Author of the publication

Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification.

, , , , , and . ICST, page 620-623. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of Vulnerability Trends, 2008-2016., , and . QRS Companion, page 587-588. IEEE, (2017)Using Synthetic Perturbations and Statistical Screening to Assay Shared-Memory Programs., , , and . Inf. Process. Lett., 54 (3): 147-153 (1995)IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing., , , , and . Softw. Test. Verification Reliab., 18 (3): 125-148 (2008)MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts., , , , , , and . ICST, page 141-152. IEEE, (2023)MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage., , , and . DSA, page 102-112. IEEE, (2018)Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report., , , and . ICST Workshops, page 153. IEEE Computer Society, (2014)Practical combinatorial (t-way) methods for detecting complex faults in regression testing., and . ICSM, page 599. IEEE Computer Society, (2011)A Method-Level Test Generation Framework for Debugging Big Data Applications., , , , and . IEEE BigData, page 221-230. IEEE, (2018)SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph., , , , , and . BRAINS, page 1-8. IEEE, (2023)Combinatorial Methods in Security Testing., , , and . Computer, 49 (10): 80-83 (2016)