Fadi Wedyan
Fadi Wedyan
Associate Professor, Department of Software Engineering, Hashemite University , Zarqa, 13315
Verified email at hu.edu.jo
Title
Cited by
Cited by
Year
The effectiveness of automated static analysis tools for fault detection and refactoring prediction
F Wedyan, D Alrmuny, JM Bieman
2009 International Conference on Software Testing Verification and …, 2009
502009
Cell phone-based system (Chaak) for surveillance of immatures of dengue virus mosquito vectors
S Lozano–Fuentes, F Wedyan, E Hernandez–Garcia, D Sadhu, S Ghosh, ...
Journal of medical entomology 50 (4), 879-889, 2013
292013
Robust resource allocation in a massive multiplayer online gaming environment
LD Briceņo, HJ Siegel, AA Maciejewski, Y Hong, B Lock, MN Teli, ...
Proceedings of the 4th International Conference on Foundations of Digital …, 2009
242009
A dataflow testing approach for aspect-oriented programs
F Wedyan, S Ghosh
2010 IEEE 12th International Symposium on High Assurance Systems Engineering …, 2010
212010
On generating mutants for AspectJ programs
F Wedyan, S Ghosh
Information and Software Technology 54 (8), 900-914, 2012
182012
An Approach for the Generation of Higher Order Mutants Using Genetic Algorithms
A Abuljadayel, F Wedyan
International Journal of Intelligent Systems and Applications(IJISA) 10 (1 …, 2018
152018
An approach and tool for measurement of state variable based data-flow test coverage for aspect-oriented programs
F Wedyan, S Ghosh, LR Vijayasarathy
Information and Software Technology 59, 233-254, 2015
132015
A joinpoint coverage measurement tool for evaluating the effectiveness of test inputs for aspectj programs
F Wedyan, S Ghosh
2008 19th International Symposium on Software Reliability Engineering (ISSRE …, 2008
92008
An Associative Classification Data Mining Approach for Detecting Phishing Websites
S Wedyan, F Wedyan
Journal of Emerging Trends in Computing and Information Sciences 4 (12), 2013
72013
Resource allocation in a client/server system for massive multi-player online games
LD Briceno, HJ Siegel, AA Maciejewski, Y Hong, B Lock, C Panaccione, ...
IEEE Transactions on Computers 63 (12), 3127-3142, 2013
72013
Using Cell Phones for Mosquito Vector Surveillance and Control.
S Lozano-Fuentes, S Ghosh, JM Bieman, D Sadhu, L Eisen, F Wedyan, ...
SEKE, 763-767, 2012
72012
Resource allocation in a client/server hybrid network for virtual world environments
LD Briceno, HJ Siegel, AA Maciejewski, Y Hong, B Lock, MN Teli, ...
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-13, 2008
72008
JoGuide: A mobile augmented reality application for locating and describing surrounding sites
F Wedyan, R Freihat, I Aloqily, S Wedyan
Proc. 9th Int. Conf. Adv. Comput.-Human Interactions, 2016
32016
Testing with state variable data-flow criteria for aspect-oriented programs
F Wedyan
2000-2019-CSU Theses and Dissertations, 2011
22011
Domain Analysis of Formal Model Checking Tools
F Wedyan, R Freihat, S Wedyan, H Bani-Salameh, H Yousef
International Conference on Engineering and Technology (ICET), 1-4, 2017
12017
INVESTIGATING THE RELATIONSHIP BETWEEN SOFTWARE DEFECT DENSITY AND COST ESTIMATION DRIVERS: AN EMPIRICAL STUDY.
F Wedyan, H Bani-Salameh, W Al-Ajlouni, S Al-Manai
Journal of Theoretical & Applied Information Technology 82 (3), 446-453, 2015
12015
Impact of Design Patterns on Software Quality: A Systematic Literature Review
F Wedyan, S Abufakher
IET Software 14 (1), 1-17, 2019
2019
Toward An Empirical Study to investigate the size-defect Relationship Using ISBSG Repository
F Wedyan, S Al-Manai, W Al-Ajlouni
Proceedings of the International Conference on Intelligent Information …, 2015
2015
CodeRoid: a Framework for Generating Java Sourcecode Using Tablets and Smartphones
F Wedyan, HB Salameh, S Wedyan
Second International Conference on Advances in Information Processing and …, 2015
2015
An Evaluation Model for Social Development Environments
H Bani-Salameh, S Alwidian, M Hammad, F Wedyan
International Journal of Software Engineering and Its Applications 8 (1 …, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20