Journal: Softw. Test., Verif. Reliab.

Volume 25, Issue 8

713 -- 715Jeff Offutt. How the web resuscitated evolutionary design
716 -- 748Bernhard K. Aichernig, Harald Brandl, Elisabeth Jöbstl, Willibald Krenn, Rupert Schlick, Stefan Tiran. Killing strategies for model-based mutation testing
749 -- 780Gordon Fraser, Neil Walkinshaw. Assessing and generating test sets in terms of behavioural adequacy

Volume 25, Issue 5-7

461 -- 463Yue Jia, Mercedes G. Merayo, Mark Harman. Introduction to the special issue on Mutation Testing
464 -- 489Pedro Reales Mateo, Macario Polo Usaola. Reducing mutation costs through uncovered mutants
490 -- 507René Just, Franz Schweiggert. Higher accuracy and lower run time: efficient mutation analysis using non-redundant mutation operators
508 -- 535Marinos Kintis, Mike Papadakis, Nicos Malevris. Employing second-order mutation for isolating first-order equivalent mutants
536 -- 571Antonia Estero-Botaro, Francisco Palomo-Lozano, Inmaculada Medina-Bulo, Juan José Domínguez-Jiménez, Antonio García-Domínguez. Quality metrics for mutation testing with applications to WS-BPEL compositions
572 -- 604Akbar Siami Namin, Xiaozhen Xue, Omar Rosas, Pankaj Sharma. MuRanker: a mutant ranking tool
605 -- 628Mike Papadakis, Yves Le Traon. Metallaxis-FL: mutation-based fault localization
629 -- 652Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene. Using mutation to assess fault detection capability of model review
653 -- 683Vincent Aranega, Jean-Marie Mottu, Anne Etien, Thomas Degueule, Benoit Baudry, Jean-Luc Dekeyser. Towards an automation of the mutation analysis dedicated to model transformation
684 -- 711Frédéric Dadeau, Pierre-Cyrille Héam, Rafik Kheddam, Ghazi Maatoug, Michaël Rusinowitch. Model-based mutation testing from security protocols in HLPSL

Volume 25, Issue 4

333 -- 0Benoit Baudry, Alessandro Orso. Special issue for the ICST 2013 conference
334 -- 370Shin Hong, Matt Staats, Jaemin Ahn, Moonzoo Kim, Gregg Rothermel. Are concurrency coverage metrics effective for testing: a comprehensive empirical investigation
371 -- 396Daniel Di Nardo, Nadia Alshahwan, Lionel C. Briand, Yvan Labiche. Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system
397 -- 425Yu Lin, Danny Dig. A study and toolkit of CHECK-THEN-ACT idioms of Java concurrent collections
426 -- 459Gerardo Canfora, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Annibale Panichella, Sebastiano Panichella. Defect prediction as a multiobjective optimization problem

Volume 25, Issue 3

165 -- 166Eitan Farchi, Robert M. Hierons, João Lourenço. Special issue on testing, analysis and debugging of concurrent programs
167 -- 190Sangmin Park, Richard W. Vuduc, Mary Jean Harrold. UNICORN: a unified approach for localizing non-deadlock concurrency bugs
191 -- 217Shin Hong, Moonzoo Kim. A survey of race bug detection techniques for multithreaded programmes
218 -- 271Elvira Albert, Puri Arenas, Jesús Correas Fernández, Samir Genaim, Miguel Gómez-Zamalloa, Germán Puebla, Guillermo Román-Díez. Object-sensitive cost analysis for concurrent objects
272 -- 309Jan Fiedor, Vendula Hrubá, Bohuslav Krena, Zdenek Letko, S. Ur, Tomás Vojnar. Advances in noise-based testing of concurrent software
310 -- 332S. R. S. Souza, Paulo S. L. Souza, Maria A. S. Brito, Adenilso da Silva Simão, Ed Zaluska. Empirical evaluation of a new composite approach to the coverage criteria and reachability testing of concurrent programs

Volume 25, Issue 2

73 -- 76Jeff Offutt. Editorial: Who Is An Author?
77 -- 114Zhihong Xu, Yunho Kim, Moonzoo Kim, Myra B. Cohen, Gregg Rothermel. Directed test suite augmentation: an empirical investigation
115 -- 137Joan Farjo, Rawad Abou Assi, Wes Masri. Reducing execution profiles: techniques and benefits
138 -- 163Sergio Segura, Amador Durán, Ana B. Sánchez, Daniel Le Berre, Emmanuel Lonca, Antonio Ruiz Cortés. Automated metamorphic testing of variability analysis tools

Volume 25, Issue 1

1 -- 3Jeff Offutt. Editorial: Plagiarism Is For Losers
4 -- 33Jan Friso Groote, Tim W. D. M. Kouters, Ammar Osaiweran. Specification guidelines to avoid the state space explosion problem
34 -- 71Achim D. Brucker, Lukas Brügger, Burkhart Wolff. Formal firewall conformance testing: an application of test and proof techniques