{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T11:50:36Z","timestamp":1771588236344,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61421091, 91318301, 61225007, 61522201"],"award-info":[{"award-number":["61421091, 91318301, 61225007, 61522201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Basic Research Program of China (973)","award":["2014CB347701"],"award-info":[{"award-number":["2014CB347701"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2884781.2884874","type":"proceedings-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T18:21:10Z","timestamp":1463163670000},"page":"535-546","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["How does regression test prioritization perform in real-world software evolution?"],"prefix":"10.1145","author":[{"given":"Yafeng","family":"Lu","sequence":"first","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Yiling","family":"Lou","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Shiyang","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yangfan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Kaner \"Improving the maintainability of automated test suites \" in Proc. QW 1997.  C. Kaner \"Improving the maintainability of automated test suites \" in Proc. QW 1997."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.4"},{"key":"e_1_3_2_1_3_1","first-page":"179","volume-title":"Test case prioritization: an empirical study,\" in ICSM","author":"Rothermel G.","year":"1999","unstructured":"G. Rothermel , R. H. Untch , C. Chu , and M. J. Harrold , \" Test case prioritization: an empirical study,\" in ICSM , pp. 179 -- 188 , 1999 . G. Rothermel, R. H. Untch, C. Chu, and M. J. Harrold, \"Test case prioritization: an empirical study,\" in ICSM, pp. 179--188, 1999."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/851010.856115"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00037-0"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/248233.248262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.77"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_9_1","first-page":"192","volume-title":"Bridging the gap between the total and additional test-case prioritization strategies,\" in ICSE","author":"Zhang L.","year":"2013","unstructured":"L. Zhang , D. Hao , L. Zhang , G. Rothermel , and H. Mei , \" Bridging the gap between the total and additional test-case prioritization strategies,\" in ICSE , pp. 192 -- 201 , 2013 . L. Zhang, D. Hao, L. Zhang, G. Rothermel, and H. Mei, \"Bridging the gap between the total and additional test-case prioritization strategies,\" in ICSE, pp. 192--201, 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685614"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.106"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610392"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483782"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.58"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572297"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"issue":"14","key":"e_1_3_2_1_18_1","first-page":"833","article-title":"Search based software engineering","volume":"43","author":"Harman M.","year":"2001","unstructured":"M. Harman and B. F. Jones , \" Search based software engineering ,\" IST , vol. 43 , no. 14 , pp. 833 -- 839 , 2001 . M. Harman and B. F. Jones, \"Search based software engineering,\" IST, vol. 43, no. 14, pp. 833--839, 2001.","journal-title":"IST"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146240"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353673.1353676"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080769"},{"key":"e_1_3_2_1_22_1","first-page":"40","volume-title":"Faulttracer: a change impact and regression fault analysis tool for evolving java programs,\" in FSE","author":"Zhang L.","year":"2012","unstructured":"L. Zhang , M. Kim , and S. Khurshid , \" Faulttracer: a change impact and regression fault analysis tool for evolving java programs,\" in FSE , p. 40 , 2012 . L. Zhang, M. Kim, and S. Khurshid, \"Faulttracer: a change impact and regression fault analysis tool for evolving java programs,\" in FSE, p. 40, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635921"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786878"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771793"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.47"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_33_1","volume-title":"Introductory statistics","author":"Wonnacott T. H.","year":"1972","unstructured":"T. H. Wonnacott and R. J. Wonnacott , Introductory statistics , vol. 19690 . Wiley New York , 1972 . T. H. Wonnacott and R. J. Wonnacott, Introductory statistics, vol. 19690. Wiley New York, 1972."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806863"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"F. Wilcoxon \"Individual comparisons by ranking methods \" in Breakthroughs in Statistics pp. 196--202 1992.  F. Wilcoxon \"Individual comparisons by ranking methods \" in Breakthroughs in Statistics pp. 196--202 1992.","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_38_1","first-page":"106","volume-title":"Bi-criteria models for all-uses test suite reduction,\" in ICSE","author":"Black J.","year":"2004","unstructured":"J. Black , E. Melachrinoudis , and D. Kaeli , \" Bi-criteria models for all-uses test suite reduction,\" in ICSE , pp. 106 -- 115 , 2004 . J. Black, E. Melachrinoudis, and D. Kaeli, \"Bi-criteria models for all-uses test suite reduction,\" in ICSE, pp. 106--115, 2004."},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"219","article-title":"Empirical studies of test-suite reduction","volume":"12","author":"Rothermel G.","year":"2002","unstructured":"G. Rothermel , M. J. Harrold , J. Von Ronne , and C. Hong , \" Empirical studies of test-suite reduction ,\" STVR , vol. 12 , no. 4 , pp. 219 -- 249 , 2002 . G. Rothermel, M. J. Harrold, J. Von Ronne, and C. Hong, \"Empirical studies of test-suite reduction,\" STVR, vol. 12, no. 4, pp. 219--249, 2002.","journal-title":"STVR"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.26"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/271771.271802"},{"key":"e_1_3_2_1_42_1","volume-title":"A text-vector based approach to test case prioritization,\" in ICST","author":"Chen J.","year":"2016","unstructured":"J. Chen , Y. Bai , D. Hao , Y. Xiong , H. Zhang , L. Zhang , and B. Xie , \" A text-vector based approach to test case prioritization,\" in ICST , 2016 . To appear. J. Chen, Y. Bai, D. Hao, Y. Xiong, H. Zhang, L. Zhang, and B. Xie, \"A text-vector based approach to test case prioritization,\" in ICST, 2016. To appear."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381798"},{"key":"e_1_3_2_1_44_1","volume-title":"To be optimal or not in test-case prioritization,\" TSE","author":"Hao D.","year":"2015","unstructured":"D. Hao , L. Zhang , L. Zang , Y. Wang , X. Wu , and T. Xie , \" To be optimal or not in test-case prioritization,\" TSE , 2015 . To appear. D. Hao, L. Zhang, L. Zang, Y. Wang, X. Wu, and T. Xie, \"To be optimal or not in test-case prioritization,\" TSE, 2015. To appear."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572296"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988497"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348910"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.74"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2011.75"},{"key":"e_1_3_2_1_50_1","first-page":"2015","volume-title":"ICSE","author":"Saha R. K.","unstructured":"R. K. Saha , L. Zhang , S. Khurshid , and D. E. Perry , \" An information retrieval approach for regression test prioritization based on program changes,\" in Proc . ICSE , p. to appear, 2015 . R. K. Saha, L. Zhang, S. Khurshid, and D. E. Perry, \"An information retrieval approach for regression test prioritization based on program changes,\" in Proc. ICSE, p. to appear, 2015."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.18"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972715"},{"key":"e_1_3_2_1_53_1","first-page":"19","volume-title":"Prioritizing JUnit test cases in absence of coverage information,\" in ICSM","author":"Zhang L.","year":"2009","unstructured":"L. Zhang , J. Zhou , D. Hao , L. Zhang , and H. Mei , \" Prioritizing JUnit test cases in absence of coverage information,\" in ICSM , pp. 19 -- 28 , 2009 . L. Zhang, J. Zhou, D. Hao, L. Zhang, and H. Mei, \"Prioritizing JUnit test cases in absence of coverage information,\" in ICSM, pp. 19--28, 2009."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.106"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368139"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526830"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.14"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9219-7"},{"key":"e_1_3_2_1_59_1","first-page":"329","volume-title":"Incorporating varying test costs and fault severities into test case prioritization,\" in ICSE","author":"Elbaum S.","year":"2001","unstructured":"S. Elbaum , A. Malishevsky , and G. Rothermel , \" Incorporating varying test costs and fault severities into test case prioritization,\" in ICSE , pp. 329 -- 338 , 2001 . S. Elbaum, A. Malishevsky, and G. Rothermel, \"Incorporating varying test costs and fault severities into test case prioritization,\" in ICSE, pp. 329--338, 2001."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2008.52"},{"key":"e_1_3_2_1_61_1","first-page":"257","volume-title":"Quota-constrained test-case prioritization for regression testing of service-centric systems,\" in ICSM","author":"Hou S.-S.","year":"2008","unstructured":"S.-S. Hou , L. Zhang , T. Xie , and J. Sun , \" Quota-constrained test-case prioritization for regression testing of service-centric systems,\" in ICSM , pp. 257 -- 266 , 2008 . S.-S. Hou, L. Zhang, T. Xie, and J. Sun, \"Quota-constrained test-case prioritization for regression testing of service-centric systems,\" in ICSM, pp. 257--266, 2008."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581357"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453113"},{"key":"e_1_3_2_1_64_1","volume-title":"Cost-cognizant test case prioritization,\" tech. rep","author":"Malishevsky A.","year":"2006","unstructured":"A. Malishevsky , J. R. Ruthru , G. Rothermel , and S. Elbaum , \" Cost-cognizant test case prioritization,\" tech. rep ., Department Computer Science and Engineering of University of Nebraska , 2006 . A. Malishevsky, J. R. Ruthru, G. Rothermel, and S. Elbaum, \"Cost-cognizant test case prioritization,\" tech. rep., Department Computer Science and Engineering of University of Nebraska, 2006."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390639"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181793"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 38th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2884781.2884874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:07Z","timestamp":1750221547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":67,"alternative-id":["10.1145\/2884781.2884874","10.1145\/2884781"],"URL":"https:\/\/doi.org\/10.1145\/2884781.2884874","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}