Paul Ammann

Affiliations:
  • George Mason University, Fairfax, Virginia, USA


According to our database1, Paul Ammann authored at least 106 papers between 1985 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
230, 439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers.
CoRR, 2024

2022
CONFETTI: Amplifying Concolic Guidance for Fuzzers.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Prioritizing Mutants to Guide Mutation Testing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Practice makes better: quiz retake software to increase student learning.
Proceedings of the EASEAI 2021: Proceedings of the 3rd International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, 2021

2020
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Teaching a Testing Concept (JUnit) with Active Learning.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

2019
Evaluating a Test Automation Decision Support Tool.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Guiding testing effort using mutant utility.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
An Industrial Application of Mutation Testing: Lessons, Challenges, and Research Directions.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018

2017
Mutation operators for testing Android apps.
Inf. Softw. Technol., 2017

A Novel Self-Paced Model for Teaching Programming.
Proceedings of the Fourth ACM Conference on Learning @ Scale, 2017

Inferring mutant utility from program context.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

2016
Barriers to Usable Security? Three Organizational Case Studies.
IEEE Secur. Priv., 2016

Analyzing the validity of selective mutation with dominator mutants.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Are We There Yet? How Redundant and Equivalent Mutants Affect Determination of Test Completeness.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

2015
Static analysis of mutant subsumption.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Towards mutation analysis of Android apps.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

EcoDroid: An Approach for Energy-Based Ranking of Android Apps.
Proceedings of the 4th IEEE/ACM International Workshop on Green and Sustainable Software, 2015

2014
Generating Test Data to Distinguish Conjunctive Queries with Equalities.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Mutant Subsumption Graphs.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Designing Deletion Mutation Operators.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Establishing Theoretical Minimal Sets of Mutants.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

2013
Improving logic-based testing.
J. Syst. Softw., 2013

2012
Guest Editorial for the Special Issue on Model-Based Testing.
Softw. Test. Verification Reliab., 2012

Adding Criteria-Based Tests to Test Driven Development.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
Reducing logic test set size while preserving fault detection.
Softw. Test. Verification Reliab., 2011

A logic mutation approach to selective mutation for programs and queries.
Inf. Softw. Technol., 2011

Better predicate testing.
Proceedings of the 6th International Workshop on Automation of Software Test, 2011

Using abstraction and Web applications to teach criteria-based test design.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

2010
An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Applying MCDC to Large DNF Logic Expressions.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Applications of Optimization to Logic Testing.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Testing with model checkers: a survey.
Softw. Test. Verification Reliab., 2009

Issues in using model checkers for test case generation.
J. Syst. Softw., 2009

Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Double Fault Detection.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

2008
Reconciling perspectives of software logic testing.
Softw. Test. Verification Reliab., 2008

Reachability and Propagation for LTL Requirements Testing.
Proceedings of the Eighth International Conference on Quality Software, 2008

Coverage Criteria for State Based Specifications.
Proceedings of the Formal Methods and Testing, 2008

Introduction to Software Testing.
Cambridge University Press, ISBN: 978-0-511-80916-3, 2008

2007
Can-Follow Concurrency Control.
IEEE Trans. Computers, 2007

Relating counterexamples to test cases in CTL model checking specifications.
Proceedings of the 3rd Workshop on Advances in Model Based Testing, 2007

2006
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

BPEL orchestration of secure webmail.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

An industrial case study of structural testing applied to safety-critical embedded software.
Proceedings of the 2006 International Symposium on Empirical Software Engineering (ISESE 2006), 2006

An Algebra for Composing Ontologies.
Proceedings of the Formal Ontology in Information Systems, 2006

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006

A weakest-adversary security metric for network configuration security analysis.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Policy-based dissemination of partial web-ontologies.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Email feedback: a policy-based approach to overcoming false positives.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

A Host-Based Approach to Network Attack Chaining Analysis.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
A Policy Driven Approach to Email Services.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Generating test data from state-based specifications.
Softw. Test. Verification Reliab., 2003

Coverage Criteria for Logical Expressions.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2002
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng., 2002

Scalable, graph-based network vulnerability analysis.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Using a Model Checker to Test Safety Properties.
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001

2000
System testing via mutation analysis of model checking specifications.
ACM SIGSOFT Softw. Eng. Notes, 2000

Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000

Rewriting Histories: Recovering from Malicious Transactions.
Distributed Parallel Databases, 2000

Using Model Checking to Analyze Network Vulnerabilities.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Evaluation of Three Specification-Based Testing Criteria.
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000

1999
Computer Security, Fault Tolerance, And Software Assurance.
IEEE Concurr., 1999

Surviving Information Warfare Attacks.
Computer, 1999

Trusted Recovery.
Commun. ACM, 1999

The Integrity Challenge.
Proceedings of the Integrity and Internal Control in Information Systems, 1999

Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

A Specification-Based Coverage Metric to Evaluate Test Sets.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

1998
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
J. Comput. Secur., 1998

Using Model Checking to Generate Tests from Specifications.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1997
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst., 1997

Rethinking integrity [distributed databases].
IEEE Concurrency, 1997

Semantics-based transaction processing: satisfying conflicting objectives.
IEEE Concurrency, 1997

Applying Data Redundancy to Differential Equation Solvers.
Ann. Softw. Eng., 1997

Surviving information warfare attacks on databases.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Maintaining Knowledge Currency in the 21st Century.
Proceedings of the Tenth Conference on Software Engineering Education and Training, 1997

Implementing Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Information Systems Engineering, 1997

Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997

1996
Globally Consistent Event Ordering in One-Directional Distributed Environments.
IEEE Trans. Parallel Distributed Syst., 1996

The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.
J. Comput. Secur., 1996

Maintaining Replicated Authorizations in Distributed Database Systems.
Data Knowl. Eng., 1996

Ensuring Atomicity of Multilevel Transactions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
On-The-Fly Reading of Entire Databases.
IEEE Trans. Knowl. Data Eng., 1995

The Partitioned Synchronization Rule for Planar Extendible Partial Orders.
IEEE Trans. Knowl. Data Eng., 1995

Concurrency Control in a Secure Database via a Two-Snapshot Algorithm.
J. Comput. Secur., 1995

Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
Proceedings of the VLDB'95, 1995

1994
The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing.
IEEE Trans. Software Eng., 1994

One-Representative Safety Analysis in the Non-Monotonic Transform Model.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

A Five Year Perspective on Software Engineering Graduate Programs at George Mason University.
Proceedings of the Software Engineering Education, 1994

Propagation of Authorizations in Distributed Database Systems.
Proceedings of the CCS '94, 1994

An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
Proceedings of the CCS '94, 1994

1993
Distributed Timestamp Generation in Planar Lattice Networks.
ACM Trans. Comput. Syst., 1993

Planar Lattice Security Structures for Multilevel Replicated Databases.
Proceedings of the Database Security, 1993

1992
The Extended Schematic Protection Model
J. Comput. Secur., 1992

A two snapshot algorithm for concurrency control in multi-level secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

Implementing transaction control expressions by checking for absence of access rights.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Safety Analysis for the Extended Schematic Protection Model.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
Proceedings of the Database Security, 1991

A distributed implementation of the extended schematic protection model.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
On the performance of software testing using multiple versions.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

Extending the creation operation in the Schematic Protection Model.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Issues Influencing the Use of N-Version Programming.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989

1988
Data Diversity: An Approach to Software Fault Tolerance.
IEEE Trans. Computers, 1988

1985
An Experimental Evaluation of Simple Methods for Seeding Program Errors.
Proceedings of the Proceedings, 1985


  Loading...