Author of the publication

Efficient Test Suite Reduction by Merging Pairs of Suitable Test Cases

, and . Proceedings of the 7th International Workshop on Model-Driven Engineering, Verification and Validation (MoDeVVa 2010), volume 6627 of IEEE Computer Society Press, page 244–258. IEEE Computer Society Press, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Domain Evaluation of a Deep Learning-Based Type Inference System., , , and . CoRR, (2022)Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps., , , , , and . IPAW, volume 12839 of Lecture Notes in Computer Science, page 88-105. Springer, (2021)U sing Clone Detection for Finding Signatures of Malware Families: A Case Study on FinSpy., , , and . ACSOS-C, page 269-274. IEEE, (2021)Certified Information Flow Analysis of Service Implementations., and . SOCA, page 177-184. IEEE Computer Society, (2018)Deep security analysis of program code., , and . Empir. Softw. Eng., 27 (1): 2 (2022)Eine Methode zur kontrollierten Kontrollflussentfaltung und ihre Anwendung zur Präzisierung petrinetzbasierter Verifikationsmodelle.. Friedrich Schiller University of Jena, (2013)Towards Certified Data Flow Analysis of Business Processes.. ZEUS, volume 1826 of CEUR Workshop Proceedings, page 1-3. CEUR-WS.org, (2017)PANIC - Plugging Data Leak Detection into the Camunda Modeler (short paper)., and . ZEUS, volume 2339 of CEUR Workshop Proceedings, page 32-34. CEUR-WS.org, (2019)Finding Source Code Clones in Intermediate Representations of Java Bytecode., , and . IWSC, page 37-43. IEEE, (2023)StoneDetector: Structural and Sub-Clone Detection., , and . IWSC, page 33-36. IEEE, (2023)