Author of the publication

The Advantages of Post-Link Code Coverage.

, , , , , , , , and . Haifa Verification Conference, volume 4899 of Lecture Notes in Computer Science, page 235-251. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unveiling Safety Vulnerabilities of Large Language Models., , , , , , , and . CoRR, (2023)Detection of data drift and outliers affecting machine learning model performance over time., , , , and . CoRR, (2020)An Approach to Preserving Sufficient Correctness in Open Resource Coalitions., and . IWSSD, page 159-170. IEEE Computer Society, (2000)Automated substring hole analysis., , , , , , , and . ICSE Companion, page 203-206. IEEE, (2009)Automated Assistance for Eliciting User Expectations., , , , and . SEKE, page 80-85. (2004)Testing of data-centric and event-based dynamic service compositions., , , , and . Softw. Test. Verification Reliab., 23 (6): 465-497 (2013)Governance and Regulations Implications on Machine Learning (Brief Announcement)., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 208-211. Springer, (2019)Test Coverage of Data-Centric Dynamic Compositions in Service-Based Systems., , , , and . ICST, page 40-49. IEEE Computer Society, (2011)Research abstract for semantic detection in dynamic data feeds with incomplete specifications.. ICSE, page 733-734. ACM, (2002)Enabling automatic adaptation in systems with under-specified elements., , and . WOSS, page 55-60. ACM, (2002)