Author of the publication

How Verified is My Code? Falsification-Driven Verification (T).

, , , and . ASE, page 737-748. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How verified (or tested) is my code? Falsification-driven verification and testing., , , , and . Autom. Softw. Eng., 25 (4): 917-960 (2018)Understanding code smells in Android applications., , , , and . MOBILESoft, page 225-234. ACM, (2016)Participatory design with older adults: an analysis of creativity in the design of mobile healthcare applications., and . Creativity & Cognition, page 114-123. ACM, (2013)Finding Answers: A Case Study on Communicating Knowledge within a Software Development Team., and . Software Engineering Research and Practice, page 195-201. CSREA Press, (2009)Mutation Reduction Strategies Considered Harmful., , , , and . IEEE Trans. Reliab., 66 (3): 854-874 (2017)Gender Differences in Early Free and Open Source Software Joining Process., , and . OSS, volume 378 of IFIP Advances in Information and Communication Technology, page 78-93. Springer, (2012)On the limits of mutation reduction strategies., , , , and . ICSE, page 511-522. ACM, (2016)Supporting Learners in Online Courses Through Pair Programming and Live Coding., and . COMPSAC, page 738-747. IEEE Computer Society, (2016)Syntax-directed keyboard extension: Evolution and evaluation., , and . VL/HCC, page 285-289. IEEE Computer Society, (2017)Cutting and Pasting Up: "Documents" and Provenance in a Complex Work Environment., , , and . HICSS, page 1-10. IEEE Computer Society, (2010)