Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2011
- Bernhard K. Aichernig, Harald Brandl, Elisabeth Jöbstl, Willibald Krenn:
Efficient Mutation Killers in Action. ICST 2011: 120-129 - Colin Atkinson, Florian Barth, Oliver Hummel, Marcus Schumacher:
Towards a Language and Framework for Penurious Testing. ICST 2011: 31-39 - Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier:
Finding Software Vulnerabilities by Smart Fuzzing. ICST 2011: 427-430 - Fevzi Belli, Mutlu Beyazit, Tomohiko Takagi, Zengo Furukawa:
Mutation Testing of "Go-Back" Functions Based on Pushdown Automata. ICST 2011: 249-258 - Neelesh Bhattacharya:
SoftwareHardware Hybrid Systems Verification. ICST 2011: 435-438 - Kirill Bogdanov:
Test Generation for X-machines with Non-terminal States and Priorities of Operations. ICST 2011: 130-139 - Ruben Casado, Javier Tuya, Muhammad Younas:
A Framework to Test Advanced Web Services Transactions. ICST 2011: 443-446 - Adnan Causevic, Daniel Sundmark, Sasikumar Punnekkat:
Factors Limiting Industrial Adoption of Test Driven Development: A Systematic Review. ICST 2011: 337-346 - Ajay Chander, Dinakar Dhurjati, Koushik Sen, Dachuan Yu:
Optimal Test Input Sequence Generation for Finite State Models and Pushdown Systems. ICST 2011: 140-149 - Songyu Chen, Zhenyu Chen, Zhihong Zhao, Baowen Xu, Yang Feng:
Using semi-supervised clustering to improve regression test selection techniques. ICST 2011: 1-10 - Jacek Czerwonka, Rajiv Das, Nachiappan Nagappan, Alex Tarvo, Alex Teterev:
CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice - Experiences from Windows. ICST 2011: 357-366 - Frédéric Dadeau, Pierre-Cyrille Héam, Rafik Kheddam:
Mutation-Based Test Generation from Security Protocols in HLPSL. ICST 2011: 240-248 - Haitao Dan, Robert M. Hierons:
Conformance Testing from Message Sequence Charts. ICST 2011: 279-288 - Sigrid Eldh, Hans Hansson, Sasikumar Punnekkat:
Analysis of Mistakes as a Method to Improve Test Case Design. ICST 2011: 70-79 - Emelie Engström, Per Runeson, Andreas Ljung:
Improving Regression Testing Transparency and Efficiency with History-Based Prioritization - An Industrial Case Study. ICST 2011: 367-376 - Dominik Franke, Carsten Weise:
Providing a Software Quality Framework for Testing of Mobile Applications. ICST 2011: 431-434 - Gordon Fraser, Andrea Arcuri:
It is Not the Length That Matters, It is How You Control It. ICST 2011: 150-159 - Gordon Fraser, Andreas Zeller:
Exploiting Common Object Usage in Test Case Generation. ICST 2011: 80-89 - Kyungmin Go, Sungwon Kang, Myungchul Kim, Jihyun Lee:
A Systematic Test Case Generation Approach for Testing Message Length Variability. ICST 2011: 397-406 - Alberto González-Sanchez:
Cost Optimizations in Runtime Testing and Diagnosis of Systems of Systems. ICST 2011: 439-442 - Yves Grasland:
Testing Resource Usage in Home Automation Systems. ICST 2011: 419-422 - Joachim Hänsel, Daniela Rose, Paula Herber, Sabine Glesner:
An Evolutionary Algorithm for the Generation of Timed Test Traces for Embedded Real-Time Systems. ICST 2011: 170-179 - Pierre-Cyrille Héam, Cyril Nicaud:
Seed: An Easy-to-Use Random Generator of Recursive Data Structures for Testing. ICST 2011: 60-69 - Hadi Hemmati, Andrea Arcuri, Lionel C. Briand:
Empirical Investigation of the Effects of Test Suite Properties on Similarity-Based Test Case Selection. ICST 2011: 327-336 - Waldemar Hummer, Orna Raz, Onn Shehory, Philipp Leitner, Schahram Dustdar:
Test Coverage of Data-Centric Dynamic Compositions in Service-Based Systems. ICST 2011: 40-49 - Daniel Keating, Allan McInnes, Michael P. Hayes:
Model Checking a TTCAN Implementation. ICST 2011: 387-396 - Shadi Abdul Khalek, Sarfraz Khurshid:
Systematic Testing of Database Engines Using a Relational Constraint Solver. ICST 2011: 50-59 - Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
A Framework for the Automatic Correction of Constraint Programs. ICST 2011: 319-326 - Dominic Letarte, François Gauthier, Ettore Merlo:
Security Model Evolution of PHP Web Applications. ICST 2011: 289-298 - Zhi Da Luo, Raja Das, Yao Qi:
Multicore SDK: A Practical and Efficient Deadlock Detector for Real-World Applications. ICST 2011: 309-318
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 05:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint