-
1
-
-
37849002654
-
Mining API patterns as partial orders from source code: From usage scenarios to specifications
-
Acharya, M., Xie, T., Pei, J., Xu, J.: Mining API patterns as partial orders from source code: From usage scenarios to specifications. In: Proc. 7th ESEC/FSE, pp. 25-34 (2007)
-
(2007)
Proc. 7th ESEC/FSE
, pp. 25-34
-
-
Acharya, M.1
Xie, T.2
Pei, J.3
Xu, J.4
-
4
-
-
29144521934
-
Synthesis of interface specifications for Java classes
-
Alur, R., Černỳ, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for Java classes. In: Proc. 32nd POPL, pp. 98-109 (2005)
-
(2005)
Proc. 32nd POPL
, pp. 98-109
-
-
Alur, R.1
Černỳ, P.2
Madhusudan, P.3
Nam, W.4
-
5
-
-
0036038253
-
Mining specifications
-
Ammons, G., Bodik, R., Larus, J.R.: Mining specifications. In: Proc. 29th POPL, pp. 4-16 (2002)
-
(2002)
Proc. 29th POPL
, pp. 4-16
-
-
Ammons, G.1
Bodik, R.2
Larus, J.R.3
-
6
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
Angluin, D.: Learning regular sets from queries and counterexamples. Information and Computation 75(2), 87-106 (1987)
-
(1987)
Information and Computation
, vol.75
, Issue.2
, pp. 87-106
-
-
Angluin, D.1
-
7
-
-
0242540443
-
Sequential pattern mining using a bitmap representation
-
Ayres, J., Flannick, J., Gehrke, J., Yiu, T.: Sequential pattern mining using a bitmap representation. In: Proc. 8th KDD, pp. 429-435 (2002)
-
(2002)
Proc. 8th KDD
, pp. 429-435
-
-
Ayres, J.1
Flannick, J.2
Gehrke, J.3
Yiu, T.4
-
8
-
-
34548269492
-
FrUiT: IDE support for framework understanding
-
Bruch, M., Schäfer, T., Mezini, M.: FrUiT: IDE support for framework understanding. In: Proc. 4th ETX, pp. 55-59 (2006)
-
(2006)
Proc. 4th ETX
, pp. 55-59
-
-
Bruch, M.1
Schäfer, T.2
Mezini, M.3
-
9
-
-
34548210865
-
Finding what's not there: A new approach to revealing neglected conditions in software
-
Chang, R., Podgurski, A., Yang, J.: Finding what's not there: a new approach to revealing neglected conditions in software. In: Proc. ISSTA, pp. 163-173 (2007)
-
(2007)
Proc. ISSTA
, pp. 163-173
-
-
Chang, R.1
Podgurski, A.2
Yang, J.3
-
10
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
Engler, D., Chen, D.Y., Hallem, S., Chou, A., Chelf, B.: Bugs as deviant behavior: a general approach to inferring errors in systems code. In: Proc. 8th SOSP, pp. 57-72 (2001)
-
(2001)
Proc. 8th SOSP
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
11
-
-
77950474436
-
Javert: Fully automatic mining of general temporal properties from dynamic traces
-
Gabel, M., Su, Z.: Javert: fully automatic mining of general temporal properties from dynamic traces. In: Proc. 16th FSE, pp. 339-349 (2008)
-
(2008)
Proc. 16th FSE
, pp. 339-349
-
-
Gabel, M.1
Su, Z.2
-
12
-
-
69949140166
-
-
Google Code Search Engine (2008), http://www.google.com/codesearch
-
(2008)
-
-
-
14
-
-
32344438703
-
Permissive interfaces
-
Henzinger, T., Jhala, R., Majumdar, R.: Permissive interfaces. In: Proc. 5th ESEC/FSE, pp. 31-40 (2005)
-
(2005)
Proc. 5th ESEC/FSE
, pp. 31-40
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
-
15
-
-
33244490514
-
Using structural context to recommend source code examples
-
Holmes, R., Murphy, G.C.: Using structural context to recommend source code examples. In: Proc. 27th ICSE, pp. 117-125 (2005)
-
(2005)
Proc. 27th ICSE
, pp. 117-125
-
-
Holmes, R.1
Murphy, G.C.2
-
16
-
-
33947312500
-
Approximate structural context matching: An approach to recommend relevant examples
-
Holmes, R., Walker, R.J., Murphy, G.C.: Approximate structural context matching: An approach to recommend relevant examples. IEEE Transactions on Software Engineering 32(12), 952-970 (2006)
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.12
, pp. 952-970
-
-
Holmes, R.1
Walker, R.J.2
Murphy, G.C.3
-
18
-
-
84893405732
-
Data clustering: A review
-
Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Computing Surveys 31(3), 264-323 (1999)
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
19
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Li, Z., Zhou, Y.: PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In: Proc. 5th ESEC/FSE, pp. 306-315 (2005)
-
(2005)
Proc. 5th ESEC/FSE
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
20
-
-
32344438116
-
Dynamine: Finding common error patterns by mining software revision histories
-
Livshits, V.B., Zimmermann, T.: Dynamine: Finding common error patterns by mining software revision histories. In: Proc. 5th ESEC/FSE, pp. 296-305 (2005)
-
(2005)
Proc. 5th ESEC/FSE
, pp. 296-305
-
-
Livshits, V.B.1
Zimmermann, T.2
-
21
-
-
34547367487
-
SMArTIC: Towards building an accurate, robust and scalable specification miner
-
Lo, D., Khoo, S.: SMArTIC: towards building an accurate, robust and scalable specification miner. In: Proc. 6th ESEC/FSE, pp. 265-275 (2006)
-
(2006)
Proc. 6th ESEC/FSE
, pp. 265-275
-
-
Lo, D.1
Khoo, S.2
-
22
-
-
31844436753
-
Jungloid mining: Helping to navigate the API jungle
-
Mandelin, D., Xu, L., Bodik, R., Kimelman, D.: Jungloid mining: helping to navigate the API jungle. In: Proc. PLDI, pp. 48-61 (2005)
-
(2005)
Proc. PLDI
, pp. 48-61
-
-
Mandelin, D.1
Xu, L.2
Bodik, R.3
Kimelman, D.4
-
24
-
-
33746191941
-
Recommending library methods: An evaluation of the vector space model (VSM) and latent semantic indexing (LSI)
-
McCarey, F., Cinnéide, M. Ó., Kushmerick, N.: Recommending library methods: An evaluation of the vector space model (VSM) and latent semantic indexing (LSI). In: Proc. 9th ICSR, pp. 217-230 (2006)
-
(2006)
Proc. 9th ICSR
, pp. 217-230
-
-
McCarey, F.1
Cinnéide, M.O.2
Kushmerick, N.3
-
25
-
-
0033725593
-
Data mining library reuse patterns using generalized association rules
-
Michail, A.: Data mining library reuse patterns using generalized association rules. In: Proc. 22nd ICSE, pp. 167-176 (2000)
-
(2000)
Proc. 22nd ICSE
, pp. 167-176
-
-
Michail, A.1
-
26
-
-
34547337753
-
Work experience versus refactoring to design patterns: A controlled experiment
-
Ng, T., Cheung, S., Chan, W., Yu, Y.: Work experience versus refactoring to design patterns: a controlled experiment. In: Proc. 6th ESEC/FSE, pp. 12-22 (2006)
-
(2006)
Proc. 6th ESEC/FSE
, pp. 12-22
-
-
Ng, T.1
Cheung, S.2
Chan, W.3
Yu, Y.4
-
27
-
-
34548783828
-
Path-sensitive inference of function precedence protocols
-
Ramanathan, M.K., Grama, A., Jagannathan, S.: Path-sensitive inference of function precedence protocols. In: Proc. 29th ICSE, pp. 240-250 (2007)
-
(2007)
Proc. 29th ICSE
, pp. 240-250
-
-
Ramanathan, M.K.1
Grama, A.2
Jagannathan, S.3
-
28
-
-
0035009421
-
Encoding Program Executions
-
Reiss, S., Renieris, M.: Encoding Program Executions. In: Proc. 23rd ICSE, pp. 221-230 (2001)
-
(2001)
Proc. 23rd ICSE
, pp. 221-230
-
-
Reiss, S.1
Renieris, M.2
-
29
-
-
37849052833
-
Recommending random walks
-
Saul, Z.M., Filkov, V., Devanbu, P., Bird, C.: Recommending random walks. In: Proc. 7th ESEC/FSE, pp. 15-24 (2007)
-
(2007)
Proc. 7th ESEC/FSE
, pp. 15-24
-
-
Saul, Z.M.1
Filkov, V.2
Devanbu, P.3
Bird, C.4
-
30
-
-
60849117733
-
Why are APIs difficult to learn and use?
-
Scaffidi, C.: Why are APIs difficult to learn and use? Crossroads 12(4), 4-4 (2005)
-
(2005)
Crossroads
, vol.12
, Issue.4
, pp. 4-4
-
-
Scaffidi, C.1
-
31
-
-
34548219459
-
Static specification mining using automata-based abstractions
-
Shoham, S., Yahav, E., Fink, S., Pistoia, M.: Static specification mining using automata-based abstractions. In: Proc. ISSTA, pp. 174-184 (2007)
-
(2007)
Proc. ISSTA
, pp. 174-184
-
-
Shoham, S.1
Yahav, E.2
Fink, S.3
Pistoia, M.4
-
33
-
-
51049123306
-
PARSEWeb: A programmer assistant for reusing open source code on the web
-
Thummalapenta, S., Xie, T.: PARSEWeb: A programmer assistant for reusing open source code on the web. In: Proc. 22nd ASE, pp. 204-213 (2007)
-
(2007)
Proc. 22nd ASE
, pp. 204-213
-
-
Thummalapenta, S.1
Xie, T.2
-
34
-
-
37849020292
-
Detecting object usage anomalies
-
Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. In: Proc. 7th ESEC/FSE, pp. 35-44 (2007)
-
(2007)
Proc. 7th ESEC/FSE
, pp. 35-44
-
-
Wasylkowski, A.1
Zeller, A.2
Lindig, C.3
-
35
-
-
24644493674
-
Mining temporal specifications for error detection
-
Halbwachs, N, Zuck, L.D, eds, TACAS 2005, Springer, Heidelberg
-
Weimer, W., Necula, G.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 461-476. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3440
, pp. 461-476
-
-
Weimer, W.1
Necula, G.2
-
36
-
-
0036983315
-
Automatic extraction of object-oriented component interfaces
-
Whaley, J., Martin, M., Lam, M.: Automatic extraction of object-oriented component interfaces. In: Proc. ISSTA, pp. 218-228 (2002)
-
(2002)
Proc. ISSTA
, pp. 218-228
-
-
Whaley, J.1
Martin, M.2
Lam, M.3
-
37
-
-
85088066547
-
Recovering system specific rules from software repositories
-
Williams, C.C., Hollingsworth, J.K.: Recovering system specific rules from software repositories. In: Proc. 2nd MSR, pp. 1-5 (2005)
-
(2005)
Proc. 2nd MSR
, pp. 1-5
-
-
Williams, C.C.1
Hollingsworth, J.K.2
-
38
-
-
77953967695
-
MAPO: Mining API usages from open source repositories
-
Xie, T., Pei, J.: MAPO: Mining API usages from open source repositories. In: Proc. 3rd MSR, pp. 54-57 (2006)
-
(2006)
Proc. 3rd MSR
, pp. 54-57
-
-
Xie, T.1
Pei, J.2
-
39
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: mining temporal API rules from imperfect traces. In: Proc. 28th ICSE, pp. 282-291 (2006)
-
(2006)
Proc. 28th ICSE
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
|