{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:37:52Z","timestamp":1771670272315,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":209,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2593882.2593885","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"117-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":158,"title":["Software testing: a research travelogue (2000\u20132014)"],"prefix":"10.1145","author":[{"given":"Alessandro","family":"Orso","sequence":"first","affiliation":[{"name":"Georgia Tech, USA"}]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes In Computer Scienc","first-page":"1349","volume-title":"GECCO (2)","author":"Adamopoulos K.","unstructured":"K. Adamopoulos , M. Harman , and R. M. Hierons . How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution . In GECCO (2) , Volume 3103 of Lecture Notes In Computer Scienc , pages 1338\u2013 1349 . Springer, 2004. K. Adamopoulos, M. Harman, and R. M. Hierons. How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution. In GECCO (2), Volume 3103 of Lecture Notes In Computer Scienc, pages 1338\u20131349. Springer, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.12.005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.52"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100082"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.77"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393666"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_9_1","unstructured":"Mit app inventor. http:\/\/appinventor.mit.edu\/explore\/.  Mit app inventor. http:\/\/appinventor.mit.edu\/explore\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001452"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321693"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985871"},{"key":"e_1_3_2_1_13_1","unstructured":"Atlassian. Atlassian software systems: Bamboo. https:\/\/www.atlassian.com\/software\/bamboo.  Atlassian. Atlassian software systems: Bamboo. https:\/\/www.atlassian.com\/software\/bamboo."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100119"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30557-6_14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007527"},{"key":"e_1_3_2_1_17_1","volume-title":"Extreme Programming Explained: Embrace Change","author":"Beck K.","year":"2000","unstructured":"K. Beck . Extreme Programming Explained: Embrace Change . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2000 . K. Beck. Extreme Programming Explained: Embrace Change. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390634"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.25"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.58"},{"key":"e_1_3_2_1_21_1","unstructured":"R. V. Binder. Open source tools for model-based testing. http:\/\/robertvbinder.com\/open-source-tools-for-model-basedtesting.  R. V. Binder. Open source tools for model-based testing. http:\/\/robertvbinder.com\/open-source-tools-for-model-basedtesting."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.624306"},{"key":"e_1_3_2_1_23_1","first-page":"289","article-title":"Regression test selection techniques: A survey","volume":"35","author":"Biswas S.","year":"2011","unstructured":"S. Biswas , R. Mall , M. Satpathy , and S. Sukumaran . Regression test selection techniques: A survey . Informatica , 35 : 289 \u2013 321 , 2011 . S. Biswas, R. Mall, M. Satpathy, and S. Sukumaran. Regression test selection techniques: A survey. Informatica, 35:289\u2013321, 2011.","journal-title":"Informatica"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594329"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586099"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.03.004"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_28_1","unstructured":"C. Cadar. KLEE-related publications and systems. http:\/\/klee.github.io\/klee\/Publications.html 2014.  C. Cadar. KLEE-related publications and systems. http:\/\/klee.github.io\/klee\/Publications.html 2014."},{"key":"e_1_3_2_1_29_1","first-page":"224","volume-title":"Proceedings of the USENIX Conference on Operating Systems Design and Implementation","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the USENIX Conference on Operating Systems Design and Implementation , pages 209\u2013 224 , 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the USENIX Conference on Operating Systems Design and Implementation, pages 209\u2013224, 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.43"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351697"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.07.004"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00028-0"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462173"},{"key":"e_1_3_2_1_37_1","volume-title":"Workshop on Hot Topics in Dependable Systems (HotDep)","author":"Chipounov V.","year":"2009","unstructured":"V. Chipounov , V. Georgescu , C. Zamfir , and G. Candea . Selective symbolic execution . In Workshop on Hot Topics in Dependable Systems (HotDep) , 2009 . V. Chipounov, V. Georgescu, C. Zamfir, and G. Candea. Selective symbolic execution. In Workshop on Hot Topics in Dependable Systems (HotDep), 2009."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(85)90004-4"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.10"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.605761"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.50"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776822"},{"key":"e_1_3_2_1_43_1","first-page":"121","article-title":"Combinatorial aspects of covering arrays","volume":"58","author":"Colbourn C.","year":"2004","unstructured":"C. Colbourn . Combinatorial aspects of covering arrays . Le Matematich (Catania) , 58 : 121 \u2013 157 , 2004 . C. Colbourn. Combinatorial aspects of covering arrays. Le Matematich (Catania), 58:121\u2013157, 2004.","journal-title":"Le Matematich (Catania)"},{"key":"e_1_3_2_1_44_1","first-page":"252","volume-title":"Proceedings of the IASTED International Conference on Software Engineering","author":"Colbourn C. J.","year":"2004","unstructured":"C. J. Colbourn and M. B. Cohen . A deterministic density algorithm for pairwise interaction coverage . In Proceedings of the IASTED International Conference on Software Engineering , pages 242\u2013 252 , 2004 . C. J. Colbourn and M. B. Cohen. A deterministic density algorithm for pairwise interaction coverage. In Proceedings of the IASTED International Conference on Software Engineering, pages 242\u2013252, 2004."},{"key":"e_1_3_2_1_45_1","unstructured":"Conformiq. http:\/\/www.conformiq.com.  Conformiq. http:\/\/www.conformiq.com."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062533"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348254"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the Pacific Northwest Sofware Quality Conference","author":"Czerwonka J.","year":"2006","unstructured":"J. Czerwonka . Pairwise testing in the real world: Practical extensions to test-case scenarios . In Proceedings of the Pacific Northwest Sofware Quality Conference , 2006 . J. Czerwonka. Pairwise testing in the real world: Practical extensions to test-case scenarios. In Proceedings of the Pacific Northwest Sofware Quality Conference, 2006."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2003.04.003"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_53_1","first-page":"16","volume-title":"Proceedings of the Internatinoal Conference on Advances in System Testing and Validation Lifecycles","author":"Demiroz G.","year":"2012","unstructured":"G. Demiroz and C. Yilmaz . Cost-aware combinatorial interaction testing . In Proceedings of the Internatinoal Conference on Advances in System Testing and Validation Lifecycles , pages 9\u2013 16 , Nov. 2012 . G. Demiroz and C. Yilmaz. Cost-aware combinatorial interaction testing. In Proceedings of the Internatinoal Conference on Advances in System Testing and Validation Lifecycles, pages 9\u201316, Nov. 2012."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381509"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2318202.2318210"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_57_1","unstructured":"B. Dutertre and L. de Moura. The YICES SMT Solver.  B. Dutertre and L. de Moura. The YICES SMT Solver."},{"key":"e_1_3_2_1_58_1","volume-title":"Pearson Education","author":"Duvall P. M.","year":"2007","unstructured":"P. M. Duvall , S. Matyas , and A. Glover . Continuous Integration: Improving Software Quality and Reducing Risk . Pearson Education , 2007 . P. M. Duvall, S. Matyas, and A. Glover. Continuous Integration: Improving Software Quality and Reducing Risk. Pearson Education, 2007."},{"key":"e_1_3_2_1_59_1","volume-title":"http:\/\/www.eclipse.org\/","author":"Foundation Eclipse","year":"2014","unstructured":"Eclipse Foundation . Eclipse. http:\/\/www.eclipse.org\/ , 2014 . Eclipse Foundation. Eclipse. http:\/\/www.eclipse.org\/, 2014."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007522"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13792-1_3"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486870"},{"key":"e_1_3_2_1_64_1","unstructured":"M. Fowler. Continuous integration. martinflowler.com\/articles\/continuousIntegration.html.  M. Fowler. Continuous integration. martinflowler.com\/articles\/continuousIntegration.html."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483774"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.93"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698889"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.163"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9135-7"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336773"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993529"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.427"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05031-2_7"},{"key":"e_1_3_2_1_77_1","first-page":"260","volume-title":"Proceedings of the Conference on IASTED International Multi-Conference: Software Engineering","author":"Grindal M.","year":"2007","unstructured":"M. Grindal and J. Offutt . Input parameter modeling for combination strategies . In Proceedings of the Conference on IASTED International Multi-Conference: Software Engineering , pages 255\u2013 260 , 2007 . M. Grindal and J. Offutt. Input parameter modeling for combination strategies. In Proceedings of the Conference on IASTED International Multi-Conference: Software Engineering, pages 255\u2013260, 2007."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336763"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336762"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181790"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/786768.786970"},{"key":"e_1_3_2_1_82_1","unstructured":"P. Gupta M. Ivey and J. Penix. Testing at the speed and scale of google. http:\/\/googletesting.blogspot.com\/2011\/ 06\/testing-at-speed-and-scale-of-google.html June 2011.  P. Gupta M. Ivey and J. Penix. Testing at the speed and scale of google. http:\/\/googletesting.blogspot.com\/2011\/ 06\/testing-at-speed-and-scale-of-google.html June 2011."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486801"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265732"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"e_1_3_2_1_87_1","volume-title":"Research Memoranda CS-13-01, Department of Computer Science","author":"Harman M.","year":"2013","unstructured":"M. Harman , P. McMinn , M. Shahbaz , and S. Yoo . A comprehensive survey of trends in oracles for software testing. Technical report , Research Memoranda CS-13-01, Department of Computer Science , University of Sheffield , 2013 . M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. A comprehensive survey of trends in oracles for software testing. Technical report, Research Memoranda CS-13-01, Department of Computer Science, University of Sheffield, 2013."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336532"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152391"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2003.11.029"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430540"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_29"},{"key":"e_1_3_2_1_93_1","series-title":"Lecture Notes in Computer Science","first-page":"12","volume-title":"Testing of Software and Communicating Systems","author":"Huima A.","unstructured":"A. Huima . Implementing Conformiq Qtronic . In A. Petrenko, M. Veanes, J. Tretmans, and W. Grieskamp, editors, Testing of Software and Communicating Systems , volume 4581 of Lecture Notes in Computer Science , pages 1\u2013 12 . 2007. A. Huima. Implementing Conformiq Qtronic. In A. Petrenko, M. Veanes, J. Tretmans, and W. Grieskamp, editors, Testing of Software and Communicating Systems, volume 4581 of Lecture Notes in Computer Science, pages 1\u201312. 2007."},{"key":"e_1_3_2_1_94_1","first-page":"200","volume-title":"Proceedings of the International Conference on Software Engineering","author":"Hutchins M.","year":"1994","unstructured":"M. Hutchins , H. Foster , T. Goradia , and T. Ostrand . Experiments on the effectiveness of dataflow- and controlflow-based test adequacy criteria . In Proceedings of the International Conference on Software Engineering , pages 191\u2013 200 , May 1994 . M. Hutchins, H. Foster, T. Goradia, and T. Ostrand. Experiments on the effectiveness of dataflow- and controlflow-based test adequacy criteria. In Proceedings of the International Conference on Software Engineering, pages 191\u2013200, May 1994."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.40"},{"key":"e_1_3_2_1_96_1","unstructured":"Jenkins. Jenkins: An extendable open source continous integration server. jenkins-ci.org.  Jenkins. Jenkins: An extendable open source continous integration server. jenkins-ci.org."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337279"},{"key":"e_1_3_2_1_98_1","unstructured":"Apache JMeter. https:\/\/jmeter.apache.org.  Apache JMeter. https:\/\/jmeter.apache.org."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500077"},{"key":"e_1_3_2_1_100_1","volume-title":"http:\/\/www.junit.org","author":"Framework Unit Testing","year":"2014","unstructured":"J Unit Testing Framework . http:\/\/www.junit.org , 2014 . JUnit Testing Framework. http:\/\/www.junit.org, 2014."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.21"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765924"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960284"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2012.86"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.114"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.39"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEUS.2005.12"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"key":"e_1_3_2_1_110_1","first-page":"317","volume-title":"Dynamic Approach of Test Data Generation. In Proceedings of the IEEE Conference on Software Maintenance","author":"Korel B.","year":"1990","unstructured":"B. Korel . A Dynamic Approach of Test Data Generation. In Proceedings of the IEEE Conference on Software Maintenance , pages 311\u2013 317 , November 1990 . B. Korel. A Dynamic Approach of Test Data Generation. In Proceedings of the IEEE Conference on Software Maintenance, pages 311\u2013317, November 1990."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/1241572.1241582"},{"key":"e_1_3_2_1_112_1","unstructured":"LabView System Design Software. http:\/\/www.ni.com\/labview\/.  LabView System Design Software. http:\/\/www.ni.com\/labview\/."},{"issue":"4","key":"e_1_3_2_1_113_1","first-page":"9","article-title":"Model-based testing - next generation functional testing","volume":"12","author":"Legeard B.","year":"2010","unstructured":"B. Legeard and M. Utting . Model-based testing - next generation functional testing . SoftwareTech News , 12 ( 4 ): 9 \u2013 18 , Jan. 2010 . B. Legeard and M. Utting. Model-based testing - next generation functional testing. SoftwareTech News, 12(4):9\u201318, Jan. 2010.","journal-title":"SoftwareTech News"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483780"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610414"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.13"},{"key":"e_1_3_2_1_118_1","first-page":"10","volume-title":"Proceedings of the International Conference on Pervasive Computing and Communications","author":"Liu Y.","year":"2013","unstructured":"Y. Liu , C. Xu , and S. C. Cheung . Where has my battery gone? Finding sensor related energy black holes in smartphone applications . In Proceedings of the International Conference on Pervasive Computing and Communications , pages 2\u2013 10 , 2013 . Y. Liu, C. Xu, and S. C. Cheung. Where has my battery gone? Finding sensor related energy black holes in smartphone applications. In Proceedings of the International Conference on Pervasive Computing and Communications, pages 2\u201310, 2013."},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083274.1083281"},{"key":"e_1_3_2_1_120_1","volume-title":"Proceedings of the Workshop on the Evaluation of Software Defect Detection Tools","author":"Lu S.","year":"2005","unstructured":"S. Lu , Z. Li , F. Qin , L. Tan , P. Zhou , and Y. Zhou . Bugbench: Benchmarks for evaluating bug detection tools . In Proceedings of the Workshop on the Evaluation of Software Defect Detection Tools , 2005 . S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for evaluating bug detection tools. In Proceedings of the Workshop on the Evaluation of Software Defect Detection Tools, 2005."},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100092"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.22"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985979"},{"key":"e_1_3_2_1_125_1","unstructured":"Matlab. http:\/\/www.mathworks.com\/products\/matlab\/.  Matlab. http:\/\/www.mathworks.com\/products\/matlab\/."},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70756"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077276.1077279"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525880.1525884"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240304"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360211"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31612-8_22"},{"key":"e_1_3_2_1_133_1","volume-title":"https: \/\/developer.mozilla.org\/en-US\/docs\/Tinderbox","author":"Network Mozilla Developer","year":"2014","unstructured":"Mozilla Developer Network . Tinderbox. https: \/\/developer.mozilla.org\/en-US\/docs\/Tinderbox , 2014 . Mozilla Developer Network. Tinderbox. https: \/\/developer.mozilla.org\/en-US\/docs\/Tinderbox, 2014."},{"key":"e_1_3_2_1_134_1","unstructured":"National Institute of Standards and Technology. Nist software assurance reference dataset project. samate.nist.gov\/SRD\/.  National Institute of Standards and Technology. Nist software assurance reference dataset project. samate.nist.gov\/SRD\/."},{"key":"e_1_3_2_1_135_1","unstructured":"Nester. nester.sourceforge.net.  Nester. nester.sourceforge.net."},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(03)00291-9"},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077303.1077304"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199902)29:2%3C167::AID-SPE225%3E3.3.CO;2-M"},{"key":"e_1_3_2_1_140_1","unstructured":"Open Source Software Testing Tools. www.opensourcetesting.org\/performance.php.  Open Source Software Testing Tools. www.opensourcetesting.org\/performance.php."},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029928"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019136.2019143"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/242223.242288"},{"key":"e_1_3_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_22"},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"e_1_3_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390643"},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.13"},{"key":"e_1_3_2_1_149_1","unstructured":"Performance Testing Guidance for Web Applications. perftestingguide.codeplex.com\/releases\/view\/.  Performance Testing Guidance for Web Applications. perftestingguide.codeplex.com\/releases\/view\/."},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001425"},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.5555\/827270.829032"},{"key":"e_1_3_2_1_152_1","unstructured":"The r project for statistical computing. http:\/\/www.r-project.org\/.  The r project for statistical computing. http:\/\/www.r-project.org\/."},{"key":"e_1_3_2_1_153_1","volume-title":"The yogi project","author":"Research M.","year":"2014","unstructured":"M. Research . The yogi project , 2014 . http:\/\/research.microsoft.com\/en-us\/projects\/Yogi. M. Research. The yogi project, 2014. http:\/\/research.microsoft.com\/en-us\/projects\/Yogi."},{"key":"e_1_3_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/366378.366385"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/186258.187171"},{"key":"e_1_3_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"e_1_3_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"e_1_3_2_1_158_1","volume-title":"June","author":"Rothermel G.","year":"2000","unstructured":"G. Rothermel , M. J. Harrold , and J. Dedhia . Regression test selection for C++ programs. Journal of Software Testing, Verification, and Reliability, 10(2):77\u2013109 , June 2000 . G. Rothermel, M. J. Harrold, and J. Dedhia. Regression test selection for C++ programs. Journal of Software Testing, Verification, and Reliability, 10(2):77\u2013109, June 2000."},{"key":"e_1_3_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.91"},{"key":"e_1_3_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.5555\/2361717"},{"key":"e_1_3_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.42"},{"key":"e_1_3_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462179"},{"key":"e_1_3_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"e_1_3_2_1_165_1","volume-title":"http:\/\/www.sat4j.org","author":"J.","year":"2012","unstructured":"SAT4 J. http:\/\/www.sat4j.org , 2012 . SAT4J. http:\/\/www.sat4j.org, 2012."},{"key":"e_1_3_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"e_1_3_2_1_167_1","volume-title":"Agile Software Development with Scrum","author":"Schwaber K.","year":"2001","unstructured":"K. Schwaber and M. Beedle . Agile Software Development with Scrum . Prentice Hall PTR , Upper Saddle River, NJ, USA, 1 st edition, 2001 . K. Schwaber and M. Beedle. Agile Software Development with Scrum. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1st edition, 2001.","edition":"1"},{"key":"e_1_3_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001451"},{"key":"e_1_3_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISoLA.2006.63"},{"key":"e_1_3_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321679"},{"key":"e_1_3_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"e_1_3_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.18"},{"issue":"14","key":"e_1_3_2_1_174_1","first-page":"202","article-title":"Covering arrays of higher strength from permutation vectors","volume":"3","author":"Sherwood G. B.","year":"2005","unstructured":"G. B. Sherwood , S. S. Martirosyan , and C. J. Colbourn . Covering arrays of higher strength from permutation vectors . Journal of Combinatorial Design , 3 ( 14 ): 202 \u2013 213 , 2005 . G. B. Sherwood, S. S. Martirosyan, and C. J. Colbourn. Covering arrays of higher strength from permutation vectors. Journal of Combinatorial Design, 3(14):202\u2013213, 2005.","journal-title":"Journal of Combinatorial Design"},{"key":"e_1_3_2_1_175_1","first-page":"77","volume-title":"Proceedings of the Annual International Computer Software and Applications Conference","author":"Shiba T.","year":"2004","unstructured":"T. Shiba , T. Tsuchiya , and T. Kikuno . Using artificial life techniques to generate test cases for combinatorial testing . In Proceedings of the Annual International Computer Software and Applications Conference , pages 72\u2013 77 , 2004 . T. Shiba, T. Tsuchiya, and T. Kikuno. Using artificial life techniques to generate test cases for combinatorial testing. In Proceedings of the Annual International Computer Software and Applications Conference, pages 72\u201377, 2004."},{"key":"e_1_3_2_1_176_1","volume-title":"Apr.","author":"Repository Infrastructure","year":"2012","unstructured":"Software-artifact Infrastructure Repository . http:\/\/sir.unl.edu\/ , Apr. 2012 . Software-artifact Infrastructure Repository. http:\/\/sir.unl.edu\/, Apr. 2012."},{"key":"e_1_3_2_1_177_1","unstructured":"Smartesting. http:\/\/www.smartesting.com.  Smartesting. http:\/\/www.smartesting.com."},{"key":"e_1_3_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083149"},{"key":"e_1_3_2_1_180_1","unstructured":"Spec explorer. http:\/\/www.specexplorer.net.  Spec explorer. http:\/\/www.specexplorer.net."},{"key":"e_1_3_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566187"},{"key":"e_1_3_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337326"},{"key":"e_1_3_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336776"},{"key":"e_1_3_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831732"},{"key":"e_1_3_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985847"},{"key":"e_1_3_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.60"},{"key":"e_1_3_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001422"},{"key":"e_1_3_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2009.2034288"},{"key":"e_1_3_2_1_189_1","unstructured":"Test Studio. www.telerik.com\/teststudio\/performance-testing.  Test Studio. www.telerik.com\/teststudio\/performance-testing."},{"key":"e_1_3_2_1_190_1","unstructured":"ThoughtWorks. Go: Continous delivery. www.thoughtworks.com\/products\/go-continuous-delivery.  ThoughtWorks. Go: Continous delivery. www.thoughtworks.com\/products\/go-continuous-delivery."},{"key":"e_1_3_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792786.1792798"},{"key":"e_1_3_2_1_192_1","volume-title":"http:\/\/www.transworldnews.com\/ NewsStory.aspx?storyid=49790","author":"Hours After Unknown Outage Down","year":"2010","unstructured":"TransWorldNews. Amazon.com Down for Hours After Unknown Outage . http:\/\/www.transworldnews.com\/ NewsStory.aspx?storyid=49790 , 2010 . TransWorldNews. Amazon.com Down for Hours After Unknown Outage. http:\/\/www.transworldnews.com\/ NewsStory.aspx?storyid=49790, 2010."},{"key":"e_1_3_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.456"},{"key":"e_1_3_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.56"},{"key":"e_1_3_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985820"},{"key":"e_1_3_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/25.4.465"},{"key":"e_1_3_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018431.1021418"},{"key":"e_1_3_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.5555\/330775"},{"key":"e_1_3_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189748.1189752"},{"key":"e_1_3_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_3_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882330"},{"key":"e_1_3_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.21"},{"key":"e_1_3_2_1_203_1","unstructured":"Yahoo! pipes. http:\/\/pipes.yahoo.com\/pipes\/.  Yahoo! pipes. http:\/\/pipes.yahoo.com\/pipes\/."},{"key":"e_1_3_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.65"},{"key":"e_1_3_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.408"},{"key":"e_1_3_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_207_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572296"},{"key":"e_1_3_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.44"},{"key":"e_1_3_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568294"},{"key":"e_1_3_2_1_210_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Future of Software Engineering Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593882.2593885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:54Z","timestamp":1750273434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":209,"alternative-id":["10.1145\/2593882.2593885","10.1145\/2593882"],"URL":"https:\/\/doi.org\/10.1145\/2593882.2593885","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}