Name
Affiliation
Papers
MICHAEL D. ERNST
University of Washington, Seattle, WA, USA
170
Collaborators
Citations 
PageRank 
260
6629
347.51
Referers 
Referees 
References 
9461
3688
3217
Search Limit
1001000
Title
Citations
PageRank
Year
An Empirical Study of Fault Localization Families and Their Combinations220.642021
Checking conformance of applications against GUI policies00.342021
Verifying Determinism in Sequential Programs00.342021
MeMo: Automatically identifying metamorphic relations in Javadoc comments for test automation10.352021
Visualizing Distributed System Executions20.352020
Verifying object construction10.362020
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size40.392020
Where should I comment my code? - a dataset and model for predicting locations that need comments.00.342020
Research on NLP for RE at Università della Svizzera Italiana (USI): A Report.00.342019
Static Identification of Injection Attacks in Java10.352019
Modular verification of web page layout10.362019
Lightweight verification of array indexing.00.342018
Comparing developer-provided to user-provided tests for fault localization and automated program repair.50.382018
An Empirical Study of Fault Localization Families and Their Combinations.30.362018
Translating code comments to procedure specifications.120.502018
Generalized data structure synthesis.10.352018
A Graphical Interactive Debugger for Distributed Systems.00.342018
Natural Language is a Programming Language: Applying Natural Language Processing to Software Development.00.342017
Verifying Invariants of Lock-Free Data Structures with Rely-Guarantee and Refinement Types.10.342017
Automatic generation of oracles for exceptional behaviors.150.552016
Planning for change in a formal verification of the raft consensus protocol.190.642016
Locking discipline inference and checking.30.372016
Fast synthesis of fast collections.110.662016
Boolean Formulas for the Static Identification of Injection Attacks in Java.10.362015
Static Analysis of Implicit Control Flow: Resolving Java Reflection and Android Intents (T)260.742015
Semantics for Locking Specifications.00.342015
Development History Granularity Transformations (N)80.502015
Collaborative Verification of Information Flow for a High-Assurance App Store.00.342015
Explaining Visual Changes in Web Interfaces120.602015
Toward a Dependability Case Language and Workflow for a Radiation Therapy System.20.362015
Mutation Analysis for the Real World: Effectiveness, Efficiency, and Proper Tool Support.00.342015
Proactive detection of inadequate diagnostic messages for software configuration errors50.462015
Ayudante: identifying undesired variable interactions20.392015
Inferring models of concurrent systems from logs of their behavior with CSight330.962014
Are mutants a valid substitute for real faults in software testing?2114.432014
A type system for format strings40.522014
A Biofeedback System for Continuous Monitoring of Bone Healing.00.342014
A format string checker for Java00.342014
Introductory programming meets the real world: using real problems and data in CS160.582014
Defects4J: a database of existing faults to enable controlled testing studies for Java programs2465.432014
Empirically revisiting the test independence assumption541.882014
Case studies and tools for contract specifications140.582014
Collaborative Verification of Information Flow for a High-Assurance App Store370.982014
Automated diagnosis of software configuration errors501.242013
Early Detection of Collaboration Conflicts and Risks341.032013
Rely-guarantee references for refinement types over aliased mutable data60.412013
Unifying FSM-inference algorithms through declarative specification280.762013
Interactive record/replay for web application debugging571.702013
Java UI : Effects for Controlling UI Object Access.90.542013
Static lock capabilities for deadlock freedom60.442012
  • 1
  • 2