Travelled to:
1 × Austria
1 × Canada
1 × China
1 × Croatia
1 × India
1 × Japan
1 × Russia
1 × Sweden
1 × Switzerland
2 × Italy
9 × USA
Collaborated with:
A.Orso D.Li S.Mahajan S.Hao A.H.Tran M.Wan J.Gui R.Govindan ∅ G.Safi N.Medvidović Y.Jin N.Kukreja M.Tambe S.R.Choudhary S.Anand P.Manolios Y.Lyu A.Shahbazian S.Mcilroy M.Nagappan C.Sahin J.Clause J.Garcia D.Popescu
Talks about:
applic (10) energi (7) web (7) use (7) test (6) android (4) analysi (4) present (3) identif (3) inject (3)
♂ Person: William G. J. Halfond
DBLP: Halfond:William_G=_J=
Facilitated 1 volumes:
Contributed to:
Wrote 24 papers:
- ESEC-FSE-2015-LiLWH #analysis #android #java #string
- String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
- ESEC-FSE-2015-LiTH #energy #mobile #named #web
- Nyx: a display energy optimizer for mobile web apps (DL, AHT, WGJH), pp. 958–961.
- ESEC-FSE-2015-SafiSHM #detection
- Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
- ICSE-v1-2015-GuiMNH #developer #mobile
- Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers (JG, SM, MN, WGJH), pp. 100–110.
- ICST-2015-MahajanH #detection #html #locality #using
- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
- ICST-2015-MahajanH15a #debugging #html #named
- WebSee: A Tool for Debugging HTML Presentation Failures (SM, WGJH), pp. 1–8.
- ICST-2015-WanJLH #android #detection #energy
- Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
- ASE-2014-MahajanH #comparison #html #image #using
- Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
- ICSE-2014-LiTH #energy #performance #smarttech #web
- Making web applications more energy efficient for OLED smartphones (DL, AHT, WGJH), pp. 527–538.
- ICSME-2014-LiHGH #android #empirical #energy
- An Empirical Study of the Energy Consumption of Android Applications (DL, SH, JG, WGJH), pp. 121–130.
- ISSTA-2014-LiJSCH #energy #optimisation #testing
- Integrated energy-directed test suite optimization (DL, YJ, CS, JC, WGJH), pp. 339–350.
- ASE-2013-KukrejaHT #game studies #testing #using
- Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
- ESEC-FSE-2013-GarciaPSHM #distributed #identification
- Identifying message flow in distributed event-based systems (JG, DP, GS, WGJH, NM), pp. 367–377.
- ICSE-2013-HaoLHG #energy #mobile #program analysis #using
- Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
- ISSTA-2013-LiHHG #android #energy
- Calculating source line level energy information for Android applications (DL, SH, WGJH, RG), pp. 78–89.
- ASE-2011-Halfond #web
- Domain and value checking of web application invocation arguments (WGJH), pp. 544–547.
- ICST-2009-HalfondCO #identification #testing
- Penetration Testing with Improved Input Vector Identification (WGJH, SRC, AO), pp. 346–355.
- ISSTA-2009-HalfondAO #analysis #identification #interface #precise #testing #web
- Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
- FSE-2008-HalfondO #automation #identification #parametricity #web
- Automated identification of parameter mismatches in web applications (WGJH, AO), pp. 181–191.
- ESEC-FSE-2007-HalfondO #automation #generative #interface #testing #using #web
- Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
- ASE-2006-HalfondO #database #testing
- Command-Form Coverage for Testing Database Applications (WGJH, AO), pp. 69–80.
- FSE-2006-HalfondOM #evaluation #injection #sql #using
- Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
- ICSE-2006-HalfondO #injection #sql #using
- Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
- ASE-2005-HalfondO #analysis #injection #monitoring #named
- AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.