default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,993 matches
- 2024
- Tanwir Ahmad, Dragos Truscan:
Early Detection with Explainability of Network Attacks Using Deep Learning. ICSTW 2024: 161-167 - Aritra Ahmed, Ramiro Liscano, Akramul Azim, Yee-Kang Chang, Vijay Sundaresan:
Java lock contention anti-patterns and their associated recommendations. ICSTW 2024: 144-151 - Abdulrahman Alshammari, Paul Ammann, Michael Hilton, Jonathan Bell:
230,439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers. ICST 2024: 257-268 - Abdulrahman Alshammari, Paul Ammann, Michael Hilton, Jonathan Bell:
A Study of Flaky Failure De-Duplication to Identify Unreliably Killed Mutants. ICSTW 2024: 257-262 - C. M. Hicks Andrew, Deborah Ann Furman, Ryan Thomas Rawlins, Michael Edward Gildein, Eitan Farchi:
A Novel Double T-wise Approach to Root Cause Analysis via Combinatorial Test Set Completion. ICSTW 2024: 193-196 - Saba Gholizadeh Ansari, I. S. W. B. Prasetya, Mehdi Dastani, Frank Dignum, Gabriele Keller:
EmoSTL: Formal Spatial-Temporal Verification of Emotion Specifications in Computer Games. ICST 2024: 13-24 - Iván Arcuschin, Lisandro Di Meo, Michael Auer, Juan P. Galeotti, Gordon Fraser:
Brewing Up Reliability: Espresso Test Generation for Android Apps. ICST 2024: 185-196 - Sushmita Azad, Avi Kondareddy:
The Future of Google Testing. ICSTW 2024: 103-104 - Robert Balink, Marc-Florian Wendland, Yuriy Yevstihnyeyev:
Selecting "good" regression tests based on a classification of side-effects. ICSTW 2024: 309-317 - Andrea Bogle, Tan Tran, Rafael Ceja, Joshua Sasaki, Riyadh Mahmood:
Automated Hybrid Fuzzing of Web APIs. ICSTW 2024: 283-292 - Andrea Bombarda, Silvia Bonfanti, Angelo Gargantini:
Testing the Evolution of Feature Models with Specific Combinatorial Tests. ICSTW 2024: 1-10 - Andrea Bombarda, Angelo Gargantini:
Integrating Product Sampling and Behavioral Testing for Software Product Lines with Combinatorial Testing. ICSTW 2024: 197-206 - Felix Cammaerts:
Teaching Model-Driven Engineering from a Model-Testing Perspective. ICST 2024: 454-456 - Jian Chen, Manar H. Alalfi, Thomas R. Dean:
Timed Model-Based Mutation Operators for Simulink Models. ICSTW 2024: 263-272 - Ben Coleman, Nathan Sommer:
Fostering a Testing Mindset through Automated Feedback on Multiple Submissions Using Git-keeper. ICSTW 2024: 349-353 - Joana Coutinho, Alexandre Lemos, Miguel Terra-Neves, André Ribeiro, Vasco Manquinho, Rui Quintino, Bartlomiej Matejczyk:
BugOut: Automated Test Generation and Bug Detection for Low-Code. ICST 2024: 373-382 - Suddhasvatta Das:
Agile Regression Testing. ICST 2024: 457-459 - Alastair F. Donaldson, Dilan Sheth, Jean-Baptiste Tristan, Alex Usher:
Randomised Testing of the Compiler for a Verification-Aware Programming Language. ICST 2024: 407-418 - Andréa Doreste, Matteo Biagiola, Paolo Tonella:
Adversarial Testing with Reinforcement Learning: A Case Study on Autonomous Driving. ICST 2024: 293-304 - Asma Fariha, Akramul Azim, Ramiro Liscano:
Replay-Based Continual Learning for Test Case Prioritization. ICSTW 2024: 106-107 - Michael Foster, Christopher Wild, Robert M. Hierons, Neil Walkinshaw:
Causal Test Adequacy. ICST 2024: 161-172 - Han Fu, Sigrid Eldh, Kristian Wiklund, Andreas Ermedahl, Philipp Haller, Cyrille Artho:
In Industrial Embedded Software, are Some Compilation Errors Easier to Localize and Fix than Others? ICST 2024: 383-394 - Aayush Garg, Renzo Degiovanni, Mike Papadakis, Yves Le Traon:
On the Coupling between Vulnerabilities and LLM-Generated Mutants: A Study on Vul4J Dataset. ICST 2024: 305-316 - Vahid Garousi, Alper Bugra Keles:
A pragmatic look at education and training of software test engineers: Further cooperation of academia and industry is needed. ICSTW 2024: 354-360 - Vahid Garousi, Alper Bugra Keles, Yunus Balaman, Alper Mermer, Zeynep Özdemir Güler:
Coverage measurement in model-based testing of web applications: Tool support and an industrial experience report. ICSTW 2024: 37-43 - Gregory Gay, Shiva Nejati:
Message from the Program Co-Chairs; ICST 2024. ICST 2024: xv - Sangharatna Godboley, P. Radha Krishna:
Poster: VeriSol-MCE: Verification-Based Condition Coverage Analysis of Smart Contracts Using Model Checker Engines. ICST 2024: 434-437 - Ruben Grewal, Paolo Tonella, Andrea Stocco:
Predicting Safety Misbehaviours in Autonomous Driving Systems Using Uncertainty Quantification. ICST 2024: 70-81 - Jon D. Hagar, Satoshi Masuda:
Prompt Engineering Impacts to Software Test Architectures for Beginner to Experts. ICSTW 2024: 116-121 - Susmita Haldar, Mary Pierce, Luiz Fernando Capretz:
Factors Influencing the Performance of Students in Software Automated Test Tools Course. ICSTW 2024: 331-339
skipping 1,963 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-15 22:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint