Paul Ammann
Orcid: 0009-0002-8470-2917Affiliations:
- George Mason University, Fairfax, Virginia, USA
According to our database1,
Paul Ammann
authored at least 109 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ise.gmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2024, 2024
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024
2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
Proceedings of the EASEAI 2021: Proceedings of the 3rd International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, 2021
2020
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 13th IEEE International Conference on Software Testing, 2020
2019
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
2018
An Industrial Application of Mutation Testing: Lessons, Challenges, and Research Directions.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018
2017
Proceedings of the Fourth ACM Conference on Learning @ Scale, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
2016
IEEE Secur. Priv., 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Are We There Yet? How Redundant and Equivalent Mutants Affect Determination of Test Completeness.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016
2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Proceedings of the 4th IEEE/ACM International Workshop on Green and Sustainable Software, 2015
2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
2013
2012
Softw. Test. Verification Reliab., 2012
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012
2011
Softw. Test. Verification Reliab., 2011
Inf. Softw. Technol., 2011
Proceedings of the 6th International Workshop on Automation of Software Test, 2011
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
2010
An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Applying MCDC to Large DNF Logic Expressions.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Proceedings of the Third International Conference on Software Testing, 2010
2009
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Double Fault Detection.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009
2008
Softw. Test. Verification Reliab., 2008
Proceedings of the Eighth International Conference on Quality Software, 2008
Proceedings of the Formal Methods and Testing, 2008
Cambridge University Press, ISBN: 978-0-511-80916-3, 2008
2007
Proceedings of the 3rd Workshop on Advances in Model Based Testing, 2007
2006
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
An industrial case study of structural testing applied to safety-critical embedded software.
Proceedings of the 2006 International Symposium on Empirical Software Engineering (ISESE 2006), 2006
Proceedings of the Formal Ontology in Information Systems, 2006
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
2003
Softw. Test. Verification Reliab., 2003
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003
2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 2001
2000
ACM SIGSOFT Softw. Eng. Notes, 2000
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000
Distributed Parallel Databases, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 2000
1999
The Integrity Challenge.
Proceedings of the Integrity and Internal Control in Information Systems, 1999
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999
1998
J. Comput. Secur., 1998
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998
1997
ACM Trans. Database Syst., 1997
IEEE Concurrency, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the Tenth Conference on Software Engineering Education and Training, 1997
Proceedings of the Advanced Information Systems Engineering, 1997
Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997
1996
IEEE Trans. Parallel Distributed Syst., 1996
J. Comput. Secur., 1996
Data Knowl. Eng., 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
1995
IEEE Trans. Knowl. Data Eng., 1995
J. Comput. Secur., 1995
Proceedings of the VLDB'95, 1995
1994
IEEE Trans. Software Eng., 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
A Five Year Perspective on Software Engineering Graduate Programs at George Mason University.
Proceedings of the Software Engineering Education, 1994
Proceedings of the CCS '94, 1994
Proceedings of the CCS '94, 1994
1993
ACM Trans. Comput. Syst., 1993
Planar Lattice Security Structures for Multilevel Replicated Databases.
Proceedings of the Database Security, 1993
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
Implementing transaction control expressions by checking for absence of access rights.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
Proceedings of the Database Security, 1991
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1990
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Issues Influencing the Use of N-Version Programming.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989
1988
1985
Proceedings of the Proceedings, 1985