-
3
-
-
17044362578
-
Synthesis of interface specifications for java classes
-
R. Alur, P. Cerny, P. Madhusudan, and W. Nam. Synthesis of interface specifications for java classes. In POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 98-109, 2005.
-
(2005)
POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 98-109
-
-
Alur, R.1
Cerny, P.2
Madhusudan, P.3
Nam, W.4
-
5
-
-
0038716505
-
Debugging temporal specifications with concept analysis
-
G. Animons, D. Mandelin, R. Bodik, and J. Larus. Debugging temporal specifications with concept analysis. In PLDI '03: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, pages 182-195, 2003.
-
(2003)
PLDI '03: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation
, pp. 182-195
-
-
Animons, G.1
Mandelin, D.2
Bodik, R.3
Larus, J.4
-
6
-
-
0041734917
-
Design and implementation of a fine-grained software inspection tool
-
August
-
P. Anderson, T. Reps, and T.Teitelbaum. Design and implementation of a fine-grained software inspection tool. IEEE Trans. on Software Engineering, 29(8):721-733, August 2003.
-
(2003)
IEEE Trans. on Software Engineering
, vol.29
, Issue.8
, pp. 721-733
-
-
Anderson, P.1
Reps, T.2
Teitelbaum, T.3
-
7
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
SPIN 2001, Workshop on Model Checking of Software, May
-
T. Ball and S.K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN 2001, Workshop on Model Checking of Software, LNCS 2057, pages 103-122, May 2001.
-
(2001)
LNCS
, vol.2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
8
-
-
33751067991
-
-
B. Blanchet, A. computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, pages 140-154, 2006.
-
B. Blanchet, A. computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, pages 140-154, 2006.
-
-
-
-
9
-
-
34548756901
-
Mafia: A performance study of mining maximal frequent itemsets
-
D. Burdick, M. Calimlim, J. Flannick, J. Gehrke, and T. Yiu. Mafia: A performance study of mining maximal frequent itemsets. In Workshop on Frequent Itemset Mining Implementations (FIMI'03), 2003.
-
(2003)
Workshop on Frequent Itemset Mining Implementations (FIMI'03)
-
-
Burdick, D.1
Calimlim, M.2
Flannick, J.3
Gehrke, J.4
Yiu, T.5
-
12
-
-
0034592773
-
Hancock: A language for extracting signatures from data streams
-
C. Cortes, K. Fisher, D. Pregibon, and A. Rogers. Hancock: a language for extracting signatures from data streams. In KDD '00: Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data mining, pages 9-17, 2000.
-
(2000)
KDD '00: Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data mining
, pp. 9-17
-
-
Cortes, C.1
Fisher, K.2
Pregibon, D.3
Rogers, A.4
-
14
-
-
0038256425
-
Dynamically discovering likely program invariants to support program evolution
-
February
-
M. Ernst, J. Cockrell, W. Griswold, and D. Notkin. Dynamically discovering likely program invariants to support program evolution. IEEE TSE, 27(2): 1-25, February 2001.
-
(2001)
IEEE TSE
, vol.27
, Issue.2
, pp. 1-25
-
-
Ernst, M.1
Cockrell, J.2
Griswold, W.3
Notkin, D.4
-
18
-
-
31844450371
-
Dart: Directed automated random testing
-
Chicago, Il
-
P. Godefroid, N. Klarslund, and K. Sen. Dart: Directed automated random testing. In PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, pages 213-223, Chicago, Il, 2005.
-
(2005)
PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarslund, N.2
Sen, K.3
-
19
-
-
0348220549
-
Discovering all most specific sentences
-
D. Gunopulos, R. Khardon, H. Mannila, S. Saluja, H. Toivonen, and R. Sharma. Discovering all most specific sentences. ACM Transactions on Database Systems, 28:140-174, 2003.
-
(2003)
ACM Transactions on Database Systems
, vol.28
, pp. 140-174
-
-
Gunopulos, D.1
Khardon, R.2
Mannila, H.3
Saluja, S.4
Toivonen, H.5
Sharma, R.6
-
20
-
-
32344438703
-
Permissive interfaces
-
T. Henzinger, R. Jhala, and R. Majumdar. Permissive interfaces. SIGSOFT Softw. Eng. Notes, 30(5):31-40, 2005.
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.5
, pp. 31-40
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
-
23
-
-
77949371828
-
From uncertainty to belief: Inferring the specification within
-
T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In OSDI '06: Proceedings of the 7th Usenix Symposium on Operating Systems Design and Implementation, pages 161-176, 2006.
-
(2006)
OSDI '06: Proceedings of the 7th Usenix Symposium on Operating Systems Design and Implementation
, pp. 161-176
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
24
-
-
24144476280
-
Generalized typestate checking for data structure consistency
-
P. Lam, V. Kuncak, and M. Rinard. Generalized typestate checking for data structure consistency. In VMCAI '05: Proceedings of 6th International Conference on Verification, Model Checking and Abstract Interpretation, pages 430-447, 2005.
-
(2005)
VMCAI '05: Proceedings of 6th International Conference on Verification, Model Checking and Abstract Interpretation
, pp. 430-447
-
-
Lam, P.1
Kuncak, V.2
Rinard, M.3
-
25
-
-
84910009447
-
Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI
-
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI '04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation, pages 289-302, 2004.
-
(2004)
04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation
, pp. 289-302
-
-
Li, Z.1
Lu, S.2
Myagmar, S.3
Zhou, Y.4
-
27
-
-
31844452362
-
Scalable statistical bug isolation
-
Chicago, Illinois
-
B. Liblit, M. Naik, A. Zheng, A. Aiken, and M. Jordan. Scalable statistical bug isolation. In PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, pages 15-26, Chicago, Illinois, 2005.
-
(2005)
PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation
, pp. 15-26
-
-
Liblit, B.1
Naik, M.2
Zheng, A.3
Aiken, A.4
Jordan, M.5
-
29
-
-
31844436753
-
Jungloid mining: Helping to navigate the api jungle
-
D. Mandelin, L. Xu, R. Bodik, and D. Kimelman. Jungloid mining: helping to navigate the api jungle. In PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, pages 48-61, 2005.
-
(2005)
PLDI '05: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation
, pp. 48-61
-
-
Mandelin, D.1
Xu, L.2
Bodik, R.3
Kimelman, D.4
-
30
-
-
0029239054
-
Closure analysis in constraint form
-
J. Palsberg. Closure analysis in constraint form. ACM Trans. Program. Lang. Syst., 17(1):47-62, 1995.
-
(1995)
ACM Trans. Program. Lang. Syst
, vol.17
, Issue.1
, pp. 47-62
-
-
Palsberg, J.1
-
32
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W.S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI '04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation, 2004.
-
(2004)
OSDI '04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.S.6
-
38
-
-
34247116992
-
Perracotta: Mining temporal api rules from imperfect traces
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining temporal api rules from imperfect traces. In ICSE '06: Proceedings of the International Conference on Software Engineering, 2006.
-
(2006)
ICSE '06: Proceedings of the International Conference on Software Engineering
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
39
-
-
84885668018
-
Using model checking to find serious file system errors
-
San Francisco, CA
-
J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In OSDI '04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation, pages 273-288, San Francisco, CA, 2004.
-
(2004)
OSDI '04: Proceedings of the 6th Usenix Symposium on Operating Systems Design and Implementation
, pp. 273-288
-
-
Yang, J.1
Twohey, P.2
Engler, D.3
Musuvathi, M.4
|