Jens Krinke

Orcid: 0000-0003-1009-2861

Affiliations:
  • University College London, UK
  • King's College London, UK (former)


According to our database1, Jens Krinke authored at least 106 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adoption of automated software engineering tools and techniques in Thailand.
Empir. Softw. Eng., July, 2024

Field-sensitive program slicing.
J. Syst. Softw., April, 2024

2022
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies.
IEEE Trans. Software Eng., 2022

TCTracer: Establishing test-to-code traceability links using dynamic and static techniques.
Empir. Softw. Eng., 2022

Ethics in the mining of software repositories.
Empir. Softw. Eng., 2022

Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand.
Proceedings of the IEEE International Conference on Software Analysis, 2022

BigCloneBench Considered Harmful for Machine Learning.
Proceedings of the 16th IEEE International Workshop on Software Clones, 2022

2021
Toxic Code Snippets on Stack Overflow.
IEEE Trans. Software Eng., 2021

The Impact of Code Review on Architectural Changes.
IEEE Trans. Software Eng., 2021

Artefact Relation Graphs for Unit Test Reuse Recommendation.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

Code Similarity in Clone Detection.
Proceedings of the Code Clone Analysis, 2021

2020
Evaluating lexical approximation of program dependence.
J. Syst. Softw., 2020

ReAssert: Deep Learning for Assert Generation.
CoRR, 2020

Does code review really remove coding convention violations?
Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation, 2020

Behind the Intents: An In-depth Empirical Study on Software Refactoring in Modern Code Review.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Ethical Mining: A Case Study on MSR Mining Challenges.
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Establishing multilevel test-to-code traceability links.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Special issue on mutation testing and analysis.
Softw. Test. Verification Reliab., 2019

Siamese: scalable and incremental code clone search via multiple code representations.
Empir. Softw. Eng., 2019

A comparison of tree- and line-oriented observational slicing.
Empir. Softw. Eng., 2019

AVPredictor: Comprehensive prediction and detection of atomicity violations.
Concurr. Comput. Pract. Exp., 2019

Python coding style compliance on stack overflow.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

2018
A comparison of code similarity analysers.
Empir. Softw. Eng., 2018

Awareness and Experience of Developers to Outdated and License-Violating Code on Stack Overflow: An Online Survey.
CoRR, 2018

TestNMT: function-to-test neural machine translation.
Proceedings of the 4th ACM SIGSOFT International Workshop on NLP for Software Engineering, 2018

Who's this?: developer identification using IDE event data.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

CROP: linking code reviews to source code changes.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

A picture is worth a thousand words: Code clone detection based on image similarity.
Proceedings of the 12th IEEE International Workshop on Software Clones, 2018

MOBS: multi-operator observation-based slicing using lexical approximation of program dependence.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Memory mutation testing.
Inf. Softw. Technol., 2017

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Proceedings of the 26th USENIX Security Symposium, 2017

Generalized observational slicing for tree-represented modelling languages.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Tree-Oriented vs. Line-Oriented Observation-Based Slicing.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

Are developers aware of the architectural impact of their changes?
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Using compilation/decompilation to enhance clone detection.
Proceedings of the 11th IEEE International Workshop on Software Clones, 2017

Message from the Mutation 2017 Chairs.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
HOMI: Searching Higher Order Mutants for Software Improvement.
Proceedings of the Search Based Software Engineering - 8th International Symposium, 2016

Searching for Configurations in Clone Evaluation - A Replication Study.
Proceedings of the Search Based Software Engineering - 8th International Symposium, 2016

Similarity of Source Code in the Presence of Pervasive Modifications.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

An empirical study on dependence clusters for effort-aware fault-proneness prediction.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

2015
ORBS and the limits of static slicing.
Proceedings of the 15th IEEE International Working Conference on Source Code Analysis and Manipulation, 2015

Mutation testing of memory-related operators.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Deep Parameter Optimisation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Genetic Improvement using Higher Order Mutation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

2014
Exact scalable sensitivity analysis for the next release problem.
ACM Trans. Softw. Eng. Methodol., 2014

Special issue on software clones (IWSC'12).
Sci. Comput. Program., 2014

Coherent clusters in source code.
J. Syst. Softw., 2014

Pidgin Crasher: Searching for Minimised Crashing GUI Event Sequences.
Proceedings of the Search-Based Software Engineering - 6th International Symposium, 2014

Search based software engineering for software product line engineering: a survey and directions for future work.
Proceedings of the 18th International Software Product Line Conference, 2014

ORBS: language-independent program slicing.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

2013
Efficient Identification of Linchpin Vertices in Dependence Clusters.
ACM Trans. Program. Lang. Syst., 2013

State-based model slicing: A survey.
ACM Comput. Surv., 2013

Searching for better configurations: a rigorous approach to clone evaluation.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

2012
Comparative stability of cloned and non-cloned code: an empirical study.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
Is cloned code older than non-cloned code?
Proceedings of the Proceeding of the 5th ICSE International Workshop on Software Clones, 2011

An Empirical Study of the Impacts of Clones in Software Maintenance.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

Cloning in Max/MSP Patches.
Proceedings of the 2011 International Computer Music Conference, 2011

2010
Dependence cluster visualization.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

Coherent dependence clusters.
Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, 2010

Cloning and copying between GNOME projects.
Proceedings of the 7th International Working Conference on Mining Software Repositories, 2010

Distinguishing copies from originals in software clones.
Proceedings of the Proceeding of the 4th ICSE International Workshop on Software Clones, 2010

Issues in clone classification for dataflow languages.
Proceedings of the Proceeding of the 4th ICSE International Workshop on Software Clones, 2010

2009
Dependence clusters in source code.
ACM Trans. Program. Lang. Syst., 2009

Search based data sensitivity analysis applied to requirement engineering.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

2008
Mining execution relations for crosscutting concerns.
IET Softw., 2008

Pitfalls in Aspect Mining.
Proceedings of the WCRE 2008, 2008

Is Cloned Code More Stable than Non-cloned Code?
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

2007
Comparison and Evaluation of Clone Detection Tools.
IEEE Trans. Software Eng., 2007

Empirical study of optimization techniques for massive slicing.
ACM Trans. Program. Lang. Syst., 2007

Changes to Code Clones in Evolving Software.
Softwaretechnik-Trends, 2007

EzUnit: A Framework for Associating Failed Unit Tests with Potential Programming Errors.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

A Study of Consistent and Inconsistent Changes to Code Clones.
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007

Statement-Level Cohesion Metrics and their Visualization.
Proceedings of the Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30, 2007

2006
Efficient path conditions in dependence graphs for software safety analysis.
ACM Trans. Softw. Eng. Methodol., 2006

Special issue on Source code analysis and manipulation.
Sci. Comput. Program., 2006

Effects of context on program slicing.
J. Syst. Softw., 2006

Mining Control Flow Graphs for Crosscutting Concerns.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation.
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006

Dynamic path conditions in dependence graphs.
Proceedings of the 2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2006

Information Flow Control for Java Based on Path Conditions in Dependence Graphs.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Intransitive Noninterference in Dependence Graphs.
Proceedings of the Leveraging Applications of Formal Methods, 2006

2005
05451 Executive Summary -- Beyond Program Slicing Dagstuhl Seminar.
Proceedings of the Beyond Program Slicing, 06.11. - 11.11.2005, 2005

05451 Abstracts Collection -- Beyond Program Slicing.
Proceedings of the Beyond Program Slicing, 06.11. - 11.11.2005, 2005

Software Engineering Projects in Distant Teaching.
Proceedings of the 18th Conference on Software Engineering Education and Training (CSEE&T 2005), 2005

Essential open source toolset - programming with Eclipse, JUnit, CVS, Bugzilla, Ant, Tcl/Tk and more.
Wiley, ISBN: 978-0-470-84445-8, 2005

2004
Advanced slicing of sequential and concurrent programs.
PhD thesis, 2004

Slicing, Chopping, and Path Conditions with Barriers.
Softw. Qual. J., 2004

Context-Sensitivity Matters, But Context Does Not.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

Aspect Mining Using Event Traces.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Advanced Slicing of Sequential and Concurrent Programs.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

Visualization of Program Dependence and Slices.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

Using Eclipse in distant teaching of software engineering.
Proceedings of the 2004 OOPSLA workshop on Eclipse Technology eXchange, 2004

Open-Source-Programmierwerkzeuge - Versionskontrolle, Konstruktion, Testen, Fehlersuche (2. Aufl.).
dpunkt.verlag, ISBN: 978-3-89864-226-2, 2004

2003
Aspect Mining Using Dynamic Analysis.
Softwaretechnik-Trends, 2003

Context-sensitive slicing of concurrent programs.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003

Barrier Slicing and Chopping.
Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 2003

Advanced slicing of sequential and concurrent programs.
Proceedings of the Ausgezeichnete Informatikdissertationen 2003, 2003

Unions of Slices Are Not Slices.
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003

2002
Web-basierte Programmierpraktika mit Praktomat.
Softwaretechnik-Trends, 2002

Evaluating Context-Sensitive Slicing and Chopping.
Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), 2002

2001
Identifying Similar Code with Program Dependence Graphs.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

2000
Programmierwerkzeuge - Versionskontrolle, Konstruktion, Testen, Fehlersuche unter Linux / Unix.
dpunkt.verlag, ISBN: 978-3-932588-70-9, 2000

1999
Software-Sicherheitsprüfung mit VALSOFT.
Inform. Forsch. Entwickl., 1999

1998
Validation of measurement software as an application of slicing and constraint solving.
Inf. Softw. Technol., 1998

Static Slicing of Threaded Programs.
Proceedings of the SIGPLAN/SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 1998


  Loading...