default search action
Suzette Person
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c27]Ethan Bütt, Suzette Person, Christopher Bohn:
Student-Sponsored Projects in a Capstone Course : Reflections and Lessons Learned. ICSE (SEET) 2022: 254-264 - 2021
- [c26]Colin Maly, Suzette Person, Leen-Kiat Soh:
SE-First: A New Approach to Software Engineering Education. FIE 2021: 1-9
2010 – 2019
- 2016
- [c25]Benjamin Hillery, Eric Mercer, Neha Rungta, Suzette Person:
Exact Heap Summaries for Symbolic Execution. VMCAI 2016: 206-225 - 2015
- [j7]Rody Kersten, Suzette Person, Neha Rungta, Oksana Tkachuk:
Improving Coverage of Test Cases Generated by Symbolic PathFinder for Programs with Loops. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-5 (2015) - [c24]Michael W. Whalen, Suzette Person, Neha Rungta, Matt Staats, Daniela Grijincu:
A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics. ICSE (1) 2015: 506-516 - [c23]Matias Waterloo, Suzette Person, Sebastian G. Elbaum:
Test Analysis: Searching for Faults in Tests (N). ASE 2015: 149-154 - [c22]Anitha Murugesan, Michael W. Whalen, Neha Rungta, Oksana Tkachuk, Suzette Person, Mats Per Erik Heimdahl, Dongjiang You:
Are We There Yet? Determining the Adequacy of Formalized Requirements and Test Suites. NFM 2015: 279-294 - 2014
- [j6]Benjamin Hillery, Eric Mercer, Neha Rungta, Suzette Person:
Towards a lazier symbolic pathfinder. ACM SIGSOFT Softw. Eng. Notes 39(1): 1-5 (2014) - [j5]Guowei Yang, Suzette Person, Neha Rungta, Sarfraz Khurshid:
Directed Incremental Symbolic Execution. ACM Trans. Softw. Eng. Methodol. 24(1): 3:1-3:42 (2014) - [c21]Neha Rungta, Oksana Tkachuk, Suzette Person, Jason Biatek, Michael W. Whalen, Joseph Castle, Karen Gundy-Burlet:
Helping system engineers bridge the peaks. TwinPeaks 2014: 9-13 - [c20]Anita Sarma, Joshua Branchaud, Matthew B. Dwyer, Suzette Person, Neha Rungta:
Development context driven change awareness and analysis framework. ICSE Companion 2014: 404-407 - [c19]Yurong Wang, Suzette Person, Sebastian G. Elbaum, Matthew B. Dwyer:
A framework to advise tests using tests. ICSE Companion 2014: 440-443 - [c18]Guowei Yang, Sarfraz Khurshid, Suzette Person, Neha Rungta:
Property differencing for incremental checking. ICSE 2014: 1059-1070 - [c17]Lingming Zhang, Guowei Yang, Neha Rungta, Suzette Person, Sarfraz Khurshid:
Feedback-driven dynamic invariant discovery. ISSTA 2014: 362-372 - 2013
- [j4]Suzette Person, Neha Rungta:
Maintaining the health of software monitors. Innov. Syst. Softw. Eng. 9(4): 257-269 (2013) - [c16]Baishakhi Ray, Miryung Kim, Suzette Person, Neha Rungta:
Detecting and characterizing semantic inconsistencies in ported code. ASE 2013: 367-377 - [c15]John D. Backes, Suzette Person, Neha Rungta, Oksana Tkachuk:
Regression Verification Using Impact Summaries. SPIN 2013: 99-116 - 2012
- [j3]Eric Mercer, Suzette Person, Neha Rungta:
Computing and visualizing the impact of change with Java PathFinder extensions. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-5 (2012) - [c14]Neha Rungta, Suzette Person, Joshua Branchaud:
A change impact analysis to characterize evolving program behaviors. ICSM 2012: 109-118 - [e1]Alwyn Goodloe, Suzette Person:
NASA Formal Methods - 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7226, Springer 2012, ISBN 978-3-642-28890-6 [contents] - 2011
- [c13]Suzette Person, Guowei Yang, Neha Rungta, Sarfraz Khurshid:
Directed incremental symbolic execution. PLDI 2011: 504-515 - 2010
- [c12]Matthew B. Dwyer, Rahul Purandare, Suzette Person:
Runtime Verification in Context: Can Optimizing Error Detection Improve Fault Diagnosis? RV 2010: 36-50
2000 – 2009
- 2009
- [c11]Suzette Person, Matthew B. Dwyer:
Generalized Abstract Symbolic Summaries for Differencing Heap-manipulating Programs. NASA Formal Methods 2009: 46-55 - 2008
- [c10]Corina S. Pasareanu, Peter C. Mehlitz, David H. Bushnell, Karen Gundy-Burlet, Michael R. Lowry, Suzette Person, Mark Pape:
Combining unit-level symbolic execution and system-level concrete execution for testing NASA software. ISSTA 2008: 15-26 - [c9]Suzette Person, Matthew B. Dwyer, Sebastian G. Elbaum, Corina S. Pasareanu:
Differential symbolic execution. SIGSOFT FSE 2008: 226-237 - 2007
- [c8]Matthew B. Dwyer, Sebastian G. Elbaum, Suzette Person, Rahul Purandare:
Parallel Randomized State-Space Search. ICSE 2007: 3-12 - [c7]Sebastian G. Elbaum, Suzette Person, Jonathan Dokulil, Matthew Jorde:
Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable. ICSE 2007: 688-697 - 2006
- [c6]Matthew B. Dwyer, Suzette Person, Sebastian G. Elbaum:
Controlling factors in evaluating path-sensitive error detection techniques. SIGSOFT FSE 2006: 92-104 - 2005
- [c5]Leen-Kiat Soh, Ashok Samal, Suzette Person, Gwen Nugent, Jeff Lang:
Analyzing relationships between closed labs and course activities in CS1. ITiCSE 2005: 183-187 - [c4]Gwen Nugent, Leen-Kiat Soh, Ashok Samal, Suzette Person, Jeff Lang:
Design, development, and validation of a learning object for CS1. ITiCSE 2005: 370 - [c3]Leen-Kiat Soh, Ashok Samal, Suzette Person, Gwen Nugent, Jeff Lang:
Closed laboratories with embedded instructional research design for CS1. SIGCSE 2005: 297-301 - [c2]Leen-Kiat Soh, Ashok Samal, Suzette Person, Gwen Nugent, Jeff Lang:
Designing, implementing, and analyzing a placement test for introductory CS courses. SIGCSE 2005: 505-509 - 2004
- [c1]Todd Blank, Leen-Kiat Soh, Lee Dee Miller, Suzette Person:
Case-based learning mechanisms to deliver learning materials. ICMLA 2004: 423-428
1990 – 1999
- 1997
- [j2]Suzette Person:
Book Reviews: What Every Software Manager MUST KNOW TO SUCCEED With Object Technology, John Williams. ACM SIGSOFT Softw. Eng. Notes 22(1): 109 (1997) - 1996
- [j1]Suzette Person:
Book Review: The Object Primer. ACM SIGSOFT Softw. Eng. Notes 21(4): 104 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint