{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:22:13Z","timestamp":1774495333329,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1703487"],"award-info":[{"award-number":["1703487"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3340448","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"883-894","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["TERMINATOR: better automated UI test case prioritization"],"prefix":"10.1145","author":[{"given":"Zhe","family":"Yu","sequence":"first","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Fahmid","family":"Fahid","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Tim","family":"Menzies","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Kyle","family":"Patrick","sequence":"additional","affiliation":[{"name":"LexisNexis, USA"}]},{"given":"Snehit","family":"Cherian","sequence":"additional","affiliation":[{"name":"LexisNexis, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1994. Company News; A Name Change is Planned for Mead Data Central. The New York Times. (1994).  1994. Company News; A Name Change is Planned for Mead Data Central. The New York Times. (1994)."},{"key":"e_1_3_2_1_2_1","volume-title":"www.relx.com","author":"LEGAL.","year":"2019","unstructured":"https:\/\/www.nytimes.com\/1994\/12\/ 02\/business\/company-news-a-name-change-is-planned-for-mead-datacentral.html?src=pm 2019. LEGAL. www.relx.com ( 2019 ). https:\/\/www.relx.com\/our-business\/marketsegments\/legal https:\/\/www.nytimes.com\/1994\/12\/ 02\/business\/company-news-a-name-change-is-planned-for-mead-datacentral.html?src=pm 2019. LEGAL. www.relx.com (2019). https:\/\/www.relx.com\/our-business\/marketsegments\/legal"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2016.29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405252"},{"key":"e_1_3_2_1_5_1","volume-title":"History-based Test Case Prioritization for Failure Information. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). IEEE, 385\u2013388","author":"Cho Younghwan","year":"2016","unstructured":"Younghwan Cho , Jeongho Kim , and Eunseok Lee . 2016 . History-based Test Case Prioritization for Failure Information. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). IEEE, 385\u2013388 . Younghwan Cho, Jeongho Kim, and Eunseok Lee. 2016. History-based Test Case Prioritization for Failure Information. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). IEEE, 385\u2013388."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.494"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609601"},{"key":"e_1_3_2_1_8_1","volume-title":"Autonomy and Reliability of Continuous Active Learning for Technology-Assisted Review. arXiv preprint arXiv:1504.06868","author":"Cormack Gordon V","year":"2015","unstructured":"Gordon V Cormack and Maura R Grossman . 2015. Autonomy and Reliability of Continuous Active Learning for Technology-Assisted Review. arXiv preprint arXiv:1504.06868 ( 2015 ). Gordon V Cormack and Maura R Grossman. 2015. Autonomy and Reliability of Continuous Active Learning for Technology-Assisted Review. arXiv preprint arXiv:1504.06868 (2015)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911510"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983776"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080812"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Bradley Efron. 1982. The jackknife the bootstrap and other resampling plans. SIAM.  Bradley Efron. 1982. The jackknife the bootstrap and other resampling plans. SIAM.","DOI":"10.1137\/1.9781611970319"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2014.7019371"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381508"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635910"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234968"},{"key":"e_1_3_2_1_18_1","volume-title":"IEEE International Conference on. IEEE, 190\u2013195","unstructured":"2nd IEEE International Conference on. IEEE, 190\u2013195 . 2nd IEEE International Conference on. IEEE, 190\u2013195."},{"key":"e_1_3_2_1_19_1","unstructured":"Robert Feldt and Ana Magazinius. 2010. Validity Threats in Empirical Software Engineering Research-An Initial Survey.. In SEKE. 374\u2013379.  Robert Feldt and Ana Magazinius. 2010. Validity Threats in Empirical Software Engineering Research-An Initial Survey.. In SEKE. 374\u2013379."},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"The Grossman-Cormack glossary of technology-assisted review with foreword by John M. Facciola","volume":"7","author":"Grossman M. R.","year":"2013","unstructured":"M. R. Grossman and G. V.. Cormack . 2013 . The Grossman-Cormack glossary of technology-assisted review with foreword by John M. Facciola , U.S. Magistrate Judge. Federal Courts Law Review 7 , 1 (2013), 1 \u2013 34 . M. R. Grossman and G. V.. Cormack. 2013. The Grossman-Cormack glossary of technology-assisted review with foreword by John M. Facciola, U.S. Magistrate Judge. Federal Courts Law Review 7, 1 (2013), 1\u201334.","journal-title":"U.S. Magistrate Judge. Federal Courts Law Review"},{"key":"e_1_3_2_1_21_1","volume-title":"TREC 2016 Total Recall Track Overview. In TREC.","author":"Grossman Maura R","year":"2016","unstructured":"Maura R Grossman , Gordon V Cormack , and Adam Roegiest . 2016 . TREC 2016 Total Recall Track Overview. In TREC. Maura R Grossman, Gordon V Cormack, and Adam Roegiest. 2016. TREC 2016 Total Recall Track Overview. In TREC."},{"key":"e_1_3_2_1_22_1","volume-title":"Verification and Validation (ICST), 2015 IEEE 8th International Conference on. IEEE, 1\u201310","author":"Hemmati Hadi","year":"2015","unstructured":"Hadi Hemmati , Zhihan Fang , and Mika V Mantyla . 2015 . Prioritizing manual test cases in traditional and rapid release environments. In Software Testing , Verification and Validation (ICST), 2015 IEEE 8th International Conference on. IEEE, 1\u201310 . Hadi Hemmati, Zhihan Fang, and Mika V Mantyla. 2015. Prioritizing manual test cases in traditional and rapid release environments. In Software Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on. IEEE, 1\u201310."},{"key":"e_1_3_2_1_23_1","volume-title":"Verification and Validation (ICST), 2018 IEEE 11th International Conference on. IEEE, 309\u2013319","author":"Hemmati Hadi","year":"2018","unstructured":"Hadi Hemmati and Fatemeh Sharifi . 2018 . Investigating NLP-Based Approaches for Predicting Manual Test Case Failure. In Software Testing , Verification and Validation (ICST), 2018 IEEE 11th International Conference on. IEEE, 309\u2013319 . Hadi Hemmati and Fatemeh Sharifi. 2018. Investigating NLP-Based Approaches for Predicting Manual Test Case Failure. In Software Testing, Verification and Validation (ICST), 2018 IEEE 11th International Conference on. IEEE, 309\u2013319."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818815"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2014.7058806"},{"key":"e_1_3_2_1_26_1","volume-title":"2015 5th International Conference on. IEEE, 1\u20136.","author":"Kandil Passant","year":"2015","unstructured":"Passant Kandil , Sherin Moussa , and Nagwa Badr . 2015 . A methodology for regression testing reduction and prioritization of agile releases. In Information &amp; Communication Technology and Accessibility (ICTA) , 2015 5th International Conference on. IEEE, 1\u20136. Passant Kandil, Sherin Moussa, and Nagwa Badr. 2015. A methodology for regression testing reduction and prioritization of agile releases. In Information &amp; Communication Technology and Accessibility (ICTA), 2015 5th International Conference on. IEEE, 1\u20136."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.194"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581357"},{"key":"e_1_3_2_1_29_1","volume-title":"Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments. In Asia-Pacific Software Engineering Conference (APSEC)","author":"Kwon Jung-Hyun","year":"2017","unstructured":"Jung-Hyun Kwon and In-Young Ko . 2017 . Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments. In Asia-Pacific Software Engineering Conference (APSEC) , 2017 24th. IEEE, 160\u2013168. Jung-Hyun Kwon and In-Young Ko. 2017. Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments. In Asia-Pacific Software Engineering Conference (APSEC), 2017 24th. IEEE, 160\u2013168."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0065"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180213"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2014.6933509"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381798"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884874"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2015.169"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.91"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2331683"},{"key":"e_1_3_2_1_39_1","volume-title":"For Future Reference, a Pioneer in Online Reading. The Wall Street Journal","author":"Miller Stephen","year":"2012","unstructured":"Stephen Miller . 2012. For Future Reference, a Pioneer in Online Reading. The Wall Street Journal ( 2012 ). Stephen Miller. 2012. For Future Reference, a Pioneer in Online Reading. The Wall Street Journal (2012)."},{"key":"e_1_3_2_1_40_1","unstructured":"https:\/\/www.wsj.com\/articles\/ SB10001424052970203721704577157211501855648?KEYWORDS=lexisnexis  https:\/\/www.wsj.com\/articles\/ SB10001424052970203721704577157211501855648?KEYWORDS=lexisnexis"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.26"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.57"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ABLAZE.2015.7155012"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194733.3194735"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00015"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_47_1","volume-title":"A cluster analysis method for grouping means in the analysis of variance. Biometrics","author":"Scott ANDREW JHON","year":"1974","unstructured":"ANDREW JHON Scott and M Knott . 1974. A cluster analysis method for grouping means in the analysis of variance. Biometrics ( 1974 ), 507\u2013512. ANDREW JHON Scott and M Knott. 1974. A cluster analysis method for grouping means in the analysis of variance. Biometrics (1974), 507\u2013512."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019233"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/AST.2017.8"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2005.41"},{"key":"e_1_3_2_1_51_1","unstructured":"Ashlee Vance. 2010. Legal Sites Plan Revamps as Rivals Undercut Price. The New York Times. (2010).  Ashlee Vance. 2010. Legal Sites Plan Revamps as Rivals Undercut Price. The New York Times. (2010)."},{"key":"e_1_3_2_1_52_1","unstructured":"https:\/\/www.nytimes.com\/2010\/01\/25\/technology\/25westlaw. html?_r=1&amp;ref=reedelsevier  https:\/\/www.nytimes.com\/2010\/01\/25\/technology\/25westlaw. html?_r=1&amp;ref=reedelsevier"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.115"},{"key":"e_1_3_2_1_54_1","volume-title":"KDD workshop on data mining for healthcare (KDDDMH).","author":"Wallace Byron C","year":"2013","unstructured":"Byron C Wallace , Issa J Dahabreh , Kelly H Moran , Carla E Brodley , and Thomas A Trikalinos . 2013 . Active literature discovery for scoping evidence reviews: How many needles are there . In KDD workshop on data mining for healthcare (KDDDMH). Byron C Wallace, Issa J Dahabreh, Kelly H Moran, Carla E Brodley, and Thomas A Trikalinos. 2013. Active literature discovery for scoping evidence reviews: How many needles are there. In KDD workshop on data mining for healthcare (KDDDMH)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835829"},{"key":"e_1_3_2_1_56_1","volume-title":"Who Should Label What? Instance Allocation in Multiple Expert Active Learning","author":"Wallace Byron C","unstructured":"Byron C Wallace , Kevin Small , Carla E Brodley , and Thomas A Trikalinos . 2011. Who Should Label What? Instance Allocation in Multiple Expert Active Learning .. In SDM. SIAM , 176\u2013187. Byron C Wallace, Kevin Small, Carla E Brodley, and Thomas A Trikalinos. 2011. Who Should Label What? Instance Allocation in Multiple Expert Active Learning.. In SDM. SIAM, 176\u2013187."},{"key":"e_1_3_2_1_57_1","volume-title":"Semi-automated screening of biomedical citations for systematic reviews. BMC bioinformatics 11, 1","author":"Wallace Byron C","year":"2010","unstructured":"Byron C Wallace , Thomas A Trikalinos , Joseph Lau , Carla Brodley , and Christopher H Schmid . 2010. Semi-automated screening of biomedical citations for systematic reviews. BMC bioinformatics 11, 1 ( 2010 ), 1. Byron C Wallace, Thomas A Trikalinos, Joseph Lau, Carla Brodley, and Christopher H Schmid. 2010. Semi-automated screening of biomedical citations for systematic reviews. BMC bioinformatics 11, 1 (2010), 1."},{"key":"e_1_3_2_1_58_1","unstructured":"Zhe Yu. {n.d.}. PhD thesis: Total Recall and Software Engineering. ({n. d.}).  Zhe Yu. {n.d.}. PhD thesis: Total Recall and Software Engineering. ({n. d.})."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9587-0"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.11.021"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306350"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3340448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3340448","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3340448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3340448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":61,"alternative-id":["10.1145\/3338906.3340448","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3340448","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}