{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:37:36Z","timestamp":1775259456118,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61672047,61529201,61522201,61861130363"],"award-info":[{"award-number":["61672047,61529201,61522201,61861130363"]}]},{"name":"Huawei"},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1566589,CCF-1763906"],"award-info":[{"award-number":["CCF-1566589,CCF-1763906"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2017YFB1001803"],"award-info":[{"award-number":["2017YFB1001803"]}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"UT Dallas start-up fund"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236053","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T08:06:00Z","timestamp":1540800360000},"page":"656-667","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["Optimizing test prioritization via test distribution analysis"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Chen","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Yiling","family":"Lou","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Jianyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Xiaoleng","family":"Wang","sequence":"additional","affiliation":[{"name":"Baidu, China"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2018. Camel-core. http:\/\/camel.apache.org. Accessed: 2018. Camel-core. http:\/\/camel.apache.org."},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed: 2018. Chukwa. http:\/\/chukwa.apache.org. Accessed: 2018. Chukwa. http:\/\/chukwa.apache.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Accessed: 2018. Clover. https:\/\/www.atlassian.com\/software\/clover. Accessed: 2018. Clover. https:\/\/www.atlassian.com\/software\/clover."},{"key":"e_1_3_2_1_4_1","unstructured":"Accessed: 2018. Commons-Pool. https:\/\/commons.apache.org\/proper\/ commons-pool. Accessed: 2018. Commons-Pool. https:\/\/commons.apache.org\/proper\/ commons-pool."},{"key":"e_1_3_2_1_5_1","unstructured":"Accessed: 2018. Gcov. http:\/\/ltp.sourceforge.net\/coverage\/gcov.php. Accessed: 2018. Gcov. http:\/\/ltp.sourceforge.net\/coverage\/gcov.php."},{"key":"e_1_3_2_1_6_1","unstructured":"Accessed: 2018. HBase. https:\/\/hbase.apache.org. Accessed: 2018. HBase. https:\/\/hbase.apache.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Accessed: 2018. MapDB. http:\/\/www.mapdb.org. Accessed: 2018. MapDB. http:\/\/www.mapdb.org."},{"key":"e_1_3_2_1_8_1","unstructured":"Accessed: 2018. OpenTripPlanner. http:\/\/www.opentripplanner.org. Accessed: 2018. OpenTripPlanner. http:\/\/www.opentripplanner.org."},{"key":"e_1_3_2_1_9_1","unstructured":"Accessed: 2018. PHP. http:\/\/php.net. Accessed: 2018. PHP. http:\/\/php.net."},{"key":"e_1_3_2_1_10_1","unstructured":"Accessed: 2018. PIT. http:\/\/pitest.org. Accessed: 2018. PIT. http:\/\/pitest.org."},{"key":"e_1_3_2_1_11_1","unstructured":"Accessed: 2018. scikit-learn. http:\/\/scikit-learn.org\/stable\/. Accessed: 2018. scikit-learn. http:\/\/scikit-learn.org\/stable\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Accessed: 2018. XGBoost python package. http:\/\/xgboost.readthedocs.io\/en\/ latest\/python\/index.html. Accessed: 2018. XGBoost python package. http:\/\/xgboost.readthedocs.io\/en\/ latest\/python\/index.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression","volume":"46","author":"Altman N. S.","year":"1992","unstructured":"N. S. Altman . 1992 . An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression . American Statistician 46 , 3 (1992), 175 \u2013 185 . N. S. Altman. 1992. An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression. American Statistician 46, 3 (1992), 175\u2013185.","journal-title":"American Statistician"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983954"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00136-5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183456"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.70"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Junjie Chen Yanwei Bai Dan Hao Yingfei Xiong Hongyu Zhang Lu Zhang and Bing Xie. 2016. Test case prioritization for compilers: A text-vector based approach. In ICST. 266\u2013277. Junjie Chen Yanwei Bai Dan Hao Yingfei Xiong Hongyu Zhang Lu Zhang and Bing Xie. 2016. Test case prioritization for compilers: A text-vector based approach. In ICST. 266\u2013277.","DOI":"10.1109\/ICST.2016.19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Junjie Chen Yanwei Bai Dan Hao Lingming Zhang Lu Zhang and Bing Xie. 2017. How do assertions impact coverage-based test-suite reduction?. In ICST. 418\u2013423. Junjie Chen Yanwei Bai Dan Hao Lingming Zhang Lu Zhang and Bing Xie. 2017. How do assertions impact coverage-based test-suite reduction?. In ICST. 418\u2013423.","DOI":"10.1109\/ICST.2017.45"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970366"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Learning to accelerate symbolic execution via code transformation","volume":"109","author":"Chen Junjie","year":"2018","unstructured":"Junjie Chen , Wenxiang Hu , Lingming Zhang , Dan Hao , Sarfraz Khurshid , and Lu Zhang . 2018 . Learning to accelerate symbolic execution via code transformation . In ECOOP , Vol. 109. 6: 1 \u2013 6 :27. Junjie Chen, Wenxiang Hu, Lingming Zhang, Dan Hao, Sarfraz Khurshid, and Lu Zhang. 2018. Learning to accelerate symbolic execution via code transformation. In ECOOP, Vol. 109. 6:1\u20136:27.","journal-title":"ECOOP"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Lingchao Chen and Lingming Zhang. 2018. Speeding up Mutation Testing via Regression Test Selection: An Extensive Study. In ICST. 58\u201369. Lingchao Chen and Lingming Zhang. 2018. Speeding up Mutation Testing via Regression Test Selection: An Extensive Study. In ICST. 58\u201369.","DOI":"10.1109\/ICST.2018.00016"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948707"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453113"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.58"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Sebastian Elbaum Alexey Malishevsky and Gregg Rothermel. 2001. Incorporating varying test costs and fault severities into test case prioritization. In ICSE. 329\u2013 338. Sebastian Elbaum Alexey Malishevsky and Gregg Rothermel. 2001. Incorporating varying test costs and fault severities into test case prioritization. In ICSE. 329\u2013 338.","DOI":"10.1109\/ICSE.2001.919106"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988497"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771788"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1390681.1442794"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-5572-2"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771784"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6112-3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2496939"},{"key":"e_1_3_2_1_42_1","first-page":"192","article-title":"The elements of statistical learning. 2001","volume":"167","author":"Hastie Trevor","year":"2001","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . 2001 . The elements of statistical learning. 2001 . Springer 167 , 1 (2001), 192 \u2013 192 . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2001. The elements of statistical learning. 2001. Springer 167, 1 (2001), 192\u2013192.","journal-title":"Springer"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884791"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(89)90049-0"},{"key":"e_1_3_2_1_46_1","first-page":"55","article-title":"Ridge Regression","volume":"12","author":"Hoerl Arthur E.","year":"1970","unstructured":"Arthur E. Hoerl and Robert W. Kennard . 1970 . Ridge Regression : Biased Estimation for Nonorthogonal Problems. Technometrics 12 , 1 (1970), 55 \u2013 67 . Arthur E. Hoerl and Robert W. Kennard. 1970. Ridge Regression: Biased Estimation for Nonorthogonal Problems. Technometrics 12, 1 (1970), 55\u201367.","journal-title":"Biased Estimation for Nonorthogonal Problems. Technometrics"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.063"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_12"},{"key":"e_1_3_2_1_49_1","volume-title":"International Journal of Computer &amp","author":"Kumar Jain Y","year":"2011","unstructured":"Y Kumar Jain and Santosh Kumar Bhandare . 2011. Min max normalization based data perturbation method for privacy protection . International Journal of Computer &amp ; Communication Technology 2, 8 ( 2011 ), 45\u201350. Y Kumar Jain and Santosh Kumar Bhandare. 2011. Min max normalization based data perturbation method for privacy protection. International Journal of Computer &amp; Communication Technology 2, 8 (2011), 45\u201350."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.77"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950361"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737986"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381798"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884874"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950344"},{"key":"e_1_3_2_1_60_1","volume-title":"Cost-cognizant test case prioritization. Department of Computer Science and Engineering","author":"Malishevsky Alexey G","year":"2006","unstructured":"Alexey G Malishevsky , Joseph R Ruthru\ufffd , Gregg Rothermel , and Sebastian Elbaum . 2006. Cost-cognizant test case prioritization. Department of Computer Science and Engineering , University of Nebraska-Lincoln , Techical Report ( 2006 ). Alexey G Malishevsky, Joseph R Ruthru\ufffd, Gregg Rothermel, and Sebastian Elbaum. 2006. Cost-cognizant test case prioritization. Department of Computer Science and Engineering, University of Nebraska-Lincoln, Techical Report (2006)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.91"},{"key":"e_1_3_2_1_62_1","unstructured":"Andrew McCallum and Kamal Nigam. 1998. A comparison of event models for Naive Bayes text classi\ufffdcation. In AAAI. 41\u201348. Andrew McCallum and Kamal Nigam. 1998. A comparison of event models for Naive Bayes text classi\ufffdcation. In AAAI. 41\u201348."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.106"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931040"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Gregg Rothermel Roland H Untch Chengyun Chu and Mary Jean Harrold. 1999. Test case prioritization: An empirical study. In ICSM. 179\u2013188. Gregg Rothermel Roland H Untch Chengyun Chu and Mary Jean Harrold. 1999. Test case prioritization: An empirical study. In ICSM. 179\u2013188.","DOI":"10.1109\/ICSM.1999.792604"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818789"},{"key":"e_1_3_2_1_69_1","first-page":"635","article-title":"Discriminant Analysis and Statistical Pattern Recognition","volume":"168","author":"Sapatinas Theofanis","year":"2010","unstructured":"Theofanis Sapatinas . 2010 . Discriminant Analysis and Statistical Pattern Recognition . JRSS 168 , 3 (2010), 635 \u2013 636 . Theofanis Sapatinas. 2010. Discriminant Analysis and Statistical Pattern Recognition. JRSS 168, 3 (2010), 635\u2013636.","journal-title":"JRSS"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635921"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092709"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047414.2047431"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146240"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106258"},{"key":"e_1_3_2_1_75_1","volume-title":"Introductory statistics","author":"Wonnacott Thomas H","unstructured":"Thomas H Wonnacott and Ronald J Wonnacott . 1972. Introductory statistics . Vol. 19690 . Thomas H Wonnacott and Ronald J Wonnacott. 1972. Introductory statistics. Vol. 19690."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180198"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Lingming Zhang Dan Hao Lu Zhang Gregg Rothermel and Hong Mei. 2013. Bridging the gap between the total and additional test-case prioritization strategies. In ICSE. 192\u2013201. Lingming Zhang Dan Hao Lu Zhang Gregg Rothermel and Hong Mei. 2013. Bridging the gap between the total and additional test-case prioritization strategies. In ICSE. 192\u2013201.","DOI":"10.1109\/ICSE.2013.6606565"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572297"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/1318471.1318503"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786858"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236053","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:16:11Z","timestamp":1775254571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":82,"alternative-id":["10.1145\/3236024.3236053","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236053","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}