default search action
Bogdan Korel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]Berk Bekiroglu, Bogdan Korel:
Neural Network-based Tool for Survivability Assessment of K-variant Systems. Int. J. Artif. Intell. Tools 32(4): 2350049:1-2350049:24 (2023) - 2022
- [j26]Nada Almasri, Bogdan Korel, Luay Tahat:
Verification Approach for Refactoring Transformation Rules of State-Based Models. IEEE Trans. Software Eng. 48(10): 3833-3861 (2022) - 2021
- [j25]Berk Bekiroglu, Bogdan Korel:
Source Code Transformations for Improving Security of Time-bounded K-variant Systems. Inf. Softw. Technol. 137: 106601 (2021) - [j24]Berk Bekiroglu, Bogdan Korel:
Survivability Analysis of K-Variant Architecture for Different Memory Attacks and Defense Strategies. IEEE Trans. Dependable Secur. Comput. 18(4): 1868-1881 (2021)
2010 – 2019
- 2018
- [c41]Nada Almasri, Luay Tahat, Bogdan Korel:
Automatically quantifying the impact of a change in systems (journal-first abstract). ASE 2018: 952 - [c40]Bogdan Korel, Nada Almasri, Luay Tahat:
Towards Minimizing the Impact of Changes Using Search-Based Approach. SSBSE 2018: 262-277 - 2017
- [j23]Nada Almasri, Luay Tahat, Bogdan Korel:
Toward automatically quantifying the impact of a change in systems. Softw. Qual. J. 25(3): 601-640 (2017) - [j22]Luay Tahat, Bogdan Korel, George Koutsogiannakis, Nada Almasri:
State-based models in regression test suite prioritization. Softw. Qual. J. 25(3): 703-742 (2017) - 2014
- [j21]Li Wang, Shangping Ren, Bogdan Korel, Kevin A. Kwiat, Eric Salerno:
Improving System Reliability Against Rational Attacks Under Given Resources. IEEE Trans. Syst. Man Cybern. Syst. 44(4): 446-456 (2014) - 2013
- [j20]Mark Harman, Bogdan Korel:
Editorial for special issue of STVR on software testing, verification, and validation - volume 1 (extended selected papers from ICST 2011). Softw. Test. Verification Reliab. 23(6): 437 (2013) - [j19]Mark Harman, Bogdan Korel:
Editorial for special issue of STVR on software testing, verification, and validation - volume 2 (extended selected papers from ICST 2011). Softw. Test. Verification Reliab. 23(7): 529 (2013) - 2012
- [j18]Luay Ho Tahat, Bogdan Korel, Mark Harman, Hasan Ural:
Regression test suite prioritization using system models. Softw. Test. Verification Reliab. 22(7): 481-506 (2012) - 2011
- [c39]Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux:
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. SIN 2011: 183-190
2000 – 2009
- 2009
- [j17]Michael W. Godfrey, Bogdan Korel:
Editorial for Special Issue of JASE on Source Code Analysis and Manipulation. Autom. Softw. Eng. 16(2): 193-195 (2009) - [c38]Bogdan Korel, George Koutsogiannakis:
Experimental Comparison of Code-Based and Model-Based Test Prioritization. ICST Workshops 2009: 77-84 - [c37]Bogdan Korel, Qi Zhang, Li Tao:
Assertion-Based Validation of Modified Programs. ICST 2009: 426-435 - 2008
- [c36]Mark Harman, André Baresel, David W. Binkley, Robert M. Hierons, Lin Hu, Bogdan Korel, Phil McMinn, Marc Roper:
Testability Transformation - Program Transformation to Improve Testability. Formal Methods and Testing 2008: 320-344 - [c35]Bogdan Korel, George Koutsogiannakis, Luay Ho Tahat:
Application of system models in regression test suite prioritization. ICSM 2008: 247-256 - 2007
- [c34]Bogdan Korel, George Koutsogiannakis, Luay Ho Tahat:
Model-based test prioritization heuristic methods and their evaluation. A-MOST 2007: 34-43 - 2006
- [j16]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
A formalisation of the relationship between forms of program slicing. Sci. Comput. Program. 62(3): 228-252 (2006) - [j15]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
Theoretical foundations of dynamic program slicing. Theor. Comput. Sci. 360(1-3): 23-41 (2006) - 2005
- [j14]Mark Harman, Bogdan Korel, Panagiotis K. Linos:
Guest Editorial: Special Issue on Software Maintenance and Evolution. IEEE Trans. Software Eng. 31(10): 801-803 (2005) - [c33]Bogdan Korel, Luay Ho Tahat, Mark Harman:
Test Prioritization Using System Models. ICSM 2005: 559-568 - [c32]Bogdan Korel, Mark Harman, S. Chung, P. Apirukvorapinit, Rajiv Gupta, Q. Zhang:
Data Dependence Based Testability Transformation in Automated Test Generation. ISSRE 2005: 245-254 - [c31]David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel:
Minimal Slicing and the Relationships Between Forms of Slicing. SCAM 2005: 45-56 - [c30]Zakarya A. Alzamil, Bogdan Korel:
Application of redundant computation in software performance analysis. WOSP 2005: 111-121 - 2004
- [c29]André Baresel, David W. Binkley, Mark Harman, Bogdan Korel:
Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach. ISSTA 2004: 108-118 - [c28]Bogdan Korel, Luay Ho Tahat:
Understanding Modifications in State-Based Models. IWPC 2004: 246-250 - 2003
- [c27]Bogdan Korel, Inderdeep Singh, Luay Ho Tahat, Boris Vaysburg:
Slicing of State-Based Models. ICSM 2003: 34-43 - 2002
- [c26]Bogdan Korel, Luay Ho Tahat, Boris Vaysburg:
Model Based Regression Test Reduction Using Dependence Analysis. ICSM 2002: 214- - [c25]Boris Vaysburg, Luay Ho Tahat, Bogdan Korel:
Dependence analysis in reduction of requirement based test suites. ISSTA 2002: 107-111 - [c24]Patrick J. Schroeder, Pat Faherty, Bogdan Korel:
Generating Expected Results for Automated Black-Box Testing. ASE 2002: 139-148 - 2001
- [c23]Luay Ho Tahat, Atef Bader, Boris Vaysburg, Bogdan Korel:
Requirement-Based Automated Black-Box Test Generation. COMPSAC 2001: 489-495 - 2000
- [c22]Raymond Smith, Bogdan Korel:
Slicing Event Traces of Large Software Systems. AADEBUG 2000 - [c21]Zakarya A. Alzamil, Bogdan Korel:
Redundant Computation and its Application in Software Performance Analysis. Int. CMG Conference 2000: 773-782 - [c20]Patrick J. Schroeder, Bogdan Korel:
Black-box test reduction using input-output analysis. ISSTA 2000: 173-177
1990 – 1999
- 1999
- [c19]Bogdan Korel:
Black-Box Understanding of COTS Components. IWPC 1999: 92-99 - 1998
- [j13]Bogdan Korel, Juergen Rilling:
Dynamic program slicing methods. Inf. Softw. Technol. 40(11-12): 647-659 (1998) - [c18]Bogdan Korel, Ali M. Al-Yami:
Automated Regression Test Generation. ISSTA 1998: 143-152 - [c17]Bogdan Korel, Juergen Rilling:
Program Slicing in Understanding of Large Programs. IWPC 1998: 145-152 - 1997
- [j12]Bogdan Korel:
Computation of Dynamic Program Slices for Unstructured Programs. IEEE Trans. Software Eng. 23(1): 17-34 (1997) - [c16]Bogdan Korel, Juergen Rilling:
Application of Dynamic Slicing in Program Debugging. AADEBUG 1997: 43-58 - [c15]Bogdan Korel, Juergen Rilling:
Dynamic Program Slicing in Understanding of Program Execution. WPC 1997: 80-89 - 1996
- [j11]Roger Ferguson, Bogdan Korel:
Generating test data for distributed software using the chaining approach. Inf. Softw. Technol. 38(5): 343-353 (1996) - [j10]Roger Ferguson, Bogdan Korel:
The Chaining Approach for Software Test Data Generation. ACM Trans. Softw. Eng. Methodol. 5(1): 63-86 (1996) - [c14]Bogdan Korel, Ali M. Al-Yami:
Assertion-Oriented Automated Test Data Generation. ICSE 1996: 71-80 - [c13]Bogdan Korel:
Automated Test Data Generation for Programs with Procedures. ISSTA 1996: 209-215 - 1995
- [c12]Bogdan Korel:
Computation Of Dynamic Slices For Programs With Arbitrary Control-Flow. AADEBUG 1995: 71-86 - [c11]Roger Ferguson, Bogdan Korel:
Software Test Data Generation Using the Chaining Approach. ITC 1995: 703-709 - 1994
- [j9]Horst F. Wedde, Bogdan Korel, Dorota M. Huizinga:
Formal Timing Analysis for Distributed Real-Time Programs. Real Time Syst. 7(1): 57-90 (1994) - [c10]Horst F. Wedde, Bogdan Korel:
Determining the worst-case blocking sequences for distributed real-time programs. RTS 1994: 4-9 - [c9]Bogdan Korel, Satish Yalamanchili:
Forward Computation of Dynamic Program Slices. ISSTA 1994: 66-79 - 1993
- [c8]Bogdan Korel:
Identifying Faulty Modifications in Software Maintenance. AADEBUG 1993: 315-332 - [c7]Horst F. Wedde, Bogdan Korel, Jon A. Lind:
Highly Integrated Task and Resource Scheduling for Mission-Critical Systems. RTS 1993: 190-195 - 1992
- [j8]Bogdan Korel, Horst F. Wedde, Roger Ferguson:
Dynamic method of test data generation for distributed software. Inf. Softw. Technol. 34(8): 523-531 (1992) - [j7]Bogdan Korel:
Dynamic Method of Software Test Data Generation. Softw. Test. Verification Reliab. 2(4): 203-213 (1992) - [c6]Horst F. Wedde, Bogdan Korel, Dorota M. Huizinga:
Formal Analysis of Waiting Times for Distributed Real-time Processes. ICDCS 1992: 478-485 - 1991
- [c5]Bogdan Korel, Horst F. Wedde, Roger Ferguson:
Automated test data generation for distributed software. COMPSAC 1991: 680-685 - [c4]Bogdan Korel, Horst F. Wedde, Srinivas Magaraj, Kalique Nawaz, Venugopal Dayana:
Version Management in Distributed Network Environment. SCM 1991: 161-166 - 1990
- [j6]Bogdan Korel, Janusz W. Laski:
Dynamic slicing of computer programs. J. Syst. Softw. 13(3): 187-195 (1990) - [j5]Bogdan Korel:
Automated Software Test Data Generation. IEEE Trans. Software Eng. 16(8): 870-879 (1990) - [c3]Horst F. Wedde, Bogdan Korel, Willie G. Brown, Shengdong Chen:
Distributed management of replicated and partitioned files under DRAGON SLAYER. COMPSAC 1990: 436-441 - [c2]Bogdan Korel:
A dynamic approach of test data generation. ICSM 1990: 311-317
1980 – 1989
- 1989
- [c1]Horst F. Wedde, Bogdan Korel, Willie G. Brown, Shengdong Chen:
Transparent distributed object management under completely decentralized control. ICDCS 1989: 335-342 - 1988
- [j4]Bogdan Korel, Janusz W. Laski:
Dynamic Program Slicing. Inf. Process. Lett. 29(3): 155-163 (1988) - [j3]Bogdan Korel:
PELAS - Program Error-Locating Assistant System. IEEE Trans. Software Eng. 14(9): 1253-1260 (1988) - 1987
- [j2]Bogdan Korel:
The Program Dependence Graph in Static Program Testing. Inf. Process. Lett. 24(2): 103-108 (1987) - 1983
- [j1]Janusz W. Laski, Bogdan Korel:
A Data Flow Oriented Program Testing Strategy. IEEE Trans. Software Eng. 9(3): 347-354 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint