Works matching DE "EXECUTION traces (Computer program testing)"
1
- International Journal on Software Tools for Technology Transfer, 2016, v. 18, n. 1, p. 41, doi. 10.1007/s10009-014-0346-x
- Wehrle, Martin;
- Kupferschmid, Sebastian
- Article
2
- Cybernetics & Systems Analysis, 2009, v. 45, n. 5, p. 692, doi. 10.1007/s10559-009-9139-8
- Article
3
- IEEE Transactions on Software Engineering, 2015, v. 41, n. 5, p. 507, doi. 10.1109/TSE.2014.2372785
- Barr, Earl T.;
- Harman, Mark;
- McMinn, Phil;
- Shahbaz, Muzammil;
- Yoo, Shin
- Article
4
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 26
- Article
5
- VLDB Journal International Journal on Very Large Data Bases, 2012, v. 21, n. 1, p. 51, doi. 10.1007/s00778-011-0234-x
- Deutch, Daniel;
- Milo, Tova
- Article
6
- Ada User Journal, 2018, v. 39, n. 4, p. 291
- Nicolas, Valérie-Anne;
- Lallali, Mounir;
- Rubini, Stéphane;
- Singhoff, Frank
- Article
7
- Bulletin of the London Mathematical Society, 2007, v. 39, n. 3, p. 377, doi. 10.1112/blms/bdm007
- Article
8
- Software Testing: Verification & Reliability, 2017, v. 27, n. 8, p. n/a, doi. 10.1002/stvr.1639
- Wiklund, Kristian;
- Eldh, Sigrid;
- Sundmark, Daniel;
- Lundqvist, Kristina
- Article
9
- Software Testing: Verification & Reliability, 2015, v. 25, n. 4, p. 371, doi. 10.1002/stvr.1572
- Di Nardo, Daniel;
- Alshahwan, Nadia;
- Briand, Lionel;
- Labiche, Yvan
- Article
10
- Software Testing: Verification & Reliability, 2012, v. 22, n. 6, p. 365, doi. 10.1002/stvr.1464
- Andrés, César;
- Merayo, Mercedes G.;
- Núñez, Manuel
- Article
11
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 113
- Carlton, Gregory H.;
- Kessler, Gary C.
- Article
12
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 2, p. 89
- Article
13
- International Journal of Computers, Communications & Control, 2016, v. 11, n. 5, p. 645, doi. 10.15837/ijccc.2016.5.2148
- Ferlin, A.;
- Wiels, V.;
- Bon, P.
- Article
14
- Requirements Engineering, 2014, v. 19, n. 3, p. 309, doi. 10.1007/s00766-013-0197-0
- Article
15
- Requirements Engineering, 2011, v. 16, n. 3, p. 209, doi. 10.1007/s00766-011-0121-4
- Sultanov, Hakim;
- Hayes, Jane Huffman;
- Wei-Keat Kong
- Article
16
- Wireless Personal Communications, 2014, v. 77, n. 3, p. 2213, doi. 10.1007/s11277-014-1634-1
- Qu, Bo;
- Wei, Jiaolong;
- Tang, Zuping;
- Yan, Tao;
- Zhou, Zhihui
- Article
17
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 21, doi. 10.1109/TSE.2007.70744
- Weimer, Westley;
- Mishra, Nina
- Article
18
- Annals of the University of Oradea, Economic Science Series, 2009, v. 18, n. 4, p. 927
- Article
19
- Software & Systems Modeling, 2019, v. 18, n. 1, p. 385, doi. 10.1007/s10270-017-0598-5
- Bousse, Erwan;
- Mayerhofer, Tanja;
- Combemale, Benoit;
- Baudry, Benoit
- Article
20
- Software & Systems Modeling, 2011, v. 10, n. 4, p. 447, doi. 10.1007/s10270-010-0151-2
- Maoz, Shahar;
- Harel, David
- Article
21
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/392083
- Gil-Yong Lee;
- Nam-Yeol Yun;
- Sung-Chul Lee;
- Soo-Hyun Park
- Article
22
- Informatica (03505596), 2016, v. 40, n. 3, p. 325
- Article
23
- Algorithms, 2014, v. 7, n. 3, p. 339, doi. 10.3390/a7030339
- Santone, Antonella;
- Vaglini, Gigliola
- Article
24
- International Journal on Artificial Intelligence Tools, 2015, v. 24, n. 4, p. -1, doi. 10.1142/s0218213015400163
- Hussain, Muhammad;
- Qasem, Sahar;
- Bebis, George;
- Muhammad, Ghulam;
- Aboalsamh, Hatim;
- Mathkour, Hassan
- Article
25
- IAENG International Journal of Computer Science, 2014, v. 41, n. 2, p. 32
- Setiadi, Theodorus E.;
- Akihiko Ohsuga;
- Mamoru Maekawa
- Article
26
- Software: Practice & Experience, 2014, v. 44, n. 7, p. 777, doi. 10.1002/spe.2256
- Ryckbosch, Frederick;
- Diwan, Amer
- Article
27
- Scientific Annals of Computer Science, 2012, v. 22, n. 2, p. 327, doi. 10.7561/SACS.2012.2.327
- Article
28
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2011, v. 1, n. 3, p. 220
- Mokritsky, Vadim A.;
- Zorilo, Victoria V.
- Article
29
- Computer Journal, 2014, v. 57, n. 7, p. 1046, doi. 10.1093/comjnl/bxt060
- Zeyda, Frank;
- Lalkhumsanga, Lalkhumsanga;
- Cavalcanti, Ana;
- Wellings, Andy
- Article