{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:10:01Z","timestamp":1746144601432,"version":"3.40.4"},"reference-count":97,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780128001622"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1016\/b978-0-12-800162-2.00005-1","type":"book-chapter","created":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T07:02:12Z","timestamp":1393657332000},"page":"227-285","source":"Crossref","is-referenced-by-count":2,"title":["Change-Effects Analysis for Evolving Software"],"prefix":"10.1016","author":[{"given":"Raul","family":"Santelices","sequence":"first","affiliation":[]},{"given":"Yiji","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0005","series-title":"Proceedings of ACM Conference on Programming Language Design and Implementation","first-page":"246","article-title":"Dynamic program slicing","author":"Agrawal","year":"1990"},{"year":"2006","series-title":"Compilers: Principles, Techniques and Tools","author":"Aho","key":"10.1016\/B978-0-12-800162-2.00005-1_b0010"},{"year":"1986","series-title":"Compilers: Principles, Techniques and Tools","author":"Aho","key":"10.1016\/B978-0-12-800162-2.00005-1_b0015"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0020","doi-asserted-by":"crossref","unstructured":"Giuliano Antoniol, Vincenzo Fabio Rollo, and Gabriele Venturi, Detecting groups of co-changing files in CVS repositories, in: Proceedings of International Workshop on Principles of Software, Evolution, September 2005, pp. 23\u201332.","DOI":"10.1109\/IWPSE.2005.11"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0025","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"432","article-title":"Efficient and precise dynamic impact analysis using execute-after sequences","author":"Apiwattanapong","year":"2005"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0030","series-title":"Proceedings of Testing and Academic Industrial Conference Practice and Research, Techniques","first-page":"137","article-title":"Matrix: maintenance-oriented testing requirement identifier and examiner","author":"Apiwattanapong","year":"2006"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0035","series-title":"Proceedings of IEEE Conference on Software, Maintenance","first-page":"292","article-title":"Impact analysis \u2013 towards a framework for comparison","author":"Arnold","year":"1993"},{"year":"1990","series-title":"Software Testing Techniques","author":"Beizer","key":"10.1016\/B978-0-12-800162-2.00005-1_b0040"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0045","first-page":"73","article-title":"Software maintenance and evolution: a roadmap","author":"Bennett","year":"2000","journal-title":"Proceedings of Conference on the Future of Software Engineering, ICSE 2000"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0050","doi-asserted-by":"crossref","unstructured":"Dave Binkley, Sebastian Danicic, Tibor Gyimothy, Mark Harman, Akos Kiss, and Lahcen Ouarbya, Formalizing executable dynamic and forward slicing, in: Proceedings of Source Code Analysis and Manipulation, Fourth IEEE International Workshop, September 2004, pp. 43\u201352.","DOI":"10.1109\/SCAM.2004.13"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0055","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/32.624306","article-title":"Semantics guided regression test cost reduction","volume":"23","author":"Binkley","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"10.1016\/B978-0-12-800162-2.00005-1_b0060","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/201055.201056","article-title":"Program integration for languages with procedure calls","volume":"4","author":"Binkley","year":"1995","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0065","series-title":"Software Change Impact Analysis","first-page":"1","article-title":"An introduction to software change impact analysis","author":"Bohner","year":"1996"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0070","series-title":"Proceedings of IEEE International Conference on Software Maintenance","first-page":"475","article-title":"Using coupling measurement for impact analysis in object-oriented systems","author":"Briand","year":"1999"},{"article-title":"SensA: Sensitivity Analysis for Quantitative Change-Impact Prediction","year":"2013","author":"Cai","key":"10.1016\/B978-0-12-800162-2.00005-1_b0075"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0080","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"211","article-title":"Testtube: a system for selective regression testing","author":"Chen","year":"1994"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0085","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TSE.1976.233817","article-title":"A system to generate test data and symbolically execute programs","volume":"2","author":"Clarke","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0090","series-title":"Frontiers of Software Maintenance at ICSM","first-page":"21","article-title":"Traceability management for impact analysis","author":"De Lucia","year":"2008"},{"issue":"4","key":"10.1016\/B978-0-12-800162-2.00005-1_b0095","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","article-title":"Hints on test data selection: help for the practicing programmer","volume":"11","author":"DeMillo","year":"1978","journal-title":"Computer"},{"issue":"4","key":"10.1016\/B978-0-12-800162-2.00005-1_b0100","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","article-title":"Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact","volume":"10","author":"Do","year":"2005","journal-title":"Empirical Software Engineering"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0105","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","article-title":"The program dependence graph and its use in optimization","volume":"9","author":"Ferrante","year":"1987","journal-title":"ACM Transactions on Program Languages and Systems"},{"issue":"10","key":"10.1016\/B978-0-12-800162-2.00005-1_b0110","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/32.6194","article-title":"An applicable family of data flow criteria","volume":"14","author":"Frankl","year":"1988","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0115","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/32.83912","article-title":"Using program slicing in software maintenance","volume":"17","author":"Gallagher","year":"1991","journal-title":"IEEE Transactions Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0120","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"430","article-title":"Integrated impact analysis for managing software changes","author":"Gethers","year":"2012"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0125","series-title":"Proceedings of Conference on Software Maintenance","first-page":"299","article-title":"An approach to regression testing using slicing","author":"Gupta","year":"1992"},{"issue":"4","key":"10.1016\/B978-0-12-800162-2.00005-1_b0130","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"Testing programs with the aid of a compiler","volume":"3","author":"Hamlet","year":"1977","journal-title":"IEEE Transactions Software Engineering"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0135","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/152388.152391","article-title":"A methodology for controlling the size of a test suite","volume":"2","author":"Harrold","year":"1993","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0140","series-title":"Proceedings of ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2001), Tampa Bay, FL, USA","first-page":"312","article-title":"Regression test selection for java software","author":"Harrold","year":"2001"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0145","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J","article-title":"An empirical investigation of the relationship between spectra differences and regression faults","volume":"10","author":"Harrold","year":"2000","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0150","series-title":"Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation","first-page":"35","article-title":"Interprocedural slicing using dependence graphs","author":"Horwitz","year":"1988"},{"issue":"1","key":"10.1016\/B978-0-12-800162-2.00005-1_b0155","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","article-title":"Interprocedural slicing using dependence graphs","volume":"12","author":"Horwitz","year":"1990","journal-title":"ACM Transactions on Program Languages and Systems"},{"year":"1978","series-title":"Tutorial: software testing and validation techniques","author":"Howden","key":"10.1016\/B978-0-12-800162-2.00005-1_b0160"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0165","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/356651.356652","article-title":"An approach to program testing","volume":"7","author":"Huang","year":"1975","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0170","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"191","article-title":"Experiments of the effectiveness of dataflow- and controlflow-based test adequacy criteria","author":"Hutchins","year":"1994"},{"issue":"7","key":"10.1016\/B978-0-12-800162-2.00005-1_b0175","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","article-title":"Symbolic execution and program testing","volume":"19","author":"King","year":"1976","journal-title":"Communications of the ACM"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0180","series-title":"Proceedings of International Symposium on Software Testing and Analysis","first-page":"143","article-title":"Automated regression test generation","author":"Korel","year":"1998"},{"issue":"9","key":"10.1016\/B978-0-12-800162-2.00005-1_b0185","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1016\/j.jss.2006.02.040","article-title":"Effects of context on program slicing","volume":"79","author":"Krinke","year":"2006","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"10.1016\/B978-0-12-800162-2.00005-1_b0190","first-page":"51","article-title":"Class Firewall, Test Order, and Regression Testing of Object-Oriented Programs","volume":"8","author":"Kung","year":"1995","journal-title":"Journal of Object-Oriented Programming"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0195","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.1983.236871","article-title":"A data flow oriented program testing strategy","volume":"9","author":"Laski","year":"1983","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0200","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"308","article-title":"Whole program path-based dynamic impact analysis","author":"Law","year":"2003"},{"article-title":"A Review of Software Change Impact Analysis","year":"2011","author":"Lehnert","key":"10.1016\/B978-0-12-800162-2.00005-1_b0205"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0210","series-title":"Proceedings of IEEE Conference on Software Maintenance","first-page":"60","article-title":"Insights into regression testing","author":"Leung","year":"1989"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0215","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/stvr.1475","article-title":"A survey of code-based change impact analysis techniques","volume":"23","author":"Li","year":"2013","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0220","series-title":"Proceedings of IEEE International Conference on Software Maintenance","first-page":"171","article-title":"Algorithmic analysis of the impact of changes to object-oriented software","author":"Li","year":"1996"},{"issue":"2","key":"10.1016\/B978-0-12-800162-2.00005-1_b0225","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1571629.1571631","article-title":"Measuring the strength of information flows in programs","volume":"19","author":"Masri","year":"2009","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"5","key":"10.1016\/B978-0-12-800162-2.00005-1_b0230","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TSE.2002.1000449","article-title":"A state-of-the-art survey on software merging","volume":"28","author":"Mens","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0235","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1109\/32.57623","article-title":"A theory of fault-based testing","volume":"16","author":"Morell","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"year":"2004","series-title":"The Art of Software Testing","author":"Myers","key":"10.1016\/B978-0-12-800162-2.00005-1_b0240"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0245","series-title":"Proceedings of 9th European Software Engineering Conference and 10th ACM SIGSOFT Symposium on the Foundations of Software Engineering, Helsinki, Finland","first-page":"128","article-title":"Leveraging field data for impact analysis and regression testing","author":"Orso","year":"2003"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0250","series-title":"Proceedings of 26th IEEE and ACM SIGSOFT International Conference on Software Engineering (ICSE 2004), Edinburgh, Scotland","first-page":"491","article-title":"An empirical comparison of dynamic impact analysis algorithms","author":"Orso","year":"2004"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0255","series-title":"Proceedings of 12th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2004)","first-page":"241","article-title":"Scaling regression testing to large software systems","author":"Orso","year":"2004"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0260","series-title":"Proceedings of International Symposium on Foundations of Software Engineering","first-page":"226","article-title":"Differential symbolic execution","author":"Person","year":"2008"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0265","series-title":"Proceedings of ACM Conference on Programming Language Design and Implementation","first-page":"504","article-title":"Directed incremental symbolic execution","author":"Person","year":"2011"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0270","series-title":"Proceedings of IEEE International Conference on Program Comprehension","first-page":"10","article-title":"Variable granularity for improving precision of impact analysis","author":"Petrenko","year":"2009"},{"issue":"9","key":"10.1016\/B978-0-12-800162-2.00005-1_b0275","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1109\/32.58784","article-title":"A formal model of program dependencies and its implications for software testing, debugging, and maintenance","volume":"16","author":"Podgurski","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"10.1016\/B978-0-12-800162-2.00005-1_b0280","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10664-008-9088-2","article-title":"Using information retrieval based coupling measures for impact analysis","volume":"14","author":"Poshyvanyk","year":"2009","journal-title":"Empirical Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0285","series-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering","first-page":"397","article-title":"Test generation to expose changes in evolving programs","author":"Qi","year":"2010"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0290","series-title":"Proceedings of IEEE International Conference on Software Maintenance","first-page":"84","article-title":"A model for change propagation based on graph rewriting","author":"Rajlich","year":"1997"},{"issue":"2","key":"10.1016\/B978-0-12-800162-2.00005-1_b0295","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1002\/(SICI)1096-908X(199703)9:2<103::AID-SMR146>3.0.CO;2-N","article-title":"MSE: a methodology for software evolution","volume":"9","author":"Rajlich","year":"1997","journal-title":"Journal of Software Maintenance: Research and Practice"},{"year":"2011","series-title":"Software Engineering: The Current Practice","author":"Rajlich","key":"10.1016\/B978-0-12-800162-2.00005-1_b0300"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0305","series-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering","first-page":"241","article-title":"Sieve: a tool for automatically detecting variations across program versions","author":"Ramanathan","year":"2006"},{"issue":"4","key":"10.1016\/B978-0-12-800162-2.00005-1_b0310","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TSE.1985.232226","article-title":"Selecting software test data using data flow information","volume":"11","author":"Rapps","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0315","series-title":"Proceedings of ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications","first-page":"432","article-title":"Chianti: a tool for change impact analysis of java programs","author":"Ren","year":"2004"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0320","series-title":"Proceedings of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","first-page":"49","article-title":"Precise interprocedural dataflow analysis via graph reachability","author":"Reps","year":"1995"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0325","doi-asserted-by":"crossref","unstructured":"D. Richardson and M.C. Thompson, The RELAY model of error detection and its application, in: Proceedings of Workshop on Software Testing, Analysis and Verification, July 1988, pp. 223\u2013230.","DOI":"10.1109\/WST.1988.5378"},{"issue":"6","key":"10.1016\/B978-0-12-800162-2.00005-1_b0330","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/32.232020","article-title":"An analysis of test data selection criteria using the RELAY model of fault detection","volume":"19","author":"Richardson","year":"1993","journal-title":"IEEE Transactions Software Engineering"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0335","first-page":"529","volume":"22","author":"Rothermel","year":"1996","journal-title":"Analyzing regression test selection techniques"},{"issue":"10","key":"10.1016\/B978-0-12-800162-2.00005-1_b0340","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1109\/32.962562","article-title":"Test case prioritization","volume":"27","author":"Rothermel","year":"2001","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0345","series-title":"Proceedings of ACM International Symposium on Software Testing and Analysis","first-page":"169","article-title":"Selecting tests and identifying test coverage requirements for modified software","author":"Rothermel","year":"1994"},{"issue":"2","key":"10.1016\/B978-0-12-800162-2.00005-1_b0350","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/248233.248262","article-title":"A safe, efficient regression test selection technique","volume":"6","author":"Rothermel","year":"1997","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"year":"2009","series-title":"Sensitivity Analysis","author":"Saltelli","key":"10.1016\/B978-0-12-800162-2.00005-1_b0355"},{"article-title":"Change-Effects Analysis for Effective Testing and Validation of Evolving Software","year":"2012","author":"Santelices","key":"10.1016\/B978-0-12-800162-2.00005-1_b0360"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0365","series-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering","first-page":"218","article-title":"Test-suite augmentation for evolving software","author":"Santelices","year":"2008"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0370","series-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering","first-page":"343","article-title":"Efficiently monitoring data-flow test coverage","author":"Santelices","year":"2007"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0375","series-title":"Proceedings of ACM International Symposium on Software Testing and Analysis","first-page":"195","article-title":"Exploiting program dependencies for scalable multiple-path symbolic execution","author":"Santelices","year":"2010"},{"article-title":"Probabilistic Slicing for Predictive Impact Analysis","year":"2010","author":"Santelices","key":"10.1016\/B978-0-12-800162-2.00005-1_b0380"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0385","series-title":"Proceedings of IEEE International Conference on Software Testing, Verification and Validation","first-page":"11","article-title":"Applying aggressive propagation-based strategies for testing changes","author":"Santelices","year":"2011"},{"issue":"6","key":"10.1016\/B978-0-12-800162-2.00005-1_b0390","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1002\/stvr.1501","article-title":"Demand-driven propagation-based strategies for testing changes","volume":"23","author":"Santelices","year":"2013","journal-title":"Journal of Software Testing, Verification and Reliability"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0395","series-title":"Proceedings of IEEE International Conference on Software Testing, Verification and Validation","first-page":"429","article-title":"Precisely detecting runtime change interactions for evolving software","author":"Santelices","year":"2010"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0400","series-title":"Proceeding of ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis","first-page":"13","article-title":"DUA-forensics: a fine-grained dependence analysis and instrumentation framework based on soot","author":"Santelices","year":"2013"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0405","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering \u2013 New Ideas and Emerging Results Track","first-page":"1269","article-title":"Quantitative program slicing: separating statements by relevance","author":"Santelices","year":"2013"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0410","series-title":"Proceedings of IEEE International Conference on Software Testing, Verification and Validation","first-page":"268","article-title":"Empirical software change impact analysis using singular value decomposition","author":"Sherriff","year":"2008"},{"issue":"2","key":"10.1016\/B978-0-12-800162-2.00005-1_b0415","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/367008.367022","article-title":"Interprocedural control dependence","volume":"10","author":"Sinha","year":"2001","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0420","series-title":"Proceedings of ACM Conference on Programming Language Design and Implementation","first-page":"112","article-title":"Thin slicing","author":"Sridharan","year":"2007"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0425","series-title":"Proceedings of ACM International Symposium on Software Testing and Analysis","first-page":"97","article-title":"Effectively prioritizing tests in development environment","author":"Srivastava","year":"2002"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0430","series-title":"Proceedings of ACM International Symposium on Software Testing and Analysis","first-page":"1","article-title":"eXpress: guided path exploration for efficient regression test generation","author":"Taneja","year":"2011"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0435","series-title":"Proceedings of International Symposium on Software Testing and Analysis","first-page":"182","article-title":"An information flow model of fault detection","author":"Thompson","year":"1993"},{"issue":"8","key":"10.1016\/B978-0-12-800162-2.00005-1_b0440","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/32.153381","article-title":"PIE: a dynamic failure-based technique","volume":"18","author":"Voas","year":"1992","journal-title":"IEEE Transactions on Software Engineering"},{"year":"2011","series-title":"Probability and Statistics for Engineers and Scientists","author":"Walpole","key":"10.1016\/B978-0-12-800162-2.00005-1_b0445"},{"issue":"4","key":"10.1016\/B978-0-12-800162-2.00005-1_b0450","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","article-title":"Program slicing","volume":"10","author":"Weiser","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"10.1016\/B978-0-12-800162-2.00005-1_b0455","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10664-009-9111-2","article-title":"Comparing the effectiveness of several modeling methods for fault prediction","volume":"15","author":"Weyuker","year":"2010","journal-title":"Empirical Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0460","series-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering","first-page":"41","article-title":"Effect of test set minimization on fault detection effectiveness","author":"Wong","year":"1995"},{"issue":"10","key":"10.1016\/B978-0-12-800162-2.00005-1_b0465","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/TSE.2005.107","article-title":"Checking inside the black box: regression testing by comparing value spectra","volume":"31","author":"Xie","year":"2005","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0470","series-title":"Proceedings of IEEE International Conference on Software Maintenance","first-page":"23","article-title":"Localizing failure-inducing program edits based on spectrum information","author":"Zhang","year":"2011"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0475","series-title":"Proceedings of ACM Conference on Programming Language Design and Implementation","first-page":"169","article-title":"Pruning dynamic slices with confidence","author":"Zhang","year":"2006"},{"key":"10.1016\/B978-0-12-800162-2.00005-1_b0480","doi-asserted-by":"crossref","unstructured":"Yiji Zhang and Raul Santelices, Predicting data dependences for slice inspection prioritization, in: Proceedings of IEEE International Workshop on Program Debugging, November 2012, pp. 177\u2013182. http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6405438.","DOI":"10.1109\/ISSREW.2012.43"},{"issue":"6","key":"10.1016\/B978-0-12-800162-2.00005-1_b0485","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/TSE.2005.72","article-title":"Mining version histories to guide software changes","volume":"31","author":"Zimmermann","year":"2005","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Advances in Computers"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:38:13Z","timestamp":1746142693000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128001622000051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9780128001622"],"references-count":97,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-800162-2.00005-1","relation":{},"ISSN":["0065-2458"],"issn-type":[{"type":"print","value":"0065-2458"}],"subject":[],"published":{"date-parts":[[2014]]}}}