default search action
Andy Podgurski
Person information
- affiliation: Case Western Reserve University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c55]Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
Artifact for Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques. ICSE (Companion Volume) 2021: 181-182 - [c54]Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques. ICSE 2021: 649-660 - [i1]Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques. CoRR abs/2102.06292 (2021) - 2020
- [c53]Jian Liu, Xusheng Xiao, Lihua Xu, Liang Dou, Andy Podgurski:
DroidMutator: an effective mutation analysis tool for Android applications. ICSE (Companion Volume) 2020: 77-80 - [c52]Andy Podgurski, Yigit Küçük:
CounterFault: Value-Based Fault Localization by Modeling and Predicting Counterfactual Outcomes. ICSME 2020: 382-393
2010 – 2019
- 2019
- [c51]Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
The Impact of Rare Failures on Statistical Fault Localization: The Case of the Defects4J Suite. ICSME 2019: 24-28 - [c50]Tim A. D. Henderson, Andy Podgurski, Yigit Küçük:
Evaluating Automatic Fault Localization Using Markov Processes. SCAM 2019: 115-126 - 2018
- [c49]Tim A. D. Henderson, Andy Podgurski:
Behavioral Fault Localization by Sampling Suspicious Dynamic Control Flow Subgraphs. ICST 2018: 93-104 - 2017
- [j14]Zhuofu Bai, Gang Shu, Andy Podgurski:
Causal inference based fault localization for numerical software with NUMFL. Softw. Test. Verification Reliab. 27(6) (2017) - [c48]Tim A. D. Henderson, Andy Podgurski:
Rethinking dependence clones. IWSC 2017: 68-74 - [c47]Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, Huibiao Zhu:
RunDroid: recovering execution call graphs for Android applications. ESEC/SIGSOFT FSE 2017: 949-953 - 2016
- [c46]Shih-Feng Sun, Andy Podgurski:
Properties of Effective Metrics for Coverage-Based Statistical Fault Localization. ICST 2016: 124-134 - [c45]Tim A. D. Henderson, Andy Podgurski:
Sampling code clones from program dependence graphs with GRAPLE. SWAN@SIGSOFT FSE 2016: 47-53 - 2015
- [c44]Zhuofu Bai, Shih-Feng Sun, Andy Podgurski:
The Importance of Being Positive in Causal Statistical Fault Localization: Important Properties of Baah et al.'s CSFL Regression Model. COUFLESS@ICSE 2015: 7-13 - [c43]Kai Liang, Zhuofu Bai, Murat Cenk Cavusoglu, Andy Podgurski, Soumya Ray:
Fault Localization in Embedded Control System Software. SEsCPS@ICSE 2015: 8-14 - [c42]Zhuofu Bai, Gang Shu, Andy Podgurski:
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model. ICST 2015: 1-10 - 2013
- [c41]Kai Liang, Feng Cao, Zhuofu Bai, Mark Renfrew, Murat Cenk Cavusoglu, Andy Podgurski, Soumya Ray:
Detection and Prediction of Adverse and Anomalous Events in Medical Robots. IAAI 2013: 1539-1544 - [c40]Gang Shu, Boya Sun, Andy Podgurski, Feng Cao:
MFL: Method-Level Fault Localization with Causal Inference. ICST 2013: 124-133 - [c39]Gang Shu, Boya Sun, Tim A. D. Henderson, Andy Podgurski:
JavaPDG: A New Platform for Program Dependence Analysis. ICST 2013: 408-415 - 2012
- [j13]Ray-Yaung Chang, Andy Podgurski:
Discovering programming rules and violations by mining interprocedural dependences. J. Softw. Maintenance Res. Pract. 24(1): 51-66 (2012) - [c38]Boya Sun, Gang Shu, Andy Podgurski, Brian Robinson:
Extending static analysis by mining project-specific rules. ICSE 2012: 1054-1063 - [c37]Boya Sun, Gang Shu, Andy Podgurski, Soumya Ray:
CARIAL: Cost-Aware Software Reliability Improvement with Active Learning. ICST 2012: 360-369 - 2011
- [c36]Gang Shu, Zhuofu Bai, Andy Podgurski:
Statistical Evaluation of Complex Input-Output Transformations. ISSRE 2011: 70-79 - [c35]George K. Baah, Andy Podgurski, Mary Jean Harrold:
Mitigating the confounding effects of program dependences for effective fault localization. SIGSOFT FSE 2011: 146-156 - 2010
- [j12]George K. Baah, Andy Podgurski, Mary Jean Harrold:
The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis. IEEE Trans. Software Eng. 36(4): 528-545 (2010) - [c34]Boya Sun, Andy Podgurski, Soumya Ray:
Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation Graphs. ISSRE 2010: 1-10 - [c33]Boya Sun, Gang Shu, Andy Podgurski, Shirong Li, Shijie Zhang, Jiong Yang:
Propagating Bug Fixes with Fast Subgraph Matching. ISSRE 2010: 21-30 - [c32]George K. Baah, Andy Podgurski, Mary Jean Harrold:
Causal inference for statistical fault localization. ISSTA 2010: 73-84 - [c31]Andy Podgurski:
Evidence-based validation and improvement of electronic health record systems. FoSER 2010: 287-292
2000 – 2009
- 2009
- [j11]Wes Masri, Andy Podgurski:
Algorithms and tool support for dynamic information flow analysis. Inf. Softw. Technol. 51(2): 385-404 (2009) - [j10]Wes Masri, Andy Podgurski:
Measuring the strength of information flows in programs. ACM Trans. Softw. Eng. Methodol. 19(2): 5:1-5:33 (2009) - [e1]Ben Liblit, Andy Podgurski:
Proceedings of the International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2009), WODA 2009, Chicago, IL, USA, July, 2009. 2009, ISBN 978-1-60558-656-4 [contents] - 2008
- [j9]Wes Masri, Andy Podgurski:
Application-based anomaly intrusion detection with dynamic information flow analysis. Comput. Secur. 27(5-6): 176-187 (2008) - [j8]Ray-Yaung Chang, Andy Podgurski, Jiong Yang:
Discovering Neglected Conditions in Software by Mining Dependence Graphs. IEEE Trans. Software Eng. 34(5): 579-596 (2008) - [c30]Boya Sun, Ray-Yaung Chang, Xianghao Chen, Andy Podgurski:
Automated Support for Propagating Bug Fixes. ISSRE 2008: 187-196 - [c29]George K. Baah, Andy Podgurski, Mary Jean Harrold:
The probabilistic program dependence graph and its application to fault diagnosis. ISSTA 2008: 189-200 - 2007
- [j7]Wes Masri, Andy Podgurski, David Leon:
An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows. IEEE Trans. Software Eng. 33(7): 454-477 (2007) - [c28]Vinay Augustine, Andy Podgurski:
Corroborating User Assessments of Software Behavior to Facilitate Operational Testing. ISSRE 2007: 61-70 - [c27]Ray-Yaung Chang, Andy Podgurski, Jiong Yang:
Finding what's not there: a new approach to revealing neglected conditions in software. ISSTA 2007: 163-173 - 2006
- [c26]Neelam Gupta, Andy Podgurski:
Fourth international workshop on dynamic analysis (WODA 2006). ICSE 2006: 1035 - [c25]Wes Masri, Nagi Nahas, Andy Podgurski:
Memoized Forward Computation of Dynamic Slices. ISSRE 2006: 23-32 - 2005
- [j6]Wes Masri, Andy Podgurski:
Using dynamic information flow analysis to detect attacks against applications. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c24]Wes Masri, Andy Podgurski:
Using dynamic information flow analysis to detect attacks against applications. SESS@ICSE 2005: 1-7 - [c23]David Leon, Wes Masri, Andy Podgurski:
An empirical evaluation of test case filtering techniques based on exercising complex information flows. ICSE 2005: 412-421 - [c22]David Leon, Andy Podgurski, William Dickinson:
Visualizing Similarity between Program Executions. ISSRE 2005: 311-321 - 2004
- [c21]Shruti Raghavan, Rosanne Rohana, David Leon, Andy Podgurski, Vinay Augustine:
Dex: A Semantic-Graph Differencing Tool for Studying Changes in Large Code Bases. ICSM 2004: 188-197 - [c20]Wes Masri, Andy Podgurski, David Leon:
Detecting and Debugging Insecure Information Flows. ISSRE 2004: 198-209 - [c19]Patrick Francis, David Leon, Melinda Minch, Andy Podgurski:
Tree-Based Methods for Classifying Software Failures. ISSRE 2004: 451-462 - 2003
- [c18]Andy Podgurski, David Leon, Patrick Francis, Wes Masri, Melinda Minch, Jiayang Sun, Bin Wang:
Automated Support for Classifying Software Failure Reports. ICSE 2003: 465-477 - [c17]David Leon, Andy Podgurski:
A Comparison of Coverage-Based and Distribution-Based Techniques for Filtering and Prioritizing Test Cases. ISSRE 2003: 442-456 - 2001
- [c16]William Dickinson, David Leon, Andy Podgurski:
Finding Failures by Cluster Analysis of Execution Profiles. ICSE 2001: 339-348 - [c15]William Dickinson, David Leon, Andy Podgurski:
Pursuing failure: the distribution of program failures in a profile space. ESEC / SIGSOFT FSE 2001: 246-255 - 2000
- [j5]Wyatt S. Newman, Andy Podgurski, Roger D. Quinn, Frank L. Merat, Michael S. Branicky, Nick A. Barendt, Greg C. Causey, Erin L. Haaser, Yoohwan Kim, Jayendran Swaminathan, Virgilio B. Velasco Jr.:
Design lessons for building agile manufacturing systems. IEEE Trans. Robotics Autom. 16(3): 228-238 (2000) - [c14]David Leon, Andy Podgurski, Lee J. White:
Multivariate visualization in observation-based testing. ICSE 2000: 116-125 - [c13]John Steven, Pravir Chandra, Bob Fleck, Andy Podgurski:
jRapture: A Capture/Replay tool for observation-based testing. ISSTA 2000: 158-167
1990 – 1999
- 1999
- [j4]Andy Podgurski, Wassim Masri, Yolanda McCleese, Francis G. Wolff, Charles Yang:
Estimation of Software Reliability by Stratified Sampling. ACM Trans. Softw. Eng. Methodol. 8(3): 263-283 (1999) - [c12]Wyatt S. Newman, Michael S. Branicky, Andy Podgurski, Siddharth R. Chhatpar, Ling Huang, Jayendran Swaminathan, Hao Zhang:
Force-Responsive Robotic Assembly of Transmission Components. ICRA 1999: 2096-2102 - 1997
- [c11]Ju-Yeon Jo, Yoohwan Kim, Scott A. Ameduri, Andy Podgurski:
A New Role of Graphical Simulation: Software Testing. Annual Simulation Symposium 1997: 216-225 - [c10]Frank L. Merat, Nick A. Barendt, Roger D. Quinn, Greg C. Causey, Wyatt S. Newman, Virgilio B. Velasco Jr., Andy Podgurski, Yoohwan Kim, Gultekin Özsoyoglu, Ju-Yeon Jo:
Advances in agile manufacturing. ICRA 1997: 1216-1222 - [c9]Ju-Yeon Jo, Yoohwan Kim, Andy Podgurski, Wyatt S. Newman:
Virtual testing of agile manufacturing software using 3D graphical simulation. ICRA 1997: 1223-1228 - [c8]Yoohwan Kim, Ju-Yeon Jo, Virgilio B. Velasco Jr., Nicholas A. Barendt, Andy Podgurski, Gultekin Özsoyoglu, Frank L. Merat:
A flexible software architecture for agile manufacturing. ICRA 1997: 3043-3047 - [c7]Andy Podgurski, Elaine J. Weyuker:
Re-estimation of Software Reliability After Maintenance. ICSE 1997: 79-85 - 1996
- [c6]Roger D. Quinn, Greg C. Causey, Frank L. Merat, David Sargent, Nicholas A. Barendt, Wyatt S. Newman, Virgilio B. Velasco Jr., Andy Podgurski, Ju-Yeon Jo, Leon Sterling, Yoohwan Kim:
Design of an agile manufacturing workcell for light mechanical applications. ICRA 1996: 858-863 - 1993
- [j3]Andy Podgurski, Lynn Pierce:
Retrieving Reusable Software by Sampling Behaviour. ACM Trans. Softw. Eng. Methodol. 2(3): 286-303 (1993) - [c5]Andy Podgurski, Charles Yang:
Partition testing, stratified sampling, and cluster analysis. SIGSOFT FSE 1993: 169-181 - 1992
- [c4]Andy Podgurski, Lynn Pierce:
Behavior Sampling: A Technique for Automated Retrieval of Reusable Components. ICSE 1992: 349-360 - 1991
- [c3]Andy Podgurski:
Reliability, Sampling, and Algorithmic Randomness. Symposium on Testing, Analysis, and Verification 1991: 11-20 - 1990
- [j2]Andy Podgurski, Lori A. Clarke:
A Formal Model of Program Dependences and Its Implications for Software Testing, Debugging, and Maintenance. IEEE Trans. Software Eng. 16(9): 965-979 (1990)
1980 – 1989
- 1989
- [j1]Lori A. Clarke, Andy Podgurski, Debra J. Richardson, Steven J. Zeil:
A Formal Evaluation of Data Flow Path Selection Criteria. IEEE Trans. Software Eng. 15(11): 1318-1332 (1989) - [c2]Andy Podgurski, Lori A. Clarke:
The Implications of Program Dependencies for Software Testing, Debugging, and Maintenance. Symposium on Testing, Analysis, and Verification 1989: 168-178 - 1985
- [c1]Lori A. Clarke, Andy Podgurski, Debra J. Richardson, Steven J. Zeil:
A Comparison of Data Flow Path Selection Criteria. ICSE 1985: 244-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint