Heidar Pirzadeh

According to our database1, Heidar Pirzadeh authored at least 13 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A Novel Framework for Creating User Interface Level Tests Resistant to Refactoring of Web Applications.
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014

Resilient user interface level tests.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

2013
Stratified sampling of execution traces: Execution phases serving as strata.
Sci. Comput. Program., 2013

2011
The Concept of Stratified Sampling of Execution Traces.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

Exploiting text mining techniques in the analysis of execution traces.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

A software behaviour analysis framework based on the human perception systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Novel Approach Based on Gestalt Psychology for Abstracting the Content of Large Execution Traces for Program Comprehension.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

2010
An Extended Proof-Carrying Code Framework for Security Enforcement.
Trans. Comput. Sci., 2010

An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements.
Proceedings of the Software Engineering Research, 2010

2009
Quality of the Source Code for Design and Architecture Recovery Techniques: Utilities are the Problem.
Proceedings of the Ninth International Conference on Quality Software, 2009

2008
Encoding the Program Correctness Proofs as Programs in PCC Technology.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

VEP: a virtual machine for extended proof-carrying code.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008


  Loading...