Author of the publication

SBFR: A search based approach for reproducing failures of programs with grammar based input.

, , , , and . ASE, page 604-609. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation., and . SANER, page 182-192. IEEE Computer Society, (2017)Formal Design and Validation of an Automatic Train Operation Control System., , , , , , , , , and 2 other author(s). RSSRail, volume 13294 of Lecture Notes in Computer Science, page 169-178. Springer, (2022)Assessment of Source Code Obfuscation Techniques., , , , , , and . SCAM, page 11-20. IEEE Computer Society, (2016)Combining Stochastic Grammars and Genetic Programming for Coverage Testing at the System Level., , and . SSBSE, volume 8636 of Lecture Notes in Computer Science, page 138-152. Springer, (2014)SBFR: A search based approach for reproducing failures of programs with grammar based input., , , , and . ASE, page 604-609. IEEE, (2013)A Multi-objective Approach to Business Process Repair., , , and . ICSOC, volume 8831 of Lecture Notes in Computer Science, page 32-46. Springer, (2014)N-Gram Based Test Sequence Generation from Finite State Models., , and . FITTEST@ICTSS, volume 8432 of Lecture Notes in Computer Science, page 59-74. Springer, (2013)Interpolated n-grams for model based testing., , and . ICSE, page 562-572. ACM, (2014)A trust-enhanced recommender system application: Moleskiing., , and . SAC, page 1589-1593. ACM, (2005)Accounting and Billing of Wireless Internet Services in the Third Generation Networks., , , and . ER (Workshops), volume 2784 of Lecture Notes in Computer Science, page 229-240. Springer, (2002)