Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 75 matches
- 2017
- Iftekhar Ahmed, Carlos Jensen, Alex Groce, Paul E. McKenney:
Applying Mutation Analysis on Kernel Test Suites: An Experience Report. ICST Workshops 2017: 110-115 - Bernhard K. Aichernig, Silvio Marcovic, Richard Schumi:
Property-Based Testing with External Test-Case Generators. ICST Workshops 2017: 337-346 - Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method. ICST Workshops 2017: 29-35 - Hugo Leonardo da Silva Araujo, Gustavo Carvalho, Augusto Sampaio, Mohammad Reza Mousavi, Masoumeh Taromirad:
A Process for Sound Conformance Testing of Cyber-Physical Systems. ICST Workshops 2017: 46-50 - Paolo Arcaini, Xavier Devroey, Shuai Wang:
Message from the A-MOST 2017 Chairs. ICST Workshops 2017: 317-318 - Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene:
MutRex: A Mutation-Based Generator of Fault Detecting Strings for Regular Expressions. ICST Workshops 2017: 87-96 - Sara Abbaspour Asadollah, Daniel Sundmark, Hans A. Hansson:
Runtime Verification for Detecting Suspension Bugs in Multicore and Parallel Software. ICST Workshops 2017: 77-80 - Thomas Bach, Artur Andrzejak, Ralf Pannemans:
Coverage-Based Reduction of Test Execution Time: Lessons from a Very Large Industrial Project. ICST Workshops 2017: 3-12 - Tiyash Basu, Sudipta Chattopadhyay:
Testing Cache Side-Channel Leakage. ICST Workshops 2017: 51-60 - Henning Bergstrom, Eduard Paul Enoiu:
Using Timed Base-Choice Coverage Criterion for Testing Industrial Control Software. ICST Workshops 2017: 216-219 - Josip Bozic, Kristoffer Kleine, Dimitris E. Simos, Franz Wotawa:
Planning-Based Security Testing of the SSL/TLS Protocol. ICST Workshops 2017: 347-355 - Johannes Bräuer, Reinhold Plösch, Manuel Windhager:
Are CISQ Reliability Measures Practical? A Research Perspective. ICST Workshops 2017: 13-22 - Jaganmohan Chandrasekaran, Huadong Feng, Yu Lei, D. Richard Kuhn, Raghu Kacker:
Applying Combinatorial Testing to Data Mining Algorithms. ICST Workshops 2017: 253-261 - Eun-Hye Choi, Tsuyoshi Fujiwara, Osamu Mizuno:
Weighting for Combinatorial Testing by Bayesian Inference. ICST Workshops 2017: 389-391 - Sunil Chon, Jihwan Park:
Suggestion of Practical Quantification Measuring Method of Test Design Which Can Represent the Current Status. ICST Workshops 2017: 294-299 - Filip Cuckov, Grant Rudd, Liam Daly:
Framework for Model-Based Design and Verification of Human-in-the-Loop Cyber-Physical Systems. ICST Workshops 2017: 401-402 - Xi Deng, Tianyong Wu, Jun Yan, Jian Zhang:
Combinatorial Testing on Implementations of HTML5 Support. ICST Workshops 2017: 262-271 - Fernando Dias, Ana C. R. Paiva:
Pattern-Based Usability Testing. ICST Workshops 2017: 366-371 - Feng Duan, Yu Lei, Linbin Yu, Raghu N. Kacker, D. Richard Kuhn:
Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring. ICST Workshops 2017: 181-188 - Vinicius H. S. Durelli, Nilton M. De Souza, Márcio Eduardo Delamaro:
Are Deletion Mutants Easier to Identify Manually? ICST Workshops 2017: 149-158 - Hermann Felbinger, Franz Wotawa, Mihai Nica:
Mutation Score, Coverage, Model Inference: Quality Assessment for T-Way Combinatorial Test-Suites. ICST Workshops 2017: 171-180 - Vanderson Hafemann Fragal, Adenilso Simão, André Takeshi Endo, Mohammad Reza Mousavi:
Reducing the Concretization Effort in FSM-Based Testing of Software Product Lines. ICST Workshops 2017: 329-336 - Angelo Gargantini, Justyna Petke, Marco Radavelli:
Combinatorial Interaction Testing for Automated Constraint Repair. ICST Workshops 2017: 239-248 - Ceren Sahin Gebizli, Hasan Sözer:
Impact of Education and Experience Level on the Effectiveness of Exploratory Testing: An Industrial Case Study. ICST Workshops 2017: 23-28 - Mojdeh Golagha, Alexander Pretschner:
Challenges of Operationalizing Spectrum-Based Fault Localization from a Data-Centric Perspective. ICST Workshops 2017: 379-381 - Rahul Gopinath, Eric Walkingshaw:
How Good Are Your Types? Using Mutation Analysis to Evaluate the Effectiveness of Type Annotations. ICST Workshops 2017: 122-127 - Jon D. Hagar:
Defining the Phrase "Software Test Architecture" Emerging Idea. ICST Workshops 2017: 313-316 - Chihiro Iida, Shingo Takada:
Reducing Mutants with Mutant Killable Precondition. ICST Workshops 2017: 128-133 - Andrea Janes:
Test Case Generation and Prioritization: A Process-Mining Approach. ICST Workshops 2017: 38-39 - Ludwig Kampel, Bernhard Garn, Dimitris E. Simos:
Combinatorial Methods for Modelling Composed Software Systems. ICST Workshops 2017: 229-238
skipping 45 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 11:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint