{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:31:32Z","timestamp":1765261892516,"version":"3.46.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004040","name":"KU Leuven","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004040","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1109\/saner-c66551.2025.00034","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:38:52Z","timestamp":1765219132000},"page":"182-189","source":"Crossref","is-referenced-by-count":0,"title":["Graph-Theory Based Test Case Selection and Missing Test Identification for Integration Testing"],"prefix":"10.1109","author":[{"given":"Nimantha","family":"Kariyakarawana","sequence":"first","affiliation":[{"name":"KU Leuven,DistriNet,Leuven,Belgium"}]},{"given":"Charles","family":"Sys","sequence":"additional","affiliation":[{"name":"KU Leuven,DistriNet,Leuven,Belgium"}]},{"given":"Tom","family":"Holvoet","sequence":"additional","affiliation":[{"name":"KU Leuven,DistriNet,Leuven,Belgium"}]}],"member":"263","reference":[{"year":"2010","author":"Ahamed","article-title":"Studying the feasibility and importance of software testing: An analysis","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-981-33-6546-9_52"},{"year":"2020","author":"Belay","article-title":"Challenges of large-scalesoftware testing and the role of quality characteristics: Empirical study","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-031-78386-9_23"},{"issue":"2","key":"ref5","first-page":"155","article-title":"On the development and validation of a scale of test impact on test takers (titt)","volume":"7","author":"Samaie","year":"2017","journal-title":"International Journal of Language Testing"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/inventions5010010"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1142\/S0218194014500259"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICISA.2014.6847468"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.scico.2007.08.002"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.infsof.2006.11.002"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-31491-9_8"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICSESS.2015.7339088"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/0004-3702(71)90010-5"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1002\/(SICI)1099-1689(1998090)8:3<133::AID-STVR162>3.0.CO;2-M"},{"issue":"12","key":"ref15","first-page":"16","article-title":"Test case minimization techniques: a review","volume":"2","author":"Singh","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICSME52107.2021.00012"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICSTW.2016.14"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/AITEST49225.2020.00020"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/AICCSA.2001.934006"},{"key":"ref20","first-page":"999","article-title":"Graph theory techniques in model-based testing","volume-title":"International Conference on Testing Computer Software","volume":"1","author":"Robinson"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-031-52388-5_7"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICETET.2008.79"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.5120\/18165-9025"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1145\/1137661.1137669","article-title":"Application of graph theory to oo software engineering","volume-title":"Workshop on Interdisciplinary Software Engineering Research","author":"Chatzigeorgiou"},{"key":"ref25","first-page":"211","article-title":"Design pattern detection based on the graph theory","volume-title":"Knowledge-Based Systems","volume":"120","author":"Bafandeh Mayvan","year":"2017"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TSE.2022.3209625"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1088\/1742-5468\/2008\/10\/p10008"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1073\/pnas.122653799"},{"year":"2016","author":"Traag","article-title":"Introduction to leiden algorithm - leiden algorithm documentation","key":"ref29"},{"year":"2006","author":"Brandes","article-title":"Maximizing modularity is hard","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/MIPRO.2014.6859714"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s12652-021-03508-y"},{"key":"ref33","first-page":"200","article-title":"Revising the newman-girvan algorithm","volume-title":"ITAT","volume":"1649","author":"Hurajov\u00e1"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1038\/s41598-019-41695-z"},{"volume-title":"JavaParser: Visited - Analyse, transform and generate your Java code base","year":"2023","author":"Smith","key":"ref35"},{"year":"2024","article-title":"Louvain communities - networkx documentation","key":"ref36"},{"year":"2024","article-title":"Girvan-newman algorithm - networkx documentation","key":"ref37"},{"year":"2024","article-title":"Modularity - networkx documentation","key":"ref38"}],"event":{"name":"2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)","start":{"date-parts":[[2025,3,4]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,3,4]]}},"container-title":["2025 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11272146\/11272056\/11272148.pdf?arnumber=11272148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T06:12:01Z","timestamp":1765260721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11272148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/saner-c66551.2025.00034","relation":{},"subject":[],"published":{"date-parts":[[2025,3,4]]}}}