Andreas Zeller
Andreas Zeller
Faculty, CISPA Helmholtz Center for Information Security • Professor, Saarland University
Verified email at - Homepage
Cited by
Cited by
Mining version histories to guide software changes
T Zimmermann, P Weissgerber, S Diehl, A Zeller
IEEE Transactions on Software Engineering 31 (6), 429-445, 2005
Simplifying and isolating failure-inducing input
A Zeller, R Hildebrandt
IEEE Transactions on Software Engineering 28 (2), 183-200, 2002
When do changes induce fixes?
J Śliwerski, T Zimmermann, A Zeller
ACM sigsoft software engineering notes 30 (4), 1-5, 2005
Mining metrics to predict component failures
N Nagappan, T Ball, A Zeller
Proceedings of the 28th international conference on Software engineering …, 2006
Predicting defects for Eclipse
T Zimmermann, R Premraj, A Zeller
Predictor Models in Software Engineering, 2007. PROMISE'07: ICSE Workshops …, 2007
Locating causes of program failures
H Cleve, A Zeller
Proceedings. 27th International Conference on Software Engineering, 2005 …, 2005
Isolating cause-effect chains from computer programs
A Zeller
ACM SIGSOFT Software Engineering Notes 27 (6), 1-10, 2002
Why programs fail: a guide to systematic debugging
A Zeller
Elsevier, 2009
Predicting faults from cached history
S Kim, T Zimmermann, EJ Whitehead Jr, A Zeller
29th International Conference on Software Engineering (ICSE'07), 489-498, 2007
Yesterday, my program worked. Today, it does not. Why?
A Zeller
ACM SIGSOFT Software engineering notes 24 (6), 253-267, 1999
Checking app behavior against app descriptions
A Gorla, I Tavecchia, F Gross, A Zeller
Proceedings of the 36th international conference on software engineering …, 2014
How long will it take to fix this bug?
C Weiss, R Premraj, T Zimmermann, A Zeller
Fourth International Workshop on Mining Software Repositories (MSR'07: ICSE …, 2007
Mutation-driven generation of unit tests and oracles
G Fraser, A Zeller
IEEE Transactions on Software Engineering 38 (2), 278-292, 2011
It's not a bug, it's a feature: how misclassification impacts bug prediction
K Herzig, S Just, A Zeller
2013 35th international conference on software engineering (ICSE), 392-401, 2013
Predicting vulnerable software components
S Neuhaus, T Zimmermann, C Holler, A Zeller
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Fuzzing with code fragments
C Holler, K Herzig, A Zeller
21st USENIX Security Symposium (USENIX Security 12), 445-458, 2012
Detecting object usage anomalies
A Wasylkowski, A Zeller, C Lindig
Proceedings of the the 6th joint meeting of the European software …, 2007
Automated fixing of programs with contracts
Y Wei, Y Pei, CA Furia, LS Silva, S Buchholz, B Meyer, A Zeller
Proceedings of the 19th international symposium on Software testing and …, 2010
The impact of tangled code changes
K Herzig, A Zeller
2013 10th Working Conference on Mining Software Repositories (MSR), 121-130, 2013
Mining apps for abnormal usage of sensitive data
V Avdiienko, K Kuznetsov, A Gorla, A Zeller, S Arzt, S Rasthofer, ...
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20