default search action
Seyed-Hassan Mirian-Hosseinabadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zohreh Mafi, Seyed-Hassan Mirian-Hosseinabadi:
Regression test selection in test-driven development. Autom. Softw. Eng. 31(1): 9 (2024) - 2023
- [j21]Elahe Habibi, Seyed-Hassan Mirian-Hosseinabadi:
Sharif-TaaWS: a tool to automate unit testing of web services. Autom. Softw. Eng. 30(1): 1 (2023) - [j20]Mehran Rivadeh, Seyed-Hassan Mirian-Hosseinabadi:
Formal translation of YAWL workflow models to the Alloy formal specifications: a testing application. Softw. Syst. Model. 22(3): 941-968 (2023) - [i4]Alireza Aghamohammadi, Seyed-Hassan Mirian-Hosseinabadi:
Using causal inference and Bayesian statistics to explain the capability of a test suite in exposing software faults. CoRR abs/2303.09968 (2023) - 2022
- [j19]Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi, Mohsen Mahdieh:
Test case prioritization using test case diversification and fault-proneness estimations. Autom. Softw. Eng. 29(2): 50 (2022) - [j18]Elahe Habibi, Seyed-Hassan Mirian-Hosseinabadi:
Generating test as a web service (TaaWS) through a method-based attribute grammar. Int. J. Softw. Tools Technol. Transf. 24(4): 511-527 (2022) - 2021
- [j17]Alireza Aghamohammadi, Seyed-Hassan Mirian-Hosseinabadi, Sajad Jalali:
Statement frequency coverage: A code coverage criterion for assessing test suite effectiveness. Inf. Softw. Technol. 129: 106426 (2021) - [j16]Alireza Aghamohammadi, Seyed-Hassan Mirian-Hosseinabadi:
An ensemble-based predictive mutation testing approach that considers impact of unreached mutants. Softw. Test. Verification Reliab. 31(7) (2021) - [i3]Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi, Mohsen Mahdieh:
Test case prioritization using test case diversification and fault-proneness estimations. CoRR abs/2106.10524 (2021) - 2020
- [j15]Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi, Khashayar Etemadi, Ali Nosrati, Sajad Jalali:
Incorporating fault-proneness estimations into coverage-based test case prioritization methods. Inf. Softw. Technol. 121: 106269 (2020) - [i2]Alireza Aghamohammadi, Seyed-Hassan Mirian-Hosseinabadi:
The Threat to the Validity of Predictive Mutation Testing: The Impact of Uncovered Mutants. CoRR abs/2005.11532 (2020)
2010 – 2019
- 2019
- [c13]Khashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi:
Program State Coverage: A Test Coverage Metric Based on Executed Program States. SANER 2019: 584-588 - [i1]Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi, Khashayar Etemadi, Ali Nosrati, Sajad Jalali:
Incorporating fault-proneness estimations into coverage-based test case prioritization methods. CoRR abs/1908.06502 (2019) - 2016
- [j14]Mohammad Tanhaei, Jafar Habibi, Seyed-Hassan Mirian-Hosseinabadi:
Automating feature model refactoring: A Model transformation approach. Inf. Softw. Technol. 80: 138-157 (2016) - [j13]Mohammad Tanhaei, Jafar Habibi, Seyed-Hassan Mirian-Hosseinabadi:
A Feature Model Based Framework for Refactoring Software Product Line Architecture. J. Comput. Sci. Technol. 31(5): 951-986 (2016) - 2015
- [j12]Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hosseinabadi:
A model-driven approach to semi-structured database design. Frontiers Comput. Sci. 9(2): 237-252 (2015) - [j11]Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi:
Generating semantically valid test inputs using constrained input grammars. Inf. Softw. Technol. 57: 204-216 (2015) - [j10]Elahe Habibi, Seyed-Hassan Mirian-Hosseinabadi:
Event-driven web application testing based on model-based mutation testing. Inf. Softw. Technol. 67: 159-179 (2015) - [j9]Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hosseinabadi:
Lightweight formalization and validation of ORM models. J. Log. Algebraic Methods Program. 84(4): 534-549 (2015) - [j8]Shohreh Ajoudanian, Seyed-Hassan Mirian-Hosseinabadi:
Automatic promotional specialization, generalization and analysis of extended feature models with cardinalities in Alloy. J. Log. Algebraic Methods Program. 84(5): 640-667 (2015) - [j7]Maryam Nooraei Abadeh, Seyed-Hassan Mirian-Hosseinabadi:
Delta-based regression testing: a formal framework towards model-driven regression testing. J. Softw. Evol. Process. 27(12): 913-952 (2015) - 2013
- [j6]Saeed Khalafinejad, Seyed-Hassan Mirian-Hosseinabadi:
Translation of Z specifications to executable code: Application to the database domain. Inf. Softw. Technol. 55(6): 1017-1044 (2013) - 2012
- [j5]Hassan Haghighi, Seyed-Hassan Mirian-Hosseinabadi:
Towards a Calculus for Nondeterministic Schemas in Z. Int. J. Softw. Eng. Knowl. Eng. 22(6): 839- (2012) - [j4]Alireza Sadeghi, Seyed-Hassan Mirian-Hosseinabadi:
Mbtdd: Model Based Test Driven Development. Int. J. Softw. Eng. Knowl. Eng. 22(8): 1085-1102 (2012) - [c12]Maryam Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hoda Mashayekhi, Jafar Habibi:
Mining Distributed Frequent Itemsets Using a Gossip Based Protocol. UIC/ATC 2012: 780-785 - 2011
- [j3]Marzieh Esna-Ashari, Hamid R. Rabiee, Seyed-Hassan Mirian-Hosseinabadi:
Reliability of separation of duty in ANSI standard role-based access control. Sci. Iran. 18(6): 1416-1424 (2011) - [c11]Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hosseinabadi:
A Z Approach to Formalization and Validation of ORM Models. DEIS 2011: 513-526 - 2010
- [c10]Mohammad Tanhaei, Shahrouz Moaven, Jafar Habibi, Seyed Hassan Mirian:
Architectural Driven Approach for Software Product Line Testing. Software Engineering Research and Practice 2010: 198-204
2000 – 2009
- 2009
- [c9]Zahra Aghakasiri, Seyed-Hassan Mirian-Hosseinabadi:
Workflow Change Patterns: Opportunities for Extension and Reuse. SERA (selected papers) 2009: 265-275 - [c8]Nima Roohi, Gwen Salaün, Seyed-Hassan Mirian-Hosseinabadi:
Analyzing Chor Specifications by Translation into FSP. FOCLASA 2009: 159-176 - 2008
- [j2]Hassan Haghighi, Seyed-Hassan Mirian-Hosseinabadi:
Nondeterminism in Constructive Z. Fundam. Informaticae 88(1-2): 109-134 (2008) - [c7]Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi:
Integrating software development security activities with agile methodologies. AICCSA 2008: 749-754 - [c6]Hamid Bagheri, Vajih Montaghami, Gholamreza Safi, Seyed-Hassan Mirian-Hosseinabadi:
An evaluation method for aspectual modeling of distributed software architectures. AICCSA 2008: 903-908 - [c5]Amir Jahangard Rafsanjani, Seyed-Hassan Mirian-Hosseinabadi:
RIAL: Redundancy Reducing Inlining Algorithm to Map XML DTD to Relations. CIMCA/IAWTIC/ISE 2008: 25-30 - [c4]Naeem Esfahani, Seyed-Hassan Mirian-Hosseinabadi, Kamyar Rafati:
Real-Time Analysis Process Patterns. CSICC 2008: 777-781 - 2007
- [c3]Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hesam Chiniforooshan Esfahani:
An Aspect Enhanced Method of NFR Modeling in Software Architecture. ICIT 2007: 240-242 - 2006
- [c2]Hesam Chiniforooshan Esfahani, Seyed-Hassan Mirian-Hosseinabadi:
A Scalable Agent-Based Workflow Management System for Business Process Management Environments. Multiagent Systems and Software Architecture 2006: 59-70 - 2005
- [c1]Hassan Haghighi, Seyed-Hassan Mirian-Hosseinabadi:
An Approach to Nondeterminism in Translation of CZ Set Theory into Martin-Löf 's Theory of Types. FSEN 2005: 117-137
1990 – 1999
- 1998
- [j1]Seyed-Hassan Mirian-Hosseinabadi, Raymond Turner:
Constructive Z. J. Log. Comput. 8(1): 49-70 (1998) - 1997
- [b1]Seyed-Hassan Mirian-Hosseinabadi:
Constructive Z. University of Essex, Colchester, UK, 1997
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint