default search action
Mickaël Delahaye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j3]Sébastien Bardin, Nikolai Kosmatov, Michaël Marcozzi, Mickaël Delahaye:
Specify and measure, cover and reveal: A unified framework for automated test generation. Sci. Comput. Program. 207: 102641 (2021)
2010 – 2019
- 2017
- [c15]Michaël Marcozzi, Mickaël Delahaye, Sébastien Bardin, Nikolai Kosmatov, Virgile Prevosto:
Generic and Effective Specification of Structural Test Objectives. ICST 2017: 436-441 - [c14]Michaël Marcozzi, Sébastien Bardin, Mickaël Delahaye, Nikolai Kosmatov, Virgile Prevosto:
Taming Coverage Criteria Heterogeneity with LTest. ICST 2017: 500-507 - 2016
- [c13]Lydie du Bousquet, Mickaël Delahaye, Catherine Oriat:
Applying a Pairwise Coverage Criterion to Scenario-Based Testing. ICST Workshops 2016: 83-91 - [i1]Sébastien Bardin, Mickaël Delahaye, Nikolai Kosmatov, Michaël Marcozzi, Virgile Prevosto:
Generic and Effective Specification of Structural Test Objectives. CoRR abs/1609.01204 (2016) - 2015
- [j2]Mickaël Delahaye, Bernard Botella, Arnaud Gotlieb:
Infeasible path generalization in dynamic symbolic execution. Inf. Softw. Technol. 58: 403-418 (2015) - [j1]Mickaël Delahaye, Lydie du Bousquet:
Selecting a software engineering tool: lessons learnt from mutation analysis. Softw. Pract. Exp. 45(7): 875-891 (2015) - [c12]Sébastien Bardin, Mickaël Delahaye, Robin David, Nikolai Kosmatov, Mike Papadakis, Yves Le Traon, Jean-Yves Marion:
Sound and Quasi-Complete Detection of Infeasible Test Requirements. ICST 2015: 1-10 - 2014
- [c11]Sébastien Bardin, Omar Chebaro, Mickaël Delahaye, Nikolai Kosmatov:
An All-in-One Toolkit for Automated White-Box Testing. TAP@STAF 2014: 53-60 - 2013
- [c10]Mickaël Delahaye, Nikolai Kosmatov:
A Late Treatment of C Precondition in Dynamic Symbolic Execution. ICST Workshops 2013: 230-231 - [c9]Azzeddine Amiar, Mickaël Delahaye, Yliès Falcone, Lydie du Bousquet:
Compressing Microcontroller Execution Traces to Assist System Analysis. IESS 2013: 139-150 - [c8]Azzeddine Amiar, Mickaël Delahaye, Yliès Falcone, Lydie du Bousquet:
Fault localization in embedded software based on a single cyclic trace. ISSRE 2013: 148-157 - [c7]Mickaël Delahaye, Lydie du Bousquet:
A Comparison of Mutation Analysis Tools for Java. QSIC 2013: 187-195 - [c6]Mickaël Delahaye, Nikolai Kosmatov:
A Late Treatment of C Precondition in Dynamic Symbolic Execution Testing Tools. RV 2013: 328-333 - [c5]Mickaël Delahaye, Nikolai Kosmatov, Julien Signoles:
Common specification language for static and dynamic analysis of C programs. SAC 2013: 1230-1235 - 2012
- [c4]Mickaël Delahaye, Lionel C. Briand, Arnaud Gotlieb, Matthieu Petit:
µTIL: Mutation-based Statistical Test Inputs Generation for Automatic Fault Localization. SERE 2012: 197-206 - 2011
- [c3]Mickaël Delahaye:
IPEG: Utilizing Infeasibility. ICST Workshops 2011: 318-319 - 2010
- [c2]Mickaël Delahaye, Bernard Botella, Arnaud Gotlieb:
Explanation-Based Generalization of Infeasible Path. ICST 2010: 215-224
2000 – 2009
- 2009
- [c1]Bernard Botella, Mickaël Delahaye, Stéphane Hong Tuan Ha, Nikolai Kosmatov, Patricia Mouy, Muriel Roger, Nicky Williams:
Automating Structural Testing of C Programs: Experience with PathCrawler. AST 2009: 70-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint