Author of the publication

A study of relative redundancy in test-suite reduction while retaining or improving fault-localization effectiveness.

, , , , and . SAC, page 2229-2236. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring service-oriented system engineering challenges: a systematic literature review., and . Service Oriented Computing and Applications, 3 (3): 171-188 (2009)A Supervisory Control Strategy for Plug-In Hybrid Electric Vehicles Based on Energy Demand Prediction and Route Preview., , , , , and . IEEE Trans. Vehicular Technology, 64 (5): 1691-1700 (2015)Assessment on the Impact of Arable Land Protection Policies in a Rapidly Developing Region., , , , , and . ISPRS Int. J. Geo-Information, 5 (5): 69 (2016)Remotely Monitoring Ecosystem Water Use Efficiency of Grassland and Cropland in China's Arid and Semi-Arid Regions with MODIS Data., , , , , , , and . Remote Sensing, 9 (6): 616 (2017)Energy efficient driving strategy for trains in MRT systems., , and . ITSC, page 427-432. IEEE, (2012)Enriching Word Embeddings with Domain Knowledge for Readability Assessment., , , and . COLING, page 366-378. Association for Computational Linguistics, (2018)An Extended Graph-Based Label Propagation Method for Readability Assessment., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 485-496. Springer, (2015)FeSCH: A Feature Selection Method using Clusters of Hybrid-data for Cross-Project Defect Prediction., , , , and . COMPSAC (1), page 51-56. IEEE Computer Society, (2017)Variable Strength Interaction Testing with an Ant Colony System Approach., , , and . APSEC, page 160-167. IEEE Computer Society, (2009)DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy., , , , and . J. Comput. Sci. Technol., 34 (5): 1020-1038 (2019)