{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:35:00Z","timestamp":1770287700185,"version":"3.49.0"},"reference-count":35,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T00:00:00Z","timestamp":1478131200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Softw Eng Res Dev"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s40411-016-0031-8","type":"journal-article","created":{"date-parts":[[2016,11,3]],"date-time":"2016-11-03T12:05:17Z","timestamp":1478174717000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Correlating automatic static analysis and mutation testing: towards incremental strategies"],"prefix":"10.5753","volume":"4","author":[{"given":"Cl\u00e1udio A.","family":"Ara\u00fajo","sequence":"first","affiliation":[]},{"given":"Marcio E.","family":"Delamaro","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 C.","family":"Maldonado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5902-1672","authenticated-orcid":false,"given":"Auri M. R.","family":"Vincenzi","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Acree, AT, Budd TA, DeMillo RA, Lipton RJ, Sayward FG (1979) Mutation analysis. Tech rep DTIC Document.","DOI":"10.21236\/ADA076575"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Andrews, JH, Briand LC, Labiche Y (2005) Is mutation an appropriate tool for testing experiments In: XXVII International Conference on Software Engineering \u2013 ICSE\u201905, 402\u2013411.. ACM Press, New York, doi: 10.1145\/1062455.1062530 doi:http:\/\/doi.acm.org\/10.1145\/1062455.1062530.","DOI":"10.1109\/ICSE.2005.1553583"},{"key":"31_CR3","unstructured":"Atlassian (2014) Jira. Tool\u2019s Homepage, available at: https:\/\/www.atlassian.com\/software\/jira\/ . Accessed 2 July 2014."},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Ayewah, N, Pugh W, Morgenthaler JD, Penix J, Zhou Y (2007a) Evaluating static analysis defect warnings on production software In: Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE\u201907, 1\u20138.. ACM, New York, doi: 10.1145\/1251535.1251536 .","DOI":"10.1145\/1251535.1251536"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Ayewah, N, Pugh W, Morgenthaler JD, Penix J, Zhou Y (2007b) Using findbugs on production software In: Companion to the 22Nd ACM SIGPLAN Conference on Object-oriented Programming Systems and Applications Companion, OOPSLA \u201907, 805\u2013806.. ACM, New York, doi: 10.1145\/1297846.1297897 .","DOI":"10.1145\/1297846.1297897"},{"key":"31_CR6","unstructured":"Bugzilla (2014) Bugzilla \u2013 bug-tracking system. Tool\u2019s Homepage, available at: http:\/\/www.bugzilla.org\/ . Accessed 2 July 2014."},{"key":"31_CR7","unstructured":"Burn, O (2014) Checkstyle \u2013 coding standard verifier. Tool\u2019s Homepage, available at: https:\/\/github.com\/checkstyle\/checkstyle . Accessed 2 July 2014."},{"key":"31_CR8","unstructured":"Coles, H (2015) Pitest: real world mutation testing. Web page. http:\/\/pitest.org\/ . Last access: Accessed 2 July 2014."},{"key":"31_CR9","unstructured":"Copeland, L (2004) A practitioner\u2019s guide to software test design. Artech House."},{"key":"31_CR10","unstructured":"Copeland, T (2005) PMD Applied: An Easy-to-use Guide for Developers. An easy-to-use guide for developers, Centennial Books."},{"issue":"2","key":"31_CR11","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11219-011-9172-5","volume":"21","author":"C Couto","year":"2013","unstructured":"Couto, C, Montandon JaE, Silva C, Valente MT (2013) Static correspondence and correlation between field defects and warnings reported by a bug finding tool. Softw Qual J 21(2): 241\u2013257. doi: 10.1007\/s11219-011-9172-5 .","journal-title":"Softw Qual J"},{"key":"31_CR12","first-page":"225","volume-title":"XI International Conference on Software Engineering Research and Practice \u2013 SERP\u201913","author":"K Daimi","year":"2013","unstructured":"Daimi, K, Banitaan S, Liszka K (2013) Examining the performance of java static analyzers In: XI International Conference on Software Engineering Research and Practice \u2013 SERP\u201913, 225\u2013230.. CSREA Press, Las Vegas."},{"key":"31_CR13","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1145\/1321631.1321702","volume-title":"Proceedings of the Twenty-second IEEE\/ACM International Conference on Automated Software Engineering, ASE\u201907","author":"V Dallmeier","year":"2007","unstructured":"Dallmeier, V, Zimmermann T (2007) Extraction of bug localization benchmarks from history In: Proceedings of the Twenty-second IEEE\/ACM International Conference on Automated Software Engineering, ASE\u201907, 433\u2013436.. ACM, New York, doi: 10.1145\/1321631.1321702 ."},{"key":"31_CR14","first-page":"9","volume-title":"IX Brazilian Symposium on Software Quality \u2013 SBQS\u20182010","author":"JE de Ara\u00fajo Filho","year":"2010","unstructured":"de Ara\u00fajo Filho, JE, de Moura Couto CF, de Souza SJ, Valente MT (2010) A Study on the Correlation Between Field Defects and Warnings Reported by a Static Analysis Tool In: IX Brazilian Symposium on Software Quality \u2013 SBQS\u20182010, 9\u201323.. SBC, Bel\u00e9m."},{"issue":"4","key":"31_CR15","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"RA DeMillo","year":"1978","unstructured":"DeMillo, RA, Lipton RJ, Sayward FG (1978) Hints on test data selection: Help for the practicing programmer. Computer 11(4): 34\u201343.","journal-title":"Computer"},{"issue":"1","key":"31_CR16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.976940","volume":"19","author":"D Evans","year":"2002","unstructured":"Evans, D, Larochelle D (2002) Improving security using extensible lightweight static analysis. IEEE Softw 19(1): 42\u201351. doi: 10.1109\/52.976940 .","journal-title":"IEEE Softw"},{"key":"31_CR17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1960314.1960340","volume-title":"X International Conference on Aspect-oriented Software Development Companion \u2013 AOSD\u201911","author":"FC Ferrari","year":"2011","unstructured":"Ferrari, FC, Nakagawa EY, Maldonado JC, Rashid A (2011) Proteum\/AJ: A mutation system for AspectJ programs In: X International Conference on Aspect-oriented Software Development Companion \u2013 AOSD\u201911, 73\u201374.. ACM, New York, doi: 10.1145\/1960314.1960340 ."},{"issue":"12","key":"31_CR18","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/1052883.1052895","volume":"39","author":"D Hovemeyer","year":"2004","unstructured":"Hovemeyer, D, Pugh W (2004) Finding bugs is easy. SIGPLAN Not 39(12): 92\u2013106. doi: 10.1145\/1052883.1052895 .","journal-title":"SIGPLAN Not"},{"key":"31_CR19","volume-title":"IEEE Standard Glossary of Software Engineering Terminology","author":"IEEE","year":"1990","unstructured":"IEEE (1990) IEEE Standard Glossary of Software Engineering Terminology. IEEE Standards Board, New York."},{"key":"31_CR20","first-page":"612","volume-title":"XXVI IEEE\/ACM International Conference on Automated Software Engineering \u2013 ASE\u201911","author":"R Just","year":"2011","unstructured":"Just, R, Schweiggert F, Kapfhammer GM (2011) Major: An efficient and extensible tool for mutation analysis in a java compiler In: XXVI IEEE\/ACM International Conference on Automated Software Engineering \u2013 ASE\u201911, 612\u2013615.. IEEE Computer Society, Washington, DC, doi: 10.1109\/ASE.2011.6100138 ."},{"issue":"4","key":"31_CR21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2006.114","volume":"23","author":"P Louridas","year":"2006","unstructured":"Louridas, P (2006) Static code analysis. IEEE Softw 23(4): 58\u201361. doi: 10.1109\/MS.2006.114 .","journal-title":"IEEE Softw"},{"key":"31_CR22","unstructured":"Ma, YS, Offutt J (2005) Description of method-level mutation operators for Java. On-line document, available at: http:\/\/cs.gmu.edu\/~offutt\/mujava\/mutopsMethod.pdf . Accessed 10 Aug 2015."},{"issue":"2","key":"31_CR23","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/stvr.308","volume":"15","author":"YS Ma","year":"2005","unstructured":"Ma, YS, Offutt J, Kwon YR (2005) Mujava: an automated class mutation system: Research articles. Softw Test Verification Reliab 15(2): 97\u2013133. doi: 10.1002\/stvr.v15:2 .","journal-title":"Softw Test Verification Reliab"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Mathur, AP (1991) Performance, effectiveness, and reliability issues in software testing In: Computer Software and Applications Conference, 1991. COMPSAC\u201891., Proceedings of the Fifteenth Annual International, 604\u2013605.. IEEE, New York. 10.1109\/CMPSAC.1991.170248 .","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"31_CR25","unstructured":"Microsoft (2014) StyleCop. Tool Homepage, available at: https:\/\/stylecop.codeplex.com\/ . Accessed 2 July 2014."},{"issue":"4","key":"31_CR26","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<205::AID-STVR186>3.0.CO;2-X","volume":"9","author":"E Mresa","year":"1999","unstructured":"Mresa, E, Bottaci L (1999) Efficiency of mutation operators and selective mutation strategies: an empirical study. J Softw Test Verification Reliab 9(4): 205\u2013232.","journal-title":"J Softw Test Verification Reliab"},{"key":"31_CR27","first-page":"580","volume-title":"Proceedings of the 27th International Conference on Software Engineering, ICSE \u201905","author":"N Nagappan","year":"2005","unstructured":"Nagappan, N, Ball T (2005) Static analysis tools as early indicators of pre-release defect density In: Proceedings of the 27th International Conference on Software Engineering, ICSE \u201905, 580\u2013586.. ACM, New York, doi: 10.1145\/1062455.1062558 ."},{"key":"31_CR28","first-page":"100","volume-title":"15th International Conference on Software Engineering","author":"AJ Offutt","year":"1993","unstructured":"Offutt, AJ, Rothermel G, Zapf C (1993) An experimental evaluation of selective mutation In: 15th International Conference on Software Engineering, 100\u2013107.. IEEE Computer Society Press, Baltimore."},{"issue":"2","key":"31_CR29","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/227607.227610","volume":"5","author":"AJ Offutt","year":"1996","unstructured":"Offutt, AJ, Lee A, Rothermel G, Untch RH, Zapf C (1996) An experimental determination of sufficient mutant operators. ACM Trans Softw Eng Methodol 5(2): 99\u2013118.","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"31_CR30","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1138929.1138945","volume-title":"Proceedings of the 2006 International Workshop on Automation of Software Test, AST \u201906","author":"J Offutt","year":"2006","unstructured":"Offutt, J, Ma YS, Kwon YR (2006) The class-level mutants of mujava In: Proceedings of the 2006 International Workshop on Automation of Software Test, AST \u201906, 78\u201384.. ACM, New York, doi: 10.1145\/1138929.1138945 ."},{"key":"31_CR31","unstructured":"Pohl, J (2001) Lint - C program verifier. Tool\u2019s Man Page, available at: http:\/\/www.unix.com\/man-page\/FreeBSD\/1\/lint . Access on: 2 July 2014."},{"issue":"2","key":"31_CR32","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/stvr.392","volume":"19","author":"M Polo","year":"2009","unstructured":"Polo, M, Piattini M, Garc\u00eda-Rodr\u00edguez I (2009) Decreasing the cost of mutation testing with second-order mutants. Softw Test Verification Reliab 19(2): 111\u2013131. doi: 10.1002\/stvr.v19:2 .","journal-title":"Softw Test Verification Reliab"},{"key":"31_CR33","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/ICST.2011.51","volume-title":"Proceedings of the 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST \u201911","author":"H Shen","year":"2011","unstructured":"Shen, H, Fang J, Zhao J (2011) Efindbugs: Effective error ranking for findbugs In: Proceedings of the 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST \u201911, 299\u2013308.. IEEE Computer Society, Washington, DC, doi: 10.1109\/ICST.2011.51 ."},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"Tomas, P, Escalona MJ, Mejias M (2013) Open Source Tools for Measuring the Internal Quality of Java Software Products. A Survey. Computer Standards & Interfaces 36(1): 244\u2013255. http:\/\/dx.doi.org\/10.1016\/j.csi.2013.08.006 .","DOI":"10.1016\/j.csi.2013.08.006"},{"issue":"06","key":"31_CR35","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1142\/S021819400200113X","volume":"12","author":"AMR Vincenzi","year":"2002","unstructured":"Vincenzi, AMR, Nakagawa EY, Maldonado JC, Delamaro ME, Romero RAF (2002) Bayesian-learning based guidelines to determine equivalent mutants. Int J Softw Eng Knowl Eng 12(06): 675\u2013689.","journal-title":"Int J Softw Eng Knowl Eng"}],"container-title":["Journal of Software Engineering Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40411-016-0031-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40411-016-0031-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40411-016-0031-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T03:46:33Z","timestamp":1568519193000},"score":1,"resource":{"primary":{"URL":"http:\/\/jserd.springeropen.com\/articles\/10.1186\/s40411-016-0031-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,3]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1186\/s40411-016-0031-8","relation":{},"ISSN":["2195-1721"],"issn-type":[{"value":"2195-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,3]]},"article-number":"5"}}