). https:\/\/doi.org\/10.1007\/s11219-013-9200-8","DOI":"10.1007\/s11219-013-9200-8"},{"key":"9708_CR43","doi-asserted-by":"publisher","unstructured":"Zheng, J., Robinson, B., Williams, L., & Smiley, K. (2006). A lightweight process for change identification and regression test selection in using cots components. In: Proceedings of the 5th International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems (ICCBSS). https:\/\/doi.org\/10.1109\/ICCBSS.2006.1","DOI":"10.1109\/ICCBSS.2006.1"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09708-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-025-09708-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09708-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T17:38:46Z","timestamp":1743356326000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-025-09708-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,25]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["9708"],"URL":"https:\/\/doi.org\/10.1007\/s11219-025-09708-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4252171\/v1","asserted-by":"object"}]},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,25]]},"assertion":[{"value":"8 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"11"}}