{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:24:37Z","timestamp":1745987077989,"version":"3.40.4"},"reference-count":110,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780124080942"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1016\/b978-0-12-408094-2.00002-3","type":"book-chapter","created":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T17:41:27Z","timestamp":1363628487000},"page":"53-88","source":"Crossref","is-referenced-by-count":2,"title":["Regression Testing of Evolving Programs"],"prefix":"10.1016","author":[{"given":"Marcel","family":"B\u00f6hme","sequence":"first","affiliation":[]},{"given":"Abhik","family":"Roychoudhury","sequence":"additional","affiliation":[]},{"given":"Bruno C.d.S.","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2003","series-title":"Modernizing Legacy Systems: Software Technologies, Engineering Process and Business Practices","author":"Seacord","key":"10.1016\/B978-0-12-408094-2.00002-3_b0005"},{"year":"2004","series-title":"The Art of SoftwareTesting","author":"Myers","key":"10.1016\/B978-0-12-408094-2.00002-3_b0010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0015","first-page":"55","article-title":"Has the bug really been fixed?","volume":"vol. 1","author":"Gu","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0020","series-title":"Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC\/FSE \u201911","first-page":"26","article-title":"How do fixes become bugs?","author":"Yin","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0025","series-title":"Proceedings of the 1994 ACM SIGSOFT International Symposium on SoftwareTesting and Analysis, ISSTA \u201994","first-page":"80","article-title":"Applications of feasible path analysis to program testing","author":"Goldberg","year":"1994"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0030","series-title":"Proceedings of the 1993 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA \u201993","first-page":"182","article-title":"An information flow model of fault detection","author":"Thompson","year":"1993"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0035","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1109\/32.58784","article-title":"A formal model of program dependences and its implications for software testing, debugging, and maintenance","volume":"16","author":"Podgurski","year":"1990","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0040","series-title":"Proceedings of the First ACM SIGSOFT\/SIGPLAN Software Engineering Symposium on Practical Software Development Environments, SDE 1","first-page":"177","article-title":"The program dependence graph in a software development environment","author":"Ottenstein","year":"1984"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0045","unstructured":"M. Weiser, Program slicing, in: Proceedings of the 5th International Conference on Software Engineering, ICSE \u201981, 1981, pp. 439\u2013449."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0050","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","article-title":"Interprocedural slicing using dependence graphs","volume":"12","author":"Horwitz","year":"1990","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0055","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0020-0190(88)90054-3","article-title":"Dynamic program slicing","volume":"29","author":"Korel","year":"1988","journal-title":"Inf. Process. Lett."},{"issue":"9","key":"10.1016\/B978-0-12-408094-2.00002-3_b0060","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/BF01261653","article-title":"Efficient comparison of program slices","volume":"28","author":"Horwitz","year":"1991","journal-title":"Acta Inf."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0065","series-title":"Proceedings of the ACM SIGPLAN 1991 Conference on Programming Language Design and Implementation, PLDI \u201991","first-page":"107","article-title":"The semantic approach to program slicing","author":"Venkatesh","year":"1991"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0070","series-title":"Proceedings of the 7th European Software Engineering Conference Held Jointly with the 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC\/FSE-7","first-page":"303","article-title":"An efficient relevant slicing method for debugging","author":"Gyim\u00f3thy","year":"1999"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0075","series-title":"Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC\/FSE \u201911","first-page":"278","article-title":"Path exploration based on symbolic output","author":"Qi","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0080","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","article-title":"Symbolic execution and program testing","volume":"19","author":"King","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0085","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/1064978.1065036","article-title":"Dart: directed automated random testing","volume":"40","author":"Godefroid","year":"2005","journal-title":"SIGPLAN Not."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0090","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/1095430.1081750","article-title":"Cute: a concolic unit testing engine for c","volume":"30","author":"Sen","year":"2005","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"2","key":"10.1016\/B978-0-12-408094-2.00002-3_b0095","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/stvr.294","article-title":"Search-based software test data generation: a survey: research articles","volume":"14","author":"McMinn","year":"2004","journal-title":"Softw. Test. Verif. Reliab."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0100","series-title":"Proceedings of the 2012 International Conference on Software Engineering, ICSE 2012","first-page":"474","article-title":"Bugredux: reproducing field failures for in-house debugging","author":"Jin","year":"2012"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0105","doi-asserted-by":"crossref","unstructured":"S. Person, G. Yang, N. Rungta, S. Khurshid, Directed incremental symbolic execution, in: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI \u201911, 2011, pp. 504\u2013515.","DOI":"10.1145\/1993498.1993558"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0110","series-title":"Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC\/FSE \u201911","first-page":"212","article-title":"Strong higher order mutation-based test data generation","author":"Harman","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0115","series-title":"Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI \u201911","first-page":"258","article-title":"Higher-order test generation","author":"Godefroid","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0120","series-title":"Proceedings of the Third International Conference on Software Testing, Verification and Validation, ICST \u201910","first-page":"215","article-title":"Explanation-based generalization of infeasible path","author":"Delahaye","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0125","series-title":"Proceedings of the 19th International Symposium on Software Testing and Analysis, ISSTA \u201910","first-page":"195","article-title":"Exploiting program dependencies for scalable multiple-path symbolic execution","author":"Santelices","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0130","series-title":"Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS\u201908\/ETAPS\u201908","first-page":"351","article-title":"Rwset: attacking path explosion in constraint-based test generation","author":"Boonstoppel","year":"2008"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0135","series-title":"Proceedings of the 19th International Symposium on Software Testing and Analysis, ISSTA \u201910","first-page":"183","article-title":"Parallel symbolic execution for structural test generation","author":"Staats","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0140","series-title":"Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS\u201908\/ETAPS\u201908","first-page":"367","article-title":"Demand-driven compositional symbolic execution","author":"Anand","year":"2008"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0145","series-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS\u201908","article-title":"Automated whitebox fuzz testing","author":"Godefroid","year":"2008"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0150","first-page":"294","article-title":"Symbolic execution enhanced system testing","volume":"vol. 7152","author":"Davies","year":"2012"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0155","series-title":"Proceedings of the 12th International Workshop on Principles of Software Evolution and the 7th Annual ERCIM Workshop on Software Evolution, IWPSE-EVOL \u201911","first-page":"41","article-title":"A taxonomy for software change impact analysis","author":"Lehnert","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0160","series-title":"Proceedings of the 27th International Conference on Software Engineering, ICSE \u201905","first-page":"432","article-title":"Efficient and precise dynamic impact analysis using execute-after sequences","author":"Apiwattanapong","year":"2005"},{"issue":"5","key":"10.1016\/B978-0-12-408094-2.00002-3_b0165","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/949952.940089","article-title":"Leveraging field data for impact analysis and regression testing","volume":"28","author":"Orso","year":"2003","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0170","series-title":"Conference on Object-Oriented Programming, Systems, Languages, and Applications","first-page":"432","article-title":"Chianti: a tool for change impact analysis of java programs","author":"Ren","year":"2004"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0175","series-title":"Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT \u201908\/FSE-16","first-page":"226","article-title":"Differential symbolic execution","author":"Person","year":"2008"},{"year":"2010","series-title":"Probabilistic slicing for predictive impact analysis, Technical Report CERCS, GIT-CERCS-10-10","author":"Santelices","key":"10.1016\/B978-0-12-408094-2.00002-3_b0180"},{"issue":"3","key":"10.1016\/B978-0-12-408094-2.00002-3_b0185","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/65979.65980","article-title":"Integrating noninterfering versions of programs","volume":"11","author":"Horwitz","year":"1989","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"3","key":"10.1016\/B978-0-12-408094-2.00002-3_b0190","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/383876.383878","article-title":"Parallel changes in large-scale software development: an observational case study","volume":"10","author":"Perry","year":"2001","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0195","series-title":"Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation, PLDI \u201990","first-page":"234","article-title":"Identifying the semantic and textual differences between two versions of a program","author":"Horwitz","year":"1990"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0200","series-title":"Proceedings of the International Conference on Software Maintenance, ICSM \u201994","first-page":"243","article-title":"Semantic diff: a tool for summarizing the effects of modifications","author":"Jackson","year":"1994"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0205","first-page":"263","article-title":"Lsdiff: a program differencing tool to identify systematic structural differences","volume":"vol. 2","author":"Loh","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0210","series-title":"Proceedings of the International Conference on Software Maintenance, ICSM \u201998","first-page":"44","article-title":"Empirical evaluation of the textual differencing regression testing technique","author":"Vokolos","year":"1998"},{"issue":"11","key":"10.1016\/B978-0-12-408094-2.00002-3_b0215","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1002\/spe.4380151102","article-title":"A file comparison program","volume":"15","author":"Miller","year":"1985","journal-title":"Softw. Pract. Exper."},{"issue":"6","key":"10.1016\/B978-0-12-408094-2.00002-3_b0220","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1137\/0218082","article-title":"Simple fast algorithms for the editing distance between trees and related problems","volume":"18","author":"Zhang","year":"1989","journal-title":"SIAM J. Comput."},{"issue":"1","key":"10.1016\/B978-0-12-408094-2.00002-3_b0225","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10515-006-0002-0","article-title":"Jdiff: a differencing technique and tool for object-oriented programs","volume":"14","author":"Apiwattanapong","year":"2007","journal-title":"Autom. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0230","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/201055.201056","article-title":"Program integration for languages with procedure calls","volume":"4","author":"Binkley","year":"1995","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0235","series-title":"Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL \u201988","first-page":"146","article-title":"On the adequacy of program dependence graphs for representing programs","author":"Horwitz","year":"1988"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0240","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/32.153381","article-title":"Pie: a dynamic failure-based technique","volume":"18","author":"Voas","year":"1992","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0245","series-title":"Proceedings of the 24th International Conference on Computer Aided Verification, CAV\u201912","first-page":"712","article-title":"Symdiff: a language-agnostic semantic diff tool for imperative programs","author":"Lahiri","year":"2012"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0250","series-title":"International Conference on Software Testing, Verification and Validation (ICST)","article-title":"Precisely detecting runtime change interactions for evolving software","author":"Santelices","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0255","series-title":"23rd IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201908","first-page":"218","article-title":"Test-suite augmentation for evolving software","author":"Santelices","year":"2008"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0260","first-page":"253","article-title":"Yesterday, my program worked. today, it does not. why?","volume":"vol. 1687","author":"Zeller","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0265","series-title":"Proceedings of the 18th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2010)","first-page":"361","article-title":"Bert: a tool for behavioral regression testing","author":"Jin","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0270","series-title":"Proceedings of the Third International Conference on Software Testing, Verification and Validation, ICST \u201910","first-page":"137","article-title":"Automated behavioral regression testing","author":"Jin","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0275","series-title":"Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA \u201998","first-page":"143","article-title":"Automated regression test generation","author":"Korel","year":"1998"},{"issue":"4","key":"10.1016\/B978-0-12-408094-2.00002-3_b0280","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1093\/comjnl\/25.4.465","article-title":"On testing non-testable programs","volume":"25","author":"Weyuker","year":"1982","journal-title":"Comput. J."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0285","doi-asserted-by":"crossref","unstructured":"G. Fraser, N. Walkinshaw, Behaviourally adequate software testing, in: 2008 International Conference on Software Testing, Verification, and Validation, 2012, pp. 300\u2013309.","DOI":"10.1109\/ICST.2012.110"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0290","doi-asserted-by":"crossref","unstructured":"D. Qi, W. Sumner, F. Qin, M. Zheng, X. Zhang, A. Roychoudhury, Modeling software execution environment, in: 19th IEEE Working Conference on Reverse, Engineering, WCRE\u201912, 2012.","DOI":"10.1109\/WCRE.2012.51"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0295","series-title":"Proceedings of the 16th International SPINWorkshop on Model Checking Software","first-page":"174","article-title":"Empirical evaluation of the textual differencing regression testing technique","author":"Rungta","year":"2009"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0300","doi-asserted-by":"crossref","first-page":"10:1","DOI":"10.1145\/1455518.1455522","article-title":"Exe: automatically generating inputs of death","volume":"12","author":"Cadar","year":"2008","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0305","doi-asserted-by":"crossref","unstructured":"M. Papadakis, N. Malevris, An empirical evaluation of the first and second order mutation testing strategies, in: Software Testing Verification and Validation Workshop, 2010, pp. 90\u201399.","DOI":"10.1109\/ICSTW.2010.50"},{"issue":"8","key":"10.1016\/B978-0-12-408094-2.00002-3_b0310","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/32.57624","article-title":"Automated software test data generation","volume":"16","author":"Korel","year":"1990","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0315","doi-asserted-by":"crossref","unstructured":"N.E. Beckman, A.V. Nori, S.K. Rajamani, R.J. Simmons, Proofs from tests, in: Proceedings of the 2008 International Symposium on Software Testing and, Analysis, ISSTA\u201908, 2008, pp. 3\u201314.","DOI":"10.1145\/1390630.1390634"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0320","doi-asserted-by":"crossref","unstructured":"P. Godefroid, A.V. Nori, S.K. Rajamani, S.D. Tetali, Compositional may-must program analysis: unleashing the power of alternation, in: Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL\u201910, 2010, pp. 43\u201356.","DOI":"10.1145\/1706299.1706307"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0325","series-title":"Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE \u201910","first-page":"177","article-title":"Golden implementation driven software debugging","author":"Banerjee","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0330","series-title":"Proceedings of the 33rd International Conference on Software Engineering, ICSE \u201911","first-page":"391","article-title":"Programs, tests, and oracles: the foundations of testing revisited","author":"Staats","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0335","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1145\/267580.267590","article-title":"Software unit test coverage and adequacy","volume":"29","author":"Zhu","year":"1997","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/B978-0-12-408094-2.00002-3_b0340","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","article-title":"Weak mutation testing and completeness of test sets","volume":"8","author":"Howden","year":"1982","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0345","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1109\/32.57623","article-title":"A theory of fault-based testing","volume":"16","author":"Morell","year":"1990","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0350","series-title":"Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools, PASTE \u201911","first-page":"21","article-title":"An evaluation of change-based coverage criteria","author":"Fisher","year":"2011"},{"issue":"3","key":"10.1016\/B978-0-12-408094-2.00002-3_b0355","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/32.221133","article-title":"A formal analysis of the fault-detecting ability of testing methods","volume":"19","author":"Frankl","year":"1993","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"10.1016\/B978-0-12-408094-2.00002-3_b0360","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/32.6165","article-title":"A comparison of some structural testing strategies","volume":"14","author":"Ntafos","year":"1988","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"10.1016\/B978-0-12-408094-2.00002-3_b0365","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/32.491648","article-title":"A formal analysis of the subsume relation between software test adequacy criteria","volume":"22","author":"Zhu","year":"1996","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0370","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/32.83906","article-title":"Analyzing partition testing strategies","volume":"17","author":"Weyuker","year":"1991","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0375","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/32.62448","article-title":"Partition testing does not inspire confidence (program testing)","volume":"16","author":"Hamlet","year":"1990","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"10.1016\/B978-0-12-408094-2.00002-3_b0380","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TSE.1984.5010257","article-title":"An evaluation of random testing","volume":"10","author":"Duran","year":"1984","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0385","series-title":"Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA \u201998","first-page":"42","article-title":"On random and partition testing","author":"Ntafos","year":"1998"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0390","series-title":"Proceedings of the International Conference on Software Engineering, ICSE 2012","first-page":"1523","article-title":"Software regression as change of input partitioning","author":"B\u00f6hme","year":"1990"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0395","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1145\/367008.367020","article-title":"An empirical study of regression test selection techniques","volume":"10","author":"Graves","year":"2001","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0400","series-title":"Proceedings of the Conference on Software Maintenance","first-page":"299","article-title":"An approach to regression testing using slicing","author":"Gupta","year":"1992"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0405","series-title":"Proceedings of the 16th International Conference on Software Engineering, ICSE\u201994","first-page":"211","article-title":"Testtube: a system for selective regression testing","author":"Chen","year":"1994"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0410","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/152388.152391","article-title":"A methodology for controlling the size of a test suite","volume":"2","author":"Harrold","year":"1993","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"10.1016\/B978-0-12-408094-2.00002-3_b0415","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/TSE.2003.1183927","article-title":"Test-suite reduction and prioritization for modified condition\/decision coverage","volume":"29","author":"Jones","year":"2003","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0420","series-title":"Proceedings of the 10th International Conference on Fundamental Approaches to Software Engineering, FASE\u201907","first-page":"291","article-title":"Redundancy based test-suite reduction","author":"Fraser","year":"2007"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0425","series-title":"Proceedings of the International Conference on Software Maintenance, ICSM \u201998","first-page":"34","article-title":"An empirical study of the effects of minimization on the fault detection capabilities of test suites","author":"Rothermel","year":"1998"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0430","series-title":"Proceedings of the 30th International Conference on Software Engineering, ICSE \u201908","first-page":"201","article-title":"An empirical study of the effects of test-suite reduction on fault localization","author":"Yu","year":"2008"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0435","series-title":"ICSM","first-page":"335","article-title":"Fault detection probability analysis for coverage-based test suite reduction","author":"McMaster","year":"2007"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0440","series-title":"Proceedings of the International Conference on Software Engineering, ICSE 2012","first-page":"738","article-title":"On-demand test suite reduction","author":"Hao","year":"2012"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0445","series-title":"Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201905","first-page":"273","article-title":"Empirical evaluation of the tarantula automatic fault-localization technique","author":"Jones","year":"2005"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0450","series-title":"Proceedings of the eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE \u201910","first-page":"257","article-title":"Directed test suite augmentation: techniques and tradeoffs","author":"Xu","year":"2010"},{"issue":"PrePrints","key":"10.1016\/B978-0-12-408094-2.00002-3_b0455","article-title":"Whole test suite generation","volume":"99","author":"Fraser","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0460","series-title":"Proceedings of the 2009 16th Asia-Pacific Software Engineering Conference, APSEC \u201909","first-page":"406","article-title":"Directed test suite augmentation","author":"Xu","year":"2009"},{"issue":"9","key":"10.1016\/B978-0-12-408094-2.00002-3_b0465","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/32.92910","article-title":"Constraint-based automatic test data generation","volume":"17","author":"DeMillo","year":"1991","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0470","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSE.2011.93","article-title":"Mutation-driven generation of unit tests and oracles","volume":"38","author":"Fraser","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0475","series-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201910","first-page":"397","article-title":"Test generation to expose changes in evolving programs","author":"Qi","year":"2010"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0480","series-title":"ISSTA","first-page":"1","article-title":"Express: guided path exploration for efficient regression test generation","author":"Taneja","year":"2011"},{"issue":"PP","key":"10.1016\/B978-0-12-408094-2.00002-3_b0485","first-page":"19","article-title":"Automated behavioral testing of refactoring engines","volume":"99","author":"Soares","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0490","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/TSE.2011.18","article-title":"Input domain reduction through irrelevant variable removal and its effect on local, global, and hybrid search-based structural test data generation","volume":"38","author":"McMinn","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/B978-0-12-408094-2.00002-3_b0495","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1002\/(SICI)1097-024X(200001)30:1<61::AID-SPE292>3.0.CO;2-9","article-title":"Automated test-data generation for exception conditions","volume":"30","author":"Tracey","year":"2000","journal-title":"Softw. Pract. Exper."},{"issue":"1","key":"10.1016\/B978-0-12-408094-2.00002-3_b0500","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/226155.226158","article-title":"The chaining approach for software test data generation","volume":"5","author":"Ferguson","year":"1996","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0505","series-title":"Proceedings of the 2006 International Symposium on SoftwareTesting and Analysis, ISSTA \u201906","first-page":"13","article-title":"The species per path approach to searchbased test data generation","author":"McMinn","year":"2006"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0510","series-title":"Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods","first-page":"224","article-title":"Counterexample guided abstraction refinement via program execution","author":"Kroening","year":"2004"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0515","series-title":"Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012","first-page":"155","article-title":"Abstracting path conditions","author":"Strej\u010dek","year":"2012"},{"issue":"4","key":"10.1016\/B978-0-12-408094-2.00002-3_b0520","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TSE.1984.5010257","article-title":"An evaluation of random testing","volume":"10","author":"Duran","year":"1984","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0525","series-title":"Companion to the 22nd ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications Companion, OOPSLA \u201907","first-page":"815","article-title":"Randoop: feedback-directed random testing for java","author":"Pacheco","year":"2007"},{"issue":"2","key":"10.1016\/B978-0-12-408094-2.00002-3_b0530","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/TSE.2011.121","article-title":"Random testing: theoretical results and practical implications","volume":"38","author":"Arcuri","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0535","series-title":"Proceedings of the 2011 Fourth IEEE International Conference on Software Testing,Verification and Validation, ICST \u201911","first-page":"11","article-title":"Applying aggressive propagation-based strategies for testing changes","author":"Santelices","year":"2011"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0540","series-title":"Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ESEC\/FSE \u201909","first-page":"33","article-title":"Darwin: an approach for debugging evolving programs","author":"Qi","year":"2009"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0545","doi-asserted-by":"crossref","unstructured":"T. Apiwattanapong, R.A. Santelices, P.K. Chittimalli,A. Orso, M.J. Harrold, Matrix: maintenance-oriented testing requirement identifier and examiner, in: Proceedings of theTesting and Academic Industrial Conference Practice and ResearchTechniques (TAIC PART 2006),Windsor, UK,August 2006, pp. 137\u2013146.","DOI":"10.1109\/TAIC-PART.2006.18"},{"key":"10.1016\/B978-0-12-408094-2.00002-3_b0550","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme, Bruno C.d.S. Oliveira, Abhik Roychoudhury, Partition-based regression verification, in: Proceedings of the 2013 International Conference on Software Engineering, ICSE 2013, San Francisco, CA, USA, 2013, pp. 1\u201310. <http:\/\/www.comp.nus.edu.sg\/\u223cmboehme\/papers\/ICSE13.pdf>.","DOI":"10.1109\/ICSE.2013.6606576"}],"container-title":["Advances in Computers"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:57:13Z","timestamp":1745974633000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124080942000023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9780124080942"],"references-count":110,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-408094-2.00002-3","relation":{},"ISSN":["0065-2458"],"issn-type":[{"type":"print","value":"0065-2458"}],"subject":[],"published":{"date-parts":[[2013]]}}}