{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:25:41Z","timestamp":1740119141409,"version":"3.37.3"},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["432247\/2018-1"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1016\/j.infsof.2022.106902","type":"journal-article","created":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T01:37:06Z","timestamp":1647567426000},"page":"106902","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["A Systematic Literature Review on prioritizing software test cases using Markov chains"],"prefix":"10.1016","volume":"147","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1147-2519","authenticated-orcid":false,"given":"Gerson","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"\u00c9rica Ferreira","family":"de Souza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5193-6218","authenticated-orcid":false,"given":"Luciana Brasil Rebelo","family":"dos Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6413-7888","authenticated-orcid":false,"given":"Marlon","family":"da Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6481-5362","authenticated-orcid":false,"given":"Juliana Marino","family":"Balera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9025-0841","authenticated-orcid":false,"given":"Nandamudi Lankalapalli","family":"Vijaykumar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"first-page":"610","year":"1990","series-title":"Standard Glossary of Software Engineering Terminology, IEEE Software Engineering Standards & ollection","key":"10.1016\/j.infsof.2022.106902_b1"},{"year":"2008","series-title":"Principles of Model Checking","author":"Baier","key":"10.1016\/j.infsof.2022.106902_b2"},{"key":"10.1016\/j.infsof.2022.106902_b3","unstructured":"M. Delamaro, J. Maldonado, M. Jino, Introdu\u00e7\u00e3o ao Teste de Software, Rio de Janeiro, RJ, 2007."},{"year":"2012","series-title":"Foundations of Software Testing, Seventh Impression","author":"Mathur","key":"10.1016\/j.infsof.2022.106902_b4"},{"issue":"3","key":"10.1016\/j.infsof.2022.106902_b5","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/s11219-012-9181-z","article-title":"Test case prioritization: a systematic mapping study","volume":"21","author":"Catal","year":"2013","journal-title":"Softw. Qual. J."},{"key":"10.1016\/j.infsof.2022.106902_b6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.infsof.2017.08.014","article-title":"Test case prioritization approaches in regression testing: A systematic literature review","volume":"93","author":"Khatibsyarbini","year":"2018","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2022.106902_b7","series-title":"2016 1st Conference on Swarm Intelligence and Evolutionary Computation (CSIEC)","first-page":"142","article-title":"Using memetic algorithms for test case prioritization in model based software testing","author":"Nejad","year":"2016"},{"key":"10.1016\/j.infsof.2022.106902_b8","series-title":"2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"46","article-title":"Mutation-based test-case prioritization in software evolution","author":"Lou","year":"2015"},{"issue":"4","key":"10.1016\/j.infsof.2022.106902_b9","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1002\/stvr.1572","article-title":"Coverage-based regression test case selection, minimization and prioritization: A case study on an industrial system","volume":"25","author":"Di\u00a0Nardo","year":"2015","journal-title":"Softw. Test. Verif. Reliab."},{"key":"10.1016\/j.infsof.2022.106902_b10","series-title":"2013 IEEE Sixth International Conference on Software Testing, Verification and Validation","first-page":"302","article-title":"Coverage-based test case prioritisation: An industrial case study","author":"Di Nardo","year":"2013"},{"key":"10.1016\/j.infsof.2022.106902_b11","doi-asserted-by":"crossref","unstructured":"G. Rothermel, R.H. Untch, C. Chu, M.J. Harrold, Test case prioritization: an empirical study, in: Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM\u201999). \u2019software Maintenance for Business Change\u2019 (Cat. No.99CB36360), 1999, pp. 179\u2013188.","DOI":"10.1109\/ICSM.1999.792604"},{"key":"10.1016\/j.infsof.2022.106902_b12","doi-asserted-by":"crossref","unstructured":"B. Korel, G. Koutsogiannakis, L.H. Tahat, Model-based test prioritization heuristic methods and their evaluation, in: Proceedings of the 3rd International Workshop on Advances in Model-Based Testing, 2007, pp. 34\u201343.","DOI":"10.1145\/1291535.1291539"},{"issue":"10","key":"10.1016\/j.infsof.2022.106902_b13","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1109\/32.328991","article-title":"A Markov chain model for statistical software testing","volume":"20","author":"Whittaker","year":"1994","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/j.infsof.2022.106902_b14","first-page":"38","article-title":"A controlled Markov chains approach to software testing","volume":"1","author":"Cai","year":"2011","journal-title":"Softw. Eng.: Int. J. (SeiJ)"},{"issue":"1","key":"10.1016\/j.infsof.2022.106902_b15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s13198-014-0237-2","article-title":"Testing Apache OpenOffice Writer using statistical usage testing technique","volume":"6","author":"Khatri","year":"2015","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"issue":"12","key":"10.1016\/j.infsof.2022.106902_b16","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1016\/S0950-5849(00)00102-6","article-title":"Measuring complexity and coverage of software specifications","volume":"42","author":"Walton","year":"2000","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2022.106902_b17","series-title":"2017 International Conference on Software Analysis, Testing and Evolution (SATE)","first-page":"20","article-title":"Test suite prioritization for efficient regression testing of model-based automotive software","author":"Morozov","year":"2017"},{"year":"1994","series-title":"Stochastic Models: An Algorithmic Approach, Vol. 303","author":"Tijms","key":"10.1016\/j.infsof.2022.106902_b18"},{"year":"2003","series-title":"A First Course in Stochastic Models","author":"Tijms","key":"10.1016\/j.infsof.2022.106902_b19"},{"key":"10.1016\/j.infsof.2022.106902_b20","series-title":"Introduction to Stochastic Processes","first-page":"420","author":"Cinlar","year":"1975"},{"issue":"8","key":"10.1016\/j.infsof.2022.106902_b21","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/5.533956","article-title":"Principles and methods of testing finite state machines-a survey","volume":"84","author":"Lee","year":"1996","journal-title":"Proc. IEEE"},{"year":"1992","series-title":"Numerical Methods for Large Eigenvalue Problems","author":"Saad","key":"10.1016\/j.infsof.2022.106902_b22"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b23","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/32.988497","article-title":"Test case prioritization: A family of empirical studies","volume":"28","author":"Elbaum","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"10.1016\/j.infsof.2022.106902_b24","doi-asserted-by":"crossref","first-page":"623","DOI":"10.3906\/elk-1209-109","article-title":"Model-based test case prioritization using cluster analysis: a soft-computing approach","volume":"23","author":"G\u00f6k\u00e7e","year":"2015","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"issue":"14","key":"10.1016\/j.infsof.2022.106902_b25","first-page":"13","article-title":"Model based testing for software systems: an application of markov modulated markov process","volume":"46","author":"Kashyap","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.infsof.2022.106902_b26","series-title":"2011 Design, Automation & Test in Europe","first-page":"1","article-title":"Formal specification and systematic model-driven testing of embedded automotive systems","author":"Siegl","year":"2011"},{"year":"2013","series-title":"Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues, Vol. 31","author":"Br\u00e9maud","key":"10.1016\/j.infsof.2022.106902_b27"},{"key":"10.1016\/j.infsof.2022.106902_b28","series-title":"Proceedings. 26th International Conference on Software Engineering","first-page":"86","article-title":"Using simulation to empirically investigate test coverage criteria based on statechart","author":"Briand","year":"2004"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b29","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11219-014-9265-z","article-title":"Analysis of distance functions for similarity-based test suite reduction in the context of model-based testing","volume":"24","author":"Coutinho","year":"2016","journal-title":"Softw. Qual. J."},{"issue":"6","key":"10.1016\/j.infsof.2022.106902_b30","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1016\/j.infsof.2013.01.001","article-title":"Evaluating test suite characteristics, cost, and effectiveness of FSM-based testing methods","volume":"55","author":"Endo","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2022.106902_b31","article-title":"Proritization technique for minimizing number of test cases","volume":"1","author":"Raiyani","year":"2011","journal-title":"Int. J. Softw. Eng. Res. Pract."},{"issue":"3","key":"10.1016\/j.infsof.2022.106902_b32","first-page":"500","article-title":"A novel approach to test suite reduction using data mining","volume":"2","author":"Muthyala","year":"2011","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"10.1016\/j.infsof.2022.106902_b33","series-title":"International Workshop on Design, Evaluation and Refinement of Intelligent Systems (DERIS2010)","first-page":"75","article-title":"Test case reduction methods by using CBR","author":"Roongruangsuwan","year":"2010"},{"year":"2007","series-title":"Guidelines for performing Systematic Literature Reviews in Software Engineering","author":"Kitchenham","key":"10.1016\/j.infsof.2022.106902_b34"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b35","first-page":"89","article-title":"Systematic reviews and meta-analyses: an illustrated, step-by-step guide","volume":"17","author":"Pai","year":"2004","journal-title":"Natl. Med. J. India"},{"year":"2005","series-title":"Systematic Review in Software Engineering","author":"Biolchini","key":"10.1016\/j.infsof.2022.106902_b36"},{"key":"10.1016\/j.infsof.2022.106902_b37","series-title":"International Symposium on Empirical Software Engineering and Measurement","first-page":"225","article-title":"Applying systematic reviews to diverse study types: An experience report","author":"Dyba","year":"2007"},{"key":"10.1016\/j.infsof.2022.106902_b38","doi-asserted-by":"crossref","first-page":"159","DOI":"10.2307\/2529310","article-title":"The measurement of observer agreement for categorical data","author":"Landis","year":"1977","journal-title":"Biometrics"},{"key":"10.1016\/j.infsof.2022.106902_b39","series-title":"MODELSWARD","first-page":"225","article-title":"Test generation for performance evaluation of mobile multimedia streaming applications","author":"Al-tekreeti","year":"2018"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b40","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/TC.2018.2866040","article-title":"Adaptive partition testing","volume":"68","author":"Sun","year":"2018","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.infsof.2022.106902_b41","series-title":"Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering","first-page":"462","article-title":"A simpler and more direct derivation of system reliability using markov chain usage models","author":"Lin","year":"2017"},{"issue":"4","key":"10.1016\/j.infsof.2022.106902_b42","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0166-5316(99)00052-8","article-title":"Software dependability evaluation based on Markov usage models","volume":"40","author":"Gutjahr","year":"2000","journal-title":"Perform. Eval."},{"issue":"14","key":"10.1016\/j.infsof.2022.106902_b43","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/S0950-5849(02)00108-8","article-title":"Optimal software testing and adaptive software testing in the context of software cybernetics","volume":"44","author":"Cai","year":"2002","journal-title":"Inf. Softw. Technol."},{"issue":"15","key":"10.1016\/j.infsof.2022.106902_b44","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1016\/j.infsof.2004.07.006","article-title":"Optimal and adaptive testing for software reliability assessment","volume":"46","author":"Cai","year":"2004","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2022.106902_b45","unstructured":"K.-Y. Cai, Optimal test profile in the context of software cybernetics, in: Proceedings Second Asia-Pacific Conference on Quality Software, 2001, pp. 157\u2013166."},{"issue":"1","key":"10.1016\/j.infsof.2022.106902_b46","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s10270-015-0479-8","article-title":"Statistical prioritization for software product line testing: an experience report","volume":"16","author":"Devroey","year":"2015","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.infsof.2022.106902_b47","series-title":"2015 International Congress on Technology, Communication and Knowledge (ICTCK)","first-page":"435","article-title":"Automated generation of software testing path based on ant colony","author":"Sayyari","year":"2015"},{"key":"10.1016\/j.infsof.2022.106902_b48","series-title":"2012 IEEE International Systems Conference SysCon 2012","first-page":"1","article-title":"A model driven approach for system validation","author":"Kashyap","year":"2012"},{"key":"10.1016\/j.infsof.2022.106902_b49","doi-asserted-by":"crossref","first-page":"4691","DOI":"10.4028\/www.scientific.net\/AMR.433-440.4691","article-title":"Reducing safety-critical software statistical testing cost based on importance sampling technique","volume":"433\u2013440","author":"Yan","year":"2012","journal-title":"Adv. Mater. Res."},{"issue":"9","key":"10.1016\/j.infsof.2022.106902_b50","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1587\/transinf.E95.D.2219","article-title":"Application of Markov Chain Monte Carlo random testing to test case prioritization in regression testing","volume":"E95.D","author":"Zhou","year":"2012","journal-title":"IEICE Trans. Inf. Syst."},{"year":"1985","series-title":"Algorithmic Graph Theory","author":"Gibbons","key":"10.1016\/j.infsof.2022.106902_b51"},{"key":"10.1016\/j.infsof.2022.106902_b52","series-title":"Handbook of Metaheuristics, Vol. 26","article-title":"An introduction to ant colony optimization","author":"Dorigo","year":"2006"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b53","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/S0164-1212(99)00084-9","article-title":"Towards integration of use case modelling and usage-based testing","volume":"50","author":"Regnell","year":"2000","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2022.106902_b54","series-title":"1st International Workshop on Resiliency in Embedded Electronic Systems, Amsterdam, the Netherlands","first-page":"59","article-title":"ErrorPro: Software tool for stochastic error propagation analysis","author":"Morozov","year":"2015"},{"key":"10.1016\/j.infsof.2022.106902_b55","doi-asserted-by":"crossref","unstructured":"A.O. Arantes, N.L. Vijaykumar, V.A. de\u00a0Santiago\u00a0Junior, D. Guimar\u00e3es, WEB-PerformCharts: a collaborative web-based tool for test case generation from Statecharts, in: Proceedings of the 10th International Conference on Information Integration and Web-Based Applications & Services, 2008, pp. 374\u2013381.","DOI":"10.1145\/1497308.1497375"},{"key":"10.1016\/j.infsof.2022.106902_b56","series-title":"2008 IEEE International Conference on Software Testing Verification and Validation Workshop","first-page":"63","article-title":"An environment for automated test case generation from statechart-based and finite state machine-based behavioral models","author":"Santiago","year":"2008"},{"issue":"3","key":"10.1016\/j.infsof.2022.106902_b57","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","article-title":"Statecharts: A visual formalism for complex systems","volume":"8","author":"Harel","year":"1987","journal-title":"Sci. Comput. Program."},{"key":"10.1016\/j.infsof.2022.106902_b58","series-title":"International Conference on Computational Intelligence for Modelling Control and Automation","first-page":"157","article-title":"Evaluation of test criteria for space application software modeling in statecharts","author":"Souza","year":"2008"},{"issue":"1","key":"10.1016\/j.infsof.2022.106902_b59","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1504\/IJWET.2014.063041","article-title":"Tool support for generating model-based test cases via web","volume":"9","author":"Arantes","year":"2014","journal-title":"Int. J. Web Eng. Technol. IiWAS"},{"issue":"2","key":"10.1016\/j.infsof.2022.106902_b60","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11219-015-9300-8","article-title":"H-Switch Cover: a new test criterion to generate test case from finite state machines","volume":"25","author":"Souza","year":"2017","journal-title":"Softw. Qual. J."},{"key":"10.1016\/j.infsof.2022.106902_b61","first-page":"1","article-title":"Comparing graph-based algorithms to generate test cases from finite state machines","volume":"1","author":"Mariano","year":"2020","journal-title":"J. Electron. Test.-Theory Appl."},{"key":"10.1016\/j.infsof.2022.106902_b62","series-title":"23rd Asia-Pacific Software Engineering Conferencees","first-page":"153","article-title":"A map of threats to validity of systematic literature reviews in software engineering","author":"Zhou","year":"2016"},{"key":"10.1016\/j.infsof.2022.106902_b63","series-title":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","first-page":"1","article-title":"A systematic review on hidden Markov models for sentiment analysis","author":"Odumuyiwa","year":"2019"},{"key":"10.1016\/j.infsof.2022.106902_b64","doi-asserted-by":"crossref","unstructured":"D.A. Karras, R.C. Papademetriou, A systematic review of analytical management techniques in business process modelling for SMEs beyond what-if-analysis and towards a framework for integrating them with BPM, in: Proceedings of the Seventh International Symposium on Business Modeling and Software Design \u2013 BMSD, 2017, pp. 99\u2013110.","DOI":"10.5220\/0006527900990110"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584922000623?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584922000623?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T01:17:55Z","timestamp":1678411075000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584922000623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":64,"alternative-id":["S0950584922000623"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2022.106902","relation":{},"ISSN":["0950-5849"],"issn-type":[{"type":"print","value":"0950-5849"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Systematic Literature Review on prioritizing software test cases using Markov chains","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2022.106902","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106902"}}