Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Synthetic Perturbations and Statistical Screening to Assay Shared-Memory Programs., , , and . Inf. Process. Lett., 54 (3): 147-153 (1995)IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing., , , , and . Softw. Test. Verification Reliab., 18 (3): 125-148 (2008)MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts., , , , , , and . ICST, page 141-152. IEEE, (2023)A Method-Level Test Generation Framework for Debugging Big Data Applications., , , , and . IEEE BigData, page 221-230. IEEE, (2018)MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage., , , and . DSA, page 102-112. IEEE, (2018)An Analysis of Vulnerability Trends, 2008-2016., , and . QRS Companion, page 587-588. IEEE, (2017)Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report., , , and . ICST Workshops, page 153. IEEE Computer Society, (2014)Practical combinatorial (t-way) methods for detecting complex faults in regression testing., and . ICSM, page 599. IEEE Computer Society, (2011)SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph., , , , , and . BRAINS, page 1-8. IEEE, (2023)Combinatorial Methods in Security Testing., , , and . Computer, 49 (10): 80-83 (2016)