Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact., , and . Empirical Software Engineering, 10 (4): 405-435 (2005)Model-based requirements verification method: Conclusions from two controlled experiments., , , and . Inf. Softw. Technol., 56 (3): 321-334 (2014)Capturing Contextual Relationships of Buggy Classes for Detecting Quality-Related Bugs., and . ICSME, page 375-379. IEEE, (2023)Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization., and . ISSRE Workshops, page 245-251. IEEE Computer Society, (2018)Adaptive Regression Testing Strategy: An Empirical Study., and . ISSRE, page 130-139. IEEE Computer Society, (2011)An Effective Regression Testing Approach for PHP Web Applications., , and . ICST, page 221-230. IEEE Computer Society, (2012)Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis., , and . Empirical Software Engineering, 11 (1): 33-70 (2006)Improving the effectiveness of test suite through mining historical data., , and . MSR, page 142-151. ACM, (2014)Risk-based test case prioritization using a fuzzy expert system., , and . Inf. Softw. Technol., (2016)Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements., and . Requir. Eng., 24 (2): 161-180 (2019)