The SCEAS System
Navigation Menu

Search the dblp DataBase


Jens Krinke: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrea De Lucia, Mark Harman, Robert M. Hierons, Jens Krinke
    Unions of Slices Are Not Slices. [Citation Graph (0, 0)][DBLP]
    CSMR, 2003, pp:363-367 [Conf]
  2. Jens Krinke
    Evaluating Context-Sensitive Slicing and Chopping. [Citation Graph (0, 0)][DBLP]
    ICSM, 2002, pp:22-0 [Conf]
  3. Jens Krinke
    Visualization of Program Dependence and Slices. [Citation Graph (0, 0)][DBLP]
    ICSM, 2004, pp:168-177 [Conf]
  4. Jens Krinke
    Advanced Slicing of Sequential and Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    ICSM, 2004, pp:464-468 [Conf]
  5. Silvia Breu, Jens Krinke
    Aspect Mining Using Event Traces. [Citation Graph (0, 0)][DBLP]
    ASE, 2004, pp:310-315 [Conf]
  6. Jens Krinke
    Static Slicing of Threaded Programs. [Citation Graph (0, 0)][DBLP]
    PASTE, 1998, pp:35-42 [Conf]
  7. Christian Hammer, Martin Grimme, Jens Krinke
    Dynamic path conditions in dependence graphs. [Citation Graph (0, 0)][DBLP]
    PEPM, 2006, pp:58-67 [Conf]
  8. David Binkley, Mark Harman, Jens Krinke
    Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2006, pp:43-52 [Conf]
  9. Jens Krinke
    Barrier Slicing and Chopping. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:81-87 [Conf]
  10. Jens Krinke
    Context-Sensitivity Matters, But Context Does Not. [Citation Graph (0, 0)][DBLP]
    SCAM, 2004, pp:29-35 [Conf]
  11. Jens Krinke
    Context-sensitive slicing of concurrent programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:178-187 [Conf]
  12. Jens Krinke
    Identifying Similar Code with Program Dependence Graphs. [Citation Graph (0, 0)][DBLP]
    WCRE, 2001, pp:301-309 [Conf]
  13. Jens Krinke
    Mining Control Flow Graphs for Crosscutting Concerns. [Citation Graph (0, 0)][DBLP]
    WCRE, 2006, pp:334-342 [Conf]
  14. Jens Krinke, Torsten Robschink, Gregor Snelting
    Software-Sicherheitsprüfung mit VALSOFT. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:2, pp:62-73 [Journal]
  15. Jens Krinke, Gregor Snelting
    Validation of measurement software as an application of slicing and constraint solving. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1998, v:40, n:11-12, pp:661-675 [Journal]
  16. Jens Krinke
    Effects of context on program slicing. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:9, pp:1249-1260 [Journal]
  17. Giuliano Antoniol, Jens Krinke, Paolo Tonella
    Special issue on Source code analysis and manipulation. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:62, n:3, pp:205-208 [Journal]
  18. Jens Krinke
    Slicing, Chopping, and Path Conditions with Barriers. [Citation Graph (0, 0)][DBLP]
    Software Quality Journal, 2004, v:12, n:4, pp:339-360 [Journal]
  19. Jens Krinke, Maximilian Störzer, Andreas Zeller
    Web-basierte Programmierpraktika mit Praktomat. [Citation Graph (0, 0)][DBLP]
    Softwaretechnik-Trends, 2002, v:22, n:3, pp:- [Journal]
  20. Gregor Snelting, Torsten Robschink, Jens Krinke
    Efficient path conditions in dependence graphs for software safety analysis. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:4, pp:410-457 [Journal]
  21. Philipp Bouillon, Jens Krinke, Nils Meyer, Friedrich Steimann
    EzUnit: A Framework for Associating Failed Unit Tests with Potential Programming Errors. [Citation Graph (0, 0)][DBLP]
    XP, 2007, pp:101-104 [Conf]
  22. Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, Ettore Merlo
    Comparison and Evaluation of Clone Detection Tools. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2007, v:33, n:9, pp:577-591 [Journal]

  23. 05451 Executive Summary -- Beyond Program Slicing Dagstuhl Seminar. [Citation Graph (, )][DBLP]

  24. 05451 Abstracts Collection -- Beyond Program Slicing. [Citation Graph (, )][DBLP]

  25. Search based data sensitivity analysis applied to requirement engineering. [Citation Graph (, )][DBLP]

  26. Intransitive Noninterference in Dependence Graphs. [Citation Graph (, )][DBLP]

  27. Cloning and copying between GNOME projects. [Citation Graph (, )][DBLP]

  28. Coherent dependence clusters. [Citation Graph (, )][DBLP]

  29. Statement-Level Cohesion Metrics and their Visualization. [Citation Graph (, )][DBLP]

  30. Is Cloned Code More Stable than Non-cloned Code? [Citation Graph (, )][DBLP]

  31. A Study of Consistent and Inconsistent Changes to Code Clones. [Citation Graph (, )][DBLP]

  32. Pitfalls in Aspect Mining. [Citation Graph (, )][DBLP]

  33. Using Eclipse in distant teaching of software engineering. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002