Mining version histories to guide software changes T Zimmermann, P Weissgerber, S Diehl, A Zeller IEEE Transactions on Software Engineering 31 (6), 429-445, 2005 | 1758 | 2005 |
Simplifying and isolating failure-inducing input A Zeller, R Hildebrandt IEEE Transactions on software engineering 28 (2), 183-200, 2002 | 1338 | 2002 |
When do changes induce fixes? J Śliwerski, T Zimmermann, A Zeller ACM sigsoft software engineering notes 30 (4), 1-5, 2005 | 1313 | 2005 |
Mining metrics to predict component failures N Nagappan, T Ball, A Zeller Proceedings of the 28th international conference on Software engineering …, 2006 | 1109 | 2006 |
Predicting defects for Eclipse T Zimmermann, R Premraj, A Zeller Predictor Models in Software Engineering, 2007. PROMISE'07: ICSE Workshops …, 2007 | 998 | 2007 |
Locating causes of program failures H Cleve, A Zeller Proceedings of the 27th international conference on Software engineering …, 2005 | 874 | 2005 |
Isolating cause-effect chains from computer programs A Zeller ACM SIGSOFT Software Engineering Notes 27 (6), 1-10, 2002 | 860 | 2002 |
Why programs fail: a guide to systematic debugging A Zeller Morgan Kaufmann, 2009 | 843 | 2009 |
Predicting faults from cached history S Kim, T Zimmermann, EJ Whitehead Jr, A Zeller 29th International Conference on Software Engineering (ICSE'07), 489-498, 2007 | 716 | 2007 |
Yesterday, my program worked. Today, it does not. Why? A Zeller ACM SIGSOFT Software engineering notes 24 (6), 253-267, 1999 | 650 | 1999 |
It's not a bug, it's a feature: how misclassification impacts bug prediction K Herzig, S Just, A Zeller 2013 35th international conference on software engineering (ICSE), 392-401, 2013 | 583 | 2013 |
How long will it take to fix this bug? C Weiss, R Premraj, T Zimmermann, A Zeller fourth international workshop on mining software repositories (MSR'07: ICSE …, 2007 | 563 | 2007 |
Checking app behavior against app descriptions A Gorla, I Tavecchia, F Gross, A Zeller Proceedings of the 36th international conference on software engineering …, 2014 | 557 | 2014 |
Predicting vulnerable software components S Neuhaus, T Zimmermann, C Holler, A Zeller Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 544 | 2007 |
Mutation-driven generation of unit tests and oracles G Fraser, A Zeller Proceedings of the 19th international symposium on Software testing and …, 2010 | 527 | 2010 |
Fuzzing with code fragments C Holler, K Herzig, A Zeller 21st USENIX Security Symposium (USENIX Security 12), 445-458, 2012 | 493 | 2012 |
Automated fixing of programs with contracts Y Wei, Y Pei, CA Furia, LS Silva, S Buchholz, B Meyer, A Zeller Proceedings of the 19th international symposium on Software testing and …, 2010 | 448 | 2010 |
The impact of tangled code changes K Herzig, A Zeller 2013 10th Working Conference on Mining Software Repositories (MSR), 121-130, 2013 | 366 | 2013 |
Mining apps for abnormal usage of sensitive data V Avdiienko, K Kuznetsov, A Gorla, A Zeller, S Arzt, S Rasthofer, ... 2015 IEEE/ACM 37th IEEE international conference on software engineering 1 …, 2015 | 349 | 2015 |
Detecting object usage anomalies A Wasylkowski, A Zeller, C Lindig Proceedings of the the 6th joint meeting of the European software …, 2007 | 348 | 2007 |