{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:52:03Z","timestamp":1777593123230,"version":"3.51.4"},"reference-count":37,"publisher":"World Scientific Pub Co Pte Lt","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2016,6]]},"abstract":"<jats:p> Software regression testing techniques verify previous functionalities each time software modifications occur or new characteristics are added. With the aim of gaining a better understanding of this subject, in this work we present a survey of software regression testing techniques applied in the last 15 years; taking into account its application domain, kind of metrics they use, its application strategies and the phase of the software development process where they are applied. From an outcome of 460 papers, a set of 25 papers describing the use of 31 software testing regression techniques were identified. Results of this survey suggest that at the time of applying a regression testing techniques, metrics like cost and fault detection efficiency are the most relevant. Most of the techniques were assessed with instrumented programs (experimental cases) under academic settings. Conversely, we observe a minimum set of software regression techniques applied in industrial settings, mainly, under corrective and maintenance approaches. Finally, we observe a trend using some regression techniques under agile approaches. <\/jats:p>","DOI":"10.1142\/s0218194016300013","type":"journal-article","created":{"date-parts":[[2016,7,8]],"date-time":"2016-07-08T07:23:42Z","timestamp":1467962622000},"page":"675-689","source":"Crossref","is-referenced-by-count":49,"title":["15 Years of Software Regression Testing Techniques \u2014 A Survey"],"prefix":"10.1142","volume":"26","author":[{"given":"Ra\u00fal H.","family":"Rosero","sequence":"first","affiliation":[{"name":"Universidad Nacional Mayor de San Marcos, C\/Germ\u00e1n Am\u00e9zaga No. 375, Lima, Lima 01, Per\u00fa"},{"name":"Escuela Superior Polit\u00e9cnica de Chimborazo, Av. Panamericana Sur km. 1 1\/2, Riobamba, Chimborazo 060106, Ecuador"}]},{"given":"Omar S.","family":"G\u00f3mez","sequence":"additional","affiliation":[{"name":"Prometeo-Senescyt, Escuela Superior Polit\u00e9cnica de Chimborazo, Av. Panamericana Sur km. 1 1\/2, Riobamba, Chimborazo 060106, Ecuador"}]},{"given":"Glen","family":"Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"Universidad Nacional Mayor de San Marcos, C\/Germ\u00e1n Am\u00e9zaga No. 375, Lima, Lima 01, Per\u00fa"},{"name":"Universidad Nacional de Ingenier\u00eda, Av. T\u00fapac Amaru 210, Lima, Lima 025, Per\u00fa"}]}],"member":"219","published-online":{"date-parts":[[2016,7,8]]},"reference":[{"issue":"5","key":"S0218194016300013BIB001","first-page":"27","volume":"21","author":"Cockburn A.","year":"2008","journal-title":"CrossTalk \u2014 The J. Defense Software Eng."},{"key":"S0218194016300013BIB003","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367020"},{"key":"S0218194016300013BIB006","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"S0218194016300013BIB008","volume-title":"Test-Driven Development: By Example","author":"Beck K.","year":"2003"},{"key":"S0218194016300013BIB009","volume-title":"Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation","author":"Humble J.","year":"2010"},{"key":"S0218194016300013BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.58"},{"key":"S0218194016300013BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"key":"S0218194016300013BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.07.001"},{"key":"S0218194016300013BIB013","first-page":"289","volume":"35","author":"Biswas S.","year":"2011","journal-title":"Informatica"},{"key":"S0218194016300013BIB015","doi-asserted-by":"publisher","DOI":"10.1145\/274946.274960"},{"key":"S0218194016300013BIB016","first-page":"379","volume":"36","author":"Singh Y.","year":"2012","journal-title":"Informatica"},{"key":"S0218194016300013BIB018","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.256"},{"issue":"3","key":"S0218194016300013BIB019","first-page":"486","volume":"39","author":"Kumar M.","year":"2012","journal-title":"Chiang Mai J. Sci."},{"issue":"18","key":"S0218194016300013BIB020","volume":"71","author":"Kumari A. C.","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"S0218194016300013BIB021","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10509-8_24"},{"key":"S0218194016300013BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"S0218194016300013BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31519-0_7"},{"key":"S0218194016300013BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.706"},{"key":"S0218194016300013BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"S0218194016300013BIB027","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.010"},{"issue":"4","key":"S0218194016300013BIB028","first-page":"17","volume":"6","author":"Panigrahi C. R.","year":"2012","journal-title":"Int. J. Soft. Eng. Applic."},{"key":"S0218194016300013BIB030","doi-asserted-by":"publisher","DOI":"10.1145\/1543405.1543413"},{"key":"S0218194016300013BIB032","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"S0218194016300013BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/32.689399"},{"key":"S0218194016300013BIB035","doi-asserted-by":"publisher","DOI":"10.1145\/2539036.2539043"},{"key":"S0218194016300013BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.56"},{"key":"S0218194016300013BIB039","first-page":"2:1","volume":"2011","author":"Ficco M.","year":"2011","journal-title":"Adv. Soft. Eng."},{"key":"S0218194016300013BIB041","volume-title":"JUnit: A Regression Testing Framework","author":"Gamma E.","year":"2000"},{"key":"S0218194016300013BIB046","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.654.659"},{"key":"S0218194016300013BIB049","doi-asserted-by":"publisher","DOI":"10.1145\/1874391.1874405"},{"key":"S0218194016300013BIB051","volume":"11","author":"Pereira G. M.","year":"2008","journal-title":"CLEI Electronic J."},{"key":"S0218194016300013BIB052","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"S0218194016300013BIB053","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/428521"},{"key":"S0218194016300013BIB054","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"S0218194016300013BIB055","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"issue":"3","key":"S0218194016300013BIB056","first-page":"233","volume":"2","author":"Mohanty R.","year":"2010","journal-title":"Int. J. Inf. Decis. Sci."},{"key":"S0218194016300013BIB058","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2011.49064"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194016300013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T02:51:44Z","timestamp":1565146304000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194016300013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":37,"journal-issue":{"issue":"05","published-online":{"date-parts":[[2016,7,8]]},"published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1142\/S0218194016300013"],"URL":"https:\/\/doi.org\/10.1142\/s0218194016300013","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6]]}}}