Oldest pages
Jump to navigation
Jump to search
Showing below up to 23 results in range #1 to #23.
- An Empirical Evaluation of Assessing Software Requirements for Legal Compliance (06:19, 6 February 2013)
- How to do References (23:06, 14 March 2013)
- An Empirical Evaluation of the MuJava Mutation Operators (23:08, 14 March 2013)
- Formatting decisions (23:15, 14 March 2013)
- Notes about Images (17:57, 15 March 2013)
- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks (18:30, 15 March 2013)
- ICST.Table 1 (22:34, 24 August 2013)
- JCSM.Figure1 (00:40, 26 August 2013)
- JSCM.Figure2 (00:53, 26 August 2013)
- On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis" (01:11, 26 August 2013)
- Emse-table-5 (14:35, 5 September 2013)
- EmSE-Figure7 (21:00, 8 September 2013)
- Emse-table-7 (21:13, 8 September 2013)
- Emse-table-8 (21:22, 8 September 2013)
- Emse-table-10 (21:38, 8 September 2013)
- Emse-Table-11 (21:47, 8 September 2013)
- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (22:28, 8 September 2013)
- Truckers Drive Their Own Assessment for Obstructive Sleep Apnea: A Collaborative Approach to Online Self-Assessment for Obstructive Sleep Apnea (22:28, 8 September 2013)
- On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis (22:28, 8 September 2013)
- IHI Table1 (22:32, 5 January 2014)
- Modifying Without a Trace: High-level Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms (22:39, 5 January 2014)
- Proposing SQL Statement Coverage Metrics (14:46, 16 May 2021)
- Main Page (14:27, 12 July 2025)