default search action
Vidroha Debroy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Vidroha Debroy, Senecca Miller, Mark Blake, Alex Hibbard, Cody Beavers:
Log Sinks and Big Data Analytics along with User Experience Monitoring to Tell a Fuller Story (ADPBD). SEKE 2022: 253-256 - 2021
- [c20]Senecca Miller, Travis Siems, Vidroha Debroy:
Kubernetes for Cloud Container Orchestration Versus Containers as a Service (CaaS): Practical Insights. ISSRE Workshops 2021: 407-408 - 2020
- [j10]Vidroha Debroy, Senecca Miller:
Overcoming Challenges With Continuous Integration and Deployment Pipelines: An Experience Report From a Small Company. IEEE Softw. 37(3): 21-29 (2020) - [c19]Vidroha Debroy, Alireza Mansoori, James Haleblian, Mark Wilkens:
Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud. ISSRE Workshops 2020: 153-154
2010 – 2019
- 2018
- [c18]Vidroha Debroy, Lance Brimble, Matthew Yost, Archana Erry:
Automating Web Application Testing from the Ground Up: Experiences and Lessons Learned in an Industrial Setting. ICST 2018: 354-362 - [c17]Vidroha Debroy, Lance Brimble, Matthew Yost:
NewTL: engineering an extract, transform, load (ETL) software system for business on a very large scale. SAC 2018: 1568-1575 - [c16]Vidroha Debroy, Senecca Miller, Lance Brimble:
Building lean continuous integration and delivery pipelines by applying DevOps principles: a case study at Varidesk. ESEC/SIGSOFT FSE 2018: 851-856 - 2014
- [j9]Vidroha Debroy, W. Eric Wong:
Combining mutation and fault localization for automated program debugging. J. Syst. Softw. 90: 45-60 (2014) - [j8]W. Eric Wong, Vidroha Debroy, Ruizhi Gao, Yihao Li:
The DStar Method for Effective Software Fault Localization. IEEE Trans. Reliab. 63(1): 290-308 (2014) - 2013
- [j7]Vidroha Debroy, W. Eric Wong:
A consensus-based strategy to improve the quality of fault localization. Softw. Pract. Exp. 43(8): 989-1011 (2013) - 2012
- [j6]W. Eric Wong, Vidroha Debroy, Richard M. Golden, Xiaofeng Xu, Bhavani Thuraisingham:
Effective Software Fault Localization Using an RBF Neural Network. IEEE Trans. Reliab. 61(1): 149-169 (2012) - [j5]W. Eric Wong, Vidroha Debroy, Dianxiang Xu:
Towards Better Fault Localization: A Crosstab-Based Statistical Approach. IEEE Trans. Syst. Man Cybern. Part C 42(3): 378-396 (2012) - [c15]W. Eric Wong, Vidroha Debroy, Yihao Li, Ruizhi Gao:
Software Fault Localization Using DStar (D*). SERE 2012: 21-30 - 2011
- [j4]Xiaofeng Xu, Vidroha Debroy, W. Eric Wong, Donghui Guo:
Ties within Fault Localization rankings: Exposing and Addressing the Problem. Int. J. Softw. Eng. Knowl. Eng. 21(6): 803-827 (2011) - [j3]Ahyoung Sung, Byoungju Choi, W. Eric Wong, Vidroha Debroy:
Mutant generation for embedded systems using kernel-based software and hardware fault simulation. Inf. Softw. Technol. 53(10): 1153-1164 (2011) - [j2]Vidroha Debroy, W. Eric Wong:
On the estimation of adequate test set size using fault failure rates. J. Syst. Softw. 84(4): 587-602 (2011) - [c14]Vidroha Debroy, W. Eric Wong:
On the Consensus-Based Application of Fault Localization Techniques. COMPSAC Workshops 2011: 506-511 - [c13]W. Eric Wong, Antonia Bertolino, Vidroha Debroy, Aditya P. Mathur, Jeff Offutt, Mladen A. Vouk:
Teaching software testing: Experiences, lessons learned and the path forward. CSEE&T 2011: 530-534 - [c12]Vidroha Debroy, W. Eric Wong:
On the equivalence of certain fault localization techniques. SAC 2011: 1457-1463 - [c11]HyeonJeong Kim, Vidroha Debroy, Doo-Hwan Bae:
Identifying properties of UML state machine diagrams that affect data and control dependence. SAC 2011: 1464-1469 - [c10]HyeonJeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong:
Deriving Data Dependence from/for UML State Machine Diagrams. SSIRI 2011: 118-126 - [c9]W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok:
Safe Software: Does It Cost More to Develop? SSIRI 2011: 198-207 - 2010
- [j1]W. Eric Wong, Vidroha Debroy, Byoungju Choi:
A family of code coverage-based heuristics for effective fault localization. J. Syst. Softw. 83(2): 188-208 (2010) - [c8]HyeonJeong Kim, W. Eric Wong, Vidroha Debroy, Doo-Hwan Bae:
Bridging the Gap between Fault Trees and UML State Machine Diagrams for Safety Analysis. APSEC 2010: 196-205 - [c7]W. Eric Wong, Vidroha Debroy:
An Undergraduate Summer Research Program in Software Safety. CSEE&T 2010: 157-164 - [c6]Vidroha Debroy, W. Eric Wong:
Using Mutation to Automatically Suggest Fixes for Faulty Programs. ICST 2010: 65-74 - [c5]Vidroha Debroy, W. Eric Wong, Xiaofeng Xu, Byoungju Choi:
A Grouping-Based Strategy to Improve the Effectiveness of Fault Localization Techniques. QSIC 2010: 13-22 - [c4]Xiaofeng Xu, Vidroha Debroy, W. Eric Wong, Donghui Guo:
An Evaluation of Tie-Breaking Strategies for Fault Localization Techniques. SEKE 2010: 123-128 - [c3]W. Eric Wong, Vidroha Debroy, Adithya Surampudi, HyeonJeong Kim, Michael F. Siok:
Recent Catastrophic Accidents: Investigating How Software was Responsible. SSIRI 2010: 14-22 - [r1]W. Eric Wong, Vidroha Debroy:
Software Fault Localization. Encyclopedia of Software Engineering 2010: 1147-1156
2000 – 2009
- 2009
- [c2]Vidroha Debroy, W. Eric Wong:
Insights on Fault Interference for Programs with Multiple Bugs. ISSRE 2009: 165-174 - [c1]Vidroha Debroy, W. Eric Wong:
Are Fault Failure Rates Good Estimators of Adequate Test Set Size?. QSIC 2009: 229-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint