-
1
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
Engler, D., Chen, D., Hallem, S., Chou, A., Chelf, B.: Bugs as deviant behavior: A general approach to inferring errors in systems code. In: Proceedings of SOSP 2001, vol.35, pp. 57-72 (2001)
-
(2001)
Proceedings of SOSP 2001
, vol.35
, pp. 57-72
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
2
-
-
32344452883
-
Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Li, Z., Zhou, Y.: Pr-miner: automatically extracting implicit programming rules and detecting violations in large software code. SIGSOFT Softw. Eng. Notes 30(5), 306-315 (2005)
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.5
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
3
-
-
32344438116
-
Dynamine: Finding common error patterns by mining software revision histories
-
Livshits, B., Zimmermann, T.: Dynamine: finding common error patterns by mining software revision histories. SIGSOFT Softw. Eng. Notes 30(5), 296-305 (2005)
-
(2005)
SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.5
, pp. 296-305
-
-
Livshits, B.1
Zimmermann, T.2
-
4
-
-
37849020292
-
Detecting object usage anomalies
-
ACM, New York
-
Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. In: Proceedings of ESEC-FSE 2007, pp. 35-44. ACM, New York (2007)
-
(2007)
Proceedings of ESEC-FSE 2007
, pp. 35-44
-
-
Wasylkowski, A.1
Zeller, A.2
Lindig, C.3
-
5
-
-
50649122720
-
Topology analysis of software dependencies
-
Robillard, M.P.: Topology analysis of software dependencies. ACM Trans. Softw. Eng. Methodol. 17(4), 1-36 (2008)
-
(2008)
ACM Trans. Softw. Eng. Methodol.
, vol.17
, Issue.4
, pp. 1-36
-
-
Robillard, M.P.1
-
6
-
-
37849006243
-
Which warnings should i fix first?
-
ACM, New York
-
Kim, S., Ernst, M.D.:Which warnings should i fix first? In: Proceedings of ESEC/FSE, pp. 45-54. ACM, New York (2007)
-
(2007)
Proceedings of ESEC/FSE
, pp. 45-54
-
-
Kim, S.1
Ernst, M.D.2
-
7
-
-
34248185461
-
Understanding the shape of java software
-
ACM, New York
-
Baxter, G., Frean, M., Noble, J., Rickerby, M., Smith, H., Visser, M., Melton, H., Tempero, E.: Understanding the shape of java software. In: Proceedings of OOPSLA. ACM, New York (2006)
-
(2006)
Proceedings of OOPSLA
-
-
Baxter, G.1
Frean, M.2
Noble, J.3
Rickerby, M.4
Smith, H.5
Visser, M.6
Melton, H.7
Tempero, E.8
-
8
-
-
0024621584
-
Formulations and benefits of the law of demeter
-
Lienberherr, K.: Formulations and benefits of the law of demeter. ACM SIGPLAN Notices 24(3), 67-78 (1989)
-
(1989)
ACM SIGPLAN Notices
, vol.24
, Issue.3
, pp. 67-78
-
-
Lienberherr, K.1
-
9
-
-
14544301479
-
Finding bugs is easy
-
Hovemeyer, D., Pugh,W.: Finding bugs is easy. SIGPLAN Not. 39(12), 92-106 (2004)
-
(2004)
SIGPLAN Not.
, vol.39
, Issue.12
, pp. 92-106
-
-
Hovemeyer, D.1
Pugh, W.2
-
10
-
-
12244312166
-
The complexity of mining maximal frequent itemsets and maximal frequent patterns
-
Yang, G.: The complexity of mining maximal frequent itemsets and maximal frequent patterns. In: KDD 2004 (2004)
-
(2004)
KDD 2004
-
-
Yang, G.1
-
11
-
-
0035250541
-
Dynamically discovering likely program invariants to support program evolution
-
Ernst, M.D., Cockrell, J., Griswold, W., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. IEEE Transactions on Software Engineering 27(2), 99-123 (2001)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.2
, pp. 99-123
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.3
Notkin, D.4
-
13
-
-
43449101485
-
Dsd-crasher: A hybrid analysis tool for bug finding
-
Csallner, C., Smaragdakis, Y., Xie, T.: Dsd-crasher: A hybrid analysis tool for bug finding. ACM Trans. Softw. Eng. Methodol. 17(2), 1-37 (2008)
-
(2008)
ACM Trans. Softw. Eng. Methodol.
, vol.17
, Issue.2
, pp. 1-37
-
-
Csallner, C.1
Smaragdakis, Y.2
Xie, T.3
-
14
-
-
34247116992
-
Perracotta:mining temporal api rules from imperfect traces
-
ACM, New York
-
Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta:mining temporal api rules from imperfect traces. In: ICSE 2006: Proceedings of the 28th international conference on Software engineering, pp. 282-291. ACM, New York (2006)
-
(2006)
ICSE 2006: Proceedings of the 28th International Conference on Software Engineering
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
15
-
-
26444471878
-
Lightweight defect localization for java
-
Black, A.P. (ed.) ECOOP 2005. Springer, Heidelberg
-
Dallmeier, V., Lindig, C., Zeller, A.: Lightweight defect localization for java. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol.3586, pp. 528-550. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3586
, pp. 528-550
-
-
Dallmeier, V.1
Lindig, C.2
Zeller, A.3
-
16
-
-
24344496977
-
Automatic mining of source code repositories to improve bug finding techniques
-
Williams, C.C., Hollingsworth, J.K.: Automatic mining of source code repositories to improve bug finding techniques. IEEE Transactions on Software Engineering 31(6), 466-480 (2005)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.6
, pp. 466-480
-
-
Williams, C.C.1
Hollingsworth, J.K.2
-
17
-
-
34548210865
-
Finding what's not there: A new approach to revealing neglected conditions in software
-
Chang, R.-Y., Podgurski, A., Yang, J.: Finding what's not there: A new approach to revealing neglected conditions in software. In: Proceedings of ISSTA 2007 (2007)
-
(2007)
Proceedings of ISSTA 2007
-
-
Chang, R.-Y.1
Podgurski, A.2
Yang, J.3
|