{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:52:01Z","timestamp":1774896721153,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T00:00:00Z","timestamp":1676246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T00:00:00Z","timestamp":1676246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Regression testing is required to assure the quality of each iteration of microservice systems. Test case selection is one of main techniques to optimize regression testing. Existing techniques mainly involve artifacts acquisition, processing and maintenance, thus hard to apply in microservice regression testing since it is difficult to obtain and process required artifacts from multiple development teams, which is normal in cases of microservice systems. This paper proposes a novel approach, namely MRTS-BP, which takes API gateway logs instead of artifacts as inputs. By mining service dependencies from API gateway logs, MRTS-BP analyzes service change impacts based on a propagation calculation, and selects test cases affected by changes based on impact degree values. To evaluate the effectiveness of MRTS-BP, empirical studies based on four real deployed systems are presented. Retest-all strategy and a regression testing selection approach based on control flow graphs called RTS-CFG are compared with MRTS-BP. The results show that, MRTS-BP can significantly reduce both the number of test cases and overall time cost while maintaining the fault detection capability of selected test suite, and that MRTS-BP can save more time cost than RTS-CFG with the similar safety and precision.<\/jats:p>","DOI":"10.1186\/s13677-023-00398-7","type":"journal-article","created":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T06:02:52Z","timestamp":1676268172000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A microservice regression testing selection approach based on belief propagation"],"prefix":"10.1186","volume":"12","author":[{"given":"Li-zhe","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5511-5361","authenticated-orcid":false,"given":"Ji","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hai-yan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,13]]},"reference":[{"key":"398_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/AIMS.2017.23","volume-title":"Proceedings of 2017 IEEE International Conference on AI & Mobile Services (AIMS)","author":"CY Fan","year":"2017","unstructured":"Fan CY, Ma SP (2017) Migrating monolithic mobile application to microservice architecture: an experiment report. In: Proceedings of 2017 IEEE International Conference on AI & Mobile Services (AIMS), pp 109\u2013112"},{"key":"398_CR2","volume-title":"Microservices: a definition of this new architectural term","author":"J Lewis","year":"2014","unstructured":"Lewis J, Fowler M (2014) Microservices: a definition of this new architectural term. http:\/\/martinfowler.com\/articles\/microservices.html"},{"issue":"3","key":"398_CR3","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MS.2018.2141030","volume":"35","author":"X Larrucea","year":"2018","unstructured":"Larrucea X, Santamaria I, Colomo-Palacios R, Ebert C (2018) Microservices. IEEE Softw 35(3):96\u2013100","journal-title":"IEEE Softw"},{"key":"398_CR4","unstructured":"Newman S (2015) Building microservices: designing fine-grained systems. O\u2019Reilly Media,\u00a0Sevastopol"},{"issue":"2","key":"398_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo S, Harman M (2012) Regression testing minimization, selection and prioritization: a survey. Softw Test Verif Reliab 22(2):67\u2013120","journal-title":"Softw Test Verif Reliab"},{"key":"398_CR6","volume-title":"Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, Montreal, QC, Canada, May 25-31","author":"C Gao","year":"2019","unstructured":"Gao C, Zheng W, Deng Y, Lo D (2019) Emerging app issue identification from user feedback: experience on WeChat. In: Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP) 2019, Montreal, QC, Canada, May 25-31"},{"key":"398_CR7","doi-asserted-by":"publisher","first-page":"110462","DOI":"10.1016\/j.jss.2019.110462","volume":"161","author":"P Roberto","year":"2020","unstructured":"Roberto P (2020) On the testing resource allocation problem: research trends and perspectives. J Syst Softw 161:110462","journal-title":"J Syst Softw"},{"issue":"2","key":"398_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2631685","volume":"47","author":"D Qiu","year":"2014","unstructured":"Qiu D, Li B, Ji S, Leung H (2014) Regression testing of web service: a systematic mapping study. ACM Comput Surv 47(2):1\u201346","journal-title":"ACM Comput Surv"},{"issue":"2","key":"398_CR9","first-page":"29","volume":"50","author":"R Kazmi","year":"2017","unstructured":"Kazmi R, Jawawi DNA, Mohamad R, Ghani I (2017) Effective regression test case selection: a systematic literature review. ACM Comput Surv 50(2):29","journal-title":"ACM Comput Surv"},{"key":"398_CR10","doi-asserted-by":"crossref","unstructured":"Gligoric M, Eloussi L, Marinov D (2015) Practical regression test selection with dynamic file dependencies, ISSTA. ACM,\u00a0New York, pp 211\u2013222","DOI":"10.1145\/2771783.2771784"},{"key":"398_CR11","doi-asserted-by":"publisher","unstructured":"Ali S, Hafeez Y, Hussain S, Yang S (2019) Enhanced regression testing technique for agile software development and continuous integration strategies. Softw Qual Control. https:\/\/doi.org\/10.1007\/s11219-019-09463-4","DOI":"10.1007\/s11219-019-09463-4"},{"issue":"2","key":"398_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E","volume":"10","author":"G Rothermel","year":"2015","unstructured":"Rothermel G, Harrold MJ, Dedhia J (2015) Regression test selection for C++ software. Softw Test Verif Reliab 10(2):77\u2013109","journal-title":"Softw Test Verif Reliab"},{"issue":"11","key":"398_CR13","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/504311.504305","volume":"36","author":"SA Spoon","year":"2001","unstructured":"Spoon SA, Jones JA, Li T (2001) Regression test selection for Java software. ACM Sigplan Not 36(11):312\u2013326","journal-title":"ACM Sigplan Not"},{"key":"398_CR14","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/ICST.2019.00052","volume-title":"12th IEEE Conference on Software Testing, Validation and Verification (ICST)","author":"H Zhong","year":"2019","unstructured":"Zhong H, Zhang L, Khurshid S (2019) TestSage: regression test selection for large-scale web service testing. In: 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp 430\u2013441. https:\/\/doi.org\/10.1109\/ICST.2019.00052"},{"key":"398_CR15","unstructured":"Yedidia JS, Freeman WT, Weiss Y (2002) Understanding belief propagation and its generalizations. Morgan Kaufmann,\u00a0San Mateo"},{"key":"398_CR16","doi-asserted-by":"crossref","unstructured":"Ruth M, Oh S, Loup A (2007) Towards automatic regression test selection for web services. In: Computer software and applications conference. COMPSAC,\u00a0New York","DOI":"10.1109\/COMPSAC.2007.219"},{"key":"398_CR17","volume-title":"xUnit: test patterns refactoring test code","author":"G Meszaros","year":"2007","unstructured":"Meszaros G (2007) xUnit: test patterns refactoring test code. Addison-Wesley, Boston"},{"key":"398_CR18","volume-title":"Practical unit testing with JUnit and Mockito","author":"T Kaczanowski","year":"2013","unstructured":"Kaczanowski T. Practical unit testing with JUnit and Mockito. https:\/\/site.mockito.org\/, 2013"},{"issue":"3","key":"398_CR19","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1147\/sj.473.0457","volume":"47","author":"ZJ Li","year":"2008","unstructured":"Li ZJ, Tan HF, Liu HH, Zhu J, Mitsumori NM (2008) Business-process-driven gray-box SOA testing. IBM Syst 47(3):457\u2013472","journal-title":"IBM Syst"},{"key":"398_CR20","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-642-19811-3_24","volume-title":"Proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering: Part of the Joint European Conferences on Theory and Practice of Software (FASE\u201911\/ETAPS\u201911)","author":"TA Khan","year":"2011","unstructured":"Khan TA, Heckel R (2011) On model-based regression testing of web-services using dependency analysis of visual contracts. In: Proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering: Part of the Joint European Conferences on Theory and Practice of Software (FASE\u201911\/ETAPS\u201911), pp 341\u2013355"},{"issue":"6","key":"398_CR21","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.jss.2012.01.036","volume":"85","author":"B Li","year":"2012","unstructured":"Li B, Qiu D, Leung H, Wang D (2012) Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. Syst Softw 85(6):1300\u20131324","journal-title":"Syst Softw"},{"key":"398_CR22","first-page":"157","volume-title":"Proceedings of the 5th International Conference on Service-Oriented Computing (ICSOC\u201907)","author":"H Liu","year":"2007","unstructured":"Liu H, Li Z, Zhu J, Tan H (2007) Business process regression testing. In: Proceedings of the 5th International Conference on Service-Oriented Computing (ICSOC\u201907), pp 157\u2013168"},{"key":"398_CR23","first-page":"158","volume-title":"Proceedings of the Symposium on Software Testing, Analysis, and Verification","author":"MJ Harrold","year":"1989","unstructured":"Harrold MJ, Soffa ML (1989) Interprocedual data flow testing. In: Proceedings of the Symposium on Software Testing, Analysis, and Verification, pp 158\u2013167"},{"key":"398_CR24","first-page":"257","volume-title":"Proceedings of the International Symposium on Software Reliability Engineering","author":"M Fisher","year":"2002","unstructured":"Fisher M, Jin D, Rothermel G (2002) Test reuse in the spreadsheet paradigm. In: Proceedings of the International Symposium on Software Reliability Engineering, pp 257\u2013268"},{"key":"398_CR25","first-page":"358","volume-title":"Proceedings of International Conference on Software Maintenance","author":"G Rothermel","year":"1993","unstructured":"Rothermel G, Harrold MJ (1993) A safe, efficient algorithm for regression test selection. In: Proceedings of International Conference on Software Maintenance, pp 358\u2013367"},{"key":"398_CR26","first-page":"169","volume-title":"Proceedings of International Symposium on Software Testing and Analysis","author":"G Rothermel","year":"1994","unstructured":"Rothermel G, Harrold MJ (1994) Selecting tests and identifying test coverage requirements for modified software. In: Proceedings of International Symposium on Software Testing and Analysis, pp 169\u2013184"},{"issue":"2","key":"398_CR27","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1145\/248233.248262","volume":"6","author":"G Rothermel","year":"1997","unstructured":"Rothermel G, Harrold MJ (1997) A safe, efficient regression test selection technique. ACM Trans Softw Eng Methodol 6(2):173\u2013210","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"398_CR28","first-page":"357","volume-title":"Proceedings of the International Computer Software and Applications Conference","author":"S Beydeda","year":"2001","unstructured":"Beydeda S, Gruhn V (2001) Integrating white-and black-box techniques for class-level regression testing. In: Proceedings of the International Computer Software and Applications Conference, pp 357\u2013362"},{"key":"398_CR29","first-page":"18","volume-title":"Proceedings of the International Conference on Software Maintenance","author":"L White","year":"2004","unstructured":"White L, Robinson B (2004) Industrial real-time regression testing and analysis using firewalls. In: Proceedings of the International Conference on Software Maintenance, pp 18\u201327"},{"issue":"6","key":"398_CR30","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1002\/smr.371","volume":"20","author":"L White","year":"2008","unstructured":"White L, Jaber K, Robinson B (2008) Extended firewall for regression testing: an experience report. J Softw Maint Evol 20(6):419\u2013433","journal-title":"J Softw Maint Evol"},{"key":"398_CR31","first-page":"496","volume-title":"Proceedings of the International Computer Software and Applications Conference, (COMPSAC 2001)","author":"R Paul","year":"2001","unstructured":"Paul R, Yu L, Tsai WT, Bai X (2001) Scenario-based functional regression testing. In: Proceedings of the International Computer Software and Applications Conference, (COMPSAC 2001), pp 496\u2013501"},{"key":"398_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/AICCSA.2006.205085","volume-title":"Proceedings of the IEEE International Conference on Computer Systems and Applications, (COMPSAC 2006)","author":"A Tarhini","year":"2006","unstructured":"Tarhini A, Fouchal H, Mansour N (2006) Regression testing web services-based applications. In: Proceedings of the IEEE International Conference on Computer Systems and Applications, (COMPSAC 2006), pp 163\u2013170"},{"key":"398_CR33","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Han J (2014) Frequent pattern mining. Springer International Publishing, Switzerland, pp 19\u201336","DOI":"10.1007\/978-3-319-07821-2_2"},{"key":"398_CR34","unstructured":"Mao LI, Zhi-Gang Z, Tao W (2019) Multiuser detection scheme for SCMA systems based on stability of belief propagation. Computer Science,\u00a0Beijing"},{"key":"398_CR35","volume-title":"Low noise non-linear equalization using neural networks and belief propagation","author":"E Yamazaki","year":"2019","unstructured":"Yamazaki E, Farsad N, Goldsmith A (2019) Low noise non-linear equalization using neural networks and belief propagation"},{"key":"398_CR36","volume-title":"Improving massive MIMO belief propagation detector with deep neural network","author":"X Tan","year":"2018","unstructured":"Tan X, Xu W, Be\u2019Ery Y (2018) Improving massive MIMO belief propagation detector with deep neural network"},{"issue":"3","key":"398_CR37","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/s10766-019-00632-3","volume":"48","author":"B Shan","year":"2020","unstructured":"Shan B, Fang Y (2020) GPU accelerated parallel algorithm of sliding-window belief propagation for LDPC codes. Int J Parallel Prog 48(3):566\u2013579","journal-title":"Int J Parallel Prog"},{"key":"398_CR38","doi-asserted-by":"publisher","first-page":"2124","DOI":"10.1109\/TPAMI.2017.2749575","volume":"9","author":"C Knoll","year":"2018","unstructured":"Knoll C, Mehta D, Chen T (2018) Fixed points of belief propagation -- an analysis via polynomial homotopy continuation. IEEE Trans Pattern Anal Mach Intell 9:2124\u20132136","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"398_CR39","doi-asserted-by":"crossref","unstructured":"Lu Z et al (2003) Web Log Mining. Web Intelligence. Springer Berlin, Heidelberg, pp 173\u2013194","DOI":"10.1007\/978-3-662-05320-1_9"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00398-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00398-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00398-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T06:04:13Z","timestamp":1676268253000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00398-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,13]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["398"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00398-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-535094\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,13]]},"assertion":[{"value":"17 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors approved the final manuscript and the submission to this journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"20"}}