Name
Affiliation
Papers
CYRILLE ARTHO
Research Center for Information Security (RCIS), AIST Tokyo Japan
69
Collaborators
Citations 
PageRank 
132
588
44.46
Referers 
Referees 
References 
1130
967
835
Search Limit
1001000
Title
Citations
PageRank
Year
The Java Pathfinder Workshop 201900.342020
Java Pathfinder at SV-COMP 2019 (Competition Contribution)00.342019
Method summaries for JPF00.342019
COST Action IC 1402 ArVI: Runtime Verification Beyond Monitoring - Activity Report of Working Group 1.00.342019
Model-Based Testing Of The Java Network Api10.352017
Automated Dataset Construction from Web Resources with Tool Kayur00.342017
Greedy combinatorial test case generation using unsatisfiable cores.100.502016
Java Pathfinder on Android Devices.00.342016
Classification of Randomly Generated Test Cases00.342016
Distance-Integrated Combinatorial Testing10.362016
Test Effectiveness Evaluation of Prioritized Combinatorial Testing: A Case Study30.402016
Guiding random test generation with program analysis.10.492016
Precondition Coverage in Software Testing00.342016
Runtime Monitoring For Concurrent Systems00.342016
Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder.10.352016
GRT at the SBST 2015 tool competition90.622015
Priority Integration for Weighted Combinatorial Testing40.442015
Using Checkpointing and Virtualization for Fault Injection00.342015
Static analysis meets runtime verification (NII Shonan Meeting 2015-5).00.342015
GRT: An Automated Test Generator Using Orchestrated Program Analysis110.522015
Model-Based Testing of Stateful APIs with Modbat00.342015
Optimization of Combinatorial Testing by Incremental SAT Solving70.442015
Combinatorial Testing for Tree-Structured Test Models with Constraints40.452015
GRT: Program-Analysis-Guided Random Testing (T)220.702015
Domain-Specific Languages with Scala.20.362015
Software Model Checking of UDP-based Distributed Applications.00.342015
Cardinality of UDP Transmission Outcomes.00.342015
A Knoppix-based demonstration environment for JPF00.342014
Design of Prioritized N-Wise Testing.20.422014
Efficient testing of software product lines via centralization (short paper)20.412014
Using Checkpointing and Virtualization for Fault Injection00.342014
Project centralization based on graph coloring10.362014
The Quest for Precision: A Layered Approach for Data Race Detection in Static Analysis.10.362013
Modbat: A Model-Based API Tester for Event-Driven Systems.150.712013
With an Open Mind: How to Write Good Models.20.392013
Analyzing Distributed Java Applications by Automatic Centralization50.452013
Model-Based Testing for Verification Back-Ends.60.462013
Implementation Of A Memory Disclosure Attack On Memory Deduplication Of Virtual Machines60.502013
Why do software packages conflict?130.612012
Memory deduplication as a threat to the guest OS502.072011
Sources of Inter-package Conflicts in Debian20.372011
Model checking distributed systems by combining caching and process checkpointing50.532011
Run-time verification of networked software00.342010
Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine80.742010
Separation of Transitions, Actions, and Exceptions in Model-Based Testing20.392009
Introduction of Virtualization Technology to Multi-Process Model Checking.00.342009
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time121.212009
Verifying networked programs using a model checker extension30.452009
Efficient Model Checking of Networked Applications150.882008
Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs00.342008
  • 1
  • 2