default search action
Dave W. Binkley
Person information
- affiliation: Loyola University Maryland, Department of Computer Science, Baltimore, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j63]Seongmin Lee, Dave W. Binkley, Robert Feldt, Nicolas Gold, Shin Yoo:
Causal program dependence analysis. Sci. Comput. Program. 240: 103208 (2025) - 2024
- [i8]Linas Vidziunas, David W. Binkley, Leon Moonen:
The Impact of Program Reduction on Automated Program Repair. CoRR abs/2408.01134 (2024) - 2023
- [j62]Quentin Stiévenart, Dave W. Binkley, Coen De Roover:
An empirical evaluation of quasi-static executable slices. J. Syst. Softw. 200: 111666 (2023) - [c92]Quentin Stiévenart, David W. Binkley, Coen De Roover:
Dynamic Slicing of WebAssembly Binaries. ICSME 2023: 84-96 - 2022
- [j61]Dave W. Binkley, Leon Moonen, Sibren Isaacman:
Featherweight assisted vulnerability discovery. Inf. Softw. Technol. 146: 106844 (2022) - [c91]Quentin Stiévenart, David W. Binkley, Coen De Roover:
Static Stack-Preserving Intra-Procedural Slicing of WebAssembly Binaries. ICSE 2022: 2031-2042 - [c90]Dave W. Binkley, Leon Moonen:
Assessing the Impact of Execution Environment on Observation-Based Slicing. SCAM 2022: 40-44 - [i7]David W. Binkley, Leon Moonen, Sibren Isaacman:
Featherweight Assisted Vulnerability Discovery. CoRR abs/2202.02679 (2022) - [i6]David W. Binkley, Leon Moonen:
Assessing the Impact of Execution Environment on Observation-Based Slicing. CoRR abs/2208.13244 (2022) - 2021
- [j60]Jack R. Toohey, M. S. Raunak, Dave W. Binkley:
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively. Computer 54(8): 77-85 (2021) - [j59]Seongmin Lee, Dave W. Binkley, Robert Feldt, Nicolas Gold, Shin Yoo:
Observation-based approximate dependency modeling and its use for program slicing. J. Syst. Softw. 179: 110988 (2021) - [j58]Animesh Chaturvedi, Aruna Tiwari, Dave W. Binkley, Shubhangi Chaturvedi:
Service Evolution Analytics: Change and Evolution Mining of a Distributed System. IEEE Trans. Engineering Management 68(1): 137-148 (2021) - [j57]Animesh Chaturvedi, Dave W. Binkley:
Web Service Slicing: Intra and Inter-Operational Analysis to Test Changes. IEEE Trans. Serv. Comput. 14(3): 930-943 (2021) - [c89]Quentin Stiévenart, David W. Binkley, Coen De Roover:
QSES: Quasi-Static Executable Slices. SCAM 2021: 209-213 - [i5]Seongmin Lee, Dave W. Binkley, Robert Feldt, Nicolas Gold, Shin Yoo:
Causal Program Dependence Analysis. CoRR abs/2104.09107 (2021) - 2020
- [j56]Seongmin Lee, Dave W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
Evaluating lexical approximation of program dependence. J. Syst. Softw. 160 (2020) - [j55]Leon Moonen, David W. Binkley, Sydney Pugh:
On Adaptive Change Recommendation. J. Syst. Softw. 164: 110550 (2020) - [c88]Dave W. Binkley, James Glenn, Abdullah Alsharif, Phil McMinn:
An Investigation into the Effect of Control and Data Dependence Paths on Predicate Testability. SCAM 2020: 160-170
2010 – 2019
- 2019
- [j54]Abdallah Qusef, Mahmoud O. Elish, Dave W. Binkley:
An Exploratory Study of the Relationship Between Software Test Smells and Fault-Proneness. IEEE Access 7: 139526-139536 (2019) - [j53]David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
A comparison of tree- and line-oriented observational slicing. Empir. Softw. Eng. 24(5): 3077-3113 (2019) - [c87]David W. Binkley, Marcia Davis, Dawn J. Lawrie, Christopher Morrell:
To CamelCase or under_score. ICPC 2019: 177 - [c86]Seongmin Lee, David W. Binkley, Robert Feldt, Nicolas Gold, Shin Yoo:
MOAD: Modeling Observation-Based Approximate Dependency. SCAM 2019: 12-22 - [i4]Earl T. Barr, David W. Binkley, Mark Harman, Mohamed Nassim Seghir:
Sub-Turing Islands in the Wild. CoRR abs/1905.12734 (2019) - 2018
- [j52]Thomas Rolfsnes, Leon Moonen, Stefano Di Alesio, Razieh Behjati, Dave W. Binkley:
Aggregating Association Rules to Improve Change Recommendation. Empir. Softw. Eng. 23(2): 987-1035 (2018) - [j51]Leon Moonen, Thomas Rolfsnes, Dave W. Binkley, Stefano Di Alesio:
What are the effects of history length and age on mining software change impact? Empir. Softw. Eng. 23(4): 2362-2397 (2018) - [j50]Dave W. Binkley, Dawn J. Lawrie, Christopher Morrell:
The need for software specific natural language techniques. Empir. Softw. Eng. 23(4): 2398-2425 (2018) - [c85]Tom Lusco, David W. Binkley, Ron Ice:
Modeling for Stakeholder Engagement. ICSA Companion 2018: 116-119 - [c84]Seongmin Lee, David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
MOBS: multi-operator observation-based slicing using lexical approximation of program dependence. ICSE (Companion Volume) 2018: 302-303 - [c83]Dawn J. Lawrie, Dave W. Binkley:
On the Value of Bug Reports for Retrieval-Based Bug Localization. ICSME 2018: 524-528 - [c82]Sydney Pugh, David W. Binkley, Leon Moonen:
[Research Paper] The Case for Adaptive Change Recommendation. SCAM 2018: 129-138 - [c81]Sydney Pugh, David W. Binkley:
Change Impact using Dynamic History Analysis: (Abstract Only). SIGCSE 2018: 275 - 2017
- [j49]Shin Yoo, David W. Binkley, Roger D. Eastman:
Observational slicing based on visual semantics. J. Syst. Softw. 129: 60-78 (2017) - [c80]Thomas Rolfsnes, Leon Moonen, David W. Binkley:
Predicting relevance of change recommendations. ASE 2017: 694-705 - [c79]David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
Tree-Oriented vs. Line-Oriented Observation-Based Slicing. SCAM 2017: 21-30 - [c78]Nicolas E. Gold, David W. Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
Generalized observational slicing for tree-represented modelling languages. ESEC/SIGSOFT FSE 2017: 547-558 - 2016
- [j48]David W. Binkley, Daniel Heinz, Dawn J. Lawrie, Justin Overfelt:
Source code analysis with LDA. J. Softw. Evol. Process. 28(10): 893-920 (2016) - [c77]Syed S. Islam, David W. Binkley:
PORBS: A parallel observation-based slicer. ICPC 2016: 1-3 - [c76]Yibiao Yang, Mark Harman, Jens Krinke, Syed S. Islam, David W. Binkley, Yuming Zhou, Baowen Xu:
An empirical study on dependence clusters for effort-aware fault-proneness prediction. ASE 2016: 296-307 - [c75]Leon Moonen, Stefano Di Alesio, David W. Binkley, Thomas Rolfsnes:
Practical guidelines for change recommendation using association rule mining. ASE 2016: 732-743 - [c74]Thomas Rolfsnes, Leon Moonen, Stefano Di Alesio, Razieh Behjati, Dave W. Binkley:
Improving change recommendation using aggregated association rules. MSR 2016: 73-84 - [c73]David W. Binkley, Dawn J. Lawrie:
A Case for Software Specific Natural Language Techniques. SCAM 2016: 187-196 - [c72]Leon Moonen, Stefano Di Alesio, Thomas Rolfsnes, Dave W. Binkley:
Exploring the Effects of History Length and Age on Mining Software Change Impact. SCAM 2016: 207-216 - [c71]Thomas Rolfsnes, Stefano Di Alesio, Razieh Behjati, Leon Moonen, Dave W. Binkley:
Generalizing the Analysis of Evolutionary Coupling for Software Change Impact Analysis. SANER 2016: 201-212 - 2015
- [j47]Gabriele Bavota, Abdallah Qusef, Rocco Oliveto, Andrea De Lucia, Dave W. Binkley:
Are test smells really harmful? An empirical study. Empir. Softw. Eng. 20(4): 1052-1094 (2015) - [j46]David W. Binkley, Filippo Ricca, Serge Demeyer:
Editorial of special section from Software Evolution Week 2014. Inf. Softw. Technol. 65: 95-96 (2015) - [j45]David W. Binkley, Dawn J. Lawrie, Christopher Uehlinger, Daniel Heinz:
Enabling improved IR-based feature location. J. Syst. Softw. 101: 30-42 (2015) - [j44]David W. Binkley, Dawn J. Lawrie:
The impact of vocabulary normalization. J. Softw. Evol. Process. 27(4): 255-273 (2015) - [c70]David W. Binkley, Árpád Beszédes, Syed S. Islam, Judit Jász, Béla Vancsics:
Uncovering dependence clusters and linchpin functions. ICSME 2015: 141-150 - [c69]David W. Binkley, Nicolas E. Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
ORBS and the limits of static slicing. SCAM 2015: 1-10 - [c68]Dawn J. Lawrie, Dave W. Binkley:
Navigating source code with words. SCAM 2015: 71-80 - 2014
- [j43]Emily Hill, David W. Binkley, Dawn J. Lawrie, Lori L. Pollock, K. Vijay-Shanker:
An empirical study of identifier splitting techniques. Empir. Softw. Eng. 19(6): 1754-1780 (2014) - [j42]Syed S. Islam, Jens Krinke, David W. Binkley, Mark Harman:
Coherent clusters in source code. J. Syst. Softw. 88: 1-24 (2014) - [j41]Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, Dave W. Binkley:
Recovering test-to-code traceability using slicing and textual analysis. J. Syst. Softw. 88: 147-168 (2014) - [c67]David W. Binkley, Dawn J. Lawrie:
Learning to Rank Improves IR in SE. ICSME 2014: 441-445 - [c66]David W. Binkley, Daniel Heinz, Dawn J. Lawrie, Justin Overfelt:
Understanding LDA in source code analysis. ICPC 2014: 26-36 - [c65]Shin Yoo, David W. Binkley, Roger D. Eastman:
Seeing Is Slicing: Observation Based Slicing of Picture Description Languages. SCAM 2014: 175-184 - [c64]David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
ORBS: language-independent program slicing. SIGSOFT FSE 2014: 109-120 - [e2]Serge Demeyer, Dave W. Binkley, Filippo Ricca:
2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, CSMR-WCRE 2014, Antwerp, Belgium, February 3-6, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3752-3 [contents] - 2013
- [j40]Dave W. Binkley, Marcia Davis, Dawn J. Lawrie, Jonathan I. Maletic, Christopher Morrell, Bonita Sharif:
The impact of identifier style on effort and comprehension. Empir. Softw. Eng. 18(2): 219-276 (2013) - [j39]Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David W. Binkley:
Evaluating test-to-code traceability recovery methods through controlled experiments. J. Softw. Evol. Process. 25(11): 1167-1191 (2013) - [j38]David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Zheng Li:
Efficient Identification of Linchpin Vertices in Dependence Clusters. ACM Trans. Program. Lang. Syst. 35(2): 7:1-7:35 (2013) - [c63]Lori L. Pollock, David W. Binkley, Dawn J. Lawrie, Emily Hill, Rocco Oliveto, Gabriele Bavota, Alberto Bacchelli:
1st international workshop on natural language analysis in software engineering (NaturaLiSE 2013). ICSE 2013: 1537-1538 - [c62]Emily Hill, Alberto Bacchelli, Dave W. Binkley, Bogdan Dit, Dawn J. Lawrie, Rocco Oliveto:
Which Feature Location Technique is Better? ICSM 2013: 408-411 - [c61]Dave W. Binkley, Dawn J. Lawrie, Emily Hill, Janet E. Burge, Ian G. Harris, Regina Hebig, Oliver Keszöcze, Karl Reed, John Slankas:
Task-Driven Software Summarization. ICSM 2013: 432-435 - [c60]David W. Binkley, Dawn J. Lawrie, Lori L. Pollock, Emily Hill, K. Vijay-Shanker:
A dataset for evaluating identifier splitters. MSR 2013: 401-404 - 2012
- [c59]Gabriele Bavota, Abdallah Qusef, Rocco Oliveto, Andrea De Lucia, David W. Binkley:
An empirical analysis of the distribution of unit test smells and their impact on software maintenance. ICSM 2012: 56-65 - [c58]Dave W. Binkley, Dawn J. Lawrie, Christopher Uehlinger:
Vocabulary normalization improves IR-based concept location. ICSM 2012: 588-591 - 2011
- [j37]David W. Binkley, Mark Harman, Kiran Lakhotia:
FlagRemover: A testability transformation for transforming loop-assigned flags. ACM Trans. Softw. Eng. Methodol. 20(3): 12:1-12:33 (2011) - [c57]Nicolas Gold, Jens Krinke, Mark Harman, David W. Binkley:
Cloning in Max/MSP Patches. ICMC 2011 - [c56]Kelly Androutsopoulos, David W. Binkley, David Clark, Nicolas Gold, Mark Harman, Kevin Lano, Zheng Li:
Model projection: simplifying models in response to restricting the environment. ICSE 2011: 291-300 - [c55]Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David W. Binkley:
SCOTCH: Test-to-code traceability using slicing and conceptual coupling. ICSM 2011: 63-72 - [c54]Dawn J. Lawrie, David W. Binkley:
Expanding identifiers to normalize source code vocabulary. ICSM 2011: 113-122 - [c53]David W. Binkley, Matthew Hearn, Dawn J. Lawrie:
Improving identifier informativeness using part of speech information. MSR 2011: 203-206 - [c52]Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David W. Binkley:
SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter. WCRE 2011: 443-444 - 2010
- [j36]David W. Binkley, Mark Harman, Youssef Hassoun, Syed S. Islam, Zheng Li:
Assessing the impact of global variables on program dependence and dependence clusters. J. Syst. Softw. 83(1): 96-107 (2010) - [j35]Richard W. Barraclough, David W. Binkley, Sebastian Danicic, Mark Harman, Robert M. Hierons, Ákos Kiss, Mike Laurence, Lahcen Ouarbya:
A trajectory-based strict semantics for program slicing. Theor. Comput. Sci. 411(11-13): 1372-1386 (2010) - [c51]Jens Krinke, Nicolas Gold, Yue Jia, David W. Binkley:
Distinguishing copies from originals in software clones. IWSC 2010: 41-48 - [c50]Nicolas Gold, Jens Krinke, Mark Harman, David W. Binkley:
Issues in clone classification for dataflow languages. IWSC 2010: 83-84 - [c49]Jens Krinke, Nicolas Gold, Yue Jia, David W. Binkley:
Cloning and copying between GNOME projects. MSR 2010: 98-101 - [c48]Syed S. Islam, Jens Krinke, David W. Binkley, Mark Harman:
Coherent dependence clusters. PASTE 2010: 53-60 - [c47]Amy Wheeler, Dave W. Binkley:
Subclass Instantiation Distribution. SCAM 2010: 23-32 - [c46]Syed S. Islam, Jens Krinke, David W. Binkley:
Dependence cluster visualization. SOFTVIS 2010: 93-102 - [c45]Dawn J. Lawrie, David W. Binkley, Christopher Morrell:
Normalizing Source Code Vocabulary. WCRE 2010: 3-12 - [r2]David W. Binkley, Dawn J. Lawrie:
Development: Information Retrieval Applications. Encyclopedia of Software Engineering 2010: 231-242 - [r1]David W. Binkley, Dawn J. Lawrie:
Maintenance and Evolution: Information Retrieval Applications. Encyclopedia of Software Engineering 2010: 454-463
2000 – 2009
- 2009
- [j34]David W. Binkley, Henry Feild, Dawn J. Lawrie, Maurizio Pighin:
Increasing diversity: Natural language measures for software fault prediction. J. Syst. Softw. 82(11): 1793-1803 (2009) - [j33]David W. Binkley, Dawn J. Lawrie, Steve Maex, Christopher Morrell:
Identifier length and limited programmer memory. Sci. Comput. Program. 74(7): 430-445 (2009) - [j32]Mark Harman, David W. Binkley, Keith B. Gallagher, Nicolas Gold, Jens Krinke:
Dependence clusters in source code. ACM Trans. Program. Lang. Syst. 32(1): 1:1-1:33 (2009) - [j31]Phil McMinn, David W. Binkley, Mark Harman:
Empirical evaluation of a nesting testability transformation for evolutionary testing. ACM Trans. Softw. Eng. Methodol. 18(3): 11:1-11:27 (2009) - [c44]David W. Binkley, Marcia Davis, Dawn J. Lawrie, Christopher Morrell:
To camelcase or under_score. ICPC 2009: 158-167 - [c43]David W. Binkley, Mark Harman:
Identifying 'Linchpin Vertices' That Cause Large Dependence Clusters. SCAM 2009: 89-98 - [c42]Susan Horwitz, Susan H. Rodger, Maureen Biggers, David W. Binkley, C. Kolin Frantz, Dawn Gundermann, Susanne E. Hambrusch, Steven Huss-Lederman, Ethan V. Munson, Barbara G. Ryder, Monica Sweat:
Using peer-led team learning to increase participation and success of under-represented groups in introductory computer science. SIGCSE 2009: 163-167 - 2008
- [j30]David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
An empirical study of the relationship between the concepts expressed in source code and dependence. J. Syst. Softw. 81(12): 2287-2298 (2008) - [c41]Mark Harman, André Baresel, David W. Binkley, Robert M. Hierons, Lin Hu, Bogdan Korel, Phil McMinn, Marc Roper:
Testability Transformation - Program Transformation to Improve Testability. Formal Methods and Testing 2008: 320-344 - [c40]David W. Binkley, Dawn J. Lawrie, Steve Maex, Christopher Morrell:
Impact of Limited Memory Resources. ICPC 2008: 83-92 - [c39]David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi, Joachim Wegener:
Dependence Anti Patterns. ASE Workshops 2008: 25-34 - [c38]David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
Evaluating Key Statements Analysis. SCAM 2008: 121-130 - [i3]Dave W. Binkley:
Dependence Cluster Causes. Scalable Program Analysis 2008 - 2007
- [j29]Dawn J. Lawrie, Henry Feild, David W. Binkley:
Quantifying identifier quality: an analysis of trends. Empir. Softw. Eng. 12(4): 359-388 (2007) - [j28]Dawn J. Lawrie, Christopher Morrell, Henry Feild, David W. Binkley:
Effective identifier names for comprehension and memory. Innov. Syst. Softw. Eng. 3(4): 303-318 (2007) - [j27]Dawn J. Lawrie, Henry Feild, David W. Binkley:
An empirical study of rules for well-formed identifiers. J. Softw. Maintenance Res. Pract. 19(4): 205-229 (2007) - [j26]David W. Binkley, Mark Harman, Jens Krinke:
Empirical study of optimization techniques for massive slicing. ACM Trans. Program. Lang. Syst. 30(1): 3 (2007) - [j25]David W. Binkley, Nicolas Gold, Mark Harman:
An empirical study of static program slice size. ACM Trans. Softw. Eng. Methodol. 16(2): 8 (2007) - [j24]Timothy M. Meyers, David W. Binkley:
An empirical study of slice-based cohesion and coupling metrics. ACM Trans. Softw. Eng. Methodol. 17(1): 2:1-2:27 (2007) - [j23]David W. Binkley, Rainer Koschke, Spiros Mancoridis:
Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance and Evolution. IEEE Trans. Software Eng. 33(12): 797-798 (2007) - [c37]David W. Binkley:
Source Code Analysis: A Road Map. FOSE 2007: 104-119 - [c36]Dawn J. Lawrie, Henry Feild, David W. Binkley:
Extracting Meaning from Abbreviated Identifiers. SCAM 2007: 213-222 - 2006
- [j22]David W. Binkley, Sebastian Danicic, Mark Harman, John Howroyd, Lahcen Ouarbya:
A formal relationship between program slicing and partial evaluation. Formal Aspects Comput. 18(2): 103-119 (2006) - [j21]Mark Harman, Arun Lakhotia, David W. Binkley:
Theory and algorithms for slicing unstructured programs. Inf. Softw. Technol. 48(7): 549-565 (2006) - [j20]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
A formalisation of the relationship between forms of program slicing. Sci. Comput. Program. 62(3): 228-252 (2006) - [j19]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
Theoretical foundations of dynamic program slicing. Theor. Comput. Sci. 360(1-3): 23-41 (2006) - [j18]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects. IEEE Trans. Software Eng. 32(9): 698-717 (2006) - [c35]Phil McMinn, Mark Harman, David W. Binkley, Paolo Tonella:
The species per path approach to SearchBased test data generation. ISSTA 2006: 13-24 - [c34]Dawn J. Lawrie, Christopher Morrell, Henry Feild, David W. Binkley:
What's in a Name? A Study of Identifiers. ICPC 2006: 3-12 - [c33]Dawn J. Lawrie, Henry Feild, David W. Binkley:
Leveraged Quality Assessment using Information Retrieval Techniques. ICPC 2006: 149-158 - [c32]Keith B. Gallagher, David W. Binkley, Mark Harman:
Stop-List Slicing. SCAM 2006: 11-20 - [c31]David W. Binkley, Mark Harman, Jens Krinke:
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. SCAM 2006: 43-52 - [c30]Dawn J. Lawrie, Henry Feild, David W. Binkley:
Syntactic Identifier Conciseness and Consistency. SCAM 2006: 139-148 - [c29]David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
An Empirical Study of Executable Concept Slice Size. WCRE 2006: 103-114 - [e1]David W. Binkley, Mark Harman, Jens Krinke:
Beyond Program Slicing, 06.11. - 11.11.2005. Dagstuhl Seminar Proceedings 05451, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - 2005
- [j17]Nicolas E. Gold, Mark Harman, David W. Binkley, Robert M. Hierons:
Unifying program slicing and concept assignment for higher-level executable source code extraction. Softw. Pract. Exp. 35(10): 977-1006 (2005) - [c28]David W. Binkley, Mariano Ceccato, Mark Harman, Filippo Ricca, Paolo Tonella:
Automated Refactoring of Object Oriented Code into Aspects. ICSM 2005: 27-36 - [c27]David W. Binkley, Mark Harman:
Locating Dependence Clusters and Dependence Pollution. ICSM 2005: 177-186 - [c26]David W. Binkley, Mark Harman:
Forward slices are smaller than backward slices. SCAM 2005: 15-24 - [c25]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
Minimal Slicing and the Relationships Between Forms of Slicing. SCAM 2005: 45-56 - [i2]David W. Binkley, Mark Harman, Jens Krinke:
05451 Abstracts Collection -- Beyond Program Slicing. Beyond Program Slicing 2005 - [i1]Mark Harman, David W. Binkley, Jens Krinke:
05451 Executive Summary -- Beyond Program Slicing Dagstuhl Seminar. Beyond Program Slicing 2005 - 2004
- [j16]David W. Binkley, Mark Harman:
A survey of empirical results on program slicing. Adv. Comput. 62: 105-178 (2004) - [j15]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang, David W. Binkley, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya:
Syntax-Directed Amorphous Slicing. Autom. Softw. Eng. 11(1): 27-61 (2004) - [j14]David W. Binkley, Liz Burd, Mark Harman, Paolo Tonella:
Introduction. Softw. Qual. J. 12(4): 293-295 (2004) - [j13]David W. Binkley, Mark Harman:
Analysis and Visualization of Predicate Dependence on Formal Parameters and Global Variables. IEEE Trans. Software Eng. 30(11): 715-735 (2004) - [c24]André Baresel, David W. Binkley, Mark Harman, Bogdan Korel:
Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach. ISSTA 2004: 108-118 - [c23]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Lahcen Ouarbya:
Formalizing Executable Dynamic and Forward Slicing. SCAM 2004: 43-52 - [c22]Mark Harman, David W. Binkley, Ranjit Singh, Robert M. Hierons:
Amorphous Procedure Extraction. SCAM 2004: 85-94 - [c21]Lin Hu, Mark Harman, Robert M. Hierons, David W. Binkley:
Loop Squashing Transformations for Amorphous Slicing. WCRE 2004: 152-160 - [c20]Timothy M. Meyers, David W. Binkley:
Slice-Based Cohesion Metrics and Software Intervention. WCRE 2004: 256-265 - 2003
- [j12]Mark Harman, David W. Binkley, Sebastian Danicic:
Amorphous program slicing. J. Syst. Softw. 68(1): 45-64 (2003) - [c19]David W. Binkley, Mark Harman:
An Empirical Study of Predicate Dependence Levels and Trends. ICSE 2003: 330-340 - [c18]David W. Binkley, Mark Harman:
A Large-Scale Empirical Study of Forward and Backward Static Slice Size and Context Sensitivity. ICSM 2003: 44-53 - [c17]David W. Binkley, Mark Harman:
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms. SCAM 2003: 203- - [c16]Keith B. Gallagher, David W. Binkley:
An Empirical Study of Computation Equivalence as Determined by Decomposition Slice Equivalence. WCRE 2003: 316-322 - [p1]Marvin V. Zelkowitz, Dolores R. Wallace, David W. Binkley:
Experimental Validation of New Software Technology. Lecture Notes on Empirical Software Engineering 2003: 229-263 - 2002
- [j11]Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:
Flow insensitive points-to sets. Inf. Softw. Technol. 44(13): 743-754 (2002) - [c15]David W. Binkley:
An Empirical Study of the Effect of Semantic Differences on Programmer Comprehension. IWPC 2002: 97-106 - [c14]Mark Harman, Nicolas Gold, Robert M. Hierons, David W. Binkley:
Code Extraction Algorithms which Unify Slicing and Concept Assignment. WCRE 2002: 11-21 - 2001
- [c13]David W. Binkley, Rob Capellini, L. Ross Raszewski, Christopher Smith:
An Implementation of and Experiment with Semantic Differencing. ICSM 2001: 82-91 - [c12]Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:
Flow Insensitive Points-To Sets. SCAM 2001: 81-91 - 2000
- [j10]David W. Binkley:
Reducing the cost of regression testing. ACM SIGSOFT Softw. Eng. Notes 25(1): 35-36 (2000) - [c11]David W. Binkley, L. Ross Raszewski, Christopher Smith, Mark Harman:
An Empirical Study of Amorphous Slicing as a Program Comprehension Support Tool. IWPC 2000: 161-170
1990 – 1999
- 1999
- [c10]Mark Harman, Chris Fox, Robert M. Hierons, David W. Binkley, Sebastian Danicic:
Program Simplification as a Means of Approximating Undecidable Propositions. IWPC 1999: 208-217 - [c9]David W. Binkley:
Computing Amorphous Program Slices Using Dependence Graphs. SAC 1999: 519-525 - 1998
- [j9]David W. Binkley:
The application of program slicing to regression testing. Inf. Softw. Technol. 40(11-12): 583-594 (1998) - [j8]David W. Binkley, James R. Lyle:
Application of the pointer state subgraph to static program slicing. J. Syst. Softw. 40(1): 17-27 (1998) - [c8]David W. Binkley, Bruce Duncan, Brennan Jubb, April Wielgosz:
The Feedback Compiler. IWPC 1998: 198-205 - 1997
- [j7]David W. Binkley:
C++ in Safety Critical Systems. Ann. Softw. Eng. 4: 223-234 (1997) - [j6]David W. Binkley:
Semantics Guided Regression Test Cost Reduction. IEEE Trans. Software Eng. 23(8): 498-516 (1997) - [c7]David W. Binkley, Bradley M. Kuhn:
Crozzle: an NP-complete problem. SAC 1997: 30-34 - 1996
- [j5]David W. Binkley, Keith Brian Gallagher:
Program Slicing. Adv. Comput. 43: 1-50 (1996) - [c6]Bradley M. Kuhn, David W. Binkley:
An enabling optimization for C++ virtual functions. SAC 1996: 420-428 - 1995
- [j4]David W. Binkley, Susan Horwitz, Thomas W. Reps:
Program Integration for Languages with Procedure Calls. ACM Trans. Softw. Eng. Methodol. 4(1): 3-35 (1995) - [c5]David W. Binkley:
Reducing the cost of regression testing by semantics guided test case selection. ICSM 1995: 251- - 1994
- [j3]Bradley M. Kuhn, David W. Binkley:
In search of a customizable and uniform user interface. XRDS 1(2): 34-39 (1994) - [c4]David W. Binkley:
Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model. CC 1994: 374-388 - 1993
- [j2]David W. Binkley:
Precise Executable Interprocedural Slices. LOPLAS 2(1-4): 31-45 (1993) - 1992
- [c3]David W. Binkley:
Using semantic differencing to reduce the cost of regression testing. ICSM 1992: 41-50 - 1990
- [j1]Susan Horwitz, Thomas W. Reps, David W. Binkley:
Interprocedural Slicing Using Dependence Graphs. ACM Trans. Program. Lang. Syst. 12(1): 26-60 (1990)
1980 – 1989
- 1988
- [c2]Susan Horwitz, Thomas W. Reps, David W. Binkley:
Interprocedural Slicing Using Dependence Graphs. PLDI 1988: 35-46 - [c1]Susan Horwitz, Thomas W. Reps, David W. Binkley:
Interprocedural slicing using dependence graphs (with retrospective). Best of PLDI 1988: 229-243
Coauthor Index
aka: Nicolas Gold
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint