


default search action
Mechelle Gittens
Person information
- affiliation: The University of the West Indies, Barbados
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Curtis L. Gittens
, Mechelle Gittens, Verna Knight, Ian Wade:
The Digital Comic as a Study Tool for Caribbean Computer Science Students: A Pilot Study. GEM 2023: 1-6 - 2022
- [c21]Shamar Ward, Mechelle Gittens:
Locating Optimal Study Areas Using Augmented Reality And Low Cost IoT Devices. GEM 2022: 1-2
2010 – 2019
- 2019
- [c20]Shamar Ward, Mechelle Gittens:
The Feasibility of Repurposing Recycled Cell Phones as Sensors in a Smart Campus Shuttle Monitoring System. MobiCASE 2019: 57-67 - [c19]Shamar Ward, Mechelle Gittens:
Edu-BUS Wi-Fi: An On-Board Wi-Fi Educational System Using a Raspberry Pi. MobiCASE 2019: 68-82 - [c18]Shamar Ward, Mechelle Gittens, Nicholas Rock, Keone James:
CampusEMonitor: Intelligent Campus Environment Room Monitoring System. SIGUCCS 2019: 165-172 - 2018
- [c17]Shamar Akio Ward, Mechelle Gittens:
Building useful smart campus applications using a retired cell phone repurposing model. EBECEGC 2018: 43-48 - 2016
- [c16]Shamar Akio Ward, Mechelle Gittens:
Monitoring and Analyzing Wi-Fi Availability and Performance on a University Campus Using Recycled Cell Phones to Aid Students in Selecting Study Areas. SIGUCCS 2016: 147-152 - 2015
- [j6]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Abdelwahab Hamou-Lhadj
:
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System. IEEE Trans. Reliab. 64(1): 269-283 (2015) - [c15]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces. GTSE@ICSE 2015: 59-68 - [c14]Shamar Akio Ward, Mechelle Gittens:
A Real-time Application to Predict and Notify Students about the Present and Future Availability of Workspaces on a University Campus. SIGUCCS 2015: 67-74 - 2014
- [j5]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Nazim H. Madhavji, Mechelle Gittens:
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems. J. Syst. Softw. 90: 29-44 (2014) - [c13]Mechelle Gittens, Reco King, Curtis Gittens, Adrian Als:
Post-diagnosis management of diabetes through a mobile health consultation application. Healthcom 2014: 152-157 - 2011
- [j4]Zude Li, Nazim H. Madhavji, Syed Shariyar Murtaza, Mechelle Gittens, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empir. Softw. Eng. 16(5): 667-702 (2011) - [c12]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Zude Li:
Diagnosing new faults using mutants and prior faults. ICSE 2011: 960-963 - 2010
- [j3]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji:
A towards an extended relational algebra for software architecture. ACM SIGSOFT Softw. Eng. Notes 35(3): 1-4 (2010) - [c11]Syed Shariyar Murtaza, Mechelle Gittens, Zude Li, Nazim H. Madhavji:
F007: finding rediscovered faults from the field using function-level failed traces of software in the field. CASCON 2010: 57-71
2000 – 2009
- 2009
- [c10]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system. ICSM 2009: 265-273 - 2008
- [j2]Mechelle Gittens, Pramod Gupta, David Godwin, Hebert Pereyra, Jeff Riihimaki:
Focused Iterative Testing: A Test Automation Case Study. IEEE Data Eng. Bull. 31(1): 59-67 (2008) - [c9]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin, Colin A. Taylor:
SIFT: a scalable iterative-unfolding technique for filtering execution traces. CASCON 2008: 21 - [c8]Syed Shariyar Murtaza, Mechelle Gittens, Nazim H. Madhavji:
Discovering the Fault Origin from Field Traces. ISSRE 2008: 295-296 - [c7]Mechelle Gittens, Pramod Gupta, David Godwin, Hebert Pereyra, Jeff Riihimaki:
Focused iterative testing: a test automation case study. DBTest 2008: 8 - [c6]Colin A. Taylor, Mechelle Gittens, Andriy V. Miranskyy:
A case study in database reliability: component types, usage profiles, and testing. DBTest 2008: 11 - 2007
- [c5]Andriy V. Miranskyy, Nazim H. Madhavji, Mechelle Gittens, Matthew Davison
, Mark Wilding, David Godwin:
An iterative, multi-level, and scalable approach to comparing execution traces. ESEC/SIGSOFT FSE 2007: 537-540 - 2006
- [c4]Mechelle Gittens, Keri Romanufa, David Godwin, Jason Racicot:
All code coverage is not created equal: a case study in prioritized code coverage. CASCON 2006: 131-145 - 2005
- [c3]Mechelle Gittens, Yong Kim, David Godwin:
The Vital Few Versus the Trivial Many: Examining the Pareto Principle for Software. COMPSAC (1) 2005: 179-185 - 2004
- [j1]Mechelle Gittens, Hanan Lutfiyya, Michael A. Bauer:
Continuous evolutionary one-step-ahead testing. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-4 (2004) - [c2]Mechelle Gittens, Hanan Lutfi Lutfiyya, Michael A. Bauer:
An Extended Operational Profile Model. ISSRE 2004: 314-325 - 2002
- [c1]Mechelle Gittens, Hanan Lutfi Lutfiyya, Michael A. Bauer, David Godwin, Yong Woo Kim, Pramod Gupta:
An empirical evaluation of system and regression testing. CASCON 2002: 3
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint