default search action
Benedikt Hauptmann
Person information
- affiliation: TU Munich, Department of Informatics, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c21]Jannik Fischbach, Benedikt Hauptmann, Lukas Konwitschny, Dominik Spies, Andreas Vogelsang:
Towards Causality Extraction from Requirements. RE 2020: 388-393 - [i1]Jannik Fischbach, Benedikt Hauptmann, Lukas Konwitschny, Dominik Spies, Andreas Vogelsang:
Towards Causality Extraction from Requirements. CoRR abs/2006.15871 (2020)
2010 – 2019
- 2018
- [c20]Dietmar Freudenstein, Jeannette Radduenz, Maximilian Junker, Sebastian Eder, Benedikt Hauptmann:
Automated test-design from requirements: the Specmate tool. RET@ICSE 2018: 5-8 - 2016
- [b1]Benedikt Hauptmann:
Reducing System Testing Effort by Focusing on Commonalities in Test Procedures. Technical University Munich, Germany, 2016 - [c19]Henning Femmer, Benedikt Hauptmann, Sebastian Eder, Dagmar Moser:
Quality Assurance of Requirements Artifacts in Practice: A Case Study and a Process Proposal. PROFES 2016: 506-516 - 2015
- [c18]Sebastian Eder, Henning Femmer, Benedikt Hauptmann, Maximilian Junker:
Configuring Latent Semantic Indexing for Requirements Tracing. RET@ICSE 2015: 27-33 - [c17]Maximilian Junker, Manfred Broy, Benedikt Hauptmann, Wolfgang Böhm, Henning Femmer, Sebastian Eder, Elmar Jürgens, Rainer Janßen, Rudolf Vaas:
Principles and a Process for Successful Industry Cooperation - The Case of TUM and Munich Re. SER&IP@ICSE 2015: 50-53 - [c16]Benedikt Hauptmann, Elmar Jürgens, Volkmar Woinke:
Generating refactoring proposals to remove clones from automated system tests. ICPC 2015: 115-124 - 2014
- [c15]Veronika Bauer, Jonas Eckhardt, Benedikt Hauptmann, Manuel Klimek:
An exploratory study on reuse at google. SER&IPs 2014: 14-23 - [c14]Sebastian Eder, Benedikt Hauptmann, Maximilian Junker, Rudolf Vaas, Karl-Heinz Prommer:
Selecting manual regression test cases automatically using trace link recovery and change coverage. AST 2014: 29-35 - [c13]Sebastian Eder, Henning Femmer, Benedikt Hauptmann, Maximilian Junker:
Which Features Do My Users (Not) Use? ICSME 2014: 446-450 - [c12]Benedikt Hauptmann, Maximilian Junker, Sebastian Eder, Christian Amann, Rudolf Vaas:
An expert-based cost estimation model for system test execution. ICSSP 2014: 159-163 - [c11]Sebastian Eder, Maximilian Junker, Benedikt Hauptmann, Elmar Jürgens, Rudolf Vaas, Karl-Heinz Prommer:
How Much Does Unused Code Matter for Maintenance? Software Engineering 2014: 87-88 - 2013
- [c10]Sebastian Eder, Benedikt Hauptmann, Maximilian Junker, Elmar Jürgens, Rudolf Vaas, Karl-Heinz Prommer:
Did we test our changes? Assessing alignment between tests and development in practice. AST 2013: 107-110 - [c9]Benedikt Hauptmann, Maximilian Junker, Sebastian Eder, Lars Heinemann, Rudolf Vaas, Peter Braun:
Hunting for smells in natural language tests. ICSE 2013: 1217-1220 - [c8]Veronika Bauer, Benedikt Hauptmann:
Assessing cross-project clones for reuse optimization. IWSC 2013: 60-61 - 2012
- [c7]Andreas Pleuss, Benedikt Hauptmann, Deepak Dhungana, Goetz Botterweck:
User interface engineering for software product lines: the dilemma between automation and usability. EICS 2012: 25-34 - [c6]Sebastian Eder, Maximilian Junker, Elmar Jürgens, Benedikt Hauptmann, Rudolf Vaas, Karl-Heinz Prommer:
How much does unused code matter for maintenance? ICSE 2012: 1102-1111 - [c5]Benedikt Hauptmann, Maximilian Junker, Sebastian Eder, Elmar Jürgens, Rudolf Vaas:
Can clone detection support test comprehension? ICPC 2012: 209-218 - [c4]Benedikt Hauptmann, Veronika Bauer, Maximilian Junker:
Using edge bundle views for clone visualization. IWSC 2012: 86-87 - [c3]Andreas Pleuss, Benedikt Hauptmann, Markus Keunecke, Goetz Botterweck:
A case study on variability in user interfaces. SPLC (1) 2012: 6-10 - [e1]Tobias Nipkow, Orna Grumberg, Benedikt Hauptmann:
Software Safety and Security - Tools for Analysis and Verification. NATO Science for Peace and Security Series - D: Information and Communication Security 33, IOS Press 2012, ISBN 978-1-61499-027-7 [contents] - 2011
- [c2]Benedikt Hauptmann:
Model-based test instantiation for applications with user interfaces. PROFES Workshops 2011: 27-30 - 2010
- [c1]Dominik Seichter, Deepak Dhungana, Andreas Pleuss, Benedikt Hauptmann:
Knowledge management in software ecosystems: software artefacts as first-class citizens. ECSA Companion Volume 2010: 119-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint