{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:10:07Z","timestamp":1743221407797,"version":"3.40.3"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tse.2025.3538490","type":"journal-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:35:00Z","timestamp":1738694100000},"page":"802-807","source":"Crossref","is-referenced-by-count":0,"title":["On \u201cPrioritizing Test Cases for Regression Testing\u201d"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7207-802X","authenticated-orcid":false,"given":"Gregg","family":"Rothermel","sequence":"first","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1682-1289","authenticated-orcid":false,"given":"Roland","family":"Untch","sequence":"additional","affiliation":[{"name":"Computer Science Department, Middle Tennessee State University, Murfreesboro, TN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792604"},{"key":"ref3","article-title":"Insights into regression testing","volume-title":"Proc. Conf. Softw. Maintenance","author":"Leung","year":"1989"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158694"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1989.65142"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1988.10187"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1995.526547"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242531"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1988.10188"},{"key":"ref10","article-title":"An incremental data flow testing tool","volume-title":"Proc. Sixth Int. Conf. Testing Comput. Softw.","author":"Harrold","year":"1989"},{"key":"ref11","article-title":"Interprocedural data flow testing","volume-title":"Proc. 3rd Testing, Anal., Verification Symp.","author":"Harrold","year":"1989"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90093-2"},{"key":"ref13","article-title":"A method for revalidating modified programs in the maintenance phase","volume-title":"Proc. 11th Annu. Int. Comput. Softw. Appl. Conf.","author":"Yau","year":"1987"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/52.43047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1989.65195"},{"key":"ref16","article-title":"Modification oriented software testing","volume-title":"Proc. Qual. Week","author":"Sherlund","year":"1991"},{"key":"ref17","article-title":"Logical modification oriented software testing","volume-title":"Proc. 12th Int. Conf. Testing Comput. Softw.","author":"Sherlund","year":"1995"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366927"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242533"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1990.131377"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360020403"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242535"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366928"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/32.624306"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296780"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/271771.271802"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35097-4_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(19980410)28:4<347::AID-SPE145>3.0.CO;2-L"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1997.625062"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738487"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/32.153381"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296778"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.10.001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183927"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.14"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9219-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.461"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/32.988497"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.63"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381798"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.19"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.163"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.12"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.08.008"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606565"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2685614"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.77"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39742-4_10","article-title":"A fine-grained parallel multi-objective test case prioritization on GUP","volume-title":"Proc. Int. Symp. Search-Based Softw. Eng.","author":"Li","year":"2013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771788"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2496939"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572297"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2011.75"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.12"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.47"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.74"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919106"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/icsm.2007.4362638"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.101"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.40"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181793"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390639"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180213"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635910"},{"key":"ref68","article-title":"Testrail"},{"key":"ref69","article-title":"Practitest"},{"key":"ref70","article-title":"Zephyr"},{"key":"ref71","article-title":"mabl"},{"key":"ref72","article-title":"Testcraft"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.16"},{"article-title":"Self healing software utilizing regression test fingerprints,\u201d U.S","year":"2021","author":"Hicks","key":"ref74"},{"article-title":"Determining application change success ratings","year":"2020","author":"Shani","key":"ref75"},{"article-title":"Prioritization of test cases","year":"2019","author":"Dhulipala","key":"ref76"},{"article-title":"Proactive cognitive analysis for inferring test case dependencies","year":"2019","author":"Andrejko","key":"ref77"},{"article-title":"Dynamic test case prioritization for relational database systems","year":"2018","author":"Barbas","key":"ref78"},{"article-title":"Dynamic test case prioritization for relational database systems","year":"2018","author":"Barbas","key":"ref79"},{"article-title":"Proactive cognitive analysis for inferring test case dependencies","year":"2018","author":"Andrejko","key":"ref80"},{"article-title":"Proactive cognitive analysis for inferring test case dependencies","year":"2018","author":"Andrejko","key":"ref81"},{"article-title":"Risk-based test coverage and prioritization","year":"2017","author":"Rajamanickam","key":"ref82"},{"article-title":"Risk-based test coverage and prioritization","year":"2017","author":"Rajamanickam","key":"ref83"},{"article-title":"Risk-based test coverage and prioritization","year":"2017","author":"Rajamanickam","key":"ref84"},{"article-title":"Automated testing of applications with scripting code","year":"2015","author":"Artzi","key":"ref85"},{"article-title":"Test scheduling based on historical test information","year":"2015","author":"Davison","key":"ref86"},{"article-title":"Automated and unattended process for testing software applications","year":"2014","author":"Petrovick","key":"ref87"},{"article-title":"Evaluation of software based on change history","year":"2013","author":"Blount","key":"ref88"},{"article-title":"Computer program testing after source code modifications using execution conditions","year":"2012","author":"Tateishi","key":"ref89"},{"article-title":"Performance computer program testing after source code modifications using execution conditions","year":"2010","author":"Tateishi","key":"ref90"},{"article-title":"Generating testcases based on numbers of testcases previously generated","year":"2010","author":"Chadha","key":"ref91"},{"article-title":"Generating testcases based on numbers of testcases previously generated","year":"2009","author":"Chadha","key":"ref92"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10930340\/10872897.pdf?arnumber=10872897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:35:47Z","timestamp":1743154547000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10872897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":92,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3538490","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}