default search action
John Penix
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c23]John Penix:
Experiences developing tools for developers (invited talk). SIGSOFT FSE 2014: 4 - [c22]Sebastian G. Elbaum, Gregg Rothermel, John Penix:
Techniques for improving regression testing in continuous integration development environments. SIGSOFT FSE 2014: 235-245 - 2013
- [c21]John Penix:
Big problems in industry (panel). ASE 2013: 3 - 2012
- [c20]John Penix:
Large-scale test automation in the cloud (Invited industrial talk). ICSE 2012: 1122 - 2010
- [i1]Mary Jean Harrold, Darko Marinov, Stephen Oney, Mauro Pezzè, Adam A. Porter, John Penix, Per Runeson, Shin Yoo:
Introducing Continuous Systematic Testing of Evolving Software. Practical Software Testing: Tool Automation and Human Factors 2010
2000 – 2009
- 2008
- [j8]Nathaniel Ayewah, David Hovemeyer, J. David Morgenthaler, John Penix, William W. Pugh:
Using Static Analysis to Find Bugs. IEEE Softw. 25(5): 22-29 (2008) - [c19]Joseph R. Ruthruff, John Penix, J. David Morgenthaler, Sebastian G. Elbaum, Gregg Rothermel:
Predicting accurate and actionable static analysis warnings: an experimental approach. ICSE 2008: 341-350 - 2007
- [c18]Nathaniel Ayewah, William W. Pugh, J. David Morgenthaler, John Penix, YuQian Zhou:
Using FindBugs on production software. OOPSLA Companion 2007: 805-806 - [c17]Nathaniel Ayewah, William W. Pugh, J. David Morgenthaler, John Penix, YuQian Zhou:
Evaluating static analysis defect warnings on production software. PASTE 2007: 1-8 - 2006
- [j7]John Penix, John C. Grundy:
Guest Editors' Introduction. Autom. Softw. Eng. 13(3): 343-344 (2006) - 2005
- [j6]John Penix, Willem Visser, Seungjoon Park, Corina S. Pasareanu, Eric Engstrom, Aaron Larson, Nicholas Weininger:
Verifying Time Partitioning in the DEOS Scheduling Kernel. Formal Methods Syst. Des. 26(2): 103-135 (2005) - [c16]Peter C. Mehlitz, John Penix:
Design for Verification with Dynamic Assertions. SEW 2005: 285-292 - 2003
- [c15]Cleidson R. B. de Souza, David F. Redmiles, Gloria Mark, John Penix, Maarten Sierhuis:
Management of Interdependencies in Collaborative Software Development. ISESE 2003: 294-303 - 2001
- [j5]John Penix, Nigel Tracey, Willem Visser:
The first international workshop on automated program analysis, testing and verification. ACM SIGSOFT Softw. Eng. Notes 26(1): 40 (2001) - [j4]Nigel Tracey, John Penix, Willem Visser:
Automated analysis, verification and testing. Softw. Focus 2(2): 82 (2001) - [j3]Nigel Tracey, John Penix, Willem Visser:
Editorial: The First International Workshop on Automated Program Analysis, Testing and Verification (WAPATV 2000). Softw. Test. Verification Reliab. 11(2): 63-64 (2001) - [j2]Klaus Havelund, Michael R. Lowry, John Penix:
Formal Analysis of a Space-Craft Controller Using SPIN. IEEE Trans. Software Eng. 27(8): 749-765 (2001) - [c14]Nigel Tracey, John Penix, Willem Visser:
The Second International Workshop on Automated Program Analysis, Testing and Verification. ICSE 2001: 755 - [c13]Jon Whittle, Jeffrey Van Baalen, Johann Schumann, Peter Robinson, Thomas Pressburger, John Penix, Phil Oh, Michael R. Lowry, Guillaume P. Brat:
Amphion/NAV: Deductive Synthesis of State Estimation Software. ASE 2001: 395-399 - 2000
- [c12]Willem Visser, Seungjoon Park, John Penix:
Using predicate abstraction to reduce object-oriented programs for model checking. FMSP 2000: 3-182 - [c11]John Penix, Willem Visser, Eric Engstrom, Aaron Larson, Nicholas Weininger:
Verification of time partitioning in the DEOS scheduler kernel. ICSE 2000: 488-497 - [c10]Nigel Tracey, John Penix, Willem Visser:
The First International Workshop on Automated Program Analysis, Testing and Verification. ICSE 2000: 796 - [e1]Klaus Havelund, John Penix, Willem Visser:
SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30 - September 1, 2000, Proceedings. Lecture Notes in Computer Science 1885, Springer 2000, ISBN 3-540-41030-9 [contents]
1990 – 1999
- 1999
- [j1]John Penix, Perry Alexander:
Efficient Specification-Based Component Retrieval. Autom. Softw. Eng. 6(2): 139-170 (1999) - [c9]John Penix:
Evaluation of Automated Software Engineering Systems? (Panel). ASE 1999: 3 - [c8]John Penix:
Deductive Synthesis of Event-Based Software Architectures. ASE 1999: 311-314 - 1998
- [c7]John Penix, Dale E. Martin, Peter Frey, Ramanan Radhakrishnan, Perry Alexander, Philip A. Wilsey:
Experiences in verifying parallel simulation algorithms. FMSP 1998: 16-23 - [c6]John Penix, Perry Alexander:
Using Formal Specifications for Component Retrieval and Reuse. HICSS (3) 1998: 356- - [c5]John Penix:
Compositional specification of software architecture. ISAW@FSE 1998: 113-116 - 1997
- [c4]Murali Rangarajan, John Penix, Perry Alexander, Philip A. Wilsey:
Gravity: An Object-Oriented Framework for Hardware/Software Tool Integration. Annual Simulation Symposium 1997: 24-30 - [c3]Michael R. Lowry, Klaus Havelund, John Penix:
Verification and Validation of AI Systems that Control Deep-Space Spacecraft. ISMIS 1997: 35-47 - [c2]John Penix, Perry Alexander, Klaus Havelund:
Declarative Specification of Software Architectures. ASE 1997: 201- - 1995
- [c1]John Penix, Phillip Baraona, Perry Alexander:
Classification and Retrieval of Reusable Components Using Semantic Features. KBSE 1995: 131-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint