Author of the publication

Help, help, i'm being suppressed! The significance of suppressors in software testing.

, , , , , and . ISSRE, page 390-399. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mutation Reduction Strategies Considered Harmful., , , , and . IEEE Trans. Reliab., 66 (3): 854-874 (2017)Passages.. ACM SIGSOFT Softw. Eng. Notes, 39 (6): 6-7 (2014)Passages.. ACM SIGSOFT Softw. Eng. Notes, 43 (2): 6-7 (2018)Mutation Analysis: Answering the Fuzzing Challenge., , and . CoRR, (2022)How verified (or tested) is my code? Falsification-driven verification and testing., , , , and . Autom. Softw. Eng., 25 (4): 917-960 (2018)MuCheck: an extensible tool for mutation testing of haskell programs., , , and . ISSTA, page 429-432. ACM, (2014)Generating focused random tests using directed swarm testing., , , and . ISSTA, page 70-81. ACM, (2016)(Quickly) testing the tester via path coverage.. WODA, page 22-28. (2009)Counterexample Guided Abstraction Refinement Via Program Execution., , and . ICFEM, volume 3308 of Lecture Notes in Computer Science, page 224-238. Springer, (2004)Heuristic Model Checking for Java Programs., and . SPIN, volume 2318 of Lecture Notes in Computer Science, page 242-245. Springer, (2002)