default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2008
- Shay Artzi, Adam Kiezun, Julian Dolby, Frank Tip, Danny Dig, Amit M. Paradkar, Michael D. Ernst:
Finding bugs in dynamic web applications. ISSTA 2008: 261-272 - George K. Baah, Andy Podgurski, Mary Jean Harrold:
The probabilistic program dependence graph and its application to fault diagnosis. ISSTA 2008: 189-200 - Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - Nels E. Beckman, Aditya V. Nori, Sriram K. Rajamani, Robert J. Simmons:
Proofs from tests. ISSTA 2008: 3-14 - Eric Bodden, Klaus Havelund:
Racer: effective race detection using aspectj. ISSTA 2008: 155-166 - Tevfik Bultan, Tao Xie:
Workshop on testing, analysis and verification of web software (TAV-WEB 2008). ISSTA 2008: 311-312 - Raymond P. L. Buse, Westley Weimer:
A metric for software readability. ISSTA 2008: 121-130 - Raymond P. L. Buse, Westley Weimer:
Automatic documentation inference for exceptions. ISSTA 2008: 273-282 - Premkumar T. Devanbu, Brendan Murphy, Nachiappan Nagappan, Thomas Zimmermann, Valentin Dallmeier:
DEFECTS 2008: international workshop on defects in large software systems. ISSTA 2008: 307-308 - Hyunsook Do, Gregg Rothermel:
Using sensitivity analysis to create simplified economic models for regression testing. ISSTA 2008: 51-62 - Nurit Dor, Tal Lev-Ami, Shay Litvak, Mooly Sagiv, Dror Weiss:
Customization change impact analysis for erp professionals via program slicing. ISSTA 2008: 97-108 - Alex Edwards, Sean Tucker, Sébastien Worms, Rahul Vaidya, Brian Demsky:
AFID: an automated fault identification tool. ISSTA 2008: 179-188 - Bassem Elkarablieh, Darko Marinov, Sarfraz Khurshid:
Efficient solving of structural constraints. ISSTA 2008: 39-50 - Dennis Jeffrey, Neelam Gupta, Rajiv Gupta:
Fault localization using value replacement. ISSTA 2008: 167-178 - Yamini Kannan, Koushik Sen:
Universal symbolic execution and its application to likely data structure invariant generation. ISSTA 2008: 283-294 - Goh Kondoh, Tamiya Onodera:
Finding bugs in java native interface programs. ISSTA 2008: 109-118 - James R. Larus:
The real value of testing. ISSTA 2008: 1-2 - Ben Liblit:
Cooperative debugging with five hundred million test cases. ISSTA 2008: 119-120 - Ben Liblit, Atanas Rountev:
WODA 2008: the sixth international workshop on dynamic analysis. ISSTA 2008: 313-314 - Rüdiger Lincke, Jonas Lundberg, Welf Löwe:
Comparing software metrics tools. ISSTA 2008: 131-142 - Alexey Loginov, Eran Yahav, Satish Chandra, Stephen Fink, Noam Rinetzky, Mangala Gowri Nanda:
Verifying dereference safety via expanding-scope analysis. ISSTA 2008: 213-224 - Darko Marinov, Wolfram Schulte:
Workshop on state-space exploration for automated testing (SSEAT 2008). ISSTA 2008: 315-316 - Carlos Pacheco, Shuvendu K. Lahiri, Thomas Ball:
Finding errors in .net with feedback-directed random testing. ISSTA 2008: 87-96 - Matthew M. Papi, Mahmood Ali, Telmo Luis Correa Jr., Jeff H. Perkins, Michael D. Ernst:
Practical pluggable types for java. ISSTA 2008: 201-212 - Corina S. Pasareanu, Peter C. Mehlitz, David H. Bushnell, Karen Gundy-Burlet, Michael R. Lowry, Suzette Person, Mark Pape:
Combining unit-level symbolic execution and system-level concrete execution for testing NASA software. ISSTA 2008: 15-26 - Xiao Qu, Myra B. Cohen, Gregg Rothermel:
Configuration-aware regression testing: an empirical study of sampling and prioritization. ISSTA 2008: 75-86 - Sriram Sankaranarayanan, Swarat Chaudhuri, Franjo Ivancic, Aarti Gupta:
Dynamic inference of likely data preconditions over predicates by tree learning. ISSTA 2008: 295-306 - Chen Tian, Vijay Nagarajan, Rajiv Gupta, Sriraman Tallam:
Dynamic recognition of synchronization operations for improved data race detection. ISSTA 2008: 143-154 - Shmuel Ur, Scott D. Stoller, Eitan Farchi:
6th workshop on parallel and distributed systems: testing and debugging (PADTAD '08). ISSTA 2008: 309-310 - Gary Wassermann, Dachuan Yu, Ajay Chander, Dinakar Dhurjati, Hiroshi Inamura, Zhendong Su:
Dynamic test input generation for web applications. ISSTA 2008: 249-260
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 09:16 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint