A Unified Test Case Prioritization Approach

Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based test case prioritization techniques typically use one of two overall strategies: a total strategy or an additional strategy . T...

Full description

Saved in:
Bibliographic Details
Published inACM transactions on software engineering and methodology Vol. 24; no. 2; pp. 1 - 31
Main Authors Hao, Dan, Zhang, Lingming, Zhang, Lu, Rothermel, Gregg, Mei, Hong
Format Journal Article
LanguageEnglish
Published 01.12.2014
Subjects
Online AccessGet full text
ISSN1049-331X
1557-7392
DOI10.1145/2685614

Cover

Abstract Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based test case prioritization techniques typically use one of two overall strategies: a total strategy or an additional strategy . These strategies prioritize test cases based on the total number of code (or code-related) elements covered per test case and the number of additional (not yet covered) code (or code-related) elements covered per test case, respectively. In this article, we present a unified test case prioritization approach that encompasses both the total and additional strategies. Our unified test case prioritization approach includes two models ( basic and extended ) by which a spectrum of test case prioritization techniques ranging from a purely total to a purely additional technique can be defined by specifying the value of a parameter referred to as the f p value. To evaluate our approach, we performed an empirical study on 28 Java objects and 40 C objects, considering the impact of three internal factors (model type, choice of f p value, and coverage type) and three external factors (coverage granularity, test case granularity, and programming/testing paradigm), all of which can be manipulated by our approach. Our results demonstrate that a wide range of techniques derived from our basic and extended models with uniform f p values can outperform purely total techniques and are competitive with purely additional techniques. Considering the influence of each internal and external factor studied, the results demonstrate that various values of each factor have nontrivial influence on test case prioritization techniques.
AbstractList Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based test case prioritization techniques typically use one of two overall strategies: a total strategy or an additional strategy . These strategies prioritize test cases based on the total number of code (or code-related) elements covered per test case and the number of additional (not yet covered) code (or code-related) elements covered per test case, respectively. In this article, we present a unified test case prioritization approach that encompasses both the total and additional strategies. Our unified test case prioritization approach includes two models ( basic and extended ) by which a spectrum of test case prioritization techniques ranging from a purely total to a purely additional technique can be defined by specifying the value of a parameter referred to as the f p value. To evaluate our approach, we performed an empirical study on 28 Java objects and 40 C objects, considering the impact of three internal factors (model type, choice of f p value, and coverage type) and three external factors (coverage granularity, test case granularity, and programming/testing paradigm), all of which can be manipulated by our approach. Our results demonstrate that a wide range of techniques derived from our basic and extended models with uniform f p values can outperform purely total techniques and are competitive with purely additional techniques. Considering the influence of each internal and external factor studied, the results demonstrate that various values of each factor have nontrivial influence on test case prioritization techniques.
Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing. Coverage-based test case prioritization techniques typically use one of two overall strategies: a total strategy or an additional strategy. These strategies prioritize test cases based on the total number of code (or code-related) elements covered per test case and the number of additional (not yet covered) code (or code-related) elements covered per test case, respectively. In this article, we present a unified test case prioritization approach that encompasses both the total and additional strategies. Our unified test case prioritization approach includes two models (basic and extended) by which a spectrum of test case prioritization techniques ranging from a purely total to a purely additional technique can be defined by specifying the value of a parameter referred to as the f sub()pvalue. To evaluate our approach, we performed an empirical study on 28 Java objects and 40 C objects, considering the impact of three internal factors (model type, choice off sub()pvalue, and coverage type) and three external factors (coverage granularity, test case granularity, and programming/testing paradigm), all of which can be manipulated by our approach. Our results demonstrate that a wide range of techniques derived from our basic and extended models with uniform f sub()pvalues can outperform purely total techniques and are competitive with purely additional techniques. Considering the influence of each internal and external factor studied, the results demonstrate that various values of each factor have nontrivial influence on test case prioritization techniques.
Author Hao, Dan
Mei, Hong
Zhang, Lu
Rothermel, Gregg
Zhang, Lingming
Author_xml – sequence: 1
  givenname: Dan
  surname: Hao
  fullname: Hao, Dan
  organization: Peking University, Beijing, China
– sequence: 2
  givenname: Lingming
  surname: Zhang
  fullname: Zhang, Lingming
  organization: University of Texas at Dallas, Beijing, China
– sequence: 3
  givenname: Lu
  surname: Zhang
  fullname: Zhang, Lu
  organization: Peking University, Beijing, China
– sequence: 4
  givenname: Gregg
  surname: Rothermel
  fullname: Rothermel, Gregg
  organization: University of Nebraska, Lincoln, NE
– sequence: 5
  givenname: Hong
  surname: Mei
  fullname: Mei, Hong
  organization: Peking University, Beijing, China
BookMark eNplkE1LAzEYhINUsK3iX9ibgqzmc7M5LotVoaCHFryFbD4wst2sSXrQX-9qe1Lew7yHh5lhFmA2hMECcIngLUKU3eGqZhWiJ2COGOMlJwLPph9SURKCXs_AIqV3CBGBmM7BTVNsB--8NcXGply0KtniJfoQffZfKvswFM04xqD02zk4dapP9uKoS7Bd3W_ax3L9_PDUNutSE0xzaYRijDCjCHHcECEwrWssNOwUF9pAioRg3ELDkOWOd9jU2jGlHSQd0dMtwfXBd4r92E-t5M4nbfteDTbsk0RVBWEleIUmtDygOoaUonVS-_zbOkfle4mg_BlFHkeZ-Ks__Bj9TsXPf-Q3LjlggQ
CitedBy_id crossref_primary_10_3390_math8111857
crossref_primary_10_17706_jsw_10_5_577_598
crossref_primary_10_1002_stvr_1675
crossref_primary_10_1016_j_jss_2020_110712
crossref_primary_10_1109_TSE_2021_3070269
crossref_primary_10_1109_TSE_2022_3168373
crossref_primary_10_1002_smr_2653
crossref_primary_10_1016_j_infsof_2017_08_014
crossref_primary_10_1109_TSE_2025_3538490
crossref_primary_10_1007_s10515_022_00344_y
crossref_primary_10_1002_smr_2714
crossref_primary_10_1109_ACCESS_2022_3176086
crossref_primary_10_1109_TSE_2024_3380836
crossref_primary_10_1109_TR_2020_2979815
crossref_primary_10_1007_s11219_022_09599_w
crossref_primary_10_3390_app15042243
crossref_primary_10_1007_s42979_021_00821_3
crossref_primary_10_1016_j_jss_2018_01_033
crossref_primary_10_1007_s11704_016_6112_3
crossref_primary_10_1016_j_jss_2022_111419
crossref_primary_10_1145_3725528
crossref_primary_10_1109_TSE_2018_2822270
crossref_primary_10_1007_s00500_020_05517_z
crossref_primary_10_1016_j_infsof_2020_106269
crossref_primary_10_4018_IJSI_312263
crossref_primary_10_1007_s11390_015_1574_6
crossref_primary_10_1007_s10664_021_10037_x
crossref_primary_10_1145_3471906
crossref_primary_10_1016_j_jss_2016_06_058
crossref_primary_10_1587_transinf_2016EDP7356
crossref_primary_10_1007_s11432_016_5572_2
crossref_primary_10_1016_j_infsof_2018_03_004
crossref_primary_10_1007_s11334_024_00550_9
crossref_primary_10_1109_ACCESS_2023_3283212
crossref_primary_10_1109_TSE_2015_2496939
crossref_primary_10_1109_TSE_2018_2868082
crossref_primary_10_1016_j_jss_2020_110539
crossref_primary_10_1002_stvr_1811
Cites_doi 10.1002/j.1538-7305.1965.tb04146.x
10.1109/TSE.2005.49
10.1109/ISSRE.2011.26
10.1109/ICSM.2001.972715
10.1145/1134285.1134349
10.1109/TSE.2006.83
10.1145/1368088.1368139
10.1145/2635868.2635929
10.1109/ASE.2009.77
10.1002/stvr.v15:2
10.1007/978-3-642-39038-8_25
10.1145/566172.566187
10.1145/1062455.1062530
10.1007/s11390-014-1461-6
10.1109/32.988497
10.1109/TSE.1976.233837
10.1145/347324.348910
10.1145/581339.581357
10.1145/1595696.1595750
10.1145/1390630.1390641
10.1109/TSE.2007.38
10.1109/ISSRE.2004.18
10.1007/s11432-012-4746-9
10.1109/ASE.2011.6100138
10.1145/2610384.2610404
10.1109/ASE.2009.22
10.1145/1390630.1390639
10.1109/ICSM.2005.87
10.1109/COMPSAC.2013.31
10.1080/01621459.1986.10478364
10.1145/1526709.1526830
10.1145/1572272.1572297
10.1145/2483760.2483769
10.1109/TSE.2006.92
10.1109/ICSE.2009.5070541
10.1145/1146238.1146240
10.1145/2610384.2628053
10.1145/2509136.2509551
10.1145/1181775.1181793
10.1109/TSE.2011.106
10.1145/1453101.1453113
10.1109/SSIRI.2008.52
ContentType Journal Article
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1145/2685614
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-7392
EndPage 31
ExternalDocumentID 10_1145_2685614
GroupedDBID --Z
-DZ
-~X
.4S
.DC
23M
4.4
5GY
5VS
6J9
8US
AAHTB
AAKMM
AALFJ
AAYFX
AAYXX
ABPEJ
ABPPZ
ACGFO
ACGOD
ACM
ADBCU
ADL
ADMLS
AEBYY
AEFXT
AEJOY
AENEX
AENSD
AETEA
AFWIH
AFWXC
AIAGR
AIKLT
AKRVB
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BDXCO
CCLIF
CITATION
CS3
D0L
EBS
EDO
EJD
FEDTE
GUFHI
HGAVV
H~9
I07
LHSKQ
P1C
P2P
PQQKQ
RNS
ROL
TUS
UPT
YR2
ZCA
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c324t-d9a5535da33f7d399248829c0ba79cd0419957e0d51e7f7b2d8cf5acf03b3c3c3
ISSN 1049-331X
IngestDate Thu Oct 02 10:10:21 EDT 2025
Thu Apr 24 22:57:45 EDT 2025
Wed Oct 01 05:57:30 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c324t-d9a5535da33f7d399248829c0ba79cd0419957e0d51e7f7b2d8cf5acf03b3c3c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1660069761
PQPubID 23500
PageCount 31
ParticipantIDs proquest_miscellaneous_1660069761
crossref_citationtrail_10_1145_2685614
crossref_primary_10_1145_2685614
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-12-01
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-12-01
  day: 01
PublicationDecade 2010
PublicationTitle ACM transactions on software engineering and methodology
PublicationYear 2014
References Zhang L. (e_1_2_1_46_1)
e_1_2_1_20_1
e_1_2_1_41_1
e_1_2_1_24_1
e_1_2_1_45_1
e_1_2_1_22_1
e_1_2_1_43_1
e_1_2_1_28_1
e_1_2_1_49_1
e_1_2_1_26_1
e_1_2_1_47_1
Wong W. E. (e_1_2_1_44_1)
e_1_2_1_31_1
e_1_2_1_8_1
e_1_2_1_6_1
e_1_2_1_12_1
e_1_2_1_35_1
e_1_2_1_4_1
e_1_2_1_33_1
e_1_2_1_52_1
e_1_2_1_2_1
e_1_2_1_39_1
e_1_2_1_14_1
e_1_2_1_37_1
Zhang L. (e_1_2_1_50_1)
Cadar C. (e_1_2_1_3_1)
e_1_2_1_42_1
e_1_2_1_23_1
e_1_2_1_21_1
e_1_2_1_27_1
e_1_2_1_25_1
e_1_2_1_48_1
e_1_2_1_29_1
e_1_2_1_7_1
e_1_2_1_30_1
Qu M. (e_1_2_1_38_1)
e_1_2_1_5_1
Elbaum S. (e_1_2_1_10_1)
e_1_2_1_13_1
e_1_2_1_34_1
e_1_2_1_51_1
e_1_2_1_1_1
e_1_2_1_11_1
e_1_2_1_32_1
Rothermel G. (e_1_2_1_40_1)
Hao D. (e_1_2_1_16_1)
e_1_2_1_17_1
e_1_2_1_15_1
e_1_2_1_36_1
e_1_2_1_9_1
Hou S.-S. (e_1_2_1_18_1)
e_1_2_1_19_1
References_xml – ident: e_1_2_1_28_1
  doi: 10.1002/j.1538-7305.1965.tb04146.x
– ident: e_1_2_1_36_1
  doi: 10.1109/TSE.2005.49
– volume-title: Proceedings of the International Conference on Software Maintenance (ICSM'08)
  ident: e_1_2_1_18_1
– ident: e_1_2_1_51_1
  doi: 10.1109/ISSRE.2011.26
– ident: e_1_2_1_21_1
  doi: 10.1109/ICSM.2001.972715
– ident: e_1_2_1_35_1
  doi: 10.1145/1134285.1134349
– ident: e_1_2_1_2_1
  doi: 10.1109/TSE.2006.83
– ident: e_1_2_1_33_1
  doi: 10.1145/1368088.1368139
– ident: e_1_2_1_23_1
  doi: 10.1145/2635868.2635929
– ident: e_1_2_1_20_1
  doi: 10.1109/ASE.2009.77
– ident: e_1_2_1_29_1
  doi: 10.1002/stvr.v15:2
– ident: e_1_2_1_14_1
  doi: 10.1007/978-3-642-39038-8_25
– ident: e_1_2_1_42_1
  doi: 10.1145/566172.566187
– volume-title: Proceedings of the International Conference on Software Engineering (ICSE'12)
  ident: e_1_2_1_16_1
– ident: e_1_2_1_1_1
  doi: 10.1145/1062455.1062530
– volume-title: Proceedings of the International Conference on Software Maintenance (ICSM'09)
  ident: e_1_2_1_50_1
– ident: e_1_2_1_45_1
  doi: 10.1007/s11390-014-1461-6
– ident: e_1_2_1_11_1
  doi: 10.1109/32.988497
– ident: e_1_2_1_31_1
  doi: 10.1109/TSE.1976.233837
– ident: e_1_2_1_9_1
  doi: 10.1145/347324.348910
– ident: e_1_2_1_25_1
  doi: 10.1145/581339.581357
– ident: e_1_2_1_41_1
  doi: 10.1145/1595696.1595750
– volume-title: Proceedings of the International Conference on Software Maintenance (ICSM'07)
  ident: e_1_2_1_38_1
– ident: e_1_2_1_39_1
  doi: 10.1145/1390630.1390641
– volume-title: Proceedings of the International Conference on Software Engineering (ICSE'13)
  ident: e_1_2_1_46_1
– ident: e_1_2_1_27_1
  doi: 10.1109/TSE.2007.38
– ident: e_1_2_1_8_1
  doi: 10.1109/ISSRE.2004.18
– volume-title: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)
  ident: e_1_2_1_3_1
– volume-title: Proceedings of the International Conference on Software Maintenance (ICSM'99)
  ident: e_1_2_1_40_1
– ident: e_1_2_1_12_1
  doi: 10.1007/s11432-012-4746-9
– volume-title: Proceedings of the International Symposium on Software Reliability Engineering (ISSRE'97)
  ident: e_1_2_1_44_1
– ident: e_1_2_1_24_1
  doi: 10.1109/ASE.2011.6100138
– ident: e_1_2_1_52_1
  doi: 10.1145/2610384.2610404
– ident: e_1_2_1_49_1
  doi: 10.1109/ASE.2009.22
– ident: e_1_2_1_7_1
  doi: 10.1145/1390630.1390639
– ident: e_1_2_1_26_1
  doi: 10.1109/ICSM.2005.87
– ident: e_1_2_1_15_1
  doi: 10.1109/COMPSAC.2013.31
– ident: e_1_2_1_17_1
  doi: 10.1080/01621459.1986.10478364
– ident: e_1_2_1_34_1
  doi: 10.1145/1526709.1526830
– ident: e_1_2_1_48_1
  doi: 10.1145/1572272.1572297
– ident: e_1_2_1_13_1
  doi: 10.1145/2483760.2483769
– volume-title: Proceedings of the International Conference on Software Engineering (ICSE'01)
  ident: e_1_2_1_10_1
– ident: e_1_2_1_6_1
  doi: 10.1109/TSE.2006.92
– ident: e_1_2_1_19_1
  doi: 10.1109/ICSE.2009.5070541
– ident: e_1_2_1_43_1
  doi: 10.1145/1146238.1146240
– ident: e_1_2_1_22_1
  doi: 10.1145/2610384.2628053
– ident: e_1_2_1_47_1
  doi: 10.1145/2509136.2509551
– ident: e_1_2_1_5_1
  doi: 10.1145/1181775.1181793
– ident: e_1_2_1_32_1
  doi: 10.1109/TSE.2011.106
– ident: e_1_2_1_30_1
– ident: e_1_2_1_4_1
  doi: 10.1145/1453101.1453113
– ident: e_1_2_1_37_1
  doi: 10.1109/SSIRI.2008.52
SSID ssj0013024
Score 2.3975375
Snippet Test case prioritization techniques attempt to reorder test cases in a manner that increases the rate at which faults are detected during regression testing....
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 1
SubjectTerms C (programming language)
Covering
Faults
Filled plastics
Java (programming language)
Mathematical models
Programming
Regression
Strategy
Title A Unified Test Case Prioritization Approach
URI https://www.proquest.com/docview/1660069761
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1557-7392
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0013024
  issn: 1049-331X
  databaseCode: ADMLS
  dateStart: 20060401
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fa9swEBZd-rKXres21m0dKoy9BG2WJVn1o0k7wmjGYCn0zdj6UQZtMtqEwf763VlybCeD_SBggm0Z7Du--6TTd0fIW2W4zawxLEu1YVKmmtWVl8x6oPfeq9rmqHeefc6ml_LTlbraUpes6vfm5291Jf9jVTgHdkWV7D9YdvNQOAH_wb5wBAvD8a9sXCBl9Egi5wDu4wlEpPGXu29LLFQU5JXIMhvNVJ-EFpMZtoZo-4Q3CYN7gOMfuAvMdQUKm8RCaDE9WHyfVsuoTt9Zdoap7fVtGw0HF9Zdagc5523YHYASmev-ygOXvV0cASxhdsGEaFreQCyJAKo00yIfIGxQSUdPSntwyXtxNwSDXUSXWPwizU6xZGkXtNpE_VYs2-wwDHprVcaBD8h-CrCfjMh-cTa7-NolmpLQ97h9laCrxqEf4tAhYRnG64aEzA_Iozh7oEVwhSdkzy0OyeO2MweNQP2UjAsaPYOiZ1D0DDr0DNp6xjNy-fF8Ppmy2BaDGWC_K2bzSimhbCWE1xYLCwMIp7lJ6krnxiYSVffaJVZxp72uU3tqvKqMT0QtDPyek9FiuXAvCPVZrYWuDNBeKXFJ0nEvjXeKe51Kx4_Iu_bdSxNrxmPrkpty6_seEbq58Xsok7J7y0n78UqAMMxLVQu3XN-XPMuwYLbO-Ms_P-YVedj54msyWt2t3THwwlX9Jtr2FzvVYso
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Unified+Test+Case+Prioritization+Approach&rft.jtitle=ACM+transactions+on+software+engineering+and+methodology&rft.au=Hao%2C+Dan&rft.au=Zhang%2C+Lingming&rft.au=Zhang%2C+Lu&rft.au=Rothermel%2C+Gregg&rft.date=2014-12-01&rft.issn=1049-331X&rft.eissn=1557-7392&rft.volume=24&rft.issue=2&rft.spage=1&rft.epage=31&rft_id=info:doi/10.1145%2F2685614&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_2685614
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-331X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-331X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-331X&client=summon