default search action
Youssef Hassoun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [i1]Youssef Hassoun:
Secure symmetric ciphers over the real field. CoRR abs/1602.04747 (2016) - 2013
- [j7]Mustafa Bozkurt, Mark Harman, Youssef Hassoun:
Testing and verification in service-oriented architecture: a survey. Softw. Test. Verification Reliab. 23(4): 261-313 (2013) - 2012
- [j6]Phil McMinn, Mark Harman, Kiran Lakhotia, Youssef Hassoun, Joachim Wegener:
Input Domain Reduction through Irrelevant Variable Removal and Its Effect on Local, Global, and Hybrid Search-Based Structural Test Data Generation. IEEE Trans. Software Eng. 38(2): 453-477 (2012) - 2011
- [c11]Arthur I. Baars, Mark Harman, Youssef Hassoun, Kiran Lakhotia, Phil McMinn, Paolo Tonella, Tanja E. J. Vos:
Symbolic search-based testing. ASE 2011: 53-62 - 2010
- [j5]David W. Binkley, Mark Harman, Youssef Hassoun, Syed S. Islam, Zheng Li:
Assessing the impact of global variables on program dependence and dependence clusters. J. Syst. Softw. 83(1): 96-107 (2010)
2000 – 2009
- 2008
- [c10]Tao Jiang, Mark Harman, Youssef Hassoun:
Analysis of Procedure Splitability. WCRE 2008: 247-256 - 2007
- [j4]Asma Mubarak, Steve Counsell, Robert M. Hierons, Youssef Hassoun:
Package Evolvability and its Relationship with Refactoring. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 8 (2007) - [c9]Mark Harman, Youssef Hassoun, Kiran Lakhotia, Phil McMinn, Joachim Wegener:
The impact of input domain reduction on search-based test data generation. ESEC/SIGSOFT FSE 2007: 155-164 - 2006
- [j3]Deepak Advani, Youssef Hassoun, Steve Counsell:
Understanding the complexity of refactoring in software systems: a tool-based approach. Int. J. Gen. Syst. 35(3): 329-346 (2006) - [c8]Steve Counsell, Youssef Hassoun, George Loizou, Rajaa Najjar:
Common refactorings, a dependency graph and some code smells: an empirical study of Java OSS. ISESE 2006: 288-296 - [c7]Deepak Advani, Youssef Hassoun, Steve Counsell:
Extracting refactoring trends from open-source software and a possible solution to the 'related refactoring' conundrum. SAC 2006: 1713-1720 - [c6]Steve Counsell, Robert M. Hierons, Rajaa Najjar, George Loizou, Youssef Hassoun:
The Effectiveness of Refactoring, Based on a Compatibility Testing Taxonomy and a Dependency Graph. TAIC PART 2006: 181-192 - 2005
- [b1]Youssef Hassoun:
Coupling, code reuse and open implementation in reflective systems. Birkbeck, University of London, UK, 2005 - [j2]Youssef Hassoun, Steve Counsell, Roger Johnson:
Dynamic coupling metric: proof of concept. IEE Proc. Softw. 152(6): 273-279 (2005) - [j1]Youssef Hassoun, Roger Johnson, Steve Counsell:
Applications of dynamic proxies in distributed environments. Softw. Pract. Exp. 35(1): 75-99 (2005) - 2004
- [c5]Rajaa Najjar, Steve Counsell, George Loizou, Youssef Hassoun:
The quality of automated and manual data collection processes in Java software: an empirical comparison. CAiSE Workshops (2) 2004: 101-112 - [c4]Youssef Hassoun, Roger Johnson, Steve Counsell:
A Dynamic Runtime Coupling Metric for Meta-Level Architectures. CSMR 2004: 339-346 - 2003
- [c3]Youssef Hassoun, Roger Johnson, Steve Counsell:
Reusability, open implementation and Java's dynamic proxies. PPPJ 2003: 3-6 - [c2]Steve Counsell, Youssef Hassoun, Roger Johnson, Keith Mannock, Emilia Mendes:
Trends in Java code changes: the key to identification of refactorings? PPPJ 2003: 45-48 - [c1]Youssef Hassoun, Constantinos A. Constantinides:
The development of generic definitions of hyperslice packages in Hyper/J. SC 2003: 8-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint