메뉴 건너뛰기




Volumn 12, Issue 5, 2007, Pages 447-469

Trace anomalies as precursors of field failures: An empirical study

Author keywords

Anomaly detection; Deployed software analysis; Empirical study; Trace analysis

Indexed keywords

ALGORITHMS; FAILURE ANALYSIS;

EID: 34748853175     PISSN: 13823256     EISSN: 15737616     Source Type: Journal    
DOI: 10.1007/s10664-007-9042-8     Document Type: Article
Times cited : (9)

References (38)
  • 2
    • 0021122553 scopus 로고
    • Software errors and complexity: An empirical investigation
    • 1
    • Basili V, Perricone B, (1984) Software errors and complexity: an empirical investigation. Commun ACM 27(1):42-52
    • (1984) Commun ACM , vol.27 , pp. 42-52
    • Basili, V.1    Perricone, B.2
  • 3
    • 0034205795 scopus 로고    scopus 로고
    • A comprehensive evaluation of capture-recapture models for estimating software defect content
    • 6
    • Briand L, Emam KE, Freimut B, Laitenberger, O (2000) A comprehensive evaluation of capture-recapture models for estimating software defect content. IEEE Trans Softw Eng 26(6):234-244
    • (2000) IEEE Trans Softw Eng , vol.26 , pp. 234-244
    • Briand, L.1    Emam, K.E.2    Freimut, B.3    Laitenberger, O.4
  • 6
    • 26044480846 scopus 로고    scopus 로고
    • Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact
    • 4
    • Do H, Elbaum S, Rothermel G (2005) Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Empirical Softw Eng 10(4):405-435
    • (2005) Empirical Softw Eng , vol.10 , pp. 405-435
    • Do, H.1    Elbaum, S.2    Rothermel, G.3
  • 11
    • 0034226738 scopus 로고    scopus 로고
    • Predicting fault incidence using software change history
    • 7
    • Graves T, Karr A, Marron J, Siy H (2000) Predicting fault incidence using software change history. IEEE Trans Softw Eng 26(7):653-661
    • (2000) IEEE Trans Softw Eng , vol.26 , pp. 653-661
    • Graves, T.1    Karr, A.2    Marron, J.3    Siy, H.4
  • 15
    • 1542699271 scopus 로고    scopus 로고
    • IEEE Computer Society The Institute of Electrical and Electronic Engineers New York
    • IEEE Computer Society (2002) (ed) IEEE standard classification for software anomalies, pp 1044-1993. The Institute of Electrical and Electronic Engineers, New York
    • (2002) IEEE Standard Classification for Software Anomalies , pp. 1044-1993
  • 18
    • 0025384365 scopus 로고
    • Predicting software development errors using complexity metrics
    • 2
    • Khoshgoftaar T, Munson J (1990) Predicting software development errors using complexity metrics. IEEE J Sel Areas Commun 8(2):253-261
    • (1990) IEEE J Sel Areas Commun , vol.8 , pp. 253-261
    • Khoshgoftaar, T.1    Munson, J.2
  • 21
    • 20344372824 scopus 로고    scopus 로고
    • Building a better backtrace: Techniques for postmortem program analysis
    • University of California-Berkely
    • Liblit B, Aiken A (2002) Building a better backtrace: techniques for postmortem program analysis. Technical Report UCB/CSD:-02-1203, University of California-Berkely
    • (2002) Technical Report UCB/CSD:-02-1203
    • Liblit, B.1    Aiken, A.2
  • 27
    • 34748859469 scopus 로고    scopus 로고
    • Software faults, software failures, software reliability modeling
    • 2
    • Musa, J (1996) Software faults, software failures, software reliability modeling. IEEE Softw 6(2):85-91
    • (1996) IEEE Softw , vol.6 , pp. 85-91
    • Musa, J.1
  • 32
    • 84880858814 scopus 로고    scopus 로고
    • Why 6? defining the operational limits of stide, an anomaly-based intrusion detector
    • Tan K, Maxion R (2002) Why 6? defining the operational limits of stide, an anomaly-based intrusion detector. In: Proceedings of the symposium on security and privacy, pp 188-201
    • (2002) Proceedings of the Symposium on Security and Privacy , pp. 188-201
    • Tan, K.1    Maxion, R.2
  • 36
    • 0027702760 scopus 로고
    • Assessing software designs using capture-recapture methods
    • 11
    • Wiel VS, Votta L (1993) Assessing software designs using capture-recapture methods. IEEE Trans Softw Eng 19(11):1045-1054
    • (1993) IEEE Trans Softw Eng , vol.19 , pp. 1045-1054
    • Wiel, V.S.1    Votta, L.2
  • 37
    • 0029515734 scopus 로고
    • An experimental evaluation of capture-recapture in software inspections
    • 4
    • Wohlin C, Runeson P (1995) An experimental evaluation of capture-recapture in software inspections. Softw Test Verif Reliab 5(4):213-232
    • (1995) Softw Test Verif Reliab , vol.5 , pp. 213-232
    • Wohlin, C.1    Runeson, P.2
  • 38
    • 0024073337 scopus 로고
    • An analysis of several software defect models
    • 9
    • Yu T, Shen V, Dunsmore H (1988) An analysis of several software defect models. IEEE Trans Softw Eng 14(9):1261-1270
    • (1988) IEEE Trans Softw Eng , vol.14 , pp. 1261-1270
    • Yu, T.1    Shen, V.2    Dunsmore, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.