Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: Search-based multi-vulnerability testing of XML injections in web applications., , , and . Empir. Softw. Eng., 24 (6): 3730 (2019)Test smells 20 years later: detectability, validity, and reliability., , , , and . Empir. Softw. Eng., 27 (7): 170 (2022)Serverless Testing: Tool Vendors' and Experts' Points of View., and . IEEE Softw., 38 (1): 54-60 (2021)When, how, and why developers (do not) test in their IDEs., , , and . ESEC/SIGSOFT FSE, page 179-190. ACM, (2015)Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications., , , and . IEEE Trans. Software Eng., 45 (4): 335-362 (2019)An adaptive evolutionary algorithm based on non-euclidean geometry for many-objective optimization.. GECCO, page 595-603. ACM, (2019)Effective and efficient API misuse detection via exception propagation and search-based testing., , , , and . ISSTA, page 192-203. ACM, (2019)Log-based slicing for system-level test cases., , , , and . ISSTA, page 517-528. ACM, (2021)Configuring topic models for software engineering tasks in TraceLab., , , , , , and . TEFSE@ICSE, page 105-109. IEEE Computer Society, (2013)How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms., , , , , and . ICSE, page 522-531. IEEE Computer Society, (2013)