Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2013
- Earl T. Barr, Christian Bird, Mark Marron:
Collecting a heap of shapes. ISSTA 2013: 123-133 - Sandeep Bindal, Sorav Bansal, Akash Lal:
Variable and thread bounding for systematic testing of multithreaded programs. ISSTA 2013: 145-155 - Andrea Bonacchi:
Formal safety proof: a real case study in a railway interlocking system. ISSTA 2013: 378-381 - Teodora Sandra Buda:
Generation of test databases using sampling methods. ISSTA 2013: 366-369 - Hana Chockler, Karine Even, Eran Yahav:
Finding rare numerical stability errors in concurrent computations. ISSTA 2013: 12-22 - Pranavadatta Devaki, Suresh Thummalapenta, Nimit Singhania, Saurabh Sinha:
Efficient and flexible GUI test execution via test merging. ISSTA 2013: 34-44 - Gordon Fraser, Matt Staats, Phil McMinn, Andrea Arcuri, Frank Padberg:
Does automated white-box test generation really help software testers? ISSTA 2013: 291-301 - Shadi Ghaith:
Analysis of performance regression testing data by transaction profiles. ISSTA 2013: 370-373 - Milos Gligoric, Alex Groce, Chaoqiang Zhang, Rohan Sharma, Mohammad Amin Alipour, Darko Marinov:
Comparing non-adequate test suites using coverage criteria. ISSTA 2013: 302-313 - Milos Gligoric, Lingming Zhang, Cristiano Pereira, Gilles Pokam:
Selective mutation testing for concurrent code. ISSTA 2013: 224-234 - Lin Gui, Jun Sun, Yang Liu, Yuanjie Si, Jin Song Dong, Xinyu Wang:
Combining model checking and testing with an application to reliability prediction and distribution. ISSTA 2013: 101-111 - Simone Hanazumi, Ana Cristina Vieira de Melo:
Generation of Java programs properties from test purposes. ISSTA 2013: 362-365 - Mark Hills, Paul Klint, Jurgen J. Vinju:
An empirical study of PHP feature usage: a static analysis perspective. ISSTA 2013: 325-335 - Falk Howar, Dimitra Giannakopoulou, Zvonimir Rakamaric:
Hybrid learning: interface generation through static, dynamic, and symbolic analysis. ISSTA 2013: 268-279 - Casper Svenning Jensen, Mukul R. Prasad, Anders Møller:
Automated testing with targeted event sequence generation. ISSTA 2013: 67-77 - Wei Jin, Alessandro Orso:
F3: fault localization for field failures. ISSTA 2013: 213-223 - Fitsum Meshesha Kifetew, Annibale Panichella, Andrea De Lucia, Rocco Oliveto, Paolo Tonella:
Orthogonal exploration of the search space in evolutionary test case generation. ISSTA 2013: 257-267 - Mengchen Li, Yuanjun Chen, Linzhang Wang, Guoqing Xu:
Dynamically validating static memory leak warnings. ISSTA 2013: 112-122 - Ding Li, Shuai Hao, William G. J. Halfond, Ramesh Govindan:
Calculating source line level energy information for Android applications. ISSTA 2013: 78-89 - Qingzhou Luo, Grigore Rosu:
EnforceMOP: a runtime property enforcement system for multithreaded programs. ISSTA 2013: 156-166 - Jaideep Nijjar, Tevfik Bultan:
Data model property inference and repair. ISSTA 2013: 202-212 - Sangmin Park:
Debugging non-deadlock concurrency bugs. ISSTA 2013: 358-361 - Sangmin Park, Mary Jean Harrold, Richard W. Vuduc:
Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs. ISSTA 2013: 134-144 - Rahul Purandare, Matthew B. Dwyer, Sebastian G. Elbaum:
Optimizing monitoring of finite state properties through monitor compaction. ISSTA 2013: 280-290 - Yuhua Qi, Xiaoguang Mao, Yan Lei, Chengsong Wang:
Using automated program repair for evaluating the effectiveness of fault localization techniques. ISSTA 2013: 191-201 - Cosmin Radoi, Danny Dig:
Practical static race detection for Java parallel loops. ISSTA 2013: 178-190 - Nicolás Rosner, Juan P. Galeotti, Santiago Bermúdez, Guido Marucci Blas, Santiago Perez De Rosso, Lucas Pizzagalli, Luciano Zemín, Marcelo F. Frias:
Parallel bounded analysis in code with rich invariants by refinement of field bounds. ISSTA 2013: 23-33 - Hesam Samimi, Rebecca Hicks, Ari Fogel, Todd D. Millstein:
Declarative mocking. ISSTA 2013: 246-256 - Friedrich Steimann, Marcus Frenkel, Rui Abreu:
Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators. ISSTA 2013: 314-324 - Thomas Thüm:
Product-line verification with feature-oriented contracts. ISSTA 2013: 374-377
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 14:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint