Follow
Cedric Richter
Cedric Richter
University of Oldenburg
Verified email at uol.de - Homepage
Title
Cited by
Cited by
Year
PeSCo: Predicting Sequential Combinations of Verifiers: (Competition Contribution)
C Richter, H Wehrheim
Tools and Algorithms for the Construction and Analysis of Systems: 25 Years …, 2019
562019
Algorithm selection for software validation based on graph kernels
C Richter, E Hüllermeier, MC Jakobs, H Wehrheim
Automated Software Engineering 27 (1), 153-186, 2020
282020
Construction of verifier combinations based on off-the-shelf verifiers
D Beyer, S Kanav, C Richter
International Conference on Fundamental Approaches to Software Engineering …, 2022
182022
Tssb-3m: Mining single statement bugs at massive scale
C Richter, H Wehrheim
Proceedings of the 19th International Conference on Mining Software …, 2022
142022
Learning realistic mutations: Bug creation for neural bug detectors
C Richter, H Wehrheim
2022 IEEE Conference on Software Testing, Verification and Validation (ICST …, 2022
132022
Attend and represent: a novel view on algorithm selection for software verification
C Richter, H Wehrheim
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
122020
Can we learn from developer mistakes? Learning to localize and repair real bugs from real bug fixes
C Richter, H Wehrheim
arXiv preprint arXiv:2207.00301, 2022
72022
Parallel program analysis via range splitting
J Haltermann, MC Jakobs, C Richter, H Wehrheim
International Conference on Fundamental Approaches to Software Engineering …, 2023
62023
CoVeriTest with adaptive time scheduling (competition contribution)
MC Jakobs, C Richter
Fundamental Approaches to Software Engineering 12649, 358, 2021
52021
Ranged Program Analysis via Instrumentation
J Haltermann, MC Jakobs, C Richter, H Wehrheim
International Conference on Software Engineering and Formal Methods, 145-164, 2023
42023
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?
C Richter, J Haltermann, MC Jakobs, F Pauck, S Schott, H Wehrheim
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
32022
Bubaak-SpLit: Split what you cannot verify (Competition contribution)
M Chalupa, C Richter
International Conference on Tools and Algorithms for the Construction and …, 2024
22024
DeepMutants: Training neural bug detectors with contextual mutations
C Richter, H Wehrheim
arXiv preprint arXiv:2107.06657, 2021
22021
Can ChatGPT support software verification?
C Janßen, C Richter, H Wehrheim
International Conference on Fundamental Approaches to Software Engineering …, 2024
12024
How to Train Your Neural Bug Detector: Artificial vs Real Bugs
C Richter, H Wehrheim
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
12023
Parallel Program Analysis on Path Ranges
J Haltermanna, MC Jakobs, C Richter, H Wehrheim
arXiv preprint arXiv:2402.11938, 2024
2024
Ranged Program Analysis: A Parallel Divide-and-Conquer Approach for Software Verification
J Haltermann, MC Jakobs, C Richter, H Wehrheim
Software Engineering 2024 (SE 2024), 157-158, 2024
2024
On the Role of Artificial and Real Bug Fixes on the Training of Neural Bug Detectors
C Richter, H Wehrheim
Software Engineering 2024 (SE 2024), 111-112, 2024
2024
Robustness Testing of Software Verifiers
F Dyck, C Richter, H Wehrheim
International Conference on Software Engineering and Formal Methods, 66-84, 2023
2023
Variable Misuse Detection: Software Developers versus Neural Bug Detectors
C Richter, J Haltermann, MC Jakobs, F Pauck, S Schott, H Wehrheim
Gesellschaft für Informatik eV, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20