default search action
J. Jenny Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Brendan Hannon, Yulia Kumar, J. Jenny Li, Patricia Morreale:
Chef Dalle: Transforming Cooking with Multi-Model Multimodal AI. Comput. 13(7): 156 (2024) - [c69]Yulia Kumar, Anjana Manikandan, Patricia Morreale, J. Jenny Li:
Growth Mindset Emojifier Multimodal App. FLAIRS 2024 - 2023
- [c68]Yulia Kumar, Patricia Morreale, Peter Sorial, Justin Delgado, J. Jenny Li, Patrick Martins:
A Testing Framework for AI Linguistic Systems (testFAILS). AITest 2023: 51-54 - [c67]Yulia Kumar, Justin Delgado, E. Kupershtein, Brendan Hannon, Zachary Gordon, J. Jenny Li, Patricia Morreale:
AssureAIDoctor- A Bias-Free AI Bot. ISNCC 2023: 1-6 - [c66]Yulia Kumar, Zachary Gordon, Patricia Morreale, J. Jenny Li, Brendan Hannon:
Love the Way You Lie: Unmasking the Deceptions of LLMs. QRS Companion 2023: 875-876 - 2022
- [c65]Justin Delgado, U. Ebreso, Yulia Kumar, J. Jenny Li, Patricia Morreale:
Preliminary Results of Applying Transformers to Geoscience and Earth Science Data. CSCI 2022: 284-288 - [c64]J. Serra, R. Quezada, Stacy Fortes, Neil Tellez, Abdulhameed Alelaiwi, E. Landaverde, Yulia Kumar, J. Jenny Li, Patricia Morreale:
Validation of AI models for ITCZ Detection from Climate Data. DSIT 2022: 1-7 - [c63]A. Abduljabbar, N. Gupta, L. Healy, Yulia Kumar, J. Jenny Li, Patricia Morreale:
A Self-Served AI Tutor for Growth Mindset Teaching. ICICT 2022: 55-59 - [c62]Neil Tellez, J. Serra, Yulia Kumar, J. Jenny Li, Patricia Morreale:
Gauging Biases in Various Deep Learning AI Models. IntelliSys (3) 2022: 171-186 - [c61]Neil Tellez, J. Serra, U. Ebreso, K. Opara, Yulia Kumar, J. Jenny Li, Patricia Morreale:
An Assure AI Bot (AAAI bot). ISNCC 2022: 1-5 - [c60]Daehan Kwak, Patricia Morreale, Sarah T. Hug, Yulia Kumar, Jean Chu, Ching-Yu Huang, J. Jenny Li, Paolien Wang:
Evaluation of the Use of Growth Mindset in the CS Classroom. SIGCSE (1) 2022: 878-884 - 2021
- [c59]Stacy Fortes, Robert Kulesza, J. Jenny Li:
A Case Study of Object Recognition from Drone Videos. ICICT 2021: 84-87 - [c58]Patricia Morreale, J. Jenny Li, Ching-Yu Huang, Daehan Kwak, Jean Chu, Yulia Kumar, Paolien Wang:
Framework for a Growth Mindset Classroom. SIGCSE 2021: 1269 - 2020
- [j17]J. Jenny Li, Andreas Ulrich, Xiaoying Bai, Antonia Bertolino:
Advances in test automation for software with special focus on artificial intelligence and machine learning. Softw. Qual. J. 28(1): 245-248 (2020) - [c57]J. Jenny Li, Thayssa Silva, Mira Franke, Moushume Hai, Patricia Morreale:
Evaluating Deep Learning Biases Based on Grey-Box Testing Results. IntelliSys (1) 2020: 641-651
2010 – 2019
- 2018
- [e4]Xiaoying Bai, J. Jenny Li, Andreas Ulrich:
Proceedings of the 13th International Workshop on Automation of Software Test, AST@ICSE 2018, Gothenburg, Sweden, May 28-29, 2018. ACM 2018 [contents] - 2017
- [j16]J. Jenny Li, Tony Savor:
Automatic detection of DDoS attacks to notification services. Int. J. Inf. Priv. Secur. Integr. 3(1): 1-17 (2017) - [j15]J. Jenny Li, Jing-Chiou Liou:
An experiment of hit-and-run wireless attacks. Int. J. Inf. Priv. Secur. Integr. 3(1): 58-74 (2017) - [j14]Sudipto Ghosh, J. Jenny Li:
Special issue on program debugging. Softw. Qual. J. 25(1): 3-5 (2017) - 2016
- [c56]J. Jenny Li, Fenando Neto, Jingchio Liou:
Clouds for Hit-and-Run Wireless Attacks. BigDataSecurity/HPSC/IDS 2016: 67-72 - [c55]Yulia Rossikova, J. Jenny Li, Patricia Morreale:
Intelligent Data Mining for Translator Correctness Prediction. BigDataSecurity/HPSC/IDS 2016: 394-399 - [c54]Jennifer Nelson, X. Lin, C. Chen, J. Iglesias, J. Jenny Li:
Social Engineering for Security Attacks. MISNC 2016: 6 - [c53]C. Chen, J. Iglesias, X. Lin, J. Jenny Li, Patricia Morreale, Linda Ness:
Facebook Traffic Pattern Analytics. MISNC 2016: 10 - 2015
- [c52]Patricia Morreale, J. Jenny Li, Jeremy McAllister, Shruti Mishra, Thejasri Dowluri:
Mobile Persuasive Design for HEMS Adaptation. ANT/SEIT 2015: 764-771 - 2014
- [c51]Liana Barachisio Lisboa, J. Jenny Li, Patricia Morreale, D. Heer, David M. Weiss:
An Evaluation to Compare Software Product Line Decision Model and Feature Model. ENASE 2014: 144-151 - [c50]J. Jenny Li, Patricia Morreale, John Douglas Palframan:
Diagnosis-Guided Regression Test Refinement. SERE (Companion) 2014: 64-70 - [c49]J. Jenny Li, Tony Savor:
Detecting DoS Attacks on Notification Services. SERE (Companion) 2014: 192-198 - 2013
- [j13]Antonia Bertolino, Howard Foster, J. Jenny Li, Hong Zhu:
Special section on automation of software test. J. Syst. Softw. 86(8): 1977 (2013) - 2012
- [c48]J. Jenny Li, Colin L. Mallows, Jim Landwehr:
Capacity Evaluation of Multi-modal Network Notification Service. COMPSAC 2012: 62-71 - [c47]Thomas R. Devine, Katerina Goseva-Popstojanova, Sandeep Krishnan, Robyn R. Lutz, J. Jenny Li:
An Empirical Study of Pre-release Software Faults in an Industrial Product Line. ICST 2012: 181-190 - 2011
- [c46]J. Jenny Li, John Douglas Palframan, Jim Landwehr:
SoftWare IMmunization (SWIM) - A Combination of Static Analysis and Automatic Testing. COMPSAC 2011: 656-661 - [c45]Howard Foster, Antonia Bertolino, J. Jenny Li:
Sixth international workshop on automation of software test: (AST 2011). ICSE 2011: 1216-1217 - [e3]Antonia Bertolino, Howard Foster, J. Jenny Li:
Proceedings of the 6th International Workshop on Automation of Software Test, AST 2011, Waikiki, Honolulu, HI, USA, May 23-24, 2011. ACM 2011, ISBN 978-1-4503-0592-1 [contents] - 2010
- [r1]J. Jenny Li, Evelyn Moritz, David M. Weiss:
Software Testing: Tools. Encyclopedia of Software Engineering 2010: 1178-1187
2000 – 2009
- 2009
- [j12]Hong Zhu, Shing-Chi Cheung, Joseph Robert Horgan, J. Jenny Li:
Guest Editorial to the Special Issue on Automation of Software Testing. Comput. J. 52(5): 513 (2009) - [j11]Qian Yang, J. Jenny Li, David M. Weiss:
A Survey of Coverage-Based Testing Tools. Comput. J. 52(5): 589-597 (2009) - [c44]J. Jenny Li, David M. Weiss:
Using Testing Trace for Automatic User Categorization. AST 2009: 144-148 - 2008
- [c43]J. Jenny Li, David M. Weiss, Howell Yee:
An Automatically-Generated Run-Time Instrumenter to Reduce Coverage Testing Overhead. AST 2008: 49-56 - [c42]Trung T. Dinh-Trong, Birgit Geppert, J. Jenny Li, Frank Rößler:
Looking for More Confidence in Refactoring? How to Assess Adequacy of Your Refactoring Tests. QSIC 2008: 255-263 - [c41]David M. Weiss, J. Jenny Li, J. Hamilton Slye, Trung T. Dinh-Trong, Hongyu Sun:
Decision-Model-Based Code Generation for SPLE. SPLC 2008: 129-138 - 2007
- [c40]Xianming Wu, J. Jenny Li, David M. Weiss, Yann-Hang Lee:
Coverage-Based Testing on Embedded Systems. AST 2007: 31-36 - [c39]Xiao Ma, J. Jenny Li, David M. Weiss:
Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation. SNPD (3) 2007: 1129-1134 - [c38]J. Jenny Li, Birgit Geppert, Frank Rößler, David M. Weiss:
Reuse Execution Traces to Reduce Testing of Product Lines. SPLC (2) 2007: 65-72 - [c37]J. Jenny Li, David M. Weiss, J. Hamilton Slye:
Automatic Integration Test Generation from Unit Tests of eXVantage Product Family. SPLC (2) 2007: 73-80 - 2006
- [j10]J. Jenny Li, David M. Weiss, Howell Yee:
Code-coverage guided prioritized test generation. Inf. Softw. Technol. 48(12): 1187-1198 (2006) - [c36]Qian Yang, J. Jenny Li, David M. Weiss:
A Survey of Coverage Based Testing Tools. AST 2006: 99-103 - [c35]Hong Zhu, Joseph Robert Horgan, Shing-Chi Cheung, J. Jenny Li:
The first international workshop on automation of software test. ICSE 2006: 1028-1029 - [e2]Hong Zhu, Joseph R. Horgan, Shing-Chi Cheung, J. Jenny Li:
Proceedings of the 2006 International Workshop on Automation of Software Test, AST 2006, Shanghai, China, May 23, 2006. ACM 2006, ISBN 1-59593-408-1 [contents] - 2005
- [j9]J. Jenny Li, Eun Kyo Park:
Editorial. Telecommun. Syst. 28(3-4): 277-278 (2005) - [j8]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
VoIP Protection and Performance Improvement. Telecommun. Syst. 28(3-4): 351-367 (2005) - [c34]W. Eric Wong, J. Jenny Li:
An Integrated Solution for Testing and Analyzing Java Applications in an Industrial Setting. APSEC 2005: 576-583 - [c33]J. Jenny Li:
Prioritize Code for Testing to Improve Code Coverage of Complex Software. ISSRE 2005: 75-84 - [c32]J. Jenny Li, W. Eric Wong, Xiao Ma, David M. Weiss:
A Constraint Solver for Code-based Test Data Generation. SEKE 2005: 300-305 - 2004
- [j7]W. Eric Wong, J. Jenny Li:
Redesigning Legacy Systems Into The Object-Oriented Paradigm. Int. J. Softw. Eng. Knowl. Eng. 14(3): 255-276 (2004) - [c31]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
Using Overlay Networks to Improve VoIP Reliability. ATVA 2004: 392-401 - [c30]J. Jenny Li, Howell Yee:
Code-Coverage Guided Prioritized Test Generation. COMPSAC Workshops 2004: 178-181 - [c29]J. Jenny Li, Tangqiu Li, Zongkai Lin, Aditya P. Mathur, Karama Kanoun:
Computer Supported Cooperative Work in Software Engineering. COMPSAC 2004: 328 - [c28]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
Rapid fault detection and recovery for IP telephony. ICC 2004: 1484-1489 - [c27]J. Jenny Li, W. Eric Wong, Weiping Guo:
Case study of a multimedia wireless system. ICME 2004: 1815-1818 - [c26]Birgit Geppert, J. Jenny Li, Frank Rößler, David M. Weiss:
Towards Generating Acceptance Tests for Product Lines. ICSR 2004: 35-48 - [c25]Feng Liu, Wu Chou, Li Li, J. Jenny Li:
WSIP - Web Service SIP Endpoint for Converged Multimedia/Multimodal Communication over IP. ICWS 2004: 690- - [c24]Birgit Geppert, Charles W. Krueger, J. Jenny Li:
SPLiT - Workshop on Software Product Line Testing. SPLC 2004: 325-326 - 2003
- [j6]W. Eric Wong, Tatiana Sugeta, J. Jenny Li, José Carlos Maldonado:
Coverage testing software architectural design in SDL. Comput. Networks 42(3): 359-374 (2003) - [j5]J. Jenny Li, Joseph Robert Horgan:
A scalable tool for efficient protocol validation and testing. Comput. Commun. 26(7): 766-773 (2003) - [j4]W. Eric Wong, J. Jenny Li:
Editorial: ICCCN 2001. Softw. Pract. Exp. 33(14): 1299-1300 (2003) - [c23]Feng Liu, J. Jenny Li, Xueshan Shan, Wu Chou:
An Architecture of Wireless Web and Dialogue System Convergence for Multimodal Service Interaction Over Converged Networks. COMPSAC 2003: 513- - [c22]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
enProtect: Enterprise-Based Network Protection and Performance Improvement. International Conference on Internet Computing 2003: 605-606 - [c21]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
VoIP protection and performance improvement. ICCCN 2003: 505-510 - [c20]Mark J. Karol, Parameshwaran Krishnan, J. Jenny Li:
VoIP network failure detection and user notification. ICCCN 2003: 511-516 - [c19]Mingyu Wu, W. Eric Wong, J. Jenny Li:
Performance evaluation of predictive handoff scheme with channel borrowing. IPCCC 2003: 531-536 - [c18]J. Jenny Li, Wu Chou, Xueshan Shan, Feng Liu, W. Eric Wong:
An Adaptable Architecture for Secure Delivery of Converged Services. ISADS 2003: 45-52 - [c17]W. Eric Wong, J. Jenny Li:
Redesigning Legacy Systems into the Object-Oriented Paradigm. ISORC 2003: 221-229 - 2002
- [c16]J. Jenny Li, Xueshan Shan:
A Case Study of Dependable Software Upgrade with Distributed Components. COMPSAC 2002: 1028-1033 - [c15]Wu Chou, Xueshan Shan, J. Jenny Li:
An architecture of wireless Web and dialogue system convergence for multimodal service interaction over converged networks. ICCCN 2002: 69-74 - [c14]J. Jenny Li, W. Eric Wong:
Automatic Test Generation from Communicating Extended Finite State Machine (CEFSM)-Based Models. Symposium on Object-Oriented Real-Time Distributed Computing 2002: 181-188 - 2001
- [c13]W. Eric Wong, Dennis Mulcare, Plinio Vilela, J. Jenny Li:
Constructing network models from workflows. ICCCN 2001: 368-373 - [c12]Xueshan Shan, J. Jenny Li:
A case study of IP network monitoring using wireless mobile devices. ICCCN 2001: 590-593 - [e1]J. Jenny Li, Ronald P. Luijten, E. K. Park:
Proceedings of the 10th International Conference on Computer Communications and Networks, ICCCN 2001, 15-17 October, 2001, Scottsdale, Arizona, USA. IEEE 2001, ISBN 0-7803-7128-3 [contents] - 2000
- [j3]J. Jenny Li, Joseph Robert Horgan:
Applying formal description techniques to software architectural design. Comput. Commun. 23(12): 1169-1178 (2000) - [c11]J. Jenny Li, Joseph Robert Horgan:
Simulation-Trace-Based Component Performance Prediction. Annual Simulation Symposium 2000: 283-290 - [c10]J. Jenny Li, Joseph Robert Horgan:
chiProf-SDL: A Tool for Identifying Performance Bottlenecks of Software Architectural Design. Computer Performance Evaluation / TOOLS 2000: 378-381 - [c9]J. Jenny Li, Joseph Robert Horgan:
A Tool Suite for Diagnosis and Testing of Software Design Specifications. DSN 2000: 295-304 - [c8]J. Jenny Li, Joseph Robert Horgan:
A tool for efficient protocol validation and testing. ICCCN 2000: 14-17 - [c7]J. Jenny Li, Joseph Robert Horgan:
Using SDL to Model an Object-Oriented Real-Time Software Architectural Design. ISORC 2000: 288-295
1990 – 1999
- 1999
- [j2]J. Jenny Li, Joseph Robert Horgan:
cSuds-SDL: A Tool for Testing Software Architecture Specifications. Softw. Qual. J. 8(4): 241-253 (1999) - [c6]J. Jenny Li, Joseph Robert Horgan:
chi-SUDS-SDL: A Tool for Diagnosis and Understanding Software Specifications. APSEC 1999: 274- - 1998
- [j1]Hiralal Agrawal, James L. Alberi, Joseph Robert Horgan, J. Jenny Li, Saul London, W. Eric Wong, Sudipto Ghosh, Norman Wilde:
Mining System Tests to Aid Software Maintenance. Computer 31(7): 64-73 (1998) - [c5]J. Jenny Li, Joseph R. Horgan:
To maintain a reliable software specification. ISSRE 1998: 59-68 - 1997
- [c4]J. Jenny Li, Hong Liu, Rudolph E. Seviora:
Constructing automated protocol testing oracles to accommodate specification nondeterminism. ICCCN 1997: 532- - [c3]J. Jenny Li, Josephine Micallef, Joseph R. Horgan:
Automatic simulation to predict software architecture reliability. ISSRE 1997: 168-179 - 1996
- [c2]J. Jenny Li, Rudolph E. Seviora:
Automatic failure detection with Conditional-Belief supervisors. ISSRE 1996: 4-13 - 1995
- [c1]M. Hlady, R. Kovacevic, J. Jenny Li, Barry R. Pekilis, D. Prairie, Tony Savor, Rudolph E. Seviora, D. A. Simser, Alexandre Vorobiev:
An approach to automatic detection of software failures. ISSRE 1995: 314-323
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint