default search action
Marinos Kintis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Rahul Gopinath, Jie M. Zhang, Marinos Kintis, Mike Papadakis:
Mutation analysis and its industrial applications. Softw. Test. Verification Reliab. 32(7) (2022) - [j6]Rahul Gopinath, Jie M. Zhang, Marinos Kintis, Mike Papadakis:
Mutation analysis and its industrial applications. Softw. Test. Verification Reliab. 32(8) (2022)
2010 – 2019
- 2019
- [j5]Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, Mark Harman:
Chapter Six - Mutation Testing Advances: An Analysis and Survey. Adv. Comput. 112: 275-378 (2019) - [c12]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
An Industrial Study on the Differences between Pre-Release and Post-Release Bugs. ICSME 2019: 92-102 - [c11]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
On the Evolution of Keyword-Driven Test Suites. ICST 2019: 335-345 - [c10]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach:
Ukwikora: continuous inspection for keyword-driven testing. ISSTA 2019: 402-405 - 2018
- [j4]Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis, Nicos Malevris, Yves Le Traon:
How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empir. Softw. Eng. 23(4): 2426-2463 (2018) - [j3]Marinos Kintis, Mike Papadakis, Yue Jia, Nicos Malevris, Yves Le Traon, Mark Harman:
Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Trans. Software Eng. 44(4): 308-333 (2018) - [c9]Renaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon:
Can We Automate Away the Main Challenges of End-To-End Testing? BENEVOL 2018: 33-37 - [c8]Matthieu Jimenez, Thierry Titcheu Chekam, Maxime Cordy, Mike Papadakis, Marinos Kintis, Yves Le Traon, Mark Harman:
Are mutants really natural?: a study on how "naturalness" helps mutant selection. ESEM 2018: 3:1-3:10 - 2017
- [c7]Thomas Laurent, Mike Papadakis, Marinos Kintis, Christopher Henard, Yves Le Traon, Anthony Ventresque:
Assessing and Improving the Mutation Testing Practice of PIT. ICST 2017: 430-435 - 2016
- [b1]Marinos Kintis:
Effective methods to tackle the equivalent mutant problem when testing software with mutation. Athens University Economics and Business, Greece, 2016 - [c6]Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis, Nicos Malevris:
Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study. SCAM 2016: 147-156 - 2015
- [j2]Marinos Kintis, Nicos Malevris:
MEDIC: A static analysis framework for equivalent mutant identification. Inf. Softw. Technol. 68: 1-17 (2015) - [j1]Marinos Kintis, Mike Papadakis, Nicos Malevris:
Employing second-order mutation for isolating first-order equivalent mutants. Softw. Test. Verification Reliab. 25(5-7): 508-535 (2015) - 2014
- [c5]Marinos Kintis, Nicos Malevris:
Using Data Flow Patterns for Equivalent Mutant Detection. ICST Workshops 2014: 196-205 - 2013
- [c4]Marinos Kintis, Nicos Malevris:
Identifying More Equivalent Mutants via Code Similarity. APSEC (1) 2013: 180-188 - 2012
- [c3]Marinos Kintis, Mike Papadakis, Nicos Malevris:
Isolating First Order Equivalent Mutants via Second Order Mutation. ICST 2012: 701-710 - 2010
- [c2]Marinos Kintis, Mike Papadakis, Nicos Malevris:
Evaluating Mutation Testing Alternatives: A Collateral Experiment. APSEC 2010: 300-309 - [c1]Mike Papadakis, Nicos Malevris, Marinos Kintis:
Mutation Testing Strategies - A Collateral Approach. ICSOFT (2) 2010: 325-328
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint