default search action
Phyllis G. Frankl
Person information
- affiliation: New York University Tandon School of Engineering, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c29]Preston Moore, Thomas Wies, Marc Waldman, Phyllis G. Frankl, Justin Cappos:
Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings. ICSOFT 2022: 137-145
2010 – 2019
- 2019
- [c28]Preston Moore, Justin Cappos, Phyllis G. Frankl, Thomas Wies:
Charting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures. ISSRE 2019: 1-12 - 2018
- [c27]Dan Gopstein, Hongwei Henry Zhou, Phyllis G. Frankl, Justin Cappos:
Prevalence of confusing code in software projects: atoms of confusion in the wild. MSR 2018: 281-291 - 2012
- [c26]Chixiang Zhou, Phyllis G. Frankl:
Empirical Studies on Test Effectiveness for Database Applications. ICST 2012: 61-70 - [c25]Chon Ju Kim, Phyllis G. Frankl:
AQUA: Android QUery Analyzer. WCRE 2012: 395-404 - 2011
- [j15]Chixiang Zhou, Phyllis G. Frankl:
JDAMA: Java database application mutation analyser. Softw. Test. Verification Reliab. 21(3): 241-263 (2011) - [c24]Raymond Mui, Phyllis G. Frankl:
Preventing Web Application Injections with Complementary Character Coding. ESORICS 2011: 80-99 - [c23]Chixiang Zhou, Phyllis G. Frankl:
Inferential Checking for Mutants Modifying Database States. ICST 2011: 259-268 - 2010
- [c22]Raymond Mui, Phyllis G. Frankl:
Preventing SQL Injection through Automatic Query Sanitization with ASSIST. TAV-WEB 2010: 27-38
2000 – 2009
- 2009
- [c21]Chixiang Zhou, Phyllis G. Frankl:
Mutation Testing for Java Database Applications. ICST 2009: 396-405 - 2008
- [c20]David Chays, John Shahid, Phyllis G. Frankl:
Query-based test generation for database applications. DBTest 2008: 6 - 2007
- [c19]John F. Buford, Emré Celebi, Phyllis G. Frankl:
An Integrated Peer-to-Peer Data and Service Dissemination System. CCNC 2007: 546-549 - 2006
- [c18]John F. Buford, Emré Celebi, Phyllis G. Frankl:
Property-Based Peer Trust in the Sleeper Service Discovery Protocol. COMPSAC (2) 2006: 209-214 - [c17]John F. Buford, Bernard Burg, Emré Celebi, Phyllis G. Frankl:
Sleeper: A Power-Conserving Service Discovery Protocol. MobiQuitous 2006: 1-10 - 2005
- [c16]Yuetang Deng, Phyllis G. Frankl, David Chays:
Testing database transactions with AGENDA. ICSE 2005: 78-87 - 2004
- [j14]Yuetang Deng, Phyllis G. Frankl, Jiong Wang:
Testing web database applications. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-10 (2004) - [j13]David Chays, Yuetang Deng, Phyllis G. Frankl, Saikat Dan, Filippos I. Vokolos, Elaine J. Weyuker:
An AGENDA for testing relational database applications. Softw. Test. Verification Reliab. 14(1): 17-44 (2004) - 2003
- [c15]Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich:
Design of a Laboratory for Information Security Education. World Conference on Information Security Education 2003: 61-73 - [c14]Phyllis G. Frankl, Gregg Rothermel, Kent Sayre, Filippos I. Vokolos:
An Empirical Comparison of Two Safe Regression Test Selection Techniques. ISESE 2003: 195-205 - [c13]Yuetang Deng, Phyllis G. Frankl, Zhongqiang Chen:
Testing Database Transaction Concurrency. ASE 2003: 184-195 - 2002
- [e1]Phyllis G. Frankl:
Proceedings of the International Symposium on Software Testing and Analysis, ISSTA 2002, Roma, Italy, July 22-24, 2002. ACM 2002, ISBN 1-58113-562-9 [contents] - 2000
- [j12]Phyllis G. Frankl, Elaine J. Weyuker:
Testing software to detect and reduce risk. J. Syst. Softw. 53(3): 275-286 (2000) - [j11]Phyllis G. Frankl:
Assessing and enhancing software testing effectiveness. ACM SIGSOFT Softw. Eng. Notes 25(1): 50-51 (2000) - [c12]Phyllis G. Frankl, Yuetang Deng:
Comparison of delivered reliability of branch, data flow and operational testing: A case study. ISSTA 2000: 124-134 - [c11]David Chays, Saikat Dan, Phyllis G. Frankl, Filippos I. Vokolos, Elaine J. Weber:
A framework for testing database applications. ISSTA 2000: 147-157
1990 – 1999
- 1999
- [j10]Delia I. S. Marx, Phyllis G. Frankl:
Path-sensitive Alias Analysis for Data Flow Testing. Softw. Test. Verification Reliab. 9(1): 51-73 (1999) - 1998
- [j9]Phyllis G. Frankl, Richard G. Hamlet, Bev Littlewood, Lorenzo Strigini:
Evaluating Testing Methods by Delivered Reliability. IEEE Trans. Software Eng. 24(8): 586-601 (1998) - [c10]Filippos I. Vokolos, Phyllis G. Frankl:
Empirical Evaluation of the Textual Differencing Regression Testing Technique. ICSM 1998: 44-53 - [c9]Phyllis G. Frankl, Oleg Iakounenko:
Further Empirical Studies of Test Effectiveness. SIGSOFT FSE 1998: 153-162 - 1997
- [j8]Phyllis G. Frankl, Stewart N. Weiss, Cang Hu:
All-uses vs mutation testing: An experimental comparison of effectiveness. J. Syst. Softw. 38(3): 235-253 (1997) - [c8]Phyllis G. Frankl, Richard G. Hamlet, Bev Littlewood, Lorenzo Strigini:
Choosing a Testing Method to Deliver Reliability. ICSE 1997: 68-78 - [c7]J. Abraham, Phyllis G. Frankl, Christian Landrault, Meryem Marzouki, Paolo Prinetto, Chantal Robach, Pascale Thévenod-Fosse:
Hardware Test: Can We Learn from Software Testing? VTS 1997: 320-321 - 1996
- [j7]Paul Ammann, Sushil Jajodia, Phyllis G. Frankl:
Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distributed Syst. 7(6): 665-670 (1996) - [c6]Delia I. S. Marx, Phyllis G. Frankl:
The Path-Wise Approach to Data Flow Testing with Pointer Variables. ISSTA 1996: 135-146 - 1995
- [j6]Phyllis G. Frankl, Elaine J. Weyuker:
Reply to "Some Critical Remarks on a Hierarchy of Fault-Detecting Abilities of Test Methods". IEEE Trans. Software Eng. 21(10): 861-863 (1995) - 1994
- [j5]Roong-Ko Doong, Phyllis G. Frankl:
The ASTOOT Approach to Testing Object-Oriented Programs. ACM Trans. Softw. Eng. Methodol. 3(2): 101-130 (1994) - 1993
- [j4]Phyllis G. Frankl, Elaine J. Weyuker:
A Formal Analysis of the Fault-Detecting Ability of Testing Methods. IEEE Trans. Software Eng. 19(3): 202-213 (1993) - [j3]Phyllis G. Frankl, Stewart N. Weiss:
An Experimental Comparison of the Effectiveness of Branch Testing and Data Flow Testing. IEEE Trans. Software Eng. 19(8): 774-787 (1993) - [j2]Phyllis G. Frankl, Elaine J. Weyuker:
Provable Improvements on Branch Testing. IEEE Trans. Software Eng. 19(10): 962-975 (1993) - [c5]Phyllis G. Frankl, Elaine J. Weyuker:
An Analytical Comparison of the Fault-Detecting Ability of Data Flow Testing Techniques. ICSE 1993: 415-424 - [c4]Mohammed Ghriga, Phyllis G. Frankl:
Adaptive Testing of Non-Deterministic Communication Protocols. Protocol Test Systems 1993: 347-362 - 1991
- [c3]Phyllis G. Frankl, Stewart N. Weiss:
An Experimental Comparison of the Effectiveness of the All-Uses and All-Edges Adequacy Criteria. Symposium on Testing, Analysis, and Verification 1991: 154-164 - [c2]Roong-Ko Doong, Phyllis G. Frankl:
Case Studies on Testing Object-Oriented Programs. Symposium on Testing, Analysis, and Verification 1991: 165-177 - [c1]Phyllis G. Frankl, Elaine J. Weyuker:
Assessing the fault-detecting ability of testing methods. SIGSOFT 1991: 77-91
1980 – 1989
- 1988
- [j1]Phyllis G. Frankl, Elaine J. Weyuker:
An Applicable Family of Data Flow Testing Criteria. IEEE Trans. Software Eng. 14(10): 1483-1498 (1988) - 1987
- [b1]Phyllis G. Frankl:
The use of Data Flow Information for the Selection and Evaluation of Software Test Data. New York University, USA, 1987
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint