Остановите войну!
for scientists:
default search action
David Chenho Kung
Person information
- affiliation: University of Texas at Arlington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j29]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu Kacker, D. Richard Kuhn, Tao Xie, David Chenho Kung:
A Combinatorial Testing-Based Approach to Fault Localization. IEEE Trans. Software Eng. 46(6): 616-645 (2020) - 2016
- [j28]Mohsin Junaid, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models. Comput. Secur. 59: 92-117 (2016) - 2014
- [j27]Dazhi Zhang, Donggang Liu, Christoph Csallner, David Chenho Kung, Yu Lei:
A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87: 60-73 (2014) - 2012
- [j26]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. J. Syst. Softw. 85(1): 102-111 (2012) - 2007
- [j25]Yu Lei, Richard H. Carver, Raghu Kacker, David Chenho Kung:
A combinatorial testing strategy for concurrent programs. Softw. Test. Verification Reliab. 17(4): 207-225 (2007) - 2006
- [j24]Qizhi Ye, Yu Lei, David Chenho Kung:
A Blocking-based Approach to Protocol Validation. Comput. J. 49(5): 541-553 (2006) - [j23]Hong Zhu, David Chenho Kung:
Assuring quality of web-based applications. Inf. Softw. Technol. 48(12): 1135-1136 (2006) - [j22]Yu Qi, David Chenho Kung, W. Eric Wong:
An agent-based data-flow testing approach for Web applications. Inf. Softw. Technol. 48(12): 1159-1171 (2006) - 2004
- [j21]Ricardo Choren, Alessandro Garcia, Carlos José Pereira de Lucena, Martin L. Griss, David Chenho Kung, Naftaly H. Minsky, Alexander B. Romanovsky, Jaelson Brelaz de Castro, Rogério de Lemos, Danny Weyns:
Software engineering for large-scale multi-agent systems - SELMAS 2004: workshop report. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-10 (2004) - 2001
- [j20]Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-Tung Hsu:
An Object-based Data Flow Testing Approach for Web Applications. Int. J. Softw. Eng. Knowl. Eng. 11(2): 157-179 (2001) - 1998
- [j19]Pei Hsia, Chih-Tung Hsu, David Chenho Kung, Eric J. Byrne:
Incremental delivery reduces maintenance cost: a COCOMO-based study. J. Softw. Maintenance Res. Pract. 10(4): 225-247 (1998) - 1997
- [j18]Pei Hsia, David Chenho Kung, Chris Sell:
Software Requirements and acceptance Testing. Ann. Softw. Eng. 3: 291-317 (1997) - [j17]Pei Hsia, Xiaolin Li, David Chenho Kung, Chih-Tung Hsu, Liang Li, Yasufumi Toyoshima, Cris Chen:
A technique for the selective revalidation of OO software. J. Softw. Maintenance Res. Pract. 9(4): 217-233 (1997) - 1996
- [j16]Jyhjong Lin, David Chenho Kung, Pei Hsia:
Object-Oriented Specification and Formal Verification of Real-Time Systems. Ann. Softw. Eng. 2: 161-198 (1996) - [j15]David Chenho Kung, Jerry Gao, Pei Hsia, Yasufumi Toyoshima, Chris Chen:
Or Regression Testing of Object-Oriented Programs. J. Syst. Softw. 32(1): 21-40 (1996) - [j14]Jerry Gao, Chris Chen, Yasufumi Toyoshima, David Chenho Kung, Pei Hsia:
Identifying Polymorphism Change and Impact in Object-orientated Software Maintenance. J. Softw. Maintenance Res. Pract. 8(6): 357-387 (1996) - 1995
- [j13]David Chenho Kung, Jerry Gao, Pei Hsia, Yasufumi Toyoshima, Chris Chen, Young-Si Kim, Young-Kee Song:
Developing an Object-Oriented Software Testing and Maintenance Environment. Commun. ACM 38(10): 75-87 (1995) - [j12]Jyhjong Lin, David Chenho Kung, Pei Hsia:
An Object-Oriented Approach for Modeling and Analysis of Safety-Critical Real-time Systems. Informatica (Slovenia) 19(1) (1995) - [j11]David Chenho Kung, Jerry Gao, Pei Hsia, Jeremy Lin, Yasufumi Toyoshima:
Class Firewall, Test Order, and Regression Testing of Object-Oriented Programs. J. Object Oriented Program. 8(2): 51-65 (1995) - [j10]David Chenho Kung:
An executable visual formalism for object-oriented conceptual modeling. J. Syst. Softw. 31(1): 33-43 (1995) - 1994
- [j9]David Chenho Kung:
On decision tree verification and consolidation. Inf. Softw. Technol. 36(8): 485-494 (1994) - [j8]Pei Hsia, Jayarajan Samuel, Jerry Gao, David Chenho Kung, Yasufumi Toyoshima, Cris Chen:
Formal Approach to Scenario Analysis. IEEE Softw. 11(2): 33-41 (1994) - 1993
- [j7]David Chenho Kung:
The Behavior Network Model for conceptual information modeling. Inf. Syst. 18(1): 1-21 (1993) - [j6]Pei Hsia, Alan M. Davis, David Chenho Kung:
Status Report: Requirements Engineering. IEEE Softw. 10(6): 75-79 (1993) - 1991
- [j5]Chenho Kung:
Process interface modeling and consistency checking. J. Syst. Softw. 15(2): 185-191 (1991) - [j4]Chenho Kung:
Response to "deliberations on Kung's process interface modeling". J. Syst. Softw. 15(2): 199 (1991) - [j3]Yonglei Tao, Chenho Kung:
Formal definition and verification of data flow diagrams. J. Syst. Softw. 16(1): 29-36 (1991) - 1990
- [j2]David Chenho Kung:
Object Subclass Hierarchy in SQL: A Simple Approach. Commun. ACM 33(7): 117-127 (1990) - 1989
- [j1]David Chenho Kung:
Conceptual Modeling in the Context of Software Development. IEEE Trans. Software Eng. 15(10): 1176-1187 (1989)
Conference and Workshop Papers
- 2018
- [c55]Mohsin Junaid, Jiang Ming, David Chenho Kung:
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. ACSAC 2018: 198-209 - 2015
- [c54]Jing Xu, Yu Lei, Richard H. Carver, David Chenho Kung:
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops. ICST 2015: 1-10 - 2013
- [c53]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, David Chenho Kung, Raghu Kacker, D. Richard Kuhn:
Fault localization based on failure-inducing combinations. ISSRE 2013: 168-177 - [c52]Jing Xu, Yu Lei, Richard H. Carver, David Chenho Kung:
A Dynamic Approach to Isolating Erroneous Event Patterns in Concurrent Program Executions. MUSEPAT 2013: 97-109 - [c51]David Chenho Kung:
On Use Case Identification. SEKE 2013: 759-764 - 2011
- [c50]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278 - [c49]Jerry Gao, Jing Guan, Alex Ma, Chuanqi Tao, Xiaoying Bai, David Chenho Kung:
Testing Configurable Component-Based Software - Configuration Test Modeling and Complexity Analysis. SEKE 2011: 495-502 - 2010
- [c48]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. DSN 2010: 241-250 - 2008
- [c47]Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Chenho Kung:
Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324 - 2006
- [c46]Kuangnan Chang, David Chenho Kung:
Model Checking with Induction. COMPSAC (1) 2006: 143-149 - [c45]Yu Lei, Richard H. Carver, David Chenho Kung, Vidur Gupta, Monica Hernandez:
A State Exploration-Based Approach to Testing Java Monitors. ISSRE 2006: 256-265 - 2005
- [c44]Yu Qi, David Chenho Kung, W. Eric Wong:
An Agent-Based Testing Approach for Web Applications. COMPSAC (2) 2005: 45-50 - [c43]Yu Lei, David Chenho Kung, Qizhi Ye:
A Blocking-Based Approach to Protocol Validation. COMPSAC (1) 2005: 301-306 - 2004
- [c42]David Chenho Kung:
Agent-Based Framework for Testing Web Applications. COMPSAC Workshops 2004: 174-177 - [c41]Ricardo Choren, Alessandro F. Garcia, Carlos José Pereira de Lucena, Martin L. Griss, David Chenho Kung, Naftaly H. Minsky, Alexander B. Romanovsky:
Software Engineering for Large-Scale Multi-agent Systems - SELMAS'04. ICSE 2004: 752-753 - 2003
- [c40]David Chenho Kung, Hitesh Bhambhani, Sheila Nwokoro, Wesam Okasha, Ravindra Kambalakatta, Praveen Sankuratri:
Lessons Learned from Software Engineering Multi-Agent Systems. COMPSAC 2003: 50-55 - 2000
- [c39]Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-Tung Hsu:
Object-Based Data Flow Testing of Web Applications. APAQS 2000: 7-16 - [c38]David Chenho Kung, Chien-Hung Liu, Pei Hsia:
An Object-Oriented Web Test Model for Testing Web Applications . APAQS 2000: 111-120 - [c37]David Chenho Kung, Chien-Hung Liu, Pei Hsia:
An Object-Oriented Web Test Model for Testing Web Applications. COMPSAC 2000: 537-542 - [c36]Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-Tung Hsu:
Structural Testing of Web Applications. ISSRE 2000: 84-96 - 1999
- [c35]Hwan Wook Sohn, David Chenho Kung, Pei Hsia:
CORBA Components Testing with Perception-Based State Behavior. COMPSAC 1999: 116-121 - [c34]Pei Hsia, Chih-Tung Hsu, David Chenho Kung:
Brooks' Law Revisited: A System Dynamics Approach. COMPSAC 1999: 370-375 - [c33]Kuangnan Chang, David Chenho Kung, Pei Hsia:
OBL: A Formal Deduction Method for Object-Oriented Systems. COMPSAC 1999: 450-455 - [c32]Brian Keith Miller, Pei Hsia, David Chenho Kung:
Object-Oriented Architecture Measures. HICSS 1999 - [c31]Hwan Wook Sohn, David Chenho Kung, Pei Hsia:
State-Based Reproducible Testing for CORBA Applications. PDSE 1999: 24- - 1998
- [c30]David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao:
Object-Oriented Software Testing: Some Research and Development. HASE 1998: 158-165 - 1997
- [c29]Pei Hsia, Xiaolin Li, David Chenho Kung:
Augmenting data flow criteria for class testing. CASCON 1997: 9 - [c28]Pei Hsia, David Chenho Kung:
An Object-Oriented Testing and Maintenance Environment. ICSE 1997: 608-609 - [c27]David Chenho Kung, John Lin, Pei Hsia, Bill Carroll:
Object-oriented real time systems modeling and verification. WORDS 1997: 224-231 - 1996
- [c26]Pei Hsia, Xiaolin Li, David Chenho Kung:
Class testing and code-based criteria. CASCON 1996: 14 - [c25]Pei Hsia, Xiaolin Li, David Chenho Kung:
A History-Based Approach for Early Faulty State Detection. COMPSAC 1996: 321-326 - [c24]David Chenho Kung, Scott R. Oksanen, Jyhjong Lin:
An Object-Oriented Real Time Systems Modeling and Verification Methodology. COMPSAC 1996: 490-495 - [c23]Jyhjong Lin, David Chenho Kung, Pei Hsia:
Top-down development of real-time software specification. HASE 1996: 271-278 - [c22]Pei Hsia, Chih-Tung Hsu, David Chenho Kung, Lawrence B. Holder:
User-Centered System Decomposition: Z-Based Requirements Clustering. ICRE 1996: 126-135 - [c21]David Chenho Kung, Y. Lu, N. Venugopalan, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao:
Object state testing and fault analysis for reliable software systems. ISSRE 1996: 76-85 - [c20]Pei Hsia, Chih-Tung Hsu, David Chenho Kung, Michelle M. Hepner, J. W. Wang:
An Object-Oriented Approach to Incremental Delivery of Software Systems. OOIS 1996: 431-446 - [c19]Pei Hsia, Xiaolin Li, David Chenho Kung:
An Early Warning Approach for Method Sequence Testing. SEKE 1996: 330-337 - 1995
- [c18]Jerry Zeyu Gao, David Chenho Kung, Pei Hsia:
An object state test model: object state diagram. CASCON 1995: 23 - [c17]Jyhjong Lin, David Chenho Kung, Pei Hsia:
Towards a real-time object-oriented modeling approach. CASCON 1995: 42 - [c16]Jerry Z. Gao, David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen:
Object state testing for object-oriented programs. COMPSAC 1995: 232-238 - [c15]David Chenho Kung, Jerry Gao, Pei Hsia, Yasufumi Toyoshima, Cris Chen:
A Test Strategy for Object-Oriented Programs. COMPSAC 1995: 239-244 - [c14]Pei Hsia, Chih-Tung Hsu, David Chenho Kung, Alan T. Yaung:
The Impact of Incremental Delivery on Maintenance Effort: An Analytical Study. ESEC 1995: 405-422 - [c13]Pei Hsia, A. Gupta, David Chenho Kung, J. Peng, S. Liu:
A study on the effect of architecture on maintainability of object-oriented systems. ICSM 1995: 4-11 - 1994
- [c12]David Chenho Kung, Jerry Gao, Pei Hsia:
An object oriented testing and maintenance environment. CASCON 1994: 37 - [c11]Jyhjong Lin, David Chenho Kung, Pei Hsia:
Toward an object-oriented modeling approach with representation of temporal knowledge. COMPSAC 1994: 58-63 - [c10]David Chenho Kung, N. Suchak, Jerry Zeyu Gao, Pei Hsia, Yasufumi Toyoshima, Chris Chen:
On object state testing. COMPSAC 1994: 222-227 - [c9]Pei Hsia, Jerry Zeyu Gao, Jayarajan Samuel, David Chenho Kung, Yasufumi Toyoshima, Chris Chen:
Behavior-based acceptance testing of software systems: a formal scenario approach. COMPSAC 1994: 293-298 - [c8]Pei Hsia, Richard H. S. Wang, David Chenho Kung:
Guided Reuse for Programmers. CSEE 1994: 499-516 - [c7]David Chenho Kung, Jerry Gao, Pei Hsia, F. Wen, Yasufumi Toyoshima, Cris Chen:
Change Impact Identification in Object Oriented Software Maintenance. ICSM 1994: 202-211 - [c6]David Chenho Kung, Jyhjong Lin, Pei Hsia:
An Object-Oriented Conceptal Model for Information Systems. IFIP Congress (1) 1994: 259-264 - 1993
- [c5]David Chenho Kung, Jerry Gao, Pei Hsia, Jeremy Lin, Yasufumi Toyoshima:
Design Recovery for Software Testing of Object-Oriented Programs. WCRE 1993: 202-211 - 1991
- [c4]Ching-Ming Chao, David Chenho Kung:
Rapid Prototyping of Conceptual Database Design on a Relational Database Management System. ER 1991: 93-109 - 1985
- [c3]Arne Sølvberg, David Chenho Kung:
On Structural and Behavioral Modeling of Reality. DS-1 1985: 205-221 - [c2]David Chenho Kung:
On Verification of Database Temporal Constraints. SIGMOD Conference 1985: 169-179 - 1984
- [c1]David Chenho Kung:
A Temporal Framework for Database Specification and Verification. VLDB 1984: 91-99
Parts in Books or Collections
- 2008
- [p1]David Chenho Kung, Hong Zhu:
Software Verification and Validation. Wiley Encyclopedia of Computer Science and Engineering 2008
Editorship
- 1990
- [e1]Robert Meersman, Zhongzhi Shi, Chenho Kung:
Proceedings of the IFIP TC2/TC8/WG 2.6/WG 8.1 Working Conference on the Role of Artificial Intelligence in Databases and Information Systems, Guangzhou, PR China, 4-8 July, 1988. North-Holland 1990, ISBN 0-444-88645-1 [contents]
Informal and Other Publications
- 2015
- [i1]Mohsin Junaid, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models. CoRR abs/1506.05217 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint