Iftekhar Ahmed
Iftekhar Ahmed
Verified email at uci.edu - Homepage
TitleCited byYear
On the limits of mutation reduction strategies
R Gopinath, MA Alipour, I Ahmed, C Jensen, A Groce
Proceedings of the 38th international conference on software engineering …, 2016
322016
Understanding code smells in android applications
UA Mannan, I Ahmed, RAM Almurshed, D Dig, C Jensen
2016 IEEE/ACM International Conference on Mobile Software Engineering and …, 2016
312016
Can testedness be effectively measured?
I Ahmed, R Gopinath, C Brindescu, A Groce, C Jensen
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
222016
How hard does mutation analysis have to be, anyway?
R Gopinath, A Alipour, I Ahmed, C Jensen, A Groce
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
212015
Applying mutation analysis on kernel test suites: an experience report
I Ahmed, C Jensen, A Groce, PE McKenney
2017 IEEE International Conference on Software Testing, Verification and …, 2017
162017
How verified is my code? falsification-driven verification (t)
A Groce, I Ahmed, C Jensen, PE McKenney
2015 30th IEEE/ACM International Conference on Automated Software …, 2015
152015
Mutation reduction strategies considered harmful
R Gopinath, I Ahmed, MA Alipour, C Jensen, A Groce
IEEE Transactions on Reliability 66 (3), 854-874, 2017
142017
An empirical study of design degradation: How software projects get worse over time
I Ahmed, UA Mannan, R Gopinath, C Jensen
2015 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2015
142015
Measuring effectiveness of mutant sets
R Gopinath, A Alipour, I Ahmed, C Jensen, A Groce
2016 IEEE Ninth International Conference on Software Testing, Verification …, 2016
132016
Trust me, i'm an expert: Trust, homophily and expertise in mmos
MA Ahmad, I Ahmed, J Srivastava, MS Poole
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
122011
An empirical examination of the relationship between code smells and merge conflicts
I Ahmed, C Brindescu, UA Mannan, C Jensen, A Sarma
2017 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2017
112017
Does choice of mutation tool matter?
R Gopinath, I Ahmed, MA Alipour, C Jensen, A Groce
Software Quality Journal 25 (3), 871-920, 2017
112017
The Impact of Automatic Crash Reports on Bug Triaging and Development in Mozilla
I Ahmed, N Mohan, C Jensen
Proceedings of The International Symposium on Open Collaboration, 1-8, 2014
112014
Do mutation reduction strategies matter?
R Gopinath, A Alipour, I Ahmed, C Jensen, A Groce
92015
Identification of groups in online environments: The twist and turns of grouping groups
I Ahmed, C Brown, A Pilny, D Cai, YA Ada, MS Poole
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
82011
An empirical comparison of mutant selection approaches
R Gopinath, A Alipour, I Ahmed, C Jensen, A Groce
52015
An exploration of code quality in FOSS projects
I Ahmed, S Ghorashi, C Jensen
IFIP International Conference on Open Source Systems, 181-190, 2014
52014
How verified (or tested) is my code? Falsification-driven verification and testing
A Groce, I Ahmed, C Jensen, PE McKenney, J Holmes
Automated Software Engineering 25 (4), 917-960, 2018
42018
Identifying a typology of players based on longitudinal game data
I Ahmed, A Mahapatra, MS Poole, J Srivastava, C Brown
Predicting Real World Behaviors from Virtual World Data, 103-115, 2014
42014
SocialMapExplorer: visualizing social networks of massively multiplayer online games in temporal-geographic space
YD Cai, C Brown, I Ahmed, Y Atouba, A Pilny, MS Poole
Proceedings of the Conference on Extreme Science and Engineering Discovery …, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20