메뉴 건너뛰기




Volumn , Issue , 2008, Pages 9-16

Early filtering of polluting method calls for mining temporal specifications

Author keywords

[No Author keywords available]

Indexed keywords

FILTERING TECHNIQUE; HIGH COSTS; RAPID EVOLUTION; SPECIFICATION MINING; TEMPORAL RULES; TEMPORAL SPECIFICATION; VERIFICATION TOOLS;

EID: 67650540857     PISSN: 15301362     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (22)
  • 1
    • 60849122775 scopus 로고    scopus 로고
    • Java tool smithing extending the Eclipse Java Development Tools
    • M. Aeschlimann, D. Baumer, and J. Lanneluc. Java tool smithing extending the Eclipse Java Development Tools. In EclipseCon, 2005.
    • (2005) EclipseCon
    • Aeschlimann, M.1    Baumer, D.2    Lanneluc, J.3
  • 2
    • 0029212693 scopus 로고
    • Mining sequential patterns
    • R. Agrawal and R. Srikant. Mining sequential patterns. In Proc. ICDE, pages 3-14, 1995.
    • (1995) Proc. ICDE , pp. 3-14
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 0038716505 scopus 로고    scopus 로고
    • Debugging temporal specifications with concept analysis
    • G. Ammons, D. Mandelin, R. Bodík, and J. R. Larus. Debugging temporal specifications with concept analysis. In Proc. PLDI, pages 182-195, 2003.
    • (2003) Proc. PLDI , pp. 182-195
    • Ammons, G.1    Mandelin, D.2    Bodík, R.3    Larus, J.R.4
  • 5
    • 0242540443 scopus 로고    scopus 로고
    • Sequential pattern mining using a bitmap representation
    • J. Ayres, J. Flannick, J. Gehrke, and T. Yiu. Sequential pattern mining using a bitmap representation. In Proc. KDD, pages 429-435, 2002.
    • (2002) Proc. KDD , pp. 429-435
    • Ayres, J.1    Flannick, J.2    Gehrke, J.3    Yiu, T.4
  • 9
    • 0036041420 scopus 로고    scopus 로고
    • Bugs as deviant behavior: A general approach to inferring errors in systems code
    • DOI 10.1145/502059.502041
    • D. Engler, D. Chen, and A. Chou. Bugs as inconsistent behavior: A general approach to inferring errors in systems code. In Proc. SOSP, pages 57-72, 2001. (Pubitemid 33612605)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 57-72
    • Engler, D.1    Chen, D.Y.2    Hallem, S.3    Chou, A.4    Chelf, B.5
  • 10
    • 60849083488 scopus 로고
    • Complexity of automatic identification of given data
    • E. Gold. Complexity of automatic identification of given data. Information and Control, 10:447-474, 1978.
    • (1978) Information and Control , vol.10 , pp. 447-474
    • Gold, E.1
  • 11
    • 35448945212 scopus 로고    scopus 로고
    • From uncertainty to belief: Inferring the specification within
    • T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In Proc. OSDI, pages 259-272, 2006.
    • (2006) Proc. OSDI , pp. 259-272
    • Kremenek, T.1    Twohey, P.2    Back, G.3    Ng, A.4    Engler, D.5
  • 12
    • 34547367487 scopus 로고    scopus 로고
    • SMArTIC: Towards building an accurate, robust and scalable specification miner
    • DOI 10.1145/1181775.1181808, 1181808, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
    • D. Lo and S. Khoo. SMArTIC: towards building an accurate, robust and scalable specification miner. In Proc. ESEC/FSE, pages 265-275, 2006. (Pubitemid 47129403)
    • (2006) Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering , pp. 265-275
    • Lo, D.1    Khoo, S.-C.2
  • 14
    • 34548783828 scopus 로고    scopus 로고
    • Pathsensitive inference of function precedence protocols
    • M. Ramanathan, A. Grama, and S. Jagannathan. Pathsensitive inference of function precedence protocols. In Proc. ICSE, pages 240-250, 2007.
    • (2007) Proc. ICSE , pp. 240-250
    • Ramanathan, M.1    Grama, A.2    Jagannathan, S.3
  • 15
    • 24144458954 scopus 로고    scopus 로고
    • Purity and side effect analysis for Java programs
    • Verification, Model Checking, and Abstract Interpretation - 6th International Conference, VMCAI 2005
    • A. Salcianu and M. Rinard. Purity and side effect analysis for Java programs. Proc. VMCAI, pages 199-215, 2005. (Pubitemid 41231362)
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 199-215
    • Salcianu, A.1    Rinard, M.2
  • 16
    • 60849084083 scopus 로고    scopus 로고
    • Static specification mining using automata-based abstractions
    • S. Shoham, E. Yahav, S. Fink, and M. Pistoia. Static specification mining using automata-based abstractions. In Proc. ISSTA, pages 218-228, 2007.
    • (2007) Proc. ISSTA , pp. 218-228
    • Shoham, S.1    Yahav, E.2    Fink, S.3    Pistoia, M.4
  • 19
    • 40449119429 scopus 로고    scopus 로고
    • Privately finding specifications
    • DOI 10.1109/TSE.2007.70744
    • W. Weimer and N. Mishra. Privately finding specifications. IEEE Transactions on Software Engineering, 34(1):21-32, 2008. (Pubitemid 351343900)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 21-32
    • Weimer, W.1    Mishra, N.2
  • 20
    • 24644493674 scopus 로고    scopus 로고
    • Mining temporal specifications for error detection
    • Tools and Algorithms for the Construction and Analysis of Systems - 11th Int. Conference, TACAS 2005, held as part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2005, Proc.
    • W. Weimer and G. Necula. Mining temporal specifications for error detection. In Proc. TACAS, pages 461-476, 2005. (Pubitemid 41273759)
    • (2005) Lecture Notes in Computer Science , vol.3440 , pp. 461-476
    • Weimer, W.1    Necula, G.C.2
  • 21
    • 0036983315 scopus 로고    scopus 로고
    • Automatic extraction of object-oriented component interfaces
    • J. Whaley, M. Martin, and M. Lam. Automatic extraction of object-oriented component interfaces. In Proc. ISSTA, pages 218-228, 2002.
    • (2002) Proc. ISSTA , pp. 218-228
    • Whaley, J.1    Martin, M.2    Lam, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.