{"id":"https://openalex.org/W2131445143","doi":"https://doi.org/10.1145/2635868.2666597","title":"Detecting, isolating, and enforcing dependencies among and within test cases","display_name":"Detecting, isolating, and enforcing dependencies among and within test cases","publication_year":2014,"publication_date":"2014-11-04","ids":{"openalex":"https://openalex.org/W2131445143","doi":"https://doi.org/10.1145/2635868.2666597","mag":"2131445143"},"language":"en","primary_location":{"id":"doi:10.1145/2635868.2666597","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2635868.2666597","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053080959","display_name":"Jonathan Bell","orcid":"https://orcid.org/0000-0002-1187-9298"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jonathan Bell","raw_affiliation_strings":["Columbia University, USA"],"affiliations":[{"raw_affiliation_string":"Columbia University, USA","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5053080959"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":2.1838,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.88227099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"799","last_page":"802"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8060850501060486},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.6898749470710754},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.6678293943405151},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6265344023704529},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.580950915813446},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.56819748878479},{"id":"https://openalex.org/keywords/model-based-testing","display_name":"Model-based testing","score":0.495641827583313},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.4877370297908783},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4522091746330261},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36121007800102234},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3539016842842102},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.35147494077682495},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.24214103817939758},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18613538146018982},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.17515608668327332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15350815653800964}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8060850501060486},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.6898749470710754},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.6678293943405151},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6265344023704529},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.580950915813446},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.56819748878479},{"id":"https://openalex.org/C165825675","wikidata":"https://www.wikidata.org/wiki/Q1399743","display_name":"Model-based testing","level":4,"score":0.495641827583313},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.4877370297908783},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4522091746330261},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36121007800102234},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3539016842842102},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.35147494077682495},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.24214103817939758},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18613538146018982},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.17515608668327332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15350815653800964},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2635868.2666597","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2635868.2666597","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G1053595681","display_name":null,"funder_award_id":"CCF-1302269, CCF-1161079, CNS-0905246","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G2548715701","display_name":null,"funder_award_id":"CCF-1302269, CCF-1161079, CNS-0905246","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G4044384731","display_name":null,"funder_award_id":"U54 CA121852","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332161","display_name":"National Institutes of Health","ror":"https://ror.org/01cwqze88"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W22035362","https://openalex.org/W1569962836","https://openalex.org/W1989790414","https://openalex.org/W2014515160","https://openalex.org/W2024795941","https://openalex.org/W2032782696","https://openalex.org/W2050127001","https://openalex.org/W2056749200","https://openalex.org/W2079811826","https://openalex.org/W2082274331","https://openalex.org/W2107500604","https://openalex.org/W2107709519","https://openalex.org/W2121057551","https://openalex.org/W2122598528","https://openalex.org/W2126499694","https://openalex.org/W2153342620","https://openalex.org/W2154167785","https://openalex.org/W2155233265","https://openalex.org/W2158506421","https://openalex.org/W2160140538","https://openalex.org/W2167723122","https://openalex.org/W2172260321"],"related_works":["https://openalex.org/W1968494916","https://openalex.org/W1888619389","https://openalex.org/W2028796071","https://openalex.org/W2086860371","https://openalex.org/W3022870375","https://openalex.org/W2795302276","https://openalex.org/W2768752771","https://openalex.org/W3047487993","https://openalex.org/W4376482197","https://openalex.org/W2521771266"],"abstract_inverted_index":{"Testing":[0],"stateful":[1],"applications":[2],"is":[3,122],"challenging,":[4],"as":[5],"it":[6,69],"can":[7,47,77,104],"be":[8,78],"difficult":[9],"to":[10,35,37,42,99,112,123,127],"identify":[11],"hidden":[12],"dependencies":[13,18,88],"on":[14,117],"program":[15],"state.":[16],"These":[17],"may":[19],"manifest":[20],"between":[21,89],"several":[22],"test":[23,30,53,90,134,143],"cases,":[24],"or":[25],"simply":[26],"within":[27],"a":[28,45],"single":[29],"case.":[31],"When":[32],"it's":[33],"left":[34],"developers":[36],"document,":[38],"understand,":[39],"and":[40,51,71,92,138],"respond":[41],"these":[43],"dependencies,":[44],"mistake":[46],"result":[48],"in":[49],"unexpected":[50],"invalid":[52],"results.":[54],"Although":[55],"current":[56],"testing":[57,76,96,107],"infrastructure":[58],"does":[59],"not":[60],"currently":[61],"leverage":[62],"state":[63,130,139],"dependency":[64],"information,":[65,102],"we":[66,103],"argue":[67],"that":[68,72,85],"could,":[70],"by":[73,86,115],"doing":[74],"so":[75],"improved.":[79],"Our":[80,119],"results":[81],"thus":[82],"far":[83],"show":[84],"recovering":[87],"cases":[91],"modifying":[93],"the":[94,106,132,141],"popular":[95],"framework,":[97],"JUnit,":[98],"utilize":[100],"this":[101],"optimize":[105],"process,":[108],"reducing":[109],"time":[110],"needed":[111],"run":[113],"tests":[114],"62%":[116],"average.":[118],"ongoing":[120],"work":[121],"apply":[124],"similar":[125],"analyses":[126],"improve":[128],"existing":[129],"of":[131,140],"art":[133,142],"suite":[135],"prioritization":[136],"techniques":[137],"case":[144],"generation":[145],"techniques.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
