{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:21:19Z","timestamp":1772554879131,"version":"3.50.1"},"reference-count":145,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202110"],"award-info":[{"award-number":["61202110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71471092"],"award-info":[{"award-number":["71471092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502205"],"award-info":[{"award-number":["61502205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872167"],"award-info":[{"award-number":["61872167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007928","name":"Ningbo Municipal Bureau of Science and Technology","doi-asserted-by":"publisher","award":["2014A35006"],"award-info":[{"award-number":["2014A35006"]}],"id":[{"id":"10.13039\/501100007928","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002703","name":"Jiangsu University","doi-asserted-by":"publisher","award":["14JDG039"],"award-info":[{"award-number":["14JDG039"]}],"id":[{"id":"10.13039\/501100002703","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Backbone Teacher Cultivation Project of Jiangsu University"},{"name":"Jiangsu Overseas Visiting Scholar Program for the University Prominent Young & Middle-Aged Teachers and Presidents"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2879638","type":"journal-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T19:28:00Z","timestamp":1541446080000},"page":"68350-68372","source":"Crossref","is-referenced-by-count":8,"title":["An Empirical Comparison of Fixed-Strength and Mixed-Strength for Interaction Coverage Based Prioritization"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1769-6126","authenticated-orcid":false,"given":"Rubing","family":"Huang","sequence":"first","affiliation":[]},{"given":"Quanjun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tsong Yueh","family":"Chen","sequence":"additional","affiliation":[]},{"given":"James","family":"Hamlyn-Harris","sequence":"additional","affiliation":[]},{"given":"Dave","family":"Towey","sequence":"additional","affiliation":[]},{"given":"Jinfu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.42"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.13"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref32","first-page":"121","article-title":"How to do tie-breaking in prioritization of interaction test suites?","author":"huang","year":"2014","journal-title":"Proc of the Int Conf on Software Engineering and Knowledge Engineering (SEKE)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"ref30","first-page":"91","article-title":"An investigation of the applicability of design of experiments to software testing","author":"kuhn","year":"2002","journal-title":"Proceedings of the 27th Annual NASA Goddard\/IEEE Software Engineering Workshop (SEW- 27 '02)"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1016\/j.infsof.2009.04.016","article-title":"Higher order mutation testing","volume":"51","author":"jia","year":"2009","journal-title":"Inf Softw Technol"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606565"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TSE.2006.92","article-title":"On the use of mutation faults in empirical assessments of test case prioritization techniques","volume":"32","author":"do","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"},{"key":"ref28","year":"0","journal-title":"CLOC Count Lines of Code"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491436"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2327020"},{"key":"ref22","first-page":"255","article-title":"Combinatorial interaction regression testing: A study of test case generation and prioritization","author":"qu","year":"2007","journal-title":"Proc Int Conf on Software Maintenance (ICSM)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1294921.1294922"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9135-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.167"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.38"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.40"},{"key":"ref100","first-page":"186","article-title":"Faulty interaction identification via constraint solving and optimization","author":"zhang","year":"2012","journal-title":"Proc of the Intl Test Conf"},{"key":"ref25","year":"2016","journal-title":"GNU FTP Server"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.143"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.44"},{"key":"ref59","first-page":"419","article-title":"Pairwise testing in real world: Practical extensions to test case generator","author":"czerwonka","year":"2006","journal-title":"Proc 24th Pacific Northwest Software Quality Conf"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/32.605761"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.63"},{"key":"ref56","first-page":"220","article-title":"Building combinatorial test input model from use case artefacts","author":"preeti","year":"2017","journal-title":"Proc IEEE Int Conf on Software Testing Verification and Validation Workshops (ICSTW)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970301"},{"key":"ref54","first-page":"49","article-title":"Validation of constraints among configuration parameters using search-based combinatorial interaction testing","author":"gargantini","year":"2016","journal-title":"Proc 8th Int Symp Search Based Softw Eng (SSBSE)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.11"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1145\/2931037.2931040","article-title":"Threats to the validity of mutation-based test assessment","author":"papadakis","year":"2016","journal-title":"Proc 25th Int Symp Softw Test Anal (ISSTA)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1572"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.09.031"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.09.045"},{"key":"ref8","first-page":"126","article-title":"An application of adaptive random sequence in test case prioritization","author":"zhang","year":"2014","journal-title":"Proc of the Int Conf on Software Engineering and Knowledge Engineering (SEKE)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.77"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.49"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001460"},{"key":"ref45","first-page":"101","article-title":"A critique and improvement of the \n$CL$\n common language effect size statistics of McGraw and Wong","volume":"25","author":"vargha","year":"2000","journal-title":"Journal of Educational and Behavioral Statistics"},{"key":"ref48","author":"wu","year":"2017","journal-title":"Combinatorial Testing Repository"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201186"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194011005499"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E97.D.830"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1486"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25231-0_1"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9341-7"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1699-x"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.24"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1599"},{"key":"ref73","first-page":"614","article-title":"Greedy combinatorial test case generation using unsatisfiable cores","author":"yamada","year":"2016","journal-title":"Proc 31st Int Conf Autom Softw Eng (ASE)"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.61"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.466"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0093-0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.007"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2496939"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1574-6"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.26"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2510633"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.55"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.09.001"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2550441"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541815"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.15"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2015.7339054"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.271"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.066"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.5120\/ijais14-451081"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.infsof.2015.09.002","article-title":"Requirements based test prioritization using risk factors: An industrial study","volume":"69","author":"srikanth","year":"2016","journal-title":"Inf Softw Technol"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.29"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194011005220"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/32.979992"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.005"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SSBSE.2009.25"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.381"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.004"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2014.2362532"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.02.004"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581357"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.infsof.2012.01.002","article-title":"Design and implementation of a harmony-search-based variable-strength t-way testing strategy with constraints support","volume":"54","author":"alsewari","year":"2012","journal-title":"Inf Softw Technol"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.01.006"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1635-5"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71289-3_22"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.infsof.2017.10.007","article-title":"A tuned version of genetic algorithm for efficient test suite generation in interactive t-way testing strategy","volume":"94","author":"esfandyari","year":"2018","journal-title":"Inf Softw Technol"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.063"},{"key":"ref69","first-page":"540","article-title":"Learning combinatorial interaction test generation strategies using hyperheuristic search","author":"jia","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-012-9181-z"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.014"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.77"},{"key":"ref109","first-page":"207","article-title":"Attack pattern-based combinatorial testing with constraints for Web security testing","author":"bozic","year":"2015","journal-title":"Proc 16th Int Conf Softw Qual Rel Secur (QRS)"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107436"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.17"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.148"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.02.022"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.007"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/2593882.2593885","article-title":"Software testing: A research travelogue (2000&#x2013;2014)","author":"orso","year":"2014","journal-title":"Proc 2nd Int Workshop Future Softw Eng (FOSE)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.147"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.19"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.12"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.02.008"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.24"},{"key":"ref102","first-page":"578","article-title":"Generating partial covering array for locating faulty interactions in combinatorial testing","author":"wang","year":"2013","journal-title":"Proc 25th Int Conf Softw Eng Knowl Eng (SEKE)"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2016.23"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2016.39"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.314"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698916"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.149"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985931"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.117"},{"key":"ref10","first-page":"523","article-title":"Comparing white-box and black-box test prioritization","author":"henard","year":"2016","journal-title":"Proc 24th Int Conf Software Engineering (ICSE)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9024-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62964"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.53"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.84"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.03.004"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194013500459"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-5096-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.09.002"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-011-0067-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2421279"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554854"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648532"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.145"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.14"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606564"},{"key":"ref116","first-page":"699","article-title":"A mixed-way combinatorial testing for concurrent programs (S)","author":"qi","year":"2013","journal-title":"Proc 25th Int Conf Softw Eng Knowl Eng (SEKE)"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.48"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695905"},{"key":"ref120","first-page":"559","article-title":"Reducing combinatorics in GUI testing of Android applications","author":"mirzaei","year":"2016","journal-title":"Proc Int Conf Softw Eng (ICSE)"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-017-9357-7"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970325"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.16"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.infsof.2016.08.006","article-title":"The optimal testing order in the presence of switching cost","volume":"80","author":"wu","year":"2016","journal-title":"Inf Softw Technol"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.105"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.36"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.8"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08523673.pdf?arnumber=8523673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:10:46Z","timestamp":1643256646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8523673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":145,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2879638","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}