default search action
James Clause
Person information
- affiliation: University of Delaware, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Jianwei Wu, James Clause:
A uniqueness-based approach to provide descriptive JUnit test names. J. Syst. Softw. 205: 111821 (2023) - [j6]Jianwei Wu, James Clause:
Automated Identification of Uniqueness in JUnit Tests. ACM Trans. Softw. Eng. Methodol. 32(1): 18:1-18:32 (2023) - 2022
- [i2]Jianwei Wu, Jining Yu, David C. Shepherd, James Clause:
Shortcomings of Class-level Documentation: A Survey. CoRR abs/2205.03344 (2022) - 2020
- [j5]Jianwei Wu, James Clause:
A pattern-based approach to detect and improve non-descriptive test names. J. Syst. Softw. 168: 110639 (2020) - [c25]Daniel Gaston, James Clause:
A Method for Finding Missing Unit Tests. ICSME 2020: 92-103 - [c24]Ali Alotaibi, James Clause, William G. J. Halfond:
Mobile App Energy Consumption: A Study of Known Energy Issues in Mobile Applications and their Classification Schemes - Summary Plan. ICSME 2020: 854 - [i1]Jianwei Wu, James Clause:
A Pattern-based Approach to Detect and Improve Non-descriptive Test Names. CoRR abs/2005.05359 (2020)
2010 – 2019
- 2019
- [j4]Cagri Sahin, Lori L. Pollock, James Clause:
Supporting software evolution through feedback on executing/skipping energy tests for proposed source code changes. J. Softw. Evol. Process. 31(4) (2019) - 2018
- [c23]Irene Manotas, James Clause, Lori L. Pollock:
Exploring Evolutionary Search Strategies to Improve Applications' Energy Efficiency. SSBSE 2018: 278-292 - 2017
- [c22]Tedis Agolli, Lori L. Pollock, James Clause:
Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Color Changes. MOBILESoft@ICSE 2017: 30-34 - 2016
- [j3]Cagri Sahin, Lori L. Pollock, James Clause:
From benchmarks to real apps: Exploring the energy impacts of performance-directed changes. J. Syst. Softw. 117: 307-316 (2016) - [j2]Cagri Sahin, Mian Wan, Philip Tornquist, Ryan McKenna, Zachary Pearson, William G. J. Halfond, James Clause:
How does code obfuscation impact energy usage? J. Softw. Evol. Process. 28(7): 565-588 (2016) - [c21]Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause:
An empirical study of practitioners' perspectives on green software engineering. ICSE 2016: 237-248 - [c20]Chen Huo, James Clause:
Interpreting Coverage Information Using Direct and Indirect Coverage. ICST 2016: 234-243 - [c19]Benwen Zhang, Emily Hill, James Clause:
Towards automatically generating descriptive names for unit tests. ASE 2016: 625-636 - 2015
- [c18]Benwen Zhang, Emily Hill, James Clause:
Automatically Generating Test Templates from Test Names (N). ASE 2015: 506-511 - 2014
- [c17]Cagri Sahin, Lori L. Pollock, James Clause:
How do code refactorings affect energy usage? ESEM 2014: 36:1-36:10 - [c16]Irene Lizeth Manotas Gutiérrez, Lori L. Pollock, James Clause:
SEEDS: a software engineer's energy-optimization decision support framework. ICSE 2014: 503-514 - [c15]Cagri Sahin, Philip Tornquist, Ryan McKenna, Zachary Pearson, James Clause:
How Does Code Obfuscation Impact Energy Usage? ICSME 2014: 131-140 - [c14]Benwen Zhang, James Clause:
Lightweight automated detection of unsafe information leakage via exceptions. ISSTA 2014: 327-338 - [c13]Ding Li, Yuchen Jin, Cagri Sahin, James Clause, William G. J. Halfond:
Integrated energy-directed test suite optimization. ISSTA 2014: 339-350 - [c12]Chen Huo, James Clause:
Improving oracle quality by detecting brittle assertions and unused inputs in tests. SIGSOFT FSE 2014: 621-631 - 2013
- [c11]Irene Lizeth Manotas Gutiérrez, Cagri Sahin, James Clause, Lori L. Pollock, Kristina Winbladh:
Investigating the impacts of web servers on web application energy usage. GREENS 2013: 16-23 - [c10]Ding Li, Cagri Sahin, James Clause, William G. J. Halfond:
Energy-directed test suite optimization. GREENS 2013: 62-69 - 2012
- [j1]Ioannis Doudalis, James A. Clause, Guru Venkataramani, Milos Prvulovic, Alessandro Orso:
Effective and Efficient Memory Protection Using Dynamic Tainting. IEEE Trans. Computers 61(1): 87-100 (2012) - [c9]Cagri Sahin, Furkan Cayci, Irene Lizeth Manotas Gutiérrez, James Clause, Fouad E. Kiamilev, Lori L. Pollock, Kristina Winbladh:
Initial explorations on design pattern energy usage. GREENS 2012: 55-61 - 2011
- [b1]James A. Clause:
Enabling and supporting the debugging of software failures. Georgia Institute of Technology, Atlanta, GA, USA, 2011 - [c8]James A. Clause, Alessandro Orso:
Camouflage: automated anonymization of field data. ICSE 2011: 21-30 - 2010
- [c7]James A. Clause, Alessandro Orso:
LEAKPOINT: pinpointing the causes of memory leaks. ICSE (1) 2010: 515-524
2000 – 2009
- 2009
- [c6]James A. Clause, Alessandro Orso:
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. ISSTA 2009: 249-260 - 2007
- [c5]James A. Clause, Alessandro Orso:
A Technique for Enabling and Supporting Debugging of Field Failures. ICSE 2007: 261-270 - [c4]James A. Clause, Wanchun Li, Alessandro Orso:
Dytan: a generic dynamic taint analysis framework. ISSTA 2007: 196-206 - [c3]James A. Clause, Ioannis Doudalis, Alessandro Orso, Milos Prvulovic:
Effective memory protection using dynamic tainting. ASE 2007: 284-292 - 2005
- [c2]Jonathan Misurda, James A. Clause, Juliya L. Reed, Bruce R. Childers, Mary Lou Soffa:
Jazz: A Tool for Demand-Driven Structural Testing. CC 2005: 242-245 - [c1]Jonathan Misurda, James A. Clause, Juliya L. Reed, Bruce R. Childers, Mary Lou Soffa:
Demand-driven structural testing with dynamic instrumentation. ICSE 2005: 156-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint