Home - Contact - Teaching - Research - Publications
Recent
Journals
Conferences
Books/Chapters
Other
ORCID
ACM
DBLP
ResearchGate
Google
Scholar
Semantic
Scholar |
Jens Krinke's publications Recent publications
- J. Krinke, C. Ragkhitwetsagul:
BigCloneBench Considered Harmful for Machine Learning,
16th International Workshop on Software Clones,
October 2022.
[PDF]
DOI: 10.1109/IWSC55060.2022.00008
Best Paper Award.
- C. Galindo, J. Krinke, S. Pérez, J. Silva:
Field-Sensitive Program Slicing,
International Conference on Software Engineering and Formal Methods,
September 2022.
DOI: 10.1007/978-3-031-17108-6_5
[Access via SharedIt]
- R. White, J. Krinke:
TCTracer: Establishing test-to-code traceability links using dynamic and static techniques,
Empirical Software Engineering, 27:67,
2022.
[PDF]
DOI: 10.1007/s10664-021-10079-1
[Access via SharedIt],
UCL Discovery: 10145439
- N. Gold, J. Krinke:
Ethics in the mining of software repositories,
Empirical Software Engineering, 27:17,
2022.
[PDF]
DOI: 10.1007/s10664-021-10057-7
[Access via SharedIt],
UCL Discovery: 10137505
- C. Ragkhitwetsagul, J. Krinke, M. Choetkiertikul, T. Sunetnanta, F. Sarro:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand,
IEEE International Conference on Software Analysis, Evolution and Reengineering,
March 2022.
[PDF]
DOI: 10.1109/SANER2022.2022.00036
UCL Discovery: 10142033
- J. Krinke, C. Ragkhitwetsagul:
Code Similarity in Clone Detection,
In Code Clone Analysis,
Springer,
2021.
DOI: 10.1007/978-981-16-1927-4_10
- R. White, J. Krinke, E. T. Barr, F. Sarro, C. Ragkhitwetsagul:
Artefact Relation Graphs for Unit Test Reuse Recommendation,
14th IEEE Conference on Software Testing, Verification and Validation (ICST),
April 2021.
DOI: 10.1109/ICST49551.2021.00025,
UCL Discovery: 10130213
- G. Guizzo, F. Sarro, J. Krinke, S. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies,
IEEE Transactions on Software Engineering (TSE) 48(3),
2022.
DOI: 10.1109/TSE.2020.3002496,
UCL Discovery: 10100736
Journal Articles
- R. White, J. Krinke:
TCTracer: Establishing test-to-code traceability links using dynamic and static techniques,
Empirical Software Engineering, 27:67,
2022.
[PDF]
DOI: 10.1007/s10664-021-10079-1
[Access via SharedIt],
UCL Discovery: 10145439
- N. Gold, J. Krinke:
Ethics in the mining of software repositories,
Empirical Software Engineering, 27:17,
2022.
[PDF]
DOI: 10.1007/s10664-021-10057-7
[Access via SharedIt],
UCL Discovery: 10137505
- G. Guizzo, F. Sarro, J. Krinke, S. Vergilio:
Sentinel: A Hyper-Heuristic for the Generation of Mutant Reduction Strategies,
IEEE Transactions on Software Engineering (TSE) 48(3),
2022.
DOI: 10.1109/TSE.2020.3002496
UCL Discovery: 10100736
- S. Lee, D. Binkley, N. Gold, S. Islam, J. Krinke, S. Yoo:
Evaluating lexical approximation of program dependence,
Journal of Systems and Software, 160,
2020.
[PDF]
DOI: 10.1016/j.jss.2019.110459,
UCL Discovery: 10085557,
Presentation.
- M. Paixao, J. Krinke, D. Han, C. Ragkhitwetsagul, M. Harman:
The Impact of Code Review on Architectural Changes,
IEEE Transactions on Software Engineering (TSE),
2019.
[PDF]
DOI: 10.1109/TSE.2019.2912113
- C. Ragkhitwetsagul, J. Krinke, M. Paixao, G. Bianco, R. Oliveto:
Toxic Code Snippets on Stack Overflow,
IEEE Transactions on Software Engineering (TSE),
2019.
[PDF]
DOI: 10.1109/TSE.2019.2900307
Pre-print:
arXiv:1806.07659
[cs.SE].
Additional website.
Additional material:
C. Ragkhitwetsagul, J. Krinke, R. Oliveto:
Awareness and Experience of Developers to Outdated and
License-Violating Code on Stack Overflow: An Online
Survey.
UCL Computer Science Research Notes (17/10),
November 2017,
arXiv: 1806.08149
[cs.SE].
[PDF]
- C. Ragkhitwetsagul, J. Krinke:
Siamese: Scalable and Incremental Code Clone Search via
Multiple Code Representations,
Empirical Software Engineering,
2019.
DOI: 10.1007/s10664-019-09697-7
[Access via SharedIt],
Presentation.
- P. Wang, J. Krinke, X. Zhou, K. Lu:
AVPredictor: Comprehensive prediction and detection of
atomicity violations,
Concurrency and Computation: Practice and Experience
2019.
DOI: 10.1002/cpe.5160
- D. Binkley, N. Gold, S. Islam, J. Krinke, S. Yoo:
A Comparison of Tree- and Line-Oriented Observational
Slicing,
Empirical Software Engineering,
2019.
[PDF]
DOI: 10.1007/s10664-018-9675-9
- C. Ragkhitwetsagul, J. Krinke, D. Clark:
A Comparison of Code Similarity Analysers.
Empirical Software Engineering,
2017.
[Open Access]
DOI: 10.1007/s10664-017-9564-7
Additional website.
- F. Wu, J. Nanavati, M. Harman, Y. Jia, J. Krinke:
Memory Mutation Testing.
Information and Software Technology 81,
January 2017.
DOI: 10.1016/j.infsof.2016.03.002
- M. Harman, J. Krinke, I. Medina Bulo, F. Palomo Lozano,
J. Ren, S. Yoo: Exact Scalable Sensitivity
Analysis for the Next Release Problem.
ACM Transactions on Software Engineering and
Methodology, 23(2)
pp. 19:1-19:31
[PDF via ACM]
©ACM, 2014.
DOI: 10.1145/2537853
- S. Islam, J. Krinke, D. Binkley, M. Harman:
Coherent Clusters in Source Code.
Journal of Systems and Software 88,
February 2014.
[PDF]
(Open Access).
DOI: 10.1016/j.jss.2013.07.040
- K. Androutsopoulos, D.Clark, M. Harman, J. Krinke, L. Tratt:
State-Based Model Slicing: A Survey,
ACM Computing Surveys, 45(4), August 2013.
[PDF via ACM]
[PDF]
©ACM, 2013.
DOI: 10.1145/2501654.2501667
- D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke:
Efficient Identification of Linchpin Vertices in Dependence Clusters.
ACM Transactions on Programming Languages and
Systems 35(2),
July 2013.
[PDF via ACM]
[PDF]
©ACM, 2013.
DOI: 10.1145/2491522.2491524
- M. Harman, D. Binkley, K. Gallagher, N. Gold, J. Krinke:
Dependence Clusters in Source Code.
ACM Transactions on Programming Languages and
Systems 32(1), October 2009
[PDF via ACM]
[PDF]
©ACM, 2009.
DOI: 10.1145/1596527.1596528
- J. Krinke:
Mining execution relations for crosscutting concerns.
IET Software 2(2), pp. 65-78,
April 2008.
[PDF]
©IET, 2008.
DOI: 10.1049/iet-sen:20070005
- D. Binkley, M. Harman, J. Krinke:
Empirical Study of Optimization Techniques for Massive
Slicing.
ACM Transactions on Programming Languages and
Systems 30(1)
November 2007.
[PDF via ACM]
[PDF]
©ACM, 2007.
DOI: 10.1145/1290520.1290523
- S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo:
Comparison and Evaluation of Clone Detection
Tools.
IEEE Transactions on Software Engineering (TSE),
33(9),
pp. 577-591,
September 2007.
DOI: 10.1109/TSE.2007.70725
- G. Snelting, T. Robschink, J. Krinke: Efficient Path
Conditions in Dependence Graphs for Software Safety Analysis.
ACM Transactions on Software Engineering and
Methodology 15(4),
pp. 410-457,
October 2006.
[PDF via ACM]
[PDF]
©ACM, 2006.
DOI: 10.1145/1178625.1178628
- J. Krinke:
Effects of Context on Program Slicing.
Journal of Systems and Software 79(9),
pp. 1249-1260,
2006.
[PDF]
©Elsevier, 2006.
DOI: 10.1016/j.jss.2006.02.040
- J. Krinke:
Slicing, Chopping and Path Conditions with
Barriers.
Software Quality Journal 12(4),
pp. 339-360,
2004.
[PDF]
©Kluwer Academic Publishers, 2004.
DOI: 10.1023/B:SQJO.0000039792.93414.a5
- J. Krinke, T. Robschink, G. Snelting:
Software-Sicherheitsprüfung mit VALSOFT.
Informatik Forschung und Entwicklung
14(2),
pp. 62-73,
June 1999.
DOI: 10.1007/s004500050126
- J. Krinke, G. Snelting:
Validation of measurement software as an application of
slicing and constraint solving.
Information and Software Technology
40(11-12),
pp. 661-675,
December 1998.
[PDF]
©Elsevier Science B.V., 1998.
DOI: 10.1016/S0950-5849(98)00090-1
Conference and Workshop Papers
- J. Krinke, C. Ragkhitwetsagul:
BigCloneBench Considered Harmful for Machine Learning,
16th International Workshop on Software Clones,
October 2022.
[PDF]
DOI: 10.1109/IWSC55060.2022.00008
Best Paper Award.
- C. Galindo, J. Krinke, S. Pérez, J. Silva:
Field-Sensitive Program Slicing,
International Conference on Software Engineering and Formal Methods,
September 2022.
DOI: 10.1007/978-3-031-17108-6_5
[Access via SharedIt]
- C. Ragkhitwetsagul, J. Krinke, M. Choetkiertikul, T. Sunetnanta, F. Sarro:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand,
IEEE International Conference on Software Analysis, Evolution and Reengineering,
March 2022.
[PDF]
DOI: 10.1109/SANER2022.2022.00036
UCL Discovery: 10142033
- R. White, J. Krinke, E. T. Barr, F. Sarro, C. Ragkhitwetsagul:
Artefact Relation Graphs for Unit Test Reuse Recommendation,
14th IEEE Conference on Software Testing, Verification and Validation (ICST),
April 2021.
DOI: 10.1109/ICST49551.2021.00025,
UCL Discovery: 10130213
- D. Han, C. Ragkhitwetsagul, J. Krinke, M. Paixao and G. Rosa:
Does code review really remove coding convention violations?
20th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM),
September 2020.
[PDF]
DOI: 10.1109/SCAM51674.2020.00010,
UCL Discovery: 10110634,
Presentation.
- R. White, J. Krinke, R. Tan:
Establishing Multilevel Test-to-Code Traceability Links,
42nd International Conference on Software Engineering (ICSE),
June 2020.
[PDF]
DOI: 10.1145/3377811.3380921
UCL Discovery: 10091100,
Additional Material,
Presentation.
- N. Gold, J. Krinke:
Ethical Mining – A Case Study on MSR Mining Challenges,
17th International Conference on Mining Software Repositories (MSR),
June 2020.
[PDF]
DOI: 10.1145/3379597.3387462,
UCL Discovery: 10093751,
Presentation.
- M. Paixão, A. Uchôa, A. C. Bibiano, D. Oliveira, A. Garcia, J. Krinke, E. Arvonio:
Behind the Intents: An In-depth Empirical Study on Software Refactoring in Modern Code Review,
17th International Conference on Mining Software Repositories (MSR),
June 2020.
[PDF]
DOI: 10.1145/3379597.3387475,
UCL Discovery: 10094795,
Presentation.
- N. Bafatakis, N. Boecker, W. Boon, M. Cabello Salazar,
J. Krinke, G. Oznacar, R. White:
Python Coding Style Compliance on Stack Overflow
16th International Conference on Mining Software
Repositories (MSR),
Montreal, Canada,
May 2019.
[PDF]
©ACM, 2019.
DOI: 10.1109/MSR.2019.00042
Additional material.
Best Mining Challenge Paper Award.
- R. White, J. Krinke:
TestNMT: Function-to-Test Neural Machine
Translation,
International Workshop on NLP for Software Engineering
(NL4SE),
November 2018.
[PDF]
©ACM, 2018.
DOI: 10.1145/3283812.3283823
- S. Lee, D. Binkley, N. Gold, S. Islam, J. Krinke, S. Yoo:
MOBS: Multi-Operator Observation-Based Slicing using
Lexical Approximation of Program Dependence,
40th International Conference on Software Engineering
(ICSE),
May 2018.
[PDF]
©ACM, 2018.
DOI: 10.1145/3183440.3194981
- M. Paixao, J. Krinke, D. Han, M. Harman:
CROP: Linking Code Reviews to Source Code Changes,
15th International Conference on Mining Software
Repositories (MSR),
Gothenburg, Sweden,
May 2018.
[PDF]
©ACM, 2018.
DOI: 10.1145/3196398.3196466
Additional website.
- J. Wilkie, Z. Al Halabi, A. Karaoglu, J. Liao, G. Ndungu,
C. Ragkhitwetsagul, M. Paixao, J. Krinke:
Who's this? Developer identification using IDE event
data,
15th International Conference on Mining Software
Repositories (MSR),
Gothenburg, Sweden,
May 2018.
[PDF]
©ACM, 2018.
DOI: 10.1145/3196398.3196461
Additional website.
- C. Ragkhitwetsagul, J. Krinke, B. Marnette:
A Picture Is Worth a Thousand Words: Code Clone Detection
Based on Image Similarity,
International Workshop on Software Clones (IWSC),
Campobasso, Italy,
March 2018.
[PDF]
©IEEE, 2018.
DOI: 10.1109/IWSC.2018.8327318
Additional website.
- M. Paixao, J. Krinke, D. Han, C. Ragkhitwetsagul, M. Harman:
Are Developers Aware of the Architectural Impact of Their
Changes?
32nd International Conference on Automated Software
Engineering (ASE),
Urbana-Champaign, Illinois, USA,
October 2017.
[PDF]
©IEEE, 2017.
DOI: 10.1109/ASE.2017.8115622
- N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo:
Generalized Observational Slicing for Tree-Represented
Modelling Languages.
ESEC/FSE 2017,
Paderborn, Germany,
September 2017.
[PDF]
©ACM, 2017.
DOI: 10.1145/3106237.3106304
- N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo:
Tree-Oriented vs. Line-Oriented Observation-Based
Slicing.
17th International Working Conference on Source Code
Analysis and Manipulation (SCAM),
Shanghai, China,
September 2017.
[PDF]
©IEEE, 2017.
DOI: 10.1109/SCAM.2017.11
- P. Wang, J. Krinke, K. Lu, G. Li, S. Dodier-Lazaro:
How Double-Fetch Situations turn into Double-Fetch
Vulnerabilities: A Study of Double Fetches in the Linux
Kernel.
26th USENIX Security Symposium,
Vancouver, BC, Canada,
August 2017.
[PDF via USENIX]
- S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse:
No Good Reason to Remove Features.
5th International Conference on Human Aspects of
Information Security, Privacy and Trust (HAS),
Vancouver, BC, Canada,
July, 2017.
DOI: 10.1007/978-3-319-58460-7_3
- C. Ragkhitwetsagul, J. Krinke:
Using Compilation/Decompilation to Enhance Clone
Detection.
International Workshop on Software Clones (IWSC),
Klagenfurt, Austria,
February 2017.
[PDF]
©IEEE, 2017.
DOI: 10.1109/IWSC.2017.7880502
Additional website.
- C. Ragkhitwetsagul, J. Krinke, D. Clark:
Similarity of Source Code in the Presence of Pervasive
Modifications.
16th International Working Conference on Source Code
Analysis and Manipulation (SCAM),
Raleigh, NC, USA,
October 2016.
[PDF]
©IEEE, 2016.
DOI: 10.1109/SCAM.2016.13
Additional website.
- F. Wu, M. Harman, Y. Jia, J. Krinke:
HOMI: Searching Higher Order Mutants For Software
Improvement.
Symposium on Search-Based Software Engineering,
Raleigh, NC, USA,
October 2016.
DOI: 10.1007/978-3-319-47106-8_2
- C. Ragkhitwetsagul, M. Paixao, M. Adham, S. Busari, J. Krinke, J. H. Drake:
Searching for Configurations in Clone Evaluation: A Replication Study.
Symposium on Search-Based Software Engineering (Challenge Track),
Raleigh, NC, USA,
October 2016.
DOI: 10.1007/978-3-319-47106-8_20
- Y. Yang, M. Harman, J. Krinke, S. Islam, D. Binkley, Y. Zhou,
B. Xu:
An Empirical Study on Dependence Clusters for
Effort-Aware Fault-Proneness Prediction.
International Conference on Automated Software Engineering
(ASE),
Singapore,
September 2016.
[PDF via ACM]
[PDF]
©ACM, 2016.
DOI: 10.1145/2970276.2970353
- D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke, S. Yoo:
ORBS and the Limits of Static Slicing.
15th International Working Conference on Source Code
Analysis and Manipulation (SCAM),
Bremen, Germany,
September 2015.
[PDF]
©IEEE, 2015.
DOI: 10.1109/SCAM.2015.7335396
- F. Wu, W. Weimer, M. Harman, Y. Jia, J. Krinke:
Deep Parameter Optimisation.
Proceedings of the 2015 Annual Conference on Genetic and
Evolutionary Computation (GECCO '15),
Madrid, Spain,
2015.
[PDF via ACM]
DOI: 10.1145/2739480.2754648
- Y. Jia, F. Wu, M. Harman, J. Krinke:
Genetic Improvement using Higher Order Mutation.
Genetic Improvement 2015 Workshop,
Madrid, Spain,
2015.
[PDF via ACM]
DOI: 10.1145/2739482.2768417
- J. Nanavati, F. Wu, M. Harman, Y. Jia, J. Krinke:
Mutation testing of memory-related operators.
The 10th International Workshop on Mutation Analysis,
Graz, Austria,
April 2015.
DOI: 10.1109/ICSTW.2015.7107449
Best Paper Award.
- D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke, S. Yoo:
ORBS: Language-Independent Program Slicing.
Foundations of Software Engineering (FSE),
Hong Kong, China,
November 2014.
[PDF via ACM]
[PDF]
©ACM, 2014.
DOI: 10.1145/2635868.2635893
(Supersedes Research Note RN/13/13, 2013.)
- M. Harman, Y. Jia, J. Krinke, W. B. Langdon, J. Petke,
Y. Zhang:
Search based software engineering for software product
line engineering: a survey and directions for future
work.
18th International Software Product Line Conference
(SPLC),
Florence, Italy,
September 2014.
(Paper accompanying Mark Harman's keynote.)
[PDF via ACM]
DOI: 10.1145/2648511.2648513
- H. Dan, M. Harman, J. Krinke, A. Marginean, L. Li, F. Wu:
Pidgin Crasher: Searching for Minimised Crashing GUI
Event Sequences.
Symposium on Search-Based Software Engineering (Challenge
Track),
Fortaleza, Brazil,
August 2014.
DOI: 10.1007/978-3-319-09940-8_21
- T. Wang, M. Harman, Y. Jia, J. Krinke:
Searching for Better Configurations: A Rigorous Approach to Clone Evaluation.
ESEC/FSE,
Saint Petersburg, Russia,
August 2013.
[PDF via ACM]
[PDF]
©ACM, 2013.
DOI: 10.1145/2491411.2491420
- M. Mondal, C.K. Roy, M.S. Rahman, R.K. Saha, J. Krinke,
K.A. Schneider:
Comparative Stability of Cloned and Non-cloned Code: An
Empirical Study.
27th ACM Symposium on Applied Computing,
Riva del Garda, Trento, Italy,
March 2012.
[PDF via ACM]
[PDF]
©ACM, 2012.
DOI: 10.1145/2245276.2231969
- N.E. Gold, J. Krinke, M. Harman, D. Binkley:
Cloning in Max/MSP Patches.
International Computer Music Conference,
Huddersfield, UK,
July 2011.
[Online]
- M. Mondal, M.S. Rahman, R.K. Saha, C.K. Roy, J. Krinke,
K.A. Schneider:
An Empirical Study of the Impacts of Clones in Software
Maintenance.
Student Research Symposium Track of the 19th International
Conference on Program Comprehension,
Kingston, Canada,
June 2011.
[PDF]
©IEEE, 2011.
DOI: 10.1109/ICPC.2011.14
- J.Krinke:
Is Cloned Code older than Non-Cloned Code?
5th International Workshop on Detection of Software Clones (IWSC),
Waikiki, Hawaii, USA,
May 2011.
[PDF via ACM]
[PDF]
©ACM, 2011.
DOI: 10.1145/1985404.1985410
- S.Islam, J. Krinke, D. Binkley:
Dependence Clusters Visualization.
5th ACM/IEEE Symposium on Software Visualization.
Salt Lake City, Utah, USA,
October 2010.
[PDF]
©ACM, 2010.
DOI: 10.1145/1879211.1879227
- S.Islam, J. Krinke, D. Binkley, M. Harman:
Coherent Dependence Clusters.
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for
Software Tools and Engineering.
Toronto, Ontario, Canada,
June 2010.
[PDF]
©ACM, 2010.
DOI: 10.1145/1806672.1806683
- J.Krinke, N. Gold, Y. Jia, D. Binkley:
Cloning and Copying between GNOME Projects.
7th IEEE Working Conference on Mining Software
Repositories (MSR),
Cape Town, South Africa,
May 2010.
[PDF]
©IEEE, 2010.
DOI: 10.1109/MSR.2010.5463290
- J.Krinke, N. Gold, Y. Jia, D. Binkley:
Distinguishing Copies from Originals in Software Clones.
4th International Workshop on Detection of Software Clones (IWSC),
Cape Town, South Africa,
May 2010.
[PDF]
©ACM, 2010.
DOI: 10.1145/1808901.1808907
- N. Gold, J.Krinke, M. Harman, D. Binkley:
Issues in Clone Classification for Dataflow Languages.
4th International Workshop on Detection of Software Clones (IWSC),
Cape Town, South Africa,
May 2010.
[PDF]
©ACM, 2010.
DOI: 10.1145/1808901.1808916
- M. Harman, J. Krinke, J. Ren, S. Yoo:
Search Based Data Sensitivity Analysis Applied to Requirement Engineering.
ACM Genetic and Evolutionary Computation Conference (GECCO).
Montreal, Canada,
July 2009.
[PDF]
©ACM, 2009.
- Y. Jia, D. Binkley, M. Harman, J. Krinke, M. Matsushita:
KClone: A Proposed Approach to Fast Precise Code Clone Detection.
Third International Workshop on Detection of Software Clones (IWSC),
Kaiserslautern, Germany,
March 2009.
[PDF]
- K. Mens, A. Kellens, J. Krinke:
Pitfalls in Aspect Mining.
Working Conference on Reverse Engineering (WCRE),
Antwerp, Belgium,
October 2008.
[PDF]
©IEEE, 2008. Not for redistribution.
- J. Krinke:
Is Cloned Code more stable than Non-Cloned Code?
Proc. Eighth IEEE International Working Conference on Source Code
Analysis and Manipulation (SCAM 2008),
Beijing,
September 2008.
[PDF]
©IEEE, 2008. Not for redistribution.
- J. Krinke:
A Study of Consistent and Inconsistent Changes to Code
Clones.
Proc. 14th Working Conference on Reverse Engineering (WCRE
2007),
Vancouver,
October 2007.
[PDF]
©IEEE, 2007. Not for redistribution.
- J. Krinke:
Information Flow and Taint Analysis with Dependence
Graphs.
Proc. 3rd International Workshop on Code Based Security
Assessments (CoBaSSA 2007),
Vancouver,
October 2007.
[PDF]
- J. Krinke:
Statement-Level Cohesion Metrics and their Visualization.
Proc. Seventh IEEE International Working Conference on Source Code
Analysis and Manipulation (SCAM 2007),
Paris,
September 2007.
[PDF]
©IEEE, 2007. Not for redistribution.
- P. Bouillon, J. Krinke, N. Mayer, F. Steimann:
EzUnit: A Framework for associating failed unit tests
with potential programming errors.
Proc. 8th International Conference on Agile Processes in
Software Engineering and eXtreme Programming (XP 2007),
Como, Italy
June 2007.
[PDF]
©Springer, 2007. Not for redistribution.
- J. Krinke:
Changes to Code Clones in Evolving Software.
Proc. 9. Workshop Software Reengineering (WSR 2007),
Bad Honnef, Germany,
May 2007.
[PDF]
- C. Hammer, J. Krinke, F. Nodes:
Intransitive Noninterference in Dependence
Graphs.
Proc. Second International Symposium on Leveraging
Application of Formal Methods, Verification and
Validation,
Paphos, Cyprus,
pp. 136-145,
November 2006.
[PDF]
- J. Krinke:
Mining Control Flow Graphs for Crosscutting Concerns.
Proc. 13th Working Conference on Reverse Engineering
(WCRE): IEEE International Astrenet Aspect Analysis (AAA)
Workshop,
Benevento, Italy,
pp. 334-342,
October 2006.
[PDF]
©IEEE, 2006. Not for redistribution.
- D. Binkley, M. Harman, J. Krinke:
Characterising, Explaining, and Exploiting the
Approximate Nature of Static Analysis through
Animation.
Proc. in Sixth IEEE International Workshop on Source Code
Analysis and Manipulation (SCAM 2006),
Philadelphia,
September 2006.
[PDF]
©IEEE, 2006. Not for redistribution.
- C. Hammer, J. Krinke, G. Snelting:
Information Flow Control for Java Based on Path
Conditions in Dependence Graphs.
Proc. IEEE International Symposium on Secure Software
Engineering (ISSSE 2006),
pp. 87-96,
March 2006.
[PDF]
©IEEE, 2006. Not for redistribution.
- C. Hammer, M. Grimme, J. Krinke:
Dynamic Path Conditions in Dependence Graphs.
Proc. ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation (PEPM '06),
Charleston, South Carolina,
pp. 58-67,
January 2006.
[PDF]
©ACM, 2006.
- J. Krinke, M. Roos:
Erfahrungen mit dem Open-Access-Journal "eleed
(e-learning and education)".
Proc. Knowledge eXtended,
Jülich, Germany,
pp. 123-134,
November 2005
[PDF]
- J. Krinke, S. Breu:
Aspect Mining based on Control-Flow.
Proc. 7. Workshop Software Reengineering (WSR 2005),
Bad Honnef, Germany,
GI-Softwaretechnik-Trends, 25(2),
pp. 39-40,
Mai 2005.
[PDF]
- P. Bouillon, J. Krinke, S. Lukosch:
Software Engineering Projects in Distant
Teaching.
Proc. Conference on Software Engineering Education and
Training (CSEE&T),
Ottawa, Canada,
pp. 147-154,
April 2005.
[PDF]
©IEEE, 2005. Not for redistribution.
- P. Bouillon, J. Krinke, S. Lukosch:
Eine Plattform für die Softwaretechnik-Fernlehre.
Proc. Software Engineering im Unterricht der Hochschulen
(SEUH),
Aachen, Germany,
pp. 81-92,
February 2005.
- J. Krinke, S. Breu:
Control-Flow-Graph-Based Aspect Mining.
Workshop on Aspect Reverse Engineering (WARE 2004),
Delft, November 2004.
[PDF].
- P. Bouillon, J. Krinke:
Using Eclipse in Distant Teaching of Software
Engineering.
Workshop on Eclipse Technology Exchange (eTX 2004),
Vancouver, Canada,
pp. 22-26,
October 2004.
[PDF]
©ACM, 2004.
- S. Breu, J. Krinke:
Aspect Mining Using Event Traces.
Proc.
Automated Software Engineering (ASE 2004),
Linz, Austria,
pp. 310-315,
September 2004.
[PDF]
©IEEE, 2004. Not for redistribution.
- P. Bouillon, J. Krinke:
A Platform for Teaching Distributed Software
Engineering.
Proc.
Cooperative Support for Distributed Software Engineering
Processes (CSSE 2004),
Linz, Austria,
pp. 139-144,
September 2004.
[PDF]
- J. Krinke:
Visualization of Program Dependence and Slices.
Proc.
International Conference on Software
Maintenance (ICSM 2004),
Chicago,
pp. 168-177,
September 2004.
[PDF]
©IEEE, 2004. Not for redistribution.
- J. Krinke:
Advanced Slicing of Sequential and Concurrent Programs.
Proc. International Conference on Software
Maintenance (ICSM 2004),
Chicago,
pp. 464-468,
September 2004.
[PDF]
©IEEE, 2004. Not for redistribution.
- J. Krinke:
Context-Sensitivity Matters, But Context Does
Not.
Proc.
Fourth IEEE International Workshop on Source Code
Analysis and Manipulation (SCAM 2004),
Chicago,
pp. 29-35,
September 2004.
[PDF]
©IEEE, 2004. Not for redistribution.
- J. Krinke:
Textual vs. Graphical Visualization of Fine-Grained
Dependencies.
Proc. 6. Workshop Software Reengineering (WSR 2004),
Bad Honnef, Germany,
GI-Softwaretechnik-Trends, 24(2),
pp. 67-68,
Mai 2004.
[PDF]
- J. Krinke:
Context-Sensitive Slicing of Concurrent
Programs.
Proc. ESEC/FSE 2003,
Helsinki, Finland,
pp. 178-187,
September 2003.
[PDF]
©ACM, 2003. Not for redistribution.
- J. Krinke:
Barrier Slicing and Chopping.
Proc. Third IEEE International Workshop on Source Code
Analysis and Manipulation (SCAM 2003),
Amsterdam, Netherlands,
pp. 81-87,
September 2003.
[PDF]
©IEEE, 2003. Not for redistribution.
- M. Störzer, J.Krinke, S. Breu:
Trace Analysis for Aspect Application.
Analysis of Aspect-Oriented Software (AAOS),
Darmstadt, Germany, July 2003.
[PDF]
- S. Breu, J. Krinke:
Aspect Mining using Dynamic Analysis.
Proc. 5. Workshop Software-Reengineering,
Bad Honnef, Germany,
GI-Softwaretechnik-Trends, 23(2),
pp. 21-22,
Mai 2003.
[PDF]
- M. Störzer, J. Krinke:
Interference Analysis for AspectJ.
Proc. Foundations of Aspect-Oriented Languages (FOAL
2003),
Boston,
pp. 35-44,
March 2003.
[PDF]
- A. De Lucia, M. Harman, R. Hierons, J. Krinke:
Unions of Slices are not Slices.
Proc. European Conference on Software Maintenance and
Reengineering (CSMR 2003),
Benevento, Italy,
pp. 363-367,
March 2003.
[PDF]
©IEEE, 2003. Not for redistribution.
- J. Krinke:
Evaluating Context-Sensitive Slicing and
Chopping.
Proc. International Conference on Software
Maintenance (ICSM 2002),
Montreal, Canada,
pp. 22-31,
October 2002.
[PDF]
©IEEE, 2003. Not for redistribution.
- J. Krinke, M. Störzer, A. Zeller:
Web-basierte Programmierpraktika mit Praktomat.
Proc. Workshop Neue Medien in der Informatik-Lehre,
Dortmund, Germany,
October 2002.
[PDF]
- J. Krinke:
Identifying Similar Code with Program Dependence
Graphs.
Proc. Eight Working Conference on Reverse Engineering
(WCRE 2001),
Stuttgart, Germany,
pp. 301-309,
October 2001.
[PDF]
©IEEE, 2001. Not for redistribution.
- J. Krinke:
Identifizierung von ähnlichen Code mit
Programmabhängigkeitsgraphen.
Proc. 3. Workshop Software-Reengineering Fachberichte
Informatik, Universität Koblenz-Landau,
pp. 83-91,
2001.
- J. Krinke, T. Robschink:
Kombination von Slicing und Constraint-Solving für
Software-Reengineering.
Proc. Workshop Software Reengineering,
Fachberichte Informatik, Universität Koblenz-Landau,
pp. 133-140,
1999.
- T. Robschink, J. Krinke:
Heuristische Graphzerlegung.
Proc. Sicherheit und Zuverlässigkeit Software-basierter
Systeme, Institut für Sicherheitstechnologie,
pp. 234-248,
1999.
- J. Krinke, G. Snelting, T. Robschink:
Software-Sicherheitsprüfung mit VALSOFT.
Proc. Softwaretechnik 98,
Paderborn,
pp. 34-41,
September 1998.
- J. Krinke:
Static Slicing of Threaded Programs.
Proc. ACM SIGPLAN/SIGFSOFT Workshop on Program Analysis for
Software Tools and Engineering (PASTE'98),
Montreal, Canada,
pp. 35-42,
June 1998.
[PDF]
©ACM, 2003. Not for redistribution.
Thesis
- J. Krinke: Advanced Slicing of Sequential and
Concurrent Programs.
Universität Passau,
April 2003. Referees: Gregor Snelting, Passau, and Tim
Teitelbaum, Cornell.
[PDF] (2.7MB), 265
pages.
Books and Chapters
- J. Krinke, C. Ragkhitwetsagul:
Code Similarity in Clone Detection,
In Code Clone Analysis,
Springer,
2021.
DOI: 10.1007/978-981-16-1927-4_10
- J. Krinke:
Program Slicing. In Handbook of Software
Engineering and Knowledge Engineering, Vol. 3: Recent
Advances,
World Scientific Publishing,
pp. 307-332,
2005.
DOI: 10.1142/9789812775245_0011
- A. Zeller, J. Krinke:
Essential Open Source Toolset. Wiley,
2005.
[info]
- J. Krinke:
Advanced Slicing of Sequential and Concurrent
Programs.
In Ausgezeichnete Informatikdissertationen 2003,
GI-Edition - Lecture Notes in Informatics (LNI),
pp. 101-110,
2004.
[PDF]
- A. Zeller, J. Krinke:
Open-Source-Programmierwerkzeuge.
2n revised edition. dpunkt-Verlag, 2003.
[info in german...]
Other Publications
- R. White, J. Krinke:
Reassert: Deep learning for assert generation.
arXiv preprint arXiv: 2011.09784
[cs.SE]
- C. Ragkhitwetsagul, J. Krinke, R. Oliveto:
Awareness and Experience of Developers to Outdated and
License-Violating Code on Stack Overflow: An Online
Survey.
UCL Computer Science Research Notes (17/10),
November 2017,
arXiv: 1806.08149
[cs.SE].
[PDF]
- S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse:
No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones.
UCL Computer Science Research Notes (17/03),
February 2017.
[PDF]
- J. Krinke, M. Streckenbach, M. Stoerzer, C. Hammer:
Using Program Analysis Infrastructure for Software
Maintenance.
Technical Report, Universität Passau, Germany, March 2003.
[PDF]
|