Author of the publication

Using mutation analysis for a model-clone detector comparison framework.

, , , and . ICSE, page 1261-1264. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Analysis Models and Methods in Website Verification and Testing., , and . ICWE, volume 4607 of Lecture Notes in Computer Science, page 306-311. Springer, (2007)A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications., and . SANER, page 587-591. IEEE, (2020)Clone Detection in Matlab Stateflow Models., , and . ECEASST, (2014)A Mutation Framework for Evaluating Security Analysis tools in IoT Applications., , and . CoRR, (2021)Detection of feature interaction in dynamic scripting languages., , and . CASCON, page 130-137. ACM, (2019)Towards a Taxonomy for Simulink Model Mutations., , and . ICST Workshops, page 206-215. IEEE Computer Society, (2014)Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications., , and . ICST Workshops, page 287-294. IEEE Computer Society, (2009)Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models., , , , , and . ICSME, page 486-490. IEEE Computer Society, (2014)Models are code too: Near-miss clone detection for Simulink models., , , , and . ICSM, page 295-304. IEEE Computer Society, (2012)A verification framework for access control in dynamic web applications., , and . C3S2E, page 109-113. ACM, (2009)