Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can fault-exposure-potential estimates improve the fault detection abilities of test suites?, , , , and . Softw. Test., Verif. Reliab., 12 (4): 197-218 (2002)An Experimental Determination of Sufficient Mutant Operators., , , , and . ACM Trans. Softw. Eng. Methodol., 5 (2): 99-118 (1996)TUMS: testing using mutant schemata., , and . ACM Southeast Regional Conference, page 174-181. ACM, (1997)Mutation-based software testing using program schemata.. ACM Southeast Regional Conference, page 285-291. ACM, (1992)Test Case Prioritization: An Empirical Study., , , and . ICSM, page 179-188. IEEE Computer Society, (1999)PeerSpace - An Online Collaborative Learning Environment for Computer Science Students., , , , and . ICALT, page 409-411. IEEE Computer Society, (2011)Integrating Research, Reuse, and Integration into Software Engineering Course., and . CSEE, volume 640 of Lecture Notes in Computer Science, page 88-98. Springer, (1992)Mutation Analysis Using Mutant Schemata., , and . ISSTA, page 139-148. ACM, (1993)Prioritizing Test Cases For Regression Testing., , , and . IEEE Trans. Software Eng., 27 (10): 929-948 (2001)A small and secure submission system for UNIX systems., , and . ACM Southeast Regional Conference (1), page 341-344. ACM, (2005)