Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical evaluation of test case filtering techniques based on exercising complex information flows., , and . ICSE, page 412-421. ACM, (2005)Tree-Based Methods for Classifying Software Failures., , , and . ISSRE, page 451-462. IEEE Computer Society, (2004)A Comparison of Coverage-Based and Distribution-Based Techniques for Filtering and Prioritizing Test Cases., and . ISSRE, page 442-456. IEEE Computer Society, (2003)Detecting and Debugging Insecure Information Flows., , and . ISSRE, page 198-209. IEEE Computer Society, (2004)Visualizing Similarity between Program Executions., , and . ISSRE, page 311-321. IEEE Computer Society, (2005)Automated Support for Classifying Software Failure Reports., , , , , , and . ICSE, page 465-477. IEEE Computer Society, (2003)Dex: A Semantic-Graph Differencing Tool for Studying Changes in Large Code Bases., , , , and . ICSM, page 188-197. IEEE Computer Society, (2004)Multivariate visualization in observation-based testing., , and . ICSE, page 116-125. ACM, (2000)Evolution of 3GPP streaming for improving QoS over mobile networks., and . ICIP (3), page 692-695. IEEE, (2005)Pursuing failure: the distribution of program failures in a profile space., , and . ESEC / SIGSOFT FSE, page 246-255. ACM, (2001)