{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:17Z","timestamp":1750308737213,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T00:00:00Z","timestamp":1384128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,11,11]]},"abstract":"<jats:p>Now a days, software industries satisfy users' needs through developing software. To satisfy their customers, the software developers need to identify the critical components that make serious impacts on users' requirements. Tracking critical components is an important and timeconsuming process. In this paper, we propose a novel approach, Criticality Analysis, which identifies the critical components of an application. The identified critical components are verified to ensure that they are failure-free using the intelligent search based optimization algorithm, Artificial Bee Colony.<\/jats:p>","DOI":"10.1145\/2532780.2532811","type":"journal-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T14:13:59Z","timestamp":1385561639000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Criticality analyzer and tester"],"prefix":"10.1145","volume":"38","author":[{"given":"D. Jeya","family":"Mala","sequence":"first","affiliation":[{"name":"Thiagarajar College of Engineering, Tamil Nadu, India"}]},{"given":"S.","family":"Balamurugan","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services"}]},{"given":"K. Sabari","family":"Nathan","sequence":"additional","affiliation":[{"name":"Tata Consultancy Services"}]}],"member":"320","published-online":{"date-parts":[[2013,11,11]]},"reference":[{"volume-title":"Proceedings of the International Conference on Software Quality. 1--13","author":"Helander M.","key":"e_1_2_1_1_1","unstructured":"Ohlsson, Niclas, M. Helander , and C. Wohlin . 1996. Quality improvement by identification of fault-prone modules using software design metrics . In Proceedings of the International Conference on Software Quality. 1--13 . Ohlsson, Niclas, M. Helander, and C. Wohlin. 1996. Quality improvement by identification of fault-prone modules using software design metrics. In Proceedings of the International Conference on Software Quality. 1--13."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.231113"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11880240_26"},{"volume-title":"Classification techniques for metric-based Software development. Software Quality Journal","author":"Ebert Christof","key":"e_1_2_1_4_1","unstructured":"Christof Ebert . Classification techniques for metric-based Software development. Software Quality Journal . Vol. 5 , No .4. 255--272. Christof Ebert. Classification techniques for metric-based Software development. Software Quality Journal. Vol.5, No.4. 255--272."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.12.794"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.24"},{"issue":"2","key":"e_1_2_1_7_1","first-page":"15","article-title":"ABC Tester--Artificial Bee Colony Based Software Test Suite Optimization Approach","volume":"2","author":"Jeya D.","year":"2009","unstructured":"Mala, D. Jeya , and V. Mohan . 2009 . ABC Tester--Artificial Bee Colony Based Software Test Suite Optimization Approach . International Journal of Software Engineering 2 , no. 2 . 15 -- 43 . Mala, D. Jeya, and V. Mohan. 2009. ABC Tester--Artificial Bee Colony Based Software Test Suite Optimization Approach. International Journal of Software Engineering 2, no. 2. 15--43.","journal-title":"International Journal of Software Engineering"},{"key":"e_1_2_1_8_1","unstructured":"Aditya P Mathur. Foundations of Software Testing. Pearson Education India. ISBN: 9788131707951.   Aditya P Mathur. Foundations of Software Testing. Pearson Education India. ISBN: 9788131707951."},{"key":"e_1_2_1_9_1","volume-title":"Mary Jean Harrold, and Robert R. Peck","author":"Roy","year":"1999","unstructured":"Pargas, Roy P. , Mary Jean Harrold, and Robert R. Peck . 1999 . Test-data generation using genetic algorithms. Software Testing Verification and Reliability 9.4 (1999): 263--282. Pargas, Roy P., Mary Jean Harrold, and Robert R. Peck. 1999. Test-data generation using genetic algorithms. Software Testing Verification and Reliability 9.4 (1999): 263--282."},{"key":"e_1_2_1_10_1","first-page":"2231","article-title":"Fault-prone Components Identification for Real time Complex systems Based on Criticality Analysis. In International Journal of Computer Science and Informatics (IJCSI).Vol. 3. Issue-2. 17--23","author":"Jeya Mala","year":"2013","unstructured":"Jeya Mala D, Balamurugan S, Jalila A and Sabari Nathan K. 2013 . Fault-prone Components Identification for Real time Complex systems Based on Criticality Analysis. In International Journal of Computer Science and Informatics (IJCSI).Vol. 3. Issue-2. 17--23 . ISSN : 2231 - 5292 . Jeya Mala D, Balamurugan S, Jalila A and Sabari Nathan K. 2013. Fault-prone Components Identification for Real time Complex systems Based on Criticality Analysis. In International Journal of Computer Science and Informatics (IJCSI).Vol. 3. Issue-2. 17--23. ISSN: 2231-5292.","journal-title":"ISSN"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532780.2532811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2532780.2532811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:06Z","timestamp":1750278126000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532780.2532811"}},"subtitle":["an effective approach for critical component identification &amp; verification using ABC"],"short-title":[],"issued":{"date-parts":[[2013,11,11]]},"references-count":10,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,11,11]]}},"alternative-id":["10.1145\/2532780.2532811"],"URL":"https:\/\/doi.org\/10.1145\/2532780.2532811","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2013,11,11]]},"assertion":[{"value":"2013-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}