Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-based requirements verification method: Conclusions from two controlled experiments., , , and . Inf. Softw. Technol., 56 (3): 321-334 (2014)Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact., , and . Empirical Software Engineering, 10 (4): 405-435 (2005)Adaptive Regression Testing Strategy: An Empirical Study., and . ISSRE, page 130-139. IEEE Computer Society, (2011)An Effective Regression Testing Approach for PHP Web Applications., , and . ICST, page 221-230. IEEE Computer Society, (2012)Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization., and . ISSRE Workshops, page 245-251. IEEE Computer Society, (2018)Capturing Contextual Relationships of Buggy Classes for Detecting Quality-Related Bugs., and . ICSME, page 375-379. IEEE, (2023)An efficient regression testing approach for PHP Web applications using test selection and reusable constraints., and . Softw. Qual. J., 27 (4): 1383-1417 (2019)Improving the effectiveness of test suite through mining historical data., , and . MSR, page 142-151. ACM, (2014)A systematic approach to transforming system requirements into model checking specifications., , and . ICSE Companion, page 165-174. ACM, (2014)Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements., and . Requir. Eng., 24 (2): 161-180 (2019)