-
1
-
-
37849002654
-
Mining API patterns as partial orders from source code: From usage scenarios to specifications
-
M. Acharya, T. Xie, J. Pei, and J. Xu. Mining API patterns as partial orders from source code: from usage scenarios to specifications. In Proceedings of ESEC-FSE '07, 2007.
-
Proceedings of ESEC-FSE '07, 2007
-
-
Acharya, M.1
Xie, T.2
Pei, J.3
Xu, J.4
-
3
-
-
34248160938
-
The DaCapo benchmarks: Java benchmarking development and analysis
-
S. M. Blackburn, R. Garner, C. Hoffman, A. M. Khan, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B. Moss, A. Phansalkar, D. Stefanović, T. VanDrunen, D. von Dincklage, and B. Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. In Proceedings of OOPSLA '06, Oct. 2006.
-
Proceedings of OOPSLA '06, Oct. 2006
-
-
Blackburn, S.M.1
Garner, R.2
Hoffman, C.3
Khan, A.M.4
McKinley, K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, S.Z.10
Hirzel, M.11
Hosking, A.12
Jump, M.13
Lee, H.14
Moss, J.E.B.15
Phansalkar, A.16
Stefanović, D.17
VanDrunen, T.18
Von Dincklage, D.19
Wiedermann, B.20
more..
-
5
-
-
34548210865
-
Finding what's not there: A new approach to revealing neglected conditions in software
-
R.-Y. Chang, A. Podgurski, and J. Yang. Finding what's not there: a new approach to revealing neglected conditions in software. In Proceedings of ISSTA '07, 2007.
-
Proceedings of ISSTA '07, 2007
-
-
Chang, R.-Y.1
Podgurski, A.2
Yang, J.3
-
10
-
-
56249122978
-
Reducing the cost of path property monitoring through sampling
-
M. B. Dwyer, M. Diep, and S. G. Elbaum. Reducing the cost of path property monitoring through sampling. In ASE, 2008.
-
ASE, 2008
-
-
Dwyer, M.B.1
Diep, M.2
Elbaum, S.G.3
-
12
-
-
54249105050
-
Residual dynamic typestate analysis exploiting static analysis: Results to reformulate and reduce the cost of dynamic analysis
-
M. B. Dwyer and R. Purandare. Residual dynamic typestate analysis exploiting static analysis: results to reformulate and reduce the cost of dynamic analysis. In Proceedings of ASE, 2007.
-
Proceedings of ASE, 2007
-
-
Dwyer, M.B.1
Purandare, R.2
-
13
-
-
34748853175
-
Trace anomalies as precursors of field failures: An empirical study
-
S. Elbaum, S. Kanduri, and A. Andrews. Trace anomalies as precursors of field failures: an empirical study. Empirical Softw. Engg., 12(5), 2007.
-
(2007)
Empirical Softw. Engg.
, vol.12
, Issue.5
-
-
Elbaum, S.1
Kanduri, S.2
Andrews, A.3
-
14
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: a general approach to inferring errors in systems code. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, 2001.
-
SOSP '01: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, 2001
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
16
-
-
43449124115
-
Effective typestate verification in the presence of aliasing
-
S. J. Fink, E. Yahav, N. Dor, G. Ramalingam, and E. Geay. Effective typestate verification in the presence of aliasing. ACM Trans. Softw. Eng. Methodol., 17(2), 2008.
-
(2008)
ACM Trans. Softw. Eng. Methodol.
, vol.17
, Issue.2
-
-
Fink, S.J.1
Yahav, E.2
Dor, N.3
Ramalingam, G.4
Geay, E.5
-
17
-
-
77950474436
-
Javert: Fully automatic mining of general temporal properties from dynamic traces
-
M. Gabel and Z. Su. Javert: Fully automatic mining of general temporal properties from dynamic traces. In Proceedings of SIGSOFT '08/FSE-16, 2008.
-
Proceedings of SIGSOFT '08/FSE-16, 2008
-
-
Gabel, M.1
Su, Z.2
-
20
-
-
0036038345
-
Tracking down software bugs using automatic anomaly detection
-
S. Hangal and M. S. Lam. Tracking down software bugs using automatic anomaly detection. In Proceedings of ICSE, 2002.
-
Proceedings of ICSE, 2002
-
-
Hangal, S.1
Lam, M.S.2
-
22
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proceedings of ESEC/FSE-13, 2005.
-
Proceedings of ESEC/FSE-13, 2005
-
-
Li, Z.1
Zhou, Y.2
-
23
-
-
53149140743
-
MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
-
S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. A. Popa, and Y. Zhou. MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In Proceedings of SOSP '07, 2007.
-
Proceedings of SOSP '07, 2007
-
-
Lu, S.1
Park, S.2
Hu, C.3
Ma, X.4
Jiang, W.5
Li, Z.6
Popa, R.A.7
Zhou, Y.8
-
24
-
-
77949373144
-
Graph-based mining of multiple object usage patterns
-
T. T. Nguyen, H. A. Nguyen, N. H. Pham, J. M. Al-Kofahi, and T. N. Nguyen. Graph-based mining of multiple object usage patterns. In Proceedings of ESEC/FSE '09, 2009.
-
Proceedings of ESEC/FSE '09, 2009
-
-
Nguyen, T.T.1
Nguyen, H.A.2
Pham, N.H.3
Al-Kofahi, J.M.4
Nguyen, T.N.5
-
26
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
R. E. Strom and S. Yemini. Typestate: A programming language concept for enhancing software reliability. IEEE Trans. Softw. Eng., 12(1), 1986.
-
(1986)
IEEE Trans. Softw. Eng.
, vol.12
, Issue.1
-
-
Strom, R.E.1
Yemini, S.2
-
29
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining temporal API rules from imperfect traces. In Proceedings of ICSE, 2006.
-
Proceedings of ICSE, 2006
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
|