Swarnendu Biswas and Rajib Mall
 H. Leung and L. White, Insights into regression testing, Pro-ceedings of the Conference on Software Maintenance, Miami,FL, 1989, 60–69.
 H. Do, S. Mirarab, L. Tahvildari, and G. Rothermel, Theeﬀects of time constraints on test case prioritization: A seriesof controlled experiments, IEEE Transactions on SoftwareEngineering, 36(5), 2010, 593–617.
 U. Farooq and C. Lam, A max-min multiobjective techniqueto optimize model based test suite, SNPD ’09: Proceedingsof the 2009 10th ACIS International Conference on SoftwareEngineering, Artiﬁcial Intelligences, Networking and Paral-lel/Distributed Computing, 2009, 569–574.
 K. Walcott, M. Soﬀa, G. Kapfhammer, and R. Roos, Timeaware test suite prioritization, Proceedings of the 2006 Interna-tional Symposium on Software Testing and Analysis, Portland,Maine, USA, 2006, 1–12.
 X. Zhang, H. Shan, and J. Qian, Resource-aware test suiteoptimization, QSIC ’09: Proceedings of the 2009 Ninth Inter-national Conference on Quality Software, Jeju, Korea, 2009,341–346.
 C. Poole and J. Huisman, Using extreme programming in amaintenance environment, IEEE Software, 18(6), 2001, 42–50.
 A. Sangiovanni-Vincentelli and M.D. Natale, Embedded systemdesign for automotive applications, Computer, 40(10), 2007,42–51.
 D. Sundmark, A. Pettersson, and H. Thane, Regression testingof multi-tasking real-time systems: A problem statement, ACMSIGBED Review, 2(2), 2005, 31–34.
 S. Biswas, R. Mall, and M. Satpathy, Task dependency analysisfor regression test selection of embedded programs, IEEEEmbedded Systems Letters, 3(4), 2011, 117–120.
 A. Orso, N. Shi, and M. Harrold, Scaling regression testing tolarge software systems, Proceedings of the 12th ACM SIGSOFTTwelfth International Symposium on Foundations of SoftwareEngineering, Newport Beach, CA, USA, November 2004, 241–251.
 G. Rothermel and M. Harrold, A safe, eﬃcient regression testselection technique, ACM Transactions on Software Engineer-ing and Methodology, 6(2), 1997, 173–210.
 G. Rothermel and M. Harrold, Analyzing regression test selec-tion techniques, IEEE Transactions on Software Engineering,22(8), 1996, 529–551.9
 S. Biswas, R. Mall, M. Satpathy, and S. Sukumaran, Amodel-based regression test selection approach for embeddedapplications, ACM SIGSOFT Software Engineering Notes,34(4), 2009, 1–9.
 Z. Xu, K. Gao, and T. Khoshgoftaar, Application of fuzzyexpert system in test case selection for system regression test,2005 IEEE International Conference on Information Reuseand Integration, August 2005, 120–125.
 D. Goldberg, Genetic algorithms in search, optimization andmachine learning (Boston, MA, USA: Addison-Wesley Long-man, 2000).
 E. Cartaxo, P. Machado, and F. Neto, On the use of a similarityfunction for test case selection in the context of model-basedtesting, Software Testing, Veriﬁcation and Reliability, 21(2),2011, 75–100.
 I. 61508, Functional safety of electrical/electronic/programmable electronic safety-related systems – Part 1:General requirements, April 2010.
 P. Ward and S. Mellor, Structured development for real-timesystems (Prentice Hall Professional Technical Reference, 1991).
 S. Horwitz, T. Reps, and D. Binkley, Interprocedural slicingusing dependence graphs, ACM Transactions on ProgrammingLanguages and Systems, 12(1), 1990, 26–61.
 S. Biswas, Model-based regression test selection and optimiza-tion for embedded programs, Master’s Thesis, Indian Instituteof Technology, Kharagpur, India, June 2011.
 A. Konak, D. Coit, and A. Smith, Multi-objective optimizationusing genetic algorithms: A tutorial, Reliability Engineering &System Safety, 91(9), 2006, 992–1007.
 C. Fonseca and P. Fleming, Genetic algorithms for multiob-jective optimization: Formulation, discussion and generaliza-tion, Genetic Algorithms: Proceedings of the 5th InternationalConference, (San Mateo, CA: Morgan Kaufmann, July 1993),416–423.
 K. Hla, Y. Choi, and J. Park, Applying particle swarm op-timization to prioritizing test cases for embedded real timesoftware retesting, Proceedings of the 2008 IEEE 8th Interna-tional Conference on Computer and Information TechnologyWorkshops, 2008, 527–532.