default search action
Jens Krinke
Person information
- affiliation: University College London, UK
- affiliation (former): King's College London, UK
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Chaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta, Federica Sarro:
Adoption of automated software engineering tools and techniques in Thailand. Empir. Softw. Eng. 29(4): 90 (2024) - [j31]Carlos Galindo, Jens Krinke, Sergio Pérez, Josep Silva:
Field-sensitive program slicing. J. Syst. Softw. 210: 111939 (2024) - 2022
- [j30]Nicolas E. Gold, Jens Krinke:
Ethics in the mining of software repositories. Empir. Softw. Eng. 27(1): 17 (2022) - [j29]Robert White, Jens Krinke:
TCTracer: Establishing test-to-code traceability links using dynamic and static techniques. Empir. Softw. Eng. 27(3): 67 (2022) - [j28]Giovani Guizzo, Federica Sarro, Jens Krinke, Silvia R. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. IEEE Trans. Software Eng. 48(3): 803-818 (2022) - [c65]Jens Krinke, Chaiyong Ragkhitwetsagul:
BigCloneBench Considered Harmful for Machine Learning. IWSC 2022: 1-7 - [c64]Carlos Galindo, Jens Krinke, Sergio Pérez, Josep Silva:
Field-Sensitive Program Slicing. SEFM 2022: 74-90 - [c63]Chaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta, Federica Sarro:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand. SANER 2022: 218-222 - 2021
- [j27]Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixão, Giuseppe Bianco, Rocco Oliveto:
Toxic Code Snippets on Stack Overflow. IEEE Trans. Software Eng. 47(3): 560-581 (2021) - [j26]Matheus Paixão, Jens Krinke, DongGyun Han, Chaiyong Ragkhitwetsagul, Mark Harman:
The Impact of Code Review on Architectural Changes. IEEE Trans. Software Eng. 47(5): 1041-1059 (2021) - [c62]Robert White, Jens Krinke, Earl T. Barr, Federica Sarro, Chaiyong Ragkhitwetsagul:
Artefact Relation Graphs for Unit Test Reuse Recommendation. ICST 2021: 137-147 - [p2]Jens Krinke, Chaiyong Ragkhitwetsagul:
Code Similarity in Clone Detection. Code Clone Analysis 2021: 135-150 - [i6]Giovani Guizzo, Federica Sarro, Jens Krinke, Silvia Regina Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies. CoRR abs/2103.07241 (2021) - 2020
- [j25]Seongmin Lee, Dave W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
Evaluating lexical approximation of program dependence. J. Syst. Softw. 160 (2020) - [c61]Robert White, Jens Krinke, Raymond Tan:
Establishing multilevel test-to-code traceability links. ICSE 2020: 861-872 - [c60]Matheus Paixão, Anderson G. Uchôa, Ana Carla Bibiano, Daniel Oliveira, Alessandro Garcia, Jens Krinke, Emilio Arvonio:
Behind the Intents: An In-depth Empirical Study on Software Refactoring in Modern Code Review. MSR 2020: 125-136 - [c59]Nicolas E. Gold, Jens Krinke:
Ethical Mining: A Case Study on MSR Mining Challenges. MSR 2020: 265-276 - [c58]DongGyun Han, Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixão, Giovanni Rosa:
Does code review really remove coding convention violations? SCAM 2020: 43-53 - [i5]Robert White, Jens Krinke:
ReAssert: Deep Learning for Assert Generation. CoRR abs/2011.09784 (2020)
2010 – 2019
- 2019
- [j24]Pengfei Wang, Jens Krinke, Xu Zhou, Kai Lu:
AVPredictor: Comprehensive prediction and detection of atomicity violations. Concurr. Comput. Pract. Exp. 31(15) (2019) - [j23]Chaiyong Ragkhitwetsagul, Jens Krinke:
Siamese: scalable and incremental code clone search via multiple code representations. Empir. Softw. Eng. 24(4): 2236-2284 (2019) - [j22]David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
A comparison of tree- and line-oriented observational slicing. Empir. Softw. Eng. 24(5): 3077-3113 (2019) - [j21]René Just, Jens Krinke, Nan Li, José Miguel Rojas:
Special issue on mutation testing and analysis. Softw. Test. Verification Reliab. 29(1-2) (2019) - [c57]Nikolaos Bafatakis, Niels Boecker, Wenjie Boon, Martin Cabello Salazar, Jens Krinke, Gazi Oznacar, Robert White:
Python coding style compliance on stack overflow. MSR 2019: 210-214 - 2018
- [j20]Chaiyong Ragkhitwetsagul, Jens Krinke, David Clark:
A comparison of code similarity analysers. Empir. Softw. Eng. 23(4): 2464-2519 (2018) - [c56]Seongmin Lee, David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
MOBS: multi-operator observation-based slicing using lexical approximation of program dependence. ICSE (Companion Volume) 2018: 302-303 - [c55]Chaiyong Ragkhitwetsagul, Jens Krinke, Bruno Marnette:
A picture is worth a thousand words: Code clone detection based on image similarity. IWSC 2018: 44-50 - [c54]Matheus Paixão, Jens Krinke, DongGyun Han, Mark Harman:
CROP: linking code reviews to source code changes. MSR 2018: 46-49 - [c53]John Wilkie, Ziad Al Halabi, Alperen Karaoglu, Jiafeng Liao, George Ndungu, Chaiyong Ragkhitwetsagul, Matheus Paixão, Jens Krinke:
Who's this?: developer identification using IDE event data. MSR 2018: 90-93 - [c52]Robert White, Jens Krinke:
TestNMT: function-to-test neural machine translation. NL4SE@ESEC/SIGSOFT FSE 2018: 30-33 - [i4]Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixão, Giuseppe Bianco, Rocco Oliveto:
Toxic Code Snippets on Stack Overflow. CoRR abs/1806.07659 (2018) - [i3]Chaiyong Ragkhitwetsagul, Jens Krinke, Rocco Oliveto:
Awareness and Experience of Developers to Outdated and License-Violating Code on Stack Overflow: An Online Survey. CoRR abs/1806.08149 (2018) - 2017
- [j19]Fan Wu, Jay Nanavati, Mark Harman, Yue Jia, Jens Krinke:
Memory mutation testing. Inf. Softw. Technol. 81: 97-111 (2017) - [c51]Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. HCI (22) 2017: 25-44 - [c50]Jens Krinke, Nan Li, José Miguel Rojas:
Message from the Mutation 2017 Chairs. ICST Workshops 2017: 85-86 - [c49]Chaiyong Ragkhitwetsagul, Jens Krinke:
Using compilation/decompilation to enhance clone detection. IWSC 2017: 8-14 - [c48]Matheus Paixão, Jens Krinke, DongGyun Han, Chaiyong Ragkhitwetsagul, Mark Harman:
Are developers aware of the architectural impact of their changes? ASE 2017: 95-105 - [c47]David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
Tree-Oriented vs. Line-Oriented Observation-Based Slicing. SCAM 2017: 21-30 - [c46]Nicolas E. Gold, David W. Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
Generalized observational slicing for tree-represented modelling languages. ESEC/SIGSOFT FSE 2017: 547-558 - [c45]Pengfei Wang, Jens Krinke, Kai Lu, Gen Li, Steve Dodier-Lazaro:
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. USENIX Security Symposium 2017: 1-16 - 2016
- [c44]Yibiao Yang, Mark Harman, Jens Krinke, Syed S. Islam, David W. Binkley, Yuming Zhou, Baowen Xu:
An empirical study on dependence clusters for effort-aware fault-proneness prediction. ASE 2016: 296-307 - [c43]Chaiyong Ragkhitwetsagul, Jens Krinke, David Clark:
Similarity of Source Code in the Presence of Pervasive Modifications. SCAM 2016: 117-126 - [c42]Fan Wu, Mark Harman, Yue Jia, Jens Krinke:
HOMI: Searching Higher Order Mutants for Software Improvement. SSBSE 2016: 18-33 - [c41]Chaiyong Ragkhitwetsagul, Matheus Paixão, Manal T. Adham, Saheed A. Busari, Jens Krinke, John H. Drake:
Searching for Configurations in Clone Evaluation - A Replication Study. SSBSE 2016: 250-256 - 2015
- [c40]Yue Jia, Fan Wu, Mark Harman, Jens Krinke:
Genetic Improvement using Higher Order Mutation. GECCO (Companion) 2015: 803-804 - [c39]Fan Wu, Westley Weimer, Mark Harman, Yue Jia, Jens Krinke:
Deep Parameter Optimisation. GECCO 2015: 1375-1382 - [c38]Jay Nanavati, Fan Wu, Mark Harman, Yue Jia, Jens Krinke:
Mutation testing of memory-related operators. ICST Workshops 2015: 1-10 - [c37]David W. Binkley, Nicolas E. Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
ORBS and the limits of static slicing. SCAM 2015: 1-10 - [e3]Rainer Koschke, Jens Krinke, Martin P. Robillard:
2015 IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, Bremen, Germany, September 29 - October 1, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7532-0 [contents] - 2014
- [j18]Syed S. Islam, Jens Krinke, David W. Binkley, Mark Harman:
Coherent clusters in source code. J. Syst. Softw. 88: 1-24 (2014) - [j17]Katsuro Inoue, Rainer Koschke, Jens Krinke:
Special issue on software clones (IWSC'12). Sci. Comput. Program. 95: 389 (2014) - [j16]Mark Harman, Jens Krinke, Inmaculada Medina-Bulo, Francisco Palomo-Lozano, Jian Ren, Shin Yoo:
Exact scalable sensitivity analysis for the next release problem. ACM Trans. Softw. Eng. Methodol. 23(2): 19:1-19:31 (2014) - [c36]David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:
ORBS: language-independent program slicing. SIGSOFT FSE 2014: 109-120 - [c35]Mark Harman, Yue Jia, Jens Krinke, William B. Langdon, Justyna Petke, Yuanyuan Zhang:
Search based software engineering for software product line engineering: a survey and directions for future work. SPLC 2014: 5-18 - [c34]Haitao Dan, Mark Harman, Jens Krinke, Lingbo Li, Alexandru Marginean, Fan Wu:
Pidgin Crasher: Searching for Minimised Crashing GUI Event Sequences. SSBSE 2014: 253-258 - 2013
- [j15]Kelly Androutsopoulos, David Clark, Mark Harman, Jens Krinke, Laurence Tratt:
State-based model slicing: A survey. ACM Comput. Surv. 45(4): 53:1-53:36 (2013) - [j14]David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Zheng Li:
Efficient Identification of Linchpin Vertices in Dependence Clusters. ACM Trans. Program. Lang. Syst. 35(2): 7:1-7:35 (2013) - [c33]Tiantian Wang, Mark Harman, Yue Jia, Jens Krinke:
Searching for better configurations: a rigorous approach to clone evaluation. ESEC/SIGSOFT FSE 2013: 455-465 - 2012
- [c32]Manishankar Mondal, Chanchal K. Roy, Md. Saidur Rahman, Ripon K. Saha, Jens Krinke, Kevin A. Schneider:
Comparative stability of cloned and non-cloned code: an empirical study. SAC 2012: 1227-1234 - [e2]James R. Cordy, Katsuro Inoue, Rainer Koschke, Jens Krinke, Chanchal K. Roy:
Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1794-8 [contents] - 2011
- [c31]Nicolas Gold, Jens Krinke, Mark Harman, David W. Binkley:
Cloning in Max/MSP Patches. ICMC 2011 - [c30]Manishankar Mondal, Md. Saidur Rahman, Ripon K. Saha, Chanchal K. Roy, Jens Krinke, Kevin A. Schneider:
An Empirical Study of the Impacts of Clones in Software Maintenance. ICPC 2011: 242-245 - [c29]Jens Krinke:
Is cloned code older than non-cloned code? IWSC 2011: 28-33 - 2010
- [c28]Jens Krinke, Nicolas Gold, Yue Jia, David W. Binkley:
Distinguishing copies from originals in software clones. IWSC 2010: 41-48 - [c27]Nicolas Gold, Jens Krinke, Mark Harman, David W. Binkley:
Issues in clone classification for dataflow languages. IWSC 2010: 83-84 - [c26]Jens Krinke, Nicolas Gold, Yue Jia, David W. Binkley:
Cloning and copying between GNOME projects. MSR 2010: 98-101 - [c25]Syed S. Islam, Jens Krinke, David W. Binkley, Mark Harman:
Coherent dependence clusters. PASTE 2010: 53-60 - [c24]Syed S. Islam, Jens Krinke, David W. Binkley:
Dependence cluster visualization. SOFTVIS 2010: 93-102
2000 – 2009
- 2009
- [j13]Mark Harman, David W. Binkley, Keith B. Gallagher, Nicolas Gold, Jens Krinke:
Dependence clusters in source code. ACM Trans. Program. Lang. Syst. 32(1): 1:1-1:33 (2009) - [c23]Mark Harman, Jens Krinke, Jian Ren, Shin Yoo:
Search based data sensitivity analysis applied to requirement engineering. GECCO 2009: 1681-1688 - 2008
- [j12]Jens Krinke:
Mining execution relations for crosscutting concerns. IET Softw. 2(2): 65-78 (2008) - [c22]Jens Krinke:
Is Cloned Code More Stable than Non-cloned Code? SCAM 2008: 57-66 - [c21]Kim Mens, Andy Kellens, Jens Krinke:
Pitfalls in Aspect Mining. WCRE 2008: 113-122 - 2007
- [j11]Jens Krinke:
Changes to Code Clones in Evolving Software. Softwaretechnik-Trends 27(2) (2007) - [j10]David W. Binkley, Mark Harman, Jens Krinke:
Empirical study of optimization techniques for massive slicing. ACM Trans. Program. Lang. Syst. 30(1): 3 (2007) - [j9]Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, Ettore Merlo:
Comparison and Evaluation of Clone Detection Tools. IEEE Trans. Software Eng. 33(9): 577-591 (2007) - [c20]Jens Krinke:
Statement-Level Cohesion Metrics and their Visualization. SCAM 2007: 37-48 - [c19]Jens Krinke:
A Study of Consistent and Inconsistent Changes to Code Clones. WCRE 2007: 170-178 - [c18]Philipp Bouillon, Jens Krinke, Nils Meyer, Friedrich Steimann:
EzUnit: A Framework for Associating Failed Unit Tests with Potential Programming Errors. XP 2007: 101-104 - 2006
- [j8]Jens Krinke:
Effects of context on program slicing. J. Syst. Softw. 79(9): 1249-1260 (2006) - [j7]Giuliano Antoniol, Jens Krinke, Paolo Tonella:
Special issue on Source code analysis and manipulation. Sci. Comput. Program. 62(3): 205-208 (2006) - [j6]Gregor Snelting, Torsten Robschink, Jens Krinke:
Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. Softw. Eng. Methodol. 15(4): 410-457 (2006) - [c17]Christian Hammer, Jens Krinke, Frank Nodes:
Intransitive Noninterference in Dependence Graphs. ISoLA 2006: 119-128 - [c16]Christian Hammer, Jens Krinke, Gregor Snelting:
Information Flow Control for Java Based on Path Conditions in Dependence Graphs. ISSSE 2006 - [c15]Christian Hammer, Martin Grimme, Jens Krinke:
Dynamic path conditions in dependence graphs. PEPM 2006: 58-67 - [c14]David W. Binkley, Mark Harman, Jens Krinke:
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. SCAM 2006: 43-52 - [c13]Jens Krinke:
Mining Control Flow Graphs for Crosscutting Concerns. WCRE 2006: 334-342 - [e1]David W. Binkley, Mark Harman, Jens Krinke:
Beyond Program Slicing, 06.11. - 11.11.2005. Dagstuhl Seminar Proceedings 05451, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - 2005
- [b4]Andreas Zeller, Jens Krinke:
Essential open source toolset - programming with Eclipse, JUnit, CVS, Bugzilla, Ant, Tcl/Tk and more. Wiley 2005, ISBN 978-0-470-84445-8, pp. I-XII, 1-392 - [c12]Philipp Bouillon, Jens Krinke, Stephan G. Lukosch:
Software Engineering Projects in Distant Teaching. CSEE&T 2005: 147-154 - [i2]David W. Binkley, Mark Harman, Jens Krinke:
05451 Abstracts Collection -- Beyond Program Slicing. Beyond Program Slicing 2005 - [i1]Mark Harman, David W. Binkley, Jens Krinke:
05451 Executive Summary -- Beyond Program Slicing Dagstuhl Seminar. Beyond Program Slicing 2005 - 2004
- [b3]Andreas Zeller, Jens Krinke:
Open-Source-Programmierwerkzeuge - Versionskontrolle, Konstruktion, Testen, Fehlersuche (2. Aufl.). dpunkt.verlag 2004, ISBN 978-3-89864-226-2, pp. I-XII, 1-398 - [b2]Jens Krinke:
Advanced slicing of sequential and concurrent programs. University of Passau, VDM Verlag Dr. Müller 2004, ISBN 978-3-8364-7545-7, pp. 1-226 - [j5]Jens Krinke:
Slicing, Chopping, and Path Conditions with Barriers. Softw. Qual. J. 12(4): 339-360 (2004) - [c11]Philipp Bouillon, Jens Krinke:
Using Eclipse in distant teaching of software engineering. eTX 2004: 22-26 - [c10]Jens Krinke:
Visualization of Program Dependence and Slices. ICSM 2004: 168-177 - [c9]Jens Krinke:
Advanced Slicing of Sequential and Concurrent Programs. ICSM 2004: 464-468 - [c8]Silvia Breu, Jens Krinke:
Aspect Mining Using Event Traces. ASE 2004: 310-315 - [c7]Jens Krinke:
Context-Sensitivity Matters, But Context Does Not. SCAM 2004: 29-35 - 2003
- [j4]Silvia Breu, Jens Krinke:
Aspect Mining Using Dynamic Analysis. Softwaretechnik-Trends 23(2) (2003) - [c6]Andrea De Lucia, Mark Harman, Robert M. Hierons, Jens Krinke:
Unions of Slices Are Not Slices. CSMR 2003: 363-367 - [c5]Jens Krinke:
Barrier Slicing and Chopping. SCAM 2003: 81-87 - [c4]Jens Krinke:
Context-sensitive slicing of concurrent programs. ESEC / SIGSOFT FSE 2003: 178-187 - [p1]Jens Krinke:
Advanced slicing of sequential and concurrent programs. Ausgezeichnete Informatikdissertationen 2003: 101-110 - 2002
- [j3]Jens Krinke, Maximilian Störzer, Andreas Zeller:
Web-basierte Programmierpraktika mit Praktomat. Softwaretechnik-Trends 22(3) (2002) - [c3]Jens Krinke:
Evaluating Context-Sensitive Slicing and Chopping. ICSM 2002: 22- - 2001
- [c2]Jens Krinke:
Identifying Similar Code with Program Dependence Graphs. WCRE 2001: 301-309 - 2000
- [b1]Andreas Zeller, Jens Krinke:
Programmierwerkzeuge - Versionskontrolle, Konstruktion, Testen, Fehlersuche unter Linux / Unix. dpunkt.verlag 2000, ISBN 978-3-932588-70-9, pp. I-X, 1-313
1990 – 1999
- 1999
- [j2]Jens Krinke, Torsten Robschink, Gregor Snelting:
Software-Sicherheitsprüfung mit VALSOFT. Inform. Forsch. Entwickl. 14(2): 62-73 (1999) - 1998
- [j1]Jens Krinke, Gregor Snelting:
Validation of measurement software as an application of slicing and constraint solving. Inf. Softw. Technol. 40(11-12): 661-675 (1998) - [c1]Jens Krinke:
Static Slicing of Threaded Programs. PASTE 1998: 35-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint