Author of the publication

Automated Conformance Testing of Java Virtual Machines.

, and . CISIS, page 547-552. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

T-wise combinatorial interaction test suites construction based on coverage inheritance., and . Softw. Test. Verification Reliab., 22 (7): 507-526 (2012)Merging Ontologies and Data from Electronic Health Records., , , and . Future Internet, 16 (2): 62 (February 2024)A Framework for Incremental Covering Arrays Construction., and . CSOC (2), volume 349 of Advances in Intelligent Systems and Computing, page 283-294. Springer, (2015)Combinatorial Validation Testing of Java Card Byte Code Verifiers., and . WETICE, page 347-352. IEEE Computer Society, (2013)Random versus combinatorial effectiveness in software conformance testing: a case study., , and . SAC, page 1797-1802. ACM, (2015)Virtual Home Environment for Multimedia Services in 3rd Generation Networks., , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1221-1226. Springer, (2002)VSC 2015 Track Report: Validating Software for Critical Systems., and . WETICE, page 197. IEEE Computer Society, (2015)Mobility and quality of service across heterogeneous wireless networks., , and . Comput. Networks, 47 (2): 203-217 (2005)A Formal Logic Approach to Constrained Combinatorial Testing., and . J. Autom. Reason., 45 (4): 331-358 (2010)Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions., and . COMPSAC Workshops, page 493-498. IEEE Computer Society, (2013)