default search action
Paul Ammann
Person information
- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c73]Abdulrahman Alshammari, Paul Ammann, Michael Hilton, Jonathan Bell:
230,439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers. ICST 2024: 257-268 - [c72]Abdulrahman Alshammari, Paul Ammann, Michael Hilton, Jonathan Bell:
A Study of Flaky Failure De-Duplication to Identify Unreliably Killed Mutants. ICSTW 2024: 257-262 - [c71]James Kukucka, Luís Pina, Paul Ammann, Jonathan Bell:
An Empirical Examination of Fuzzer Mutator Performance. ISSTA 2024: 1631-1642 - [i1]Abdulrahman Alshammari, Paul Ammann, Michael Hilton, Jonathan Bell:
230, 439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers. CoRR abs/2401.15788 (2024) - 2022
- [c70]James Kukucka, Luís Pina, Paul Ammann, Jonathan Bell:
CONFETTI: Amplifying Concolic Guidance for Fuzzers. ICSE 2022: 438-450 - [c69]Samuel J. Kaufman, Ryan Featherman, Justin Alvin, Bob Kurtz, Paul Ammann, René Just:
Prioritizing Mutants to Guide Mutation Testing. ICSE 2022: 1743-1754 - 2021
- [c68]Kesina Baral, Jeff Offutt, Paul Ammann, Rasika Mohod:
Practice makes better: quiz retake software to increase student learning. EASEAI@ESEC/SIGSOFT FSE 2021: 47-53 - 2020
- [c67]Kesina Baral, Paul Ammann:
Teaching a Testing Concept (JUnit) with Active Learning. ICST Workshops 2020: 411 - [c66]Yiqun T. Chen, Rahul Gopinath, Anita Tadakamalla, Michael D. Ernst, Reid Holmes, Gordon Fraser, Paul Ammann, René Just:
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size. ASE 2020: 237-249
2010 – 2019
- 2019
- [c65]Justin Alvin, Bob Kurtz, Paul Ammann, Huzefa Rangwala, René Just:
Guiding testing effort using mutant utility. ICSE (Companion Volume) 2019: 312-313 - [c64]Kesina Baral, Rasika Mohod, Jennifer Flamm, Seth Goldrich, Paul Ammann:
Evaluating a Test Automation Decision Support Tool. ICST Workshops 2019: 69-76 - 2018
- [c63]Goran Petrovic, Marko Ivankovic, Bob Kurtz, Paul Ammann, René Just:
An Industrial Application of Mutation Testing: Lessons, Challenges, and Research Directions. ICST Workshops 2018: 47-53 - 2017
- [j33]Lin Deng, Jeff Offutt, Paul Ammann, Nariman Mirzaei:
Mutation operators for testing Android apps. Inf. Softw. Technol. 81: 154-168 (2017) - [c62]René Just, Bob Kurtz, Paul Ammann:
Inferring mutant utility from program context. ISSTA 2017: 284-294 - [c61]Jeff Offutt, Paul Ammann, Kinga Dobolyi, Chris Kauffmann, Jaime Lester, Upsorn Praphamontripong, Huzefa Rangwala, Sanjeev Setia, Pearl Y. Wang, Liz White:
A Novel Self-Paced Model for Teaching Programming. L@S 2017: 177-180 - 2016
- [j32]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - [c60]Bob Kurtz, Paul Ammann, Jeff Offutt, Mariet Kurtz:
Are We There Yet? How Redundant and Equivalent Mutants Affect Determination of Test Completeness. ICST Workshops 2016: 142-151 - [c59]Bob Kurtz, Paul Ammann, Jeff Offutt, Márcio Eduardo Delamaro, Mariet Kurtz, Nida Gökçe:
Analyzing the validity of selective mutation with dominator mutants. SIGSOFT FSE 2016: 571-582 - 2015
- [c58]Reyhaneh Jabbarvand Behrouz, Alireza Sadeghi, Joshua Garcia, Sam Malek, Paul Ammann:
EcoDroid: An Approach for Energy-Based Ranking of Android Apps. GREENS 2015: 8-14 - [c57]Lin Deng, Nariman Mirzaei, Paul Ammann, Jeff Offutt:
Towards mutation analysis of Android apps. ICST Workshops 2015: 1-10 - [c56]Bob Kurtz, Paul Ammann, Jeff Offutt:
Static analysis of mutant subsumption. ICST Workshops 2015: 1-10 - 2014
- [c55]Márcio Eduardo Delamaro, Jeff Offutt, Paul Ammann:
Designing Deletion Mutation Operators. ICST 2014: 11-20 - [c54]Paul Ammann, Márcio Eduardo Delamaro, Jeff Offutt:
Establishing Theoretical Minimal Sets of Mutants. ICST 2014: 21-30 - [c53]Bob Kurtz, Paul Ammann, Márcio Eduardo Delamaro, Jeff Offutt, Lin Deng:
Mutant Subsumption Graphs. ICST Workshops 2014: 176-185 - [c52]Preetham Vemasani, Alexander Brodsky, Paul Ammann:
Generating Test Data to Distinguish Conjunctive Queries with Equalities. ICST Workshops 2014: 216-221 - 2013
- [j31]Gary Kaminski, Paul Ammann, Jeff Offutt:
Improving logic-based testing. J. Syst. Softw. 86(8): 2002-2012 (2013) - 2012
- [j30]Paul Ammann, Gordon Fraser, Franz Wotawa:
Guest Editorial for the Special Issue on Model-Based Testing. Softw. Test. Verification Reliab. 22(5): 295-296 (2012) - [c51]William Shelton, Nan Li, Paul Ammann, Jeff Offutt:
Adding Criteria-Based Tests to Test Driven Development. ICST 2012: 878-886 - 2011
- [j29]Garrett Kent Kaminski, Upsorn Praphamontripong, Paul Ammann, Jeff Offutt:
A logic mutation approach to selective mutation for programs and queries. Inf. Softw. Technol. 53(10): 1137-1152 (2011) - [j28]Garrett Kent Kaminski, Paul Ammann:
Reducing logic test set size while preserving fault detection. Softw. Test. Verification Reliab. 21(3): 155-193 (2011) - [c50]Jeff Offutt, Nan Li, Paul Ammann, Wuzhi Xu:
Using abstraction and Web applications to teach criteria-based test design. CSEE&T 2011: 227-236 - [c49]Gary Kaminski, Paul Ammann, Jeff Offutt:
Better predicate testing. AST 2011: 57-63 - 2010
- [c48]Garrett Kent Kaminski, Paul Ammann:
Applications of Optimization to Logic Testing. ICST Workshops 2010: 331-336 - [c47]Garrett Kent Kaminski, Upsorn Praphamontripong, Paul Ammann, Jeff Offutt:
An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage. Software Engineering Research and Practice 2010: 205-211 - [c46]Garrett Kent Kaminski, Paul Ammann:
Applying MCDC to Large DNF Logic Expressions. Software Engineering Research and Practice 2010: 411-417
2000 – 2009
- 2009
- [j27]Gordon Fraser, Franz Wotawa, Paul Ammann:
Issues in using model checkers for test case generation. J. Syst. Softw. 82(9): 1403-1418 (2009) - [j26]Gordon Fraser, Franz Wotawa, Paul Ammann:
Testing with model checkers: a survey. Softw. Test. Verification Reliab. 19(3): 215-261 (2009) - [c45]Garrett Kent Kaminski, Paul Ammann:
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Double Fault Detection. ICST Workshops 2009: 167-176 - [c44]Garrett Kent Kaminski, Paul Ammann:
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection. ICST 2009: 356-365 - [c43]Garrett Kent Kaminski, Paul Ammann:
Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing. ICST 2009: 386-395 - 2008
- [b1]Paul Ammann, Jeff Offutt:
Introduction to Software Testing. Cambridge University Press 2008, ISBN 978-0-521-88038-1, pp. I-XXII, 1-322 - [j25]Garrett Kent Kaminski, Gregory Williams, Paul Ammann:
Reconciling perspectives of software logic testing. Softw. Test. Verification Reliab. 18(3): 149-188 (2008) - [c42]Paul Ammann, Jeff Offutt, Wuzhi Xu:
Coverage Criteria for State Based Specifications. Formal Methods and Testing 2008: 118-156 - [c41]Gordon Fraser, Paul Ammann:
Reachability and Propagation for LTL Requirements Testing. QSIC 2008: 189-198 - 2007
- [j24]Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann:
Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) - [c40]Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser:
Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 - 2006
- [c39]Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38 - [c38]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 - [c37]Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann:
An Algebra for Composing Ontologies. FOIS 2006: 265-276 - [c36]Jing Guan, Jeff Offutt, Paul Ammann:
An industrial case study of structural testing applied to safety-critical embedded software. ISESE 2006: 272-277 - [c35]Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32 - [c34]Saket Kaushik, Duminda Wijesekera, Paul Ammann:
BPEL orchestration of secure webmail. SWS 2006: 85-94 - 2005
- [c33]Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis. ACSAC 2005: 72-84 - [c32]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 - [c31]Saket Kaushik, Duminda Wijesekera, Paul Ammann:
Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 - 2004
- [c30]Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey:
A Policy Driven Approach to Email Services. POLICY 2004: 169- - 2003
- [j23]A. Jefferson Offutt, Shaoying Liu, Aynur Abdurazik, Paul Ammann:
Generating test data from state-based specifications. Softw. Test. Verification Reliab. 13(1): 25-53 (2003) - [c29]Paul Ammann, A. Jefferson Offutt, Hong Huang:
Coverage Criteria for Logical Expressions. ISSRE 2003: 99-107 - 2002
- [j22]Paul Ammann, Sushil Jajodia, Peng Liu:
Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) - [c28]Paul Ammann, Duminda Wijesekera, Saket Kaushik:
Scalable, graph-based network vulnerability analysis. CCS 2002: 217-224 - 2001
- [c27]Paul Ammann, Wei Ding, Daling Xu:
Using a Model Checker to Test Safety Properties. ICECCS 2001: 212-221 - 2000
- [j21]Peng Liu, Paul Ammann, Sushil Jajodia:
Rewriting Histories: Recovering from Malicious Transactions. Distributed Parallel Databases 8(1): 7-40 (2000) - [j20]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) - [j19]Paul Ammann:
System testing via mutation analysis of model checking specifications. ACM SIGSOFT Softw. Eng. Notes 25(1): 33 (2000) - [c26]Aynur Abdurazik, Paul Ammann, Wei Ding, A. Jefferson Offutt:
Evaluation of Three Specification-Based Testing Criteria. ICECCS 2000: 179-187 - [c25]Ronald W. Ritchey, Paul Ammann:
Using Model Checking to Analyze Network Vulnerabilities. S&P 2000: 156-165
1990 – 1999
- 1999
- [j18]Sushil Jajodia, Catherine D. McCollum, Paul Ammann:
Trusted Recovery. Commun. ACM 42(7): 71-75 (1999) - [j17]Sushil Jajodia, Paul Ammann, Catherine D. McCollum:
Surviving Information Warfare Attacks. Computer 32(4): 57-63 (1999) - [j16]Paul Ammann, Sushil Jajodia:
Computer Security, Fault Tolerance, And Software Assurance. IEEE Concurr. 7(1): 4-6 (1999) - [c24]Paul Ammann, Paul E. Black:
A Specification-Based Coverage Metric to Evaluate Test Sets. HASE 1999: 239-248 - [c23]Peng Liu, Paul Ammann, Sushil Jajodia:
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 - [c22]Paul Ammann, Sushil Jajodia:
The Integrity Challenge. IICIS 1999: 59-70 - 1998
- [j15]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions. J. Comput. Secur. 6(3): 181-217 (1998) - [c21]Paul Ammann, Paul E. Black, William Majurski:
Using Model Checking to Generate Tests from Specifications. ICFEM 1998: 46-55 - 1997
- [j14]Paul Ammann, Dahlard L. Lukes, John C. Knight:
Applying Data Redundancy to Differential Equation Solvers. Ann. Softw. Eng. 4: 65-77 (1997) - [j13]Paul Ammann, Sushil Jajodia:
Semantics-based transaction processing: satisfying conflicting objectives. IEEE Concurrency 5(2): 8-10 (1997) - [j12]Paul Ammann, Sushil Jajodia:
Rethinking integrity [distributed databases]. IEEE Concurrency 5(4): 5-6 (1997) - [j11]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) - [c20]Sushil Jajodia, Indrakshi Ray, Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 - [c19]Paul Ammann, Jeff Offutt:
Maintaining Knowledge Currency in the 21st Century. CSEE&T 1997: 161-173 - [c18]Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:
Surviving information warfare attacks on databases. S&P 1997: 164-174 - [p1]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997 - 1996
- [j10]Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996) - [j9]Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. J. Comput. Secur. 4(2/3): 149-166 (1996) - [j8]Paul Ammann, Sushil Jajodia, Phyllis G. Frankl:
Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distributed Syst. 7(6): 665-670 (1996) - [c17]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions. S&P 1996: 74-84 - 1995
- [j7]Paul Ammann, Frank Jaeckle, Sushil Jajodia:
Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. J. Comput. Secur. 3(2/3): 87-114 (1995) - [j6]Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia:
The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) - [j5]Paul Ammann, Sushil Jajodia, Padmaja Mavuluri:
On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) - [c16]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 - 1994
- [j4]Paul Ammann, Susan S. Brilliant, John C. Knight:
The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. IEEE Trans. Software Eng. 20(2): 142-148 (1994) - [c15]Paul Ammann, Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. CCS 1994: 118-125 - [c14]Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems. CCS 1994: 136-147 - [c13]Paul Ammann, Hassan Gomaa, A. Jefferson Offutt, David Rine, Bo Ingvar Sandén:
A Five Year Perspective on Software Engineering Graduate Programs at George Mason University. CSEE 1994: 473-488 - [c12]Ravi S. Sandhu, Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149 - 1993
- [j3]Paul Ammann, Sushil Jajodia:
Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993) - [c11]Paul Ammann, Sushil Jajodia:
Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134 - 1992
- [j2]Paul Ammann, Ravi S. Sandhu:
The Extended Schematic Protection Model. J. Comput. Secur. 1(3-4): 335-384 (1992) - [c10]Paul Ammann, Ravi S. Sandhu:
Implementing transaction control expressions by checking for absence of access rights. ACSAC 1992: 131-140 - [c9]Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 - [c8]Paul Ammann, Frank Jaeckle, Sushil Jajodia:
A two snapshot algorithm for concurrency control in multi-level secure databases. S&P 1992: 204-215 - 1991
- [c7]Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri:
A distributed implementation of the extended schematic protection model. ACSAC 1991: 152-164 - [c6]Paul Ammann, Sushil Jajodia:
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202 - [c5]Paul Ammann, Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model. S&P 1991: 87-97 - 1990
- [c4]Paul Ammann, Ravi S. Sandhu:
Extending the creation operation in the Schematic Protection Model. ACSAC 1990 - [c3]Susan S. Brilliant, John C. Knight, Paul Ammann:
On the performance of software testing using multiple versions. FTCS 1990: 408-415
1980 – 1989
- 1989
- [c2]John C. Knight, Paul Ammann:
Issues Influencing the Use of N-Version Programming. IFIP Congress 1989: 217-222 - 1988
- [j1]Paul Ammann, John C. Knight:
Data Diversity: An Approach to Software Fault Tolerance. IEEE Trans. Computers 37(4): 418-425 (1988) - 1985
- [c1]John C. Knight, Paul Ammann:
An Experimental Evaluation of Simple Methods for Seeding Program Errors. ICSE 1985: 337-342
Coauthor Index
aka: Jeff Offutt
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint