Follow
Andreas Zeller
Andreas Zeller
Faculty, CISPA Helmholtz Center for Information Security • Professor, Saarland University
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Mining version histories to guide software changes
T Zimmermann, P Weissgerber, S Diehl, A Zeller
IEEE Transactions on Software Engineering 31 (6), 429-445, 2005
17812005
Simplifying and isolating failure-inducing input
A Zeller, R Hildebrandt
IEEE Transactions on software engineering 28 (2), 183-200, 2002
13852002
When do changes induce fixes?
J Śliwerski, T Zimmermann, A Zeller
ACM sigsoft software engineering notes 30 (4), 1-5, 2005
13632005
Mining metrics to predict component failures
N Nagappan, T Ball, A Zeller
Proceedings of the 28th international conference on Software engineering …, 2006
11352006
Predicting defects for Eclipse
T Zimmermann, R Premraj, A Zeller
Predictor Models in Software Engineering, 2007. PROMISE'07: ICSE Workshops …, 2007
10242007
Locating causes of program failures
H Cleve, A Zeller
Proceedings of the 27th international conference on Software engineering …, 2005
8862005
Why programs fail: a guide to systematic debugging
A Zeller
Morgan Kaufmann, 2009
8752009
Isolating cause-effect chains from computer programs
A Zeller
ACM SIGSOFT Software Engineering Notes 27 (6), 1-10, 2002
8702002
Predicting faults from cached history
S Kim, T Zimmermann, EJ Whitehead Jr, A Zeller
29th International Conference on Software Engineering (ICSE'07), 489-498, 2007
7352007
Yesterday, my program worked. Today, it does not. Why?
A Zeller
ACM SIGSOFT Software engineering notes 24 (6), 253-267, 1999
6721999
It's not a bug, it's a feature: how misclassification impacts bug prediction
K Herzig, S Just, A Zeller
2013 35th international conference on software engineering (ICSE), 392-401, 2013
6062013
How long will it take to fix this bug?
C Weiss, R Premraj, T Zimmermann, A Zeller
fourth international workshop on mining software repositories (MSR'07: ICSE …, 2007
5712007
Predicting vulnerable software components
S Neuhaus, T Zimmermann, C Holler, A Zeller
Proceedings of the 14th ACM conference on Computer and communications …, 2007
5662007
Checking app behavior against app descriptions
A Gorla, I Tavecchia, F Gross, A Zeller
Proceedings of the 36th international conference on software engineering …, 2014
5642014
Mutation-driven generation of unit tests and oracles
G Fraser, A Zeller
Proceedings of the 19th international symposium on Software testing and …, 2010
5362010
Fuzzing with code fragments
C Holler, K Herzig, A Zeller
21st USENIX Security Symposium (USENIX Security 12), 445-458, 2012
5292012
Automated fixing of programs with contracts
Y Wei, Y Pei, CA Furia, LS Silva, S Buchholz, B Meyer, A Zeller
Proceedings of the 19th international symposium on Software testing and …, 2010
4592010
The impact of tangled code changes
K Herzig, A Zeller
2013 10th Working Conference on Mining Software Repositories (MSR), 121-130, 2013
3792013
Mining apps for abnormal usage of sensitive data
V Avdiienko, K Kuznetsov, A Gorla, A Zeller, S Arzt, S Rasthofer, ...
2015 IEEE/ACM 37th IEEE international conference on software engineering 1 …, 2015
3592015
Detecting object usage anomalies
A Wasylkowski, A Zeller, C Lindig
Proceedings of the the 6th joint meeting of the European software …, 2007
3512007
The system can't perform the operation now. Try again later.
Articles 1–20