DEPARTMENT OF COMPUTER SCIENCE
Dr. Jens Krinke
UCL

Home
- Contact
- Teaching
- Research
- Publications
  Recent
  Books/Chapters
  Journals
  Conferences
  Other



Bibliography
									manager

Google Scholar Citations

Sematic Scholar

Jens Krinke's publications

Recent publications

  • M. Paixao, J. Krinke, D. Han, C. Ragkhitwetsagul, M. Harman: Are Developers Aware of the Architectural Impact of Their Changes? 32nd International Conference on Automated Software Engineering (ASE), Urbana-Champaign, Illinois, USA, October 2017.

  • N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo: Generalized Observational Slicing for Tree-Represented Modelling Languages. ESEC/FSE 2017, Paderborn, Germany, September 2017.
    [PDF] ©ACM, 2017. DOI: 10.1145/3106237.3106304

  • N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo: Tree-Oriented vs. Line-Oriented Observation-Based Slicing. 17th International Working Conference on Source Code Analysis and Manipulation (SCAM), Shanghai, China, September 2017.

  • P. Wang, J. Krinke, K. Lu, G. Li, S. Dodier-Lazaro: How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.
    [PDF via USENIX]

  • S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse: No Good Reason to Remove Features. 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS), Vancouver, BC, Canada, July 2017.
    DOI: 10.1007/978-3-319-58460-7_3

  • C. Ragkhitwetsagul, J. Krinke: Using Compilation/Decompilation to Enhance Clone Detection. International Workshop on Software Clones (IWSC), Klagenfurt, Austria, February 2017.
    [PDF] ©IEEE, 2017. DOI: 10.1109/IWSC.2017.7880502

  • S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse: No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. UCL Computer Science Research Notes (17/03), February 2017.
    [PDF]

  • F. Wu, J. Nanavati, M. Harman, Y. Jia, J. Krinke: Memory Mutation Testing. Information and Software Technology 81, January 2017.
    DOI: 10.1016/j.infsof.2016.03.002

Books and Chapters

  • J. Krinke: Program Slicing. In Handbook of Software Engineering and Knowledge Engineering, Vol. 3: Recent Advances, World Scientific Publishing, pp. 307-332, 2005.

  • A. Zeller, J. Krinke: Essential Open Source Toolset. Wiley, 2005.
    [info]

  • J. Krinke: Advanced Slicing of Sequential and Concurrent Programs. In Ausgezeichnete Informatikdissertationen 2003, GI-Edition - Lecture Notes in Informatics (LNI), pp. 101-110, 2004.
    [PDF]

  • A. Zeller, J. Krinke: Open-Source-Programmierwerkzeuge. 2n revised edition. dpunkt-Verlag, 2003.
    [info in german...]

Journal Articles

  • F. Wu, J. Nanavati, M. Harman, Y. Jia, J. Krinke: Memory Mutation Testing. Information and Software Technology 81, January 2017.
    DOI: 10.1016/j.infsof.2016.03.002

  • M. Harman, J. Krinke, I. Medina Bulo, F. Palomo Lozano, J. Ren, S. Yoo: Exact Scalable Sensitivity Analysis for the Next Release Problem. ACM Transactions on Software Engineering and Methodology, 23(2) pp. 19:1-19:31
    [PDF via ACM] ©ACM, 2014. DOI: 10.1145/2537853

  • S. Islam, J. Krinke, D. Binkley, M. Harman: Coherent Clusters in Source Code. Journal of Systems and Software 88, February 2014.
    [PDF] (Open Access). DOI: 10.1016/j.jss.2013.07.040

  • K. Androutsopoulos, D.Clark, M. Harman, J. Krinke, L. Tratt: State-Based Model Slicing: A Survey, ACM Computing Surveys, 45(4), August 2013.
    [PDF via ACM] [PDF] ©ACM, 2013. DOI: 10.1145/2501654.2501667

  • D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke: Efficient Identification of Linchpin Vertices in Dependence Clusters. ACM Transactions on Programming Languages and Systems 35(2), July 2013.
    [PDF via ACM] [PDF] ©ACM, 2013. DOI: 10.1145/2491522.2491524

  • M. Harman, D. Binkley, K. Gallagher, N. Gold, J. Krinke: Dependence Clusters in Source Code. ACM Transactions on Programming Languages and Systems 32(1), October 2009
    [PDF via ACM] [PDF] ©ACM, 2009. DOI: 10.1145/1596527.1596528

  • J. Krinke: Mining execution relations for crosscutting concerns. IET Software 2(2), pp. 65-78, April 2008.
    [PDF] ©IET, 2008. DOI: 10.1049/iet-sen:20070005

  • D. Binkley, M. Harman, J. Krinke: Empirical Study of Optimization Techniques for Massive Slicing. ACM Transactions on Programming Languages and Systems 30(1) November 2007.
    [PDF via ACM] [PDF] ©ACM, 2007. DOI: 10.1145/1290520.1290523

  • S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo: Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering (TSE), 33(9), pp. 577-591, September 2007.
    DOI: 10.1109/TSE.2007.70725

  • G. Snelting, T. Robschink, J. Krinke: Efficient Path Conditions in Dependence Graphs for Software Safety Analysis. ACM Transactions on Software Engineering and Methodology 15(4), pp. 410-457, October 2006.
    [PDF via ACM] [PDF] ©ACM, 2006. DOI: 10.1145/1178625.1178628

  • J. Krinke: Effects of Context on Program Slicing. Journal of Systems and Software 79(9), pp. 1249-1260, 2006.
    [PDF] ©Elsevier, 2006. DOI: 10.1016/j.jss.2006.02.040

  • J. Krinke: Slicing, Chopping and Path Conditions with Barriers. Software Quality Journal 12(4), pp. 339-360, 2004.
    [PDF] ©Kluwer Academic Publishers, 2004. DOI: 10.1023/B:SQJO.0000039792.93414.a5

  • J. Krinke, T. Robschink, G. Snelting: Software-Sicherheitsprüfung mit VALSOFT. Informatik Forschung und Entwicklung 14(2), pp. 62-73, June 1999.
    DOI: 10.1007/s004500050126

  • J. Krinke, G. Snelting: Validation of measurement software as an application of slicing and constraint solving. Information and Software Technology 40(11-12), pp. 661-675, December 1998.
    [PDF] ©Elsevier Science B.V., 1998. DOI: 10.1016/S0950-5849(98)00090-1

Conference and Workshop Papers

  • M. Paixao, J. Krinke, D. Han, C. Ragkhitwetsagul, M. Harman: Are Developers Aware of the Architectural Impact of Their Changes? 32nd International Conference on Automated Software Engineering (ASE), Urbana-Champaign, Illinois, USA, October 2017.

  • N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo: Generalized Observational Slicing for Tree-Represented Modelling Languages. ESEC/FSE 2017, Paderborn, Germany, September 2017.
    [PDF] ©ACM, 2017. DOI: 10.1145/3106237.3106304

  • N. Gold, D. Binkley, M. Harman, S. Islam, J. Krinke, S. Yoo: Tree-Oriented vs. Line-Oriented Observation-Based Slicing. 17th International Working Conference on Source Code Analysis and Manipulation (SCAM), Shanghai, China, September 2017.

  • P. Wang, J. Krinke, K. Lu, G. Li, S. Dodier-Lazaro: How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel. 26th USENIX Security Symposium, Vancouver, BC, Canada, August 2017.
    [PDF via USENIX]

  • S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse: No Good Reason to Remove Features. 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS), Vancouver, BC, Canada, July, 2017.
    DOI: 10.1007/978-3-319-58460-7_3

  • C. Ragkhitwetsagul, J. Krinke: Using Compilation/Decompilation to Enhance Clone Detection. International Workshop on Software Clones (IWSC), Klagenfurt, Austria, February 2017.
    [PDF] ©IEEE, 2017. DOI: 10.1109/IWSC.2017.7880502

  • C. Ragkhitwetsagul, J. Krinke, D. Clark: Similarity of Source Code in the Presence of Pervasive Modifications. 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), Raleigh, NC, USA, October 2016.
    [PDF] ©IEEE, 2016. DOI: 10.1109/SCAM.2016.13

  • F. Wu, M. Harman, Y. Jia, J. Krinke: HOMI: Searching Higher Order Mutants For Software Improvement. Symposium on Search-Based Software Engineering, Raleigh, NC, USA, October 2016.
    DOI: 10.1007/978-3-319-47106-8_2

  • C. Ragkhitwetsagul, M. Paixao, M. Adham, S. Busari, J. Krinke, J. H. Drake: Searching for Configurations in Clone Evaluation: A Replication Study. Symposium on Search-Based Software Engineering (Challenge Track), Raleigh, NC, USA, October 2016.
    DOI: 10.1007/978-3-319-47106-8_20

  • Y. Yang, M. Harman, J. Krinke, S. Islam, D. Binkley, Y. Zhou, B. Xu: An Empirical Study on Dependence Clusters for Effort-Aware Fault-Proneness Prediction. International Conference on Automated Software Engineering (ASE), Singapore, September 2016.
    [PDF via ACM] [PDF] ©ACM, 2016. DOI: 10.1145/2970276.2970353

  • D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke, S. Yoo: ORBS and the Limits of Static Slicing. 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), Bremen, Germany, September 2015.
    [PDF] ©IEEE, 2015. DOI: 10.1109/SCAM.2015.7335396

  • F. Wu, W. Weimer, M. Harman, Y. Jia, J. Krinke: Deep Parameter Optimisation. Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation (GECCO '15), Madrid, Spain, 2015.
    [PDF via ACM] DOI: 10.1145/2739480.2754648

  • Y. Jia, F. Wu, M. Harman, J. Krinke: Genetic Improvement using Higher Order Mutation. Genetic Improvement 2015 Workshop, Madrid, Spain, 2015.
    [PDF via ACM] DOI: 10.1145/2739482.2768417

  • J. Nanavati, F. Wu, M. Harman, Y. Jia, J. Krinke: Mutation testing of memory-related operators. The 10th International Workshop on Mutation Analysis, Graz, Austria, April 2015.
    DOI: 10.1109/ICSTW.2015.7107449
    Best Paper Award.

  • D. Binkley, N. Gold, M. Harman, S. Islam, J. Krinke, S. Yoo: ORBS: Language-Independent Program Slicing. Foundations of Software Engineering (FSE), Hong Kong, China, November 2014.
    [PDF via ACM] [PDF] ©ACM, 2014. DOI: 10.1145/2635868.2635893
    (Supersedes Research Note RN/13/13, 2013.)

  • M. Harman, Y. Jia, J. Krinke, W. B. Langdon, J. Petke, Y. Zhang: Search based software engineering for software product line engineering: a survey and directions for future work. 18th International Software Product Line Conference (SPLC), Florence, Italy, September 2014. (Paper accompanying Mark Harman's keynote.)
    [PDF via ACM] DOI: 10.1145/2648511.2648513

  • H. Dan, M. Harman, J. Krinke, A. Marginean, L. Li, F. Wu: Pidgin Crasher: Searching for Minimised Crashing GUI Event Sequences. Symposium on Search-Based Software Engineering (Challenge Track), Fortaleza, Brazil, August 2014.
    DOI: 10.1007/978-3-319-09940-8_21

  • T. Wang, M. Harman, Y. Jia, J. Krinke: Searching for Better Configurations: A Rigorous Approach to Clone Evaluation. ESEC/FSE, Saint Petersburg, Russia, August 2013.
    [PDF via ACM] [PDF] ©ACM, 2013. DOI: 10.1145/2491411.2491420

  • M. Mondal, C.K. Roy, M.S. Rahman, R.K. Saha, J. Krinke, K.A. Schneider: Comparative Stability of Cloned and Non-cloned Code: An Empirical Study. 27th ACM Symposium on Applied Computing, Riva del Garda, Trento, Italy, March 2012.
    [PDF via ACM] [PDF] ©ACM, 2012. DOI: 10.1145/2245276.2231969

  • N.E. Gold, J. Krinke, M. Harman, D. Binkley: Cloning in Max/MSP Patches. International Computer Music Conference, Huddersfield, UK, July 2011.
    [Online]

  • M. Mondal, M.S. Rahman, R.K. Saha, C.K. Roy, J. Krinke, K.A. Schneider: An Empirical Study of the Impacts of Clones in Software Maintenance. Student Research Symposium Track of the 19th International Conference on Program Comprehension, Kingston, Canada, June 2011.
    [PDF] ©IEEE, 2011. DOI: 10.1109/ICPC.2011.14

  • J.Krinke: Is Cloned Code older than Non-Cloned Code? 5th International Workshop on Detection of Software Clones (IWSC), Waikiki, Hawaii, USA, May 2011.
    [PDF via ACM] [PDF] ©ACM, 2011. DOI: 10.1145/1985404.1985410

  • S.Islam, J. Krinke, D. Binkley: Dependence Clusters Visualization. 5th ACM/IEEE Symposium on Software Visualization. Salt Lake City, Utah, USA, October 2010.
    [PDF] ©ACM, 2010. DOI: 10.1145/1879211.1879227

  • S.Islam, J. Krinke, D. Binkley, M. Harman: Coherent Dependence Clusters. ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. Toronto, Ontario, Canada, June 2010.
    [PDF] ©ACM, 2010. DOI: 10.1145/1806672.1806683

  • J.Krinke, N. Gold, Y. Jia, D. Binkley: Cloning and Copying between GNOME Projects. 7th IEEE Working Conference on Mining Software Repositories (MSR), Cape Town, South Africa, May 2010.
    [PDF] ©IEEE, 2010. DOI: 10.1109/MSR.2010.5463290

  • J.Krinke, N. Gold, Y. Jia, D. Binkley: Distinguishing Copies from Originals in Software Clones. 4th International Workshop on Detection of Software Clones (IWSC), Cape Town, South Africa, May 2010.
    [PDF] ©ACM, 2010. DOI: 10.1145/1808901.1808907

  • N. Gold, J.Krinke, M. Harman, D. Binkley: Issues in Clone Classification for Dataflow Languages. 4th International Workshop on Detection of Software Clones (IWSC), Cape Town, South Africa, May 2010.
    [PDF] ©ACM, 2010. DOI: 10.1145/1808901.1808916

  • M. Harman, J. Krinke, J. Ren, S. Yoo: Search Based Data Sensitivity Analysis Applied to Requirement Engineering. ACM Genetic and Evolutionary Computation Conference (GECCO). Montreal, Canada, July 2009.
    [PDF] ©ACM, 2009.

  • Y. Jia, D. Binkley, M. Harman, J. Krinke, M. Matsushita: KClone: A Proposed Approach to Fast Precise Code Clone Detection. Third International Workshop on Detection of Software Clones (IWSC), Kaiserslautern, Germany, March 2009.
    [PDF]

  • K. Mens, A. Kellens, J. Krinke: Pitfalls in Aspect Mining. Working Conference on Reverse Engineering (WCRE), Antwerp, Belgium, October 2008.
    [PDF] ©IEEE, 2008. Not for redistribution.

  • J. Krinke: Is Cloned Code more stable than Non-Cloned Code? Proc. Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), Beijing, September 2008.
    [PDF] ©IEEE, 2008. Not for redistribution.

  • J. Krinke: A Study of Consistent and Inconsistent Changes to Code Clones. Proc. 14th Working Conference on Reverse Engineering (WCRE 2007), Vancouver, October 2007.
    [PDF] ©IEEE, 2007. Not for redistribution.

  • J. Krinke: Information Flow and Taint Analysis with Dependence Graphs. Proc. 3rd International Workshop on Code Based Security Assessments (CoBaSSA 2007), Vancouver, October 2007.
    [PDF]

  • J. Krinke: Statement-Level Cohesion Metrics and their Visualization. Proc. Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), Paris, September 2007.
    [PDF] ©IEEE, 2007. Not for redistribution.

  • P. Bouillon, J. Krinke, N. Mayer, F. Steimann: EzUnit: A Framework for associating failed unit tests with potential programming errors. Proc. 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming (XP 2007), Como, Italy June 2007.
    [PDF] ©Springer, 2007. Not for redistribution.

  • J. Krinke: Changes to Code Clones in Evolving Software. Proc. 9. Workshop Software Reengineering (WSR 2007), Bad Honnef, Germany, May 2007.
    [PDF]

  • C. Hammer, J. Krinke, F. Nodes: Intransitive Noninterference in Dependence Graphs. Proc. Second International Symposium on Leveraging Application of Formal Methods, Verification and Validation, Paphos, Cyprus, pp. 136-145, November 2006.
    [PDF]

  • J. Krinke: Mining Control Flow Graphs for Crosscutting Concerns. Proc. 13th Working Conference on Reverse Engineering (WCRE): IEEE International Astrenet Aspect Analysis (AAA) Workshop, Benevento, Italy, pp. 334-342, October 2006.
    [PDF] ©IEEE, 2006. Not for redistribution.

  • D. Binkley, M. Harman, J. Krinke: Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. Proc. in Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), Philadelphia, September 2006.
    [PDF] ©IEEE, 2006. Not for redistribution.

  • C. Hammer, J. Krinke, G. Snelting: Information Flow Control for Java Based on Path Conditions in Dependence Graphs. Proc. IEEE International Symposium on Secure Software Engineering (ISSSE 2006), pp. 87-96, March 2006.
    [PDF] ©IEEE, 2006. Not for redistribution.

  • C. Hammer, M. Grimme, J. Krinke: Dynamic Path Conditions in Dependence Graphs. Proc. ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation (PEPM '06), Charleston, South Carolina, pp. 58-67, January 2006.
    [PDF] ©ACM, 2006.

  • J. Krinke, M. Roos: Erfahrungen mit dem Open-Access-Journal "eleed (e-learning and education)". Proc. Knowledge eXtended, Jülich, Germany, pp. 123-134, November 2005
    [PDF]

  • J. Krinke, S. Breu: Aspect Mining based on Control-Flow. Proc. 7. Workshop Software Reengineering (WSR 2005), Bad Honnef, Germany, GI-Softwaretechnik-Trends, 25(2), pp. 39-40, Mai 2005.
    [PDF]

  • P. Bouillon, J. Krinke, S. Lukosch: Software Engineering Projects in Distant Teaching. Proc. Conference on Software Engineering Education and Training (CSEE&T), Ottawa, Canada, pp. 147-154, April 2005.
    [PDF] ©IEEE, 2005. Not for redistribution.

  • P. Bouillon, J. Krinke, S. Lukosch: Eine Plattform für die Softwaretechnik-Fernlehre. Proc. Software Engineering im Unterricht der Hochschulen (SEUH), Aachen, Germany, pp. 81-92, February 2005.

  • J. Krinke, S. Breu: Control-Flow-Graph-Based Aspect Mining. Workshop on Aspect Reverse Engineering (WARE 2004), Delft, November 2004.
    [PDF].

  • P. Bouillon, J. Krinke: Using Eclipse in Distant Teaching of Software Engineering. Workshop on Eclipse Technology Exchange (eTX 2004), Vancouver, Canada, pp. 22-26, October 2004.
    [PDF] ©ACM, 2004.

  • S. Breu, J. Krinke: Aspect Mining Using Event Traces. Proc. Automated Software Engineering (ASE 2004), Linz, Austria, pp. 310-315, September 2004.
    [PDF] ©IEEE, 2004. Not for redistribution.

  • P. Bouillon, J. Krinke: A Platform for Teaching Distributed Software Engineering. Proc. Cooperative Support for Distributed Software Engineering Processes (CSSE 2004), Linz, Austria, pp. 139-144, September 2004.
    [PDF]

  • J. Krinke: Visualization of Program Dependence and Slices. Proc. International Conference on Software Maintenance (ICSM 2004), Chicago, pp. 168-177, September 2004.
    [PDF] ©IEEE, 2004. Not for redistribution.

  • J. Krinke: Advanced Slicing of Sequential and Concurrent Programs. Proc. International Conference on Software Maintenance (ICSM 2004), Chicago, pp. 464-468, September 2004.
    [PDF] ©IEEE, 2004. Not for redistribution.

  • J. Krinke: Context-Sensitivity Matters, But Context Does Not. Proc. Fourth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), Chicago, pp. 29-35, September 2004.
    [PDF] ©IEEE, 2004. Not for redistribution.

  • J. Krinke: Textual vs. Graphical Visualization of Fine-Grained Dependencies. Proc. 6. Workshop Software Reengineering (WSR 2004), Bad Honnef, Germany, GI-Softwaretechnik-Trends, 24(2), pp. 67-68, Mai 2004.
    [PDF]

  • J. Krinke: Context-Sensitive Slicing of Concurrent Programs. Proc. ESEC/FSE 2003, Helsinki, Finland, pp. 178-187, September 2003.
    [PDF] ©ACM, 2003. Not for redistribution.

  • J. Krinke: Barrier Slicing and Chopping. Proc. Third IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), Amsterdam, Netherlands, pp. 81-87, September 2003.
    [PDF] ©IEEE, 2003. Not for redistribution.

  • M. Störzer, J.Krinke, S. Breu: Trace Analysis for Aspect Application. Analysis of Aspect-Oriented Software (AAOS), Darmstadt, Germany, July 2003.
    [PDF]

  • S. Breu, J. Krinke: Aspect Mining using Dynamic Analysis. Proc. 5. Workshop Software-Reengineering, Bad Honnef, Germany, GI-Softwaretechnik-Trends, 23(2), pp. 21-22, Mai 2003.
    [PDF]

  • M. Störzer, J. Krinke: Interference Analysis for AspectJ. Proc. Foundations of Aspect-Oriented Languages (FOAL 2003), Boston, pp. 35-44, March 2003.
    [PDF]

  • A. De Lucia, M. Harman, R. Hierons, J. Krinke: Unions of Slices are not Slices. Proc. European Conference on Software Maintenance and Reengineering (CSMR 2003), Benevento, Italy, pp. 363-367, March 2003.
    [PDF] ©IEEE, 2003. Not for redistribution.

  • J. Krinke: Evaluating Context-Sensitive Slicing and Chopping. Proc. International Conference on Software Maintenance (ICSM 2002), Montreal, Canada, pp. 22-31, October 2002.
    [PDF] ©IEEE, 2003. Not for redistribution.

  • J. Krinke, M. Störzer, A. Zeller: Web-basierte Programmierpraktika mit Praktomat. Proc. Workshop Neue Medien in der Informatik-Lehre, Dortmund, Germany, October 2002.
    [PDF]

  • J. Krinke: Identifying Similar Code with Program Dependence Graphs. Proc. Eight Working Conference on Reverse Engineering (WCRE 2001), Stuttgart, Germany, pp. 301-309, October 2001.
    [PDF] ©IEEE, 2001. Not for redistribution.

  • J. Krinke: Identifizierung von ähnlichen Code mit Programmabhängigkeitsgraphen. Proc. 3. Workshop Software-Reengineering Fachberichte Informatik, Universität Koblenz-Landau, pp. 83-91, 2001.

  • J. Krinke, T. Robschink: Kombination von Slicing und Constraint-Solving für Software-Reengineering. Proc. Workshop Software Reengineering, Fachberichte Informatik, Universität Koblenz-Landau, pp. 133-140, 1999.

  • T. Robschink, J. Krinke: Heuristische Graphzerlegung. Proc. Sicherheit und Zuverlässigkeit Software-basierter Systeme, Institut für Sicherheitstechnologie, pp. 234-248, 1999.

  • J. Krinke, G. Snelting, T. Robschink: Software-Sicherheitsprüfung mit VALSOFT. Proc. Softwaretechnik 98, Paderborn, pp. 34-41, September 1998.

  • J. Krinke: Static Slicing of Threaded Programs. Proc. ACM SIGPLAN/SIGFSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE'98), Montreal, Canada, pp. 35-42, June 1998.
    [PDF] ©ACM, 2003. Not for redistribution.

Thesis

  • J. Krinke: Advanced Slicing of Sequential and Concurrent Programs. Universität Passau, April 2003. Referees: Gregor Snelting, Passau, and Tim Teitelbaum, Cornell.
    [PDF] (2.7MB), 265 pages.

Other Publications

  • S. Dodier-Lazaro, I. Becker, J. Krinke, A. Sasse: No Good Reason to Remove Features: Expert Users Value Useful Apps over Secure Ones. UCL Computer Science Research Notes (17/03), February 2017.
    [PDF]

  • J. Krinke, M. Streckenbach, M. Stoerzer, C. Hammer: Using Program Analysis Infrastructure for Software Maintenance. Technical Report, Universität Passau, Germany, March 2003.
    [PDF]

 

Last modified: 08/16/2017