Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coverage and Its Discontents., , and . Onward!, page 255-268. ACM, (2014)Towards Characterizing Trust in Generative Artificial Intelligence among Students., , , , , , , and . ICER (2), page 3-4. ACM, (2023)Trust in Generative AI among Students: An exploratory study., , , , , , , and . SIGCSE (1), page 67-73. ACM, (2024)K-CONFIG: Using Failing Test Cases to Generate Test Cases in GCC Compilers., and . CoRR, (2019)Unlearning Trojans in Large Language Models: A Comparison Between Natural Language and Source Code., , , , and . CoRR, (2024)Help, help, i'm being suppressed! The significance of suppressors in software testing., , , , , and . ISSRE, page 390-399. IEEE Computer Society, (2013)On the limits of mutation reduction strategies., , , , and . ICSE, page 511-522. ACM, (2016)MuCheck: an extensible tool for mutation testing of haskell programs., , , and . ISSTA, page 429-432. ACM, (2014)Generating focused random tests using directed swarm testing., , , and . ISSTA, page 70-81. ACM, (2016)Removing Uninteresting Bytes in Software Fuzzing., and . ICST Workshops, page 301-305. IEEE, (2022)