Andreas Zeller
#126,526
Most Influential Person Now
German computer scientist
Andreas Zeller's AcademicInfluence.com Rankings
Andreas Zellercomputer-science Degrees
Computer Science
#5347
World Rank
#5648
Historical Rank
Programming
#67
World Rank
#70
Historical Rank
Software Engineering
#150
World Rank
#151
Historical Rank
Database
#2499
World Rank
#2618
Historical Rank

Download Badge
Computer Science
Andreas Zeller's Degrees
- PhD Computer Science Saarland University
Similar Degrees You Can Earn
Why Is Andreas Zeller Influential?
(Suggest an Edit or Addition)Andreas Zeller's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Simplifying and Isolating Failure-Inducing Input (2002) (989)
- Mining version histories to guide software changes (2004) (877)
- Mining metrics to predict component failures (2006) (809)
- Predicting Defects for Eclipse (2007) (749)
- When do changes induce fixes? (2005) (728)
- Locating causes of program failures (2005) (653)
- Mining version histories to guide software changes (2005) (523)
- Isolating cause-effect chains from computer programs (2002) (507)
- Yesterday, my program worked. Today, it does not. Why? (1999) (440)
- Predicting faults from cached history (2008) (433)
- Why Programs Fail - A Guide to Systematic Debugging, 2nd Edition (2005) (431)
- Checking app behavior against app descriptions (2014) (427)
- Mutation-Driven Generation of Unit Tests and Oracles (2010) (407)
- Predicting vulnerable software components (2007) (393)
- It's not a bug, it's a feature: How misclassification impacts bug prediction (2013) (381)
- How Long Will It Take to Fix This Bug? (2007) (377)
- Fuzzing with Code Fragments (2012) (322)
- Automated Fixing of Programs with Contracts (2010) (317)
- Detecting object usage anomalies (2007) (269)
- The impact of tangled code changes (2013) (257)
- Mining Apps for Abnormal Usage of Sensitive Data (2015) (251)
- Lightweight Defect Localization for Java (2005) (235)
- Javalanche: efficient mutation testing for Java (2009) (200)
- Mining object behavior with ADABU (2006) (194)
- Predicting component failures at design time (2006) (193)
- Change Bursts as Defect Predictors (2010) (193)
- When do changes induce fixes? (2005) (181)
- The Impact of Equivalent Mutants (2009) (177)
- Efficient mutation testing by checking invariant violations (2009) (168)
- Where Should We Fix This Bug? A Two-Phase Recommendation Model (2013) (164)
- How history justifies system architecture (or not) (2003) (152)
- Generating test cases for specification mining (2010) (144)
- Mining temporal specifications from object usage (2009) (142)
- Generating Fixes from Object Behavior Anomalies (2009) (137)
- Isolating cause-effect chains from computer programs (2002) (130)
- (Un-)Covering Equivalent Mutants (2010) (128)
- DDD—a free graphical front-end for UNIX debuggers (1996) (125)
- Efficient unit test case minimization (2007) (123)
- Search-based system testing: high coverage, no false alarms (2012) (119)
- Isolating failure-inducing thread schedules (2002) (113)
- Mining input grammars from dynamic taints (2016) (107)
- Mining trends of library usage (2009) (103)
- Visualizing Memory Graphs (2001) (103)
- Unified versioning through feature logic (1997) (98)
- When do changes induce fixes? On Fridays (2005) (96)
- Predicting Faults from Cached History (2007) (95)
- Making students read and review code (2000) (90)
- Covering and Uncovering Equivalent Mutants (2013) (89)
- Learning from 6,000 projects: lightweight cross-project anomaly detection (2010) (88)
- Lightweight bug localization with AMPLE (2005) (86)
- Generating parameterized unit tests (2011) (82)
- Why Programs Fail, Second Edition: A Guide to Systematic Debugging (2009) (81)
- Simplifying failure-inducing input (2000) (79)
- Predicting Bugs from History (2008) (76)
- Which Crashes Should I Fix First?: Predicting Top Crashes at an Early Stage to Prioritize Debugging Efforts (2011) (76)
- Isolating failure causes through test case generation (2012) (75)
- Where is the bug and how is it fixed? an experiment with practitioners (2017) (73)
- Predicting defects using change genealogies (2013) (72)
- If Your Bug Database Could Talk . . . (2006) (71)
- Automatically Generating Test Cases for Specification Mining (2012) (69)
- Mining version archives for co-changed lines (2006) (68)
- HATARI: raising risk awareness (2005) (67)
- Minimizing reproduction of software failures (2011) (65)
- Mining API Popularity (2010) (65)
- Assessing Oracle Quality with Checked Coverage (2011) (64)
- The impact of tangled code changes on defect prediction models (2016) (63)
- Automated Debugging: Are We Close (2001) (61)
- Practical Test Dependency Detection (2018) (60)
- Mining behavior models from enterprise web applications (2013) (54)
- Profiling Java programs for parallelism (2009) (51)
- Exploiting Common Object Usage in Test Case Generation (2011) (51)
- Reconstructing Core Dumps (2013) (49)
- WebMate: a tool for testing web 2.0 applications (2012) (49)
- The Future of Programming Environments: Integration, Synergy, and Assistance (2007) (47)
- Finding Failure Causes through Automated Testing (2000) (47)
- Chapter 6 – Scientific Debugging (2006) (45)
- Mining Sandboxes (2016) (45)
- EXSYST: Search-based GUI testing (2012) (44)
- Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks (2019) (44)
- Predicting defects in SAP Java code: An experience report (2009) (35)
- Handling Version Sets Through Feature Logic (1995) (35)
- TA-RE: an exchange language for mining software repositories (2006) (35)
- WebMate: Generating Test Cases for Web 2.0 (2013) (35)
- Detecting Behavior Anomalies in Graphical User Interfaces (2017) (35)
- Isolating relevant component interactions with JINSI (2006) (34)
- Learning user interface element interactions (2019) (33)
- DroidMate: A Robust and Extensible Test Generator for Android (2016) (33)
- Detecting information flow by mutating input data (2017) (32)
- Parser-directed fuzzing (2019) (32)
- Mining Input Grammars with AUTOGRAM (2017) (29)
- Failure is a four-letter word: a parody in empirical research (2011) (29)
- Assessing and Restoring Reproducibility of Jupyter Notebooks (2020) (29)
- Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking (2014) (26)
- What is the long-term impact of changes? (2008) (26)
- Configuration management with version sets: a unified software versioning model and its applications (1997) (25)
- Checked coverage: an indicator for oracle quality (2013) (25)
- Program Analysis: A Hierarchy (2003) (24)
- Mining Cause-Effect-Chains from Version Histories (2011) (23)
- Guiding App Testing with Mined Interaction Models (2018) (23)
- Localizing Bugs in Program Executions with Graphical Models (2009) (22)
- Systematically Covering Input Structure (2019) (22)
- A unified version model for configuration management (1995) (21)
- Mining input grammars from dynamic control flow (2020) (21)
- Restoring Execution Environments of Jupyter Notebooks (2021) (20)
- Sambamba: A Runtime System for Online Adaptive Parallelization (2012) (20)
- CUT: automatic unit testing in the cloud (2017) (20)
- Mining Evolution of Object Usage (2011) (19)
- Quantifying the information leak in cache attacks via symbolic execution (2017) (19)
- Mining the Jazz repository: Challenges and opportunities (2009) (19)
- Exposing Backdoors in Robust Machine Learning Models (2020) (18)
- XMLMate: evolutionary XML test generation (2014) (18)
- Predicting Effort to Fix Software Bugs (2007) (18)
- DroidMate-2: A Platform for Android Test Generation (2018) (18)
- Learning input tokens for effective fuzzing (2020) (18)
- WebMate: Web Application Test Generation in the Real World (2014) (17)
- Smooth Operatons with Square Operators - The Version Set Model in ICE (1996) (17)
- Breeding High-Impact Mutations (2011) (17)
- Mining Workflow Models from Web Applications (2015) (17)
- Configuration Management with Version Sets (1997) (17)
- AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service (2019) (16)
- The Truth, The Whole Truth, and Nothing But the Truth (2016) (16)
- Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy (2020) (16)
- Building Fast Fuzzers (2019) (15)
- Why Programs Fail (2005) (15)
- Sambamba: runtime adaptive parallel execution (2013) (15)
- Quantifying the Information Leakage in Cache Attacks via Symbolic Execution (2019) (14)
- Anatomy of Functionality Deletion: An Exploratory Study on Mobile Apps (2018) (14)
- Poster: Efficient GUI Test Generation by Learning from Tests of Other Apps (2018) (14)
- Isolating Intrusions by Automatic Experiments (2006) (14)
- Sample-Free Learning of Input Grammars for Comprehensive Software Fuzzing (2018) (13)
- Artifact Evaluation for Publications (Dagstuhl Perspectives Workshop 15452) (2015) (13)
- Locating faults with program slicing: an empirical analysis (2021) (13)
- Search-based security testing of web applications (2014) (13)
- Replaying and isolating failing multi-object interactions (2008) (13)
- eROSE: guiding programmers in eclipse (2005) (12)
- Extrinsic influence factors in software reliability: a study of 200,000 windows machines (2014) (12)
- Specifications for Free (2011) (12)
- Transferring Tests Across Web Applications (2018) (12)
- Generalized Task Parallelism (2015) (12)
- O!Snap: Cost-Efficient Testing in the Cloud (2017) (12)
- Where do bugs come from? (2006) (11)
- Using Dynamic Symbolic Execution to Generate Inputs in Search-Based GUI Testing (2015) (11)
- Versioning System Models Through Description Logic (1998) (11)
- Automated debugging in eclipse (2005) (11)
- DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification (2014) (11)
- Configuration Management with Feature Logics (1994) (11)
- Debugging Inputs (2020) (10)
- HATARI: Raising Risk Awareness. Research Demonstration (2005) (10)
- Automated debugging in Eclipse: (at the touch of not even a button) (2003) (10)
- Classifying code changes and predicting defects using changegenealogies (2013) (9)
- Checking app user interfaces against app descriptions (2016) (9)
- ProCrawl: mining test models from multi-user web applications (2014) (9)
- When does my program do this? learning circumstances of software behavior (2020) (9)
- Composition of Modular Models for Verification of Distributed Automation Systems (2018) (9)
- Abstracting failure-inducing inputs (2020) (8)
- Carving Parameterized Unit Tests (2018) (8)
- Search-Based Testing and System Testing: A Marriage in Heaven (2017) (8)
- Inputs from Hell: Learning Input Distributions for Grammar-Based Test Generation (2021) (8)
- When life gives you oranges: detecting and diagnosing intermittent job failures at Mozilla (2021) (8)
- Visual debugging with ddd (2001) (8)
- Test Complement Exclusion: Guarantees from Dynamic Analysis (2015) (8)
- Restoring Reproducibility of Jupyter Notebooks (2020) (7)
- Can We Trust Software Repositories? (2013) (7)
- Mining Your Own Evidence (2011) (7)
- Guest Editors' Introduction: Mining Software Archives (2009) (7)
- CALAPPA: a toolchain for mining Android applications (2016) (6)
- If You Can't Kill a Supermutant, You Have a Problem (2018) (6)
- Predicting Software Metrics at Design Time (2008) (6)
- Challenges for functional testing of reconfigurable production systems (2016) (6)
- Mining Specifications: A Roadmap (2010) (6)
- Mining Bug Data - A Practitioner's Guide (2014) (6)
- Inferring Input Grammars from Dynamic Control Flow (2019) (6)
- Active Learning of Input Grammars (2017) (6)
- Quantifying the Information Leak in Cache Attacks through Symbolic Execution (2016) (5)
- Mutation-driven Generation of Oracles and Unit Tests (2010) (5)
- Analyzing the User Interface of Android Apps (2018) (5)
- Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering (2011) (5)
- Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis (2020) (5)
- Mining Android Apps for Anomalies (2015) (5)
- Self-Repairing Programs (Dagstuhl Seminar 11062) (2011) (5)
- Causes and Effects in Computer Programs (2003) (5)
- Thread-level speculation with kernel support (2016) (4)
- Debugging debugging: acm sigsoft impact paper award keynote (2009) (4)
- How Developers Debug Software — The DBGBENCH Dataset (2017) (4)
- Testing and Verification of Compilers (Dagstuhl Seminar 17502) (2017) (4)
- Component based Verification of Distributed Automation Systems based on Model Composition (2018) (4)
- When Does My Program Fail? (2011) (4)
- Calibrated Mutation Testing (2011) (4)
- Generating Unit Tests with Structured System Interactions (2017) (4)
- Isolating cause-effect chains with AskIgor (2003) (4)
- Testing Apps With Real-World Inputs (2020) (4)
- Search-Based Program Analysis (2011) (4)
- Test case selection for networked production systems (2015) (4)
- Automating Full Functional Verification of Programs with Loops (2014) (4)
- Functional verification of distributed automation systems (2019) (4)
- Essential open source toolset - programming with Eclipse, JUnit, CVS, Bugzilla, Ant, Tcl/Tk and more (2005) (3)
- Learning from software (2008) (3)
- Entwicklung sicherer Software durch Security by Design (2013) (3)
- Inputs from Hell: Generating Uncommon Inputs from Common Samples (2018) (3)
- Proceedings of the 2008 international symposium on Software testing and analysis (2008) (3)
- How Failures Come to Be (2009) (3)
- How developers debug software the DbgBench dataset: poster (2017) (3)
- Learning from 6,000 Projects: Mining Models in the Large (2010) (3)
- FormatFuzzer: Effective Fuzzing of Binary File Formats (2021) (3)
- Fifth International Workshop on Dynamic Analysis (WODA 2007) (2007) (3)
- Probabilistic Grammar-based Test Generation (2021) (2)
- Isolating cause-effect chains in computer systems (2007) (2)
- Automated Debugging of Programs with Contracts (2010) (2)
- A Unified Configuration Management Model (1995) (2)
- Test generation across multiple layers (2014) (2)
- Assessing modularity via usage changes (2011) (2)
- What do all these Buttons do? Statically Mining Android User Interfaces at Scale (2021) (2)
- Why Does this App Need this Data? Automatic Tightening of Resource Access (2019) (2)
- Proceedings of the 25th International Symposium on Software Testing and Analysis (2016) (2)
- Fuzzing with Fast Failure Feedback (2020) (2)
- Mining Models (2012) (2)
- Mining Input Grammars (2021) (2)
- Model-based testing of end-user collaboration intensive systems (2017) (2)
- Chapter 1 – How Failures Come to Be (2006) (2)
- Proceedings of the 5th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering (2004) (2)
- Speeding up GUI Testing by On-Device Test Generation (2020) (2)
- Inter-Application Communication Testing of Android Applications Using Intent Fuzzing (2014) (1)
- Mining Version Archives for Co-changed Lines – Extended Version – (2006) (1)
- Incremental Configuration Management Based on Feature Unification (2008) (1)
- Object Request Broker DB function DB function DB Web Service Distributed Architectures Software Engineering (2000) (1)
- Project-specific deletion patterns (2008) (1)
- Inputs From Hell: (2022) (1)
- Isolating Failure-Inducing Input (2001) (1)
- Compiler Construction : 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 30-31, 2006, Proceedings (2006) (1)
- Isolating Failure Causes (2009) (1)
- Predicting Component Failures at Early Design Time (2006) (1)
- Fault Prediction, Localization, and Repair (Dagstuhl Seminar 13061) (2013) (1)
- Multi-Version Program Analysis (2006) (1)
- Bridging the Gap between Unit Test Generation and System Test Generation (2019) (1)
- Mining apps for anomalies (2016) (1)
- 05261 Summary - Multi-Version Program Analysis (2005) (1)
- How Developers Diagnose and Repair Software Bugs ( and what we can do about it ) (2016) (1)
- Input invariants (2022) (1)
- Extraction of Attack Signatures (2007) (1)
- Making Programs Fail (2009) (1)
- Frontmatter: mining Android user interfaces at scale (2021) (1)
- Software Connguration with Feature Logic (1996) (1)
- How Design Predicts Failures (2006) (1)
- Inducing Subtle Mutations with Program Repair (2021) (1)
- Demand-driven Pointer Analysis on Explicit Dependence Graphs (2009) (1)
- Locating faults with program slicing: an empirical analysis (2021) (1)
- Evaluating a Lightweight Defect Localization Tool (2005) (1)
- Message from the ICSE 2022 Program Chairs (2022) (1)
- Abnormal sensitive data usage in android apps (2016) (0)
- Causes and Effects (2009) (0)
- App Mining (2017) (0)
- Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, PASTE'04, Washington, DC, USA, June 7-8, 2004 (2004) (0)
- DroidMate-2: A Platform for Android Test Generation (Source Code) (2021) (0)
- 05261 Abstracts Collection - Multi-Version Program Analysis (2005) (0)
- Chapter 7 – Deducing Errors (2006) (0)
- Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (2013) (0)
- Input Algebras (2021) (0)
- Replication Package for Input Algebras (2021) (0)
- Chapter 5 – Simplifying Problems (2006) (0)
- Learning Circumstances of Software Failures (2021) (0)
- CHAPTER 10 – Asserting Expectations (2006) (0)
- Chapter 3 – Making Programs Fail (2006) (0)
- When Abstraction Fails (2005) (0)
- Guest editorial: emerging areas in automated software engineering research (2017) (0)
- ICSE 2011 technical briefings (2011) (0)
- Multi-Version Program Analysis Dagstuhl Seminar (2006) (0)
- Replication package for Abstracting Failure Inducing Inputs (2020) (0)
- 2 13061 – Fault Prediction , Localization , and Repair 1 Executive Summary (2013) (0)
- Guest editorial: emerging areas in automated software engineering research (2017) (0)
- Session details: Formal demos (2010) (0)
- 2 . 1 The Change that Causes a Failure (0)
- Multi-Version Program Analysis, 26. June - 1. July 2005 (2006) (0)
- Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2008, Seattle, WA, USA, July 20-24, 2008 (2008) (0)
- 18 11062 – Self-Repairing Programs Common Concerns and Insights (2011) (0)
- Trust, but Control: A Paradigm Shift in Program Analysis (2015) (0)
- Emerging Faculty Symposium 2010 (2010) (0)
- Program Program with Invariant Checkers Surviving Mutations RankingMutations 1 2 3 4 5 Tester (2008) (0)
- A Useful Resource for Defect Prediction Models (2009) (0)
- Poster: How Developers Debug Software The DBGBENCH Dataset (2017) (0)
- How to Compare Fuzzers (2022) (0)
- VDI Status Report Testing of Networked Systems for Industrie 4.0 (2018) (0)
- 2 Data Mining Version Histories Thomas Zimmermann (2004) (0)
- Session details: Web and security (2008) (0)
- 2 Errors are Easy to Detect , But Generally Impossible to Locate (2005) (0)
- 07491 Abstracts Collection - Mining Programs and Processes (2007) (0)
- Woda 2003 Icse Workshop on Dynamic Analysis Table of Contents Program Analysis: a Hierarchy (2003) (0)
- Generating Tests that Cover Input Structure (2021) (0)
- CHAPTER 11 – Detecting Anomalies (2006) (0)
- CLIFuzzer: mining grammars for command-line invocations (2022) (0)
- 07491 Abstracts Collection Mining Programs and Processes Dagstuhl Seminar (2009) (0)
- Inferring Loop Invariants Dynamically (2012) (0)
- Mining Precise Specifications - (Abstract) (2011) (0)
- JTACO: Test Execution for Faster Bounded Verification (2014) (0)
- Fixing the Defect (2009) (0)
- Learning from Mistakes (2009) (0)
- CHAPTER 8 – Observing Facts (2006) (0)
- Electronic Appendix to "Input Invariants" (2022) (0)
- Chapter 12 – Causes and Effects (2006) (0)
- CHAPTER 9 – Tracking Origins (2006) (0)
- 2 How Call Sequences Indicate Defects (2004) (0)
- Hardware and Software: Verification and Testing - 5th International Haifa Verification Conference, HVC 2009, Haifa, Israel, October 19-22, 2009, Revised Selected Papers (2011) (0)
- Isolating Cause–Effect Chains (2009) (0)
- Locating the Risk of Changes (2005) (0)
- Chapter 13 – Isolating Failure Causes (2006) (0)
- TRANT — A Scalable Trace Analysis Toolset for Java (2014) (0)
- Chapter 14 – Isolating Cause-Effect Chains (2006) (0)
- Proceedings of the 2nd international Haifa verification conference on Hardware and software, verification and testing (2006) (0)
- Isolating Cause-Effect Chains with AskIgor - Tool Demo - (2003) (0)
- Debugging inputs (2020) (0)
- SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), Szeged, Hungary, September 5-9, 2011 (2011) (0)
- Grammar-Based Sampling (2020) (0)
- The impact of tangled code changes on defect prediction models (2015) (0)
- Proving programs continuous: technical perspective (2012) (0)
- Personalization of Search on Structured Data (2008) (0)
- Efficient Typestate Verification for Java (2009) (0)
- IEEE International Conference on Software Testing, Verification and Validation (ICST 2020) (2022) (0)
- Introduction: The Best Papers of ISSTA (2010) (0)
- Replication Package for lFuzzer - Learning Input Tokens for Effective Fuzzing (2020) (0)
- Don ’ t Program on Fridays ! (2005) (0)
- Mining Sandboxes for Security - Automatisches Sandboxing für Software-Sicherheit (2017) (0)
- Predicting Defects in SAP Products: A Replicated Study (2007) (0)
- Understanding Program Dynamics (Dagstuhl Seminar 03491) (2021) (0)
- “Synthesizing input grammars”: a replication study (2022) (0)
- CHAPTER 4 – Reproducing Problems (2006) (0)
- Poster: Debugging Inputs (2020) (0)
- SFLKit: a workbench for statistical fault localization (2022) (0)
- Isolating Faults in Failure-Inducing Inputs (2021) (0)
- Locating CausesofProgram Failures (2005) (0)
- Lightweight Mining of Object Usage (2011) (0)
- Software-Metriken (2000) (0)
- 07491 Executive Summary - Mining Programs and Processes (2007) (0)
- Chapter 15 – Fixing the Defect (2006) (0)
- Input Repair via Synthesis and Lightweight Error Feedback (2022) (0)
- Academic prototyping (invited tutorial) (2022) (0)
- Compiler Construction: 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS ... (Lecture Notes in Computer Science) (2006) (0)
- Proceedings of the 15th international conference on Compiler Construction (2006) (0)
- Wisdom of app stores: Early identification of malicious Android apps from Google Play (2022) (0)
- CHAPTER 2 – Tracking Problems (2006) (0)
This paper list is powered by the following services:
Other Resources About Andreas Zeller
What Schools Are Affiliated With Andreas Zeller?
Andreas Zeller is affiliated with the following schools: