Author of the publication

Validation of Reverse Engineered Web Application Models.

, , and . WEC (2), page 125-128. Enformatika, Çanakkale, Turkey, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Dimensional Concerns Mining for Web Applications via Concept-Analysis, , and . International Journal of Computer, Information, Systems and Control Engineering, 1 (4): 1077 - 1080 (2007)ReAjax: a reverse engineering tool for Ajax Web applications., , and . IET Softw., 6 (1): 33-49 (2012)Recent Advances in Web Testing., , and . Adv. Comput., (2014)Report of the 8th Workshop on Empirical RequirementsEngineering (EmpiRE 2023)., , and . ACM SIGSOFT Softw. Eng. Notes, 49 (1): 27-29 (January 2024)Cluster-based modularization of processes recovered from web applications., , and . J. Softw. Evol. Process., 25 (2): 113-138 (2013)MERMAID: dedicated web server to prepare and run coarse-grained membrane protein dynamics., , and . Nucleic Acids Res., 47 (Webserver-Issue): W456-W461 (2019)Ahab's legs in scenario-based requirements validation: An experiment to study communication mistakes., , , and . J. Syst. Softw., (2015)Automated oracles: an empirical study on cost and effectiveness., , and . ESEC/SIGSOFT FSE, page 136-146. ACM, (2013)A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems., and . PROFES (1), volume 14483 of Lecture Notes in Computer Science, page 468-477. Springer, (2023)Defect location in traditional vs. Web applications - an empirical investigation., , and . WSE, page 121-129. IEEE Computer Society, (2009)