@inproceedings{BinkleyGHLM06, title = {An Empirical Study of Executable Concept Slice Size}, author = {David W. Binkley and Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi}, year = {2006}, doi = {10.1109/WCRE.2006.11}, url = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.11}, tags = {empirical, slicing}, researchr = {https://researchr.org/publication/BinkleyGHLM06}, cites = {0}, citedby = {0}, pages = {103-114}, booktitle = {WCRE}, } @inproceedings{Li09-22, title = {Identifying high-level dependence structures using slice-based dependence analysis}, author = {Zheng Li}, year = {2009}, doi = {10.1109/ICSM.2009.5306275}, url = {http://dx.doi.org/10.1109/ICSM.2009.5306275}, tags = {rule-based, analysis, slicing}, researchr = {https://researchr.org/publication/Li09-22}, cites = {0}, citedby = {0}, pages = {457-460}, booktitle = {ICSM}, } @article{JiangGHL08, title = {Locating dependence structures using search-based slicing}, author = {Tao Jiang and Nicolas Gold and Mark Harman and Zheng Li}, year = {2008}, doi = {10.1016/j.infsof.2007.11.001}, url = {http://dx.doi.org/10.1016/j.infsof.2007.11.001}, tags = {rule-based, slicing, search}, researchr = {https://researchr.org/publication/JiangGHL08}, cites = {0}, citedby = {0}, journal = {INFSOF}, volume = {50}, number = {12}, pages = {1189-1209}, } @inproceedings{AndroutsopoulosGHLT09, title = {A theoretical and empirical study of EFSM dependence}, author = {Kelly Androutsopoulos and Nicolas Gold and Mark Harman and Zheng Li and Laurence Tratt}, year = {2009}, doi = {10.1109/ICSM.2009.5306309}, url = {http://dx.doi.org/10.1109/ICSM.2009.5306309}, tags = {empirical}, researchr = {https://researchr.org/publication/AndroutsopoulosGHLT09}, cites = {0}, citedby = {0}, pages = {287-296}, booktitle = {ICSM}, } @inproceedings{GoldHLM06, title = {Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding}, author = {Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi}, year = {2006}, doi = {10.1109/ICSM.2006.10}, url = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2006.10}, tags = {rule-based, source-to-source, search, systematic-approach, open-source}, researchr = {https://researchr.org/publication/GoldHLM06}, cites = {0}, citedby = {0}, pages = {310-319}, booktitle = {ICSM}, } @article{10.1109-SCAM.2008.40, title = {Evaluating Key Statements Analysis}, author = {David Binkley and Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi}, year = {2008}, doi = {10.1109/SCAM.2008.40}, url = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2008.40}, tags = {analysis}, researchr = {https://researchr.org/publication/10.1109-SCAM.2008.40}, cites = {0}, citedby = {0}, journal = {Source Code Analysis and Manipulation, IEEE International Workshop on}, volume = {0}, } @article{HarmanLM08, title = {Editorial: Testing practice and research}, author = {Mark Harman and Zheng Li and Phil McMinn}, year = {2008}, doi = {10.1002/stvr.383}, url = {http://dx.doi.org/10.1002/stvr.383}, tags = {testing}, researchr = {https://researchr.org/publication/HarmanLM08}, cites = {0}, citedby = {0}, journal = {stvr}, volume = {18}, number = {2}, pages = {69-70}, } @article{LiHH07, title = {Search Algorithms for Regression Test Case Prioritization}, author = {Zheng Li and Mark Harman and Robert M. Hierons}, year = {2007}, doi = {10.1109/TSE.2007.38}, url = {http://dx.doi.org/10.1109/TSE.2007.38}, tags = {testing, search}, researchr = {https://researchr.org/publication/LiHH07}, cites = {0}, citedby = {0}, journal = {TSE}, volume = {33}, number = {4}, pages = {225-237}, } @article{BinkleyHHIL10, title = {Assessing the impact of global variables on program dependence and dependence clusters}, author = {David Binkley and Mark Harman and Youssef Hassoun and Syed Islam and Zheng Li}, year = {2010}, doi = {10.1016/j.jss.2009.03.038}, url = {http://dx.doi.org/10.1016/j.jss.2009.03.038}, researchr = {https://researchr.org/publication/BinkleyHHIL10}, cites = {0}, citedby = {0}, journal = {jss}, volume = {83}, number = {1}, pages = {96-107}, } @inproceedings{AndroutsopoulosCHLT09, title = {Control Dependence for Extended Finite State Machines}, author = {Kelly Androutsopoulos and David Clark and Mark Harman and Zheng Li and Laurence Tratt}, year = {2009}, doi = {10.1007/978-3-642-00593-0_15}, url = {http://dx.doi.org/10.1007/978-3-642-00593-0_15}, tags = {state machines}, researchr = {https://researchr.org/publication/AndroutsopoulosCHLT09}, cites = {0}, citedby = {0}, pages = {216-230}, booktitle = {FASE}, } @article{HarmanLMOC09, title = {TAIC PART 2007 and Mutation 2007 special issue editorial}, author = {Mark Harman and Zheng Li and Phil McMinn and Jeff Offutt and John A. Clark}, year = {2009}, doi = {10.1016/j.jss.2009.06.028}, url = {http://dx.doi.org/10.1016/j.jss.2009.06.028}, researchr = {https://researchr.org/publication/HarmanLMOC09}, cites = {0}, citedby = {0}, journal = {jss}, volume = {82}, number = {11}, pages = {1753-1754}, } @article{BinkleyGHLM08, title = {An empirical study of the relationship between the concepts expressed in source code and dependence}, author = {David W. Binkley and Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi}, year = {2008}, doi = {10.1016/j.jss.2008.04.007}, url = {http://dx.doi.org/10.1016/j.jss.2008.04.007}, tags = {empirical, source-to-source, open-source}, researchr = {https://researchr.org/publication/BinkleyGHLM08}, cites = {0}, citedby = {0}, journal = {jss}, volume = {81}, number = {12}, pages = {2287-2298}, } @inproceedings{MahdaviGLH06, title = {Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding}, author = {Kiarash Mahdavi and Nicolas Gold and Zheng Li and Mark Harman}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/961}, tags = {source-to-source, search, systematic-approach, open-source}, researchr = {https://researchr.org/publication/MahdaviGLH06}, cites = {0}, citedby = {0}, booktitle = {Dagstuhl}, } @inproceedings{BinkleyGHLM08:0, title = {Evaluating Key Statements Analysis}, author = {David W. Binkley and Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi}, year = {2008}, doi = {10.1109/SCAM.2008.40}, url = {http://dx.doi.org/10.1109/SCAM.2008.40}, tags = {analysis}, researchr = {https://researchr.org/publication/BinkleyGHLM08%3A0}, cites = {0}, citedby = {0}, pages = {121-130}, booktitle = {SCAM}, } @inproceedings{BinkleyGHLMW08, title = {Dependence Anti Patterns}, author = {David Binkley and Nicolas Gold and Mark Harman and Zheng Li and Kiarash Mahdavi and Joachim Wegener}, year = {2008}, doi = {10.1109/ASEW.2008.4686318}, url = {http://dx.doi.org/10.1109/ASEW.2008.4686318}, researchr = {https://researchr.org/publication/BinkleyGHLMW08}, cites = {0}, citedby = {0}, pages = {25-34}, booktitle = {jckbse}, }