-
1
-
-
70349434052
-
Frequent pattern-growth approach for document organization
-
M. Akbar and R. Angryk. Frequent pattern-growth approach for document organization. In CIKM '08, pages 77-82, 2008.
-
(2008)
CIKM '08
, pp. 77-82
-
-
Akbar, M.1
Angryk, R.2
-
2
-
-
33745432231
-
LibX - A firefox extension for enhanced library access
-
A. Bailey and G. Back. LibX - a Firefox extension for enhanced library access. Library Hi Tech, 24(2):290-304, 2006.
-
(2006)
Library Hi Tech
, vol.24
, Issue.2
, pp. 290-304
-
-
Bailey, A.1
Back, G.2
-
3
-
-
33846521634
-
Bell: Bit-encoding online memory leak detection
-
M. Bond and K. McKinley. Bell: bit-encoding online memory leak detection. In ASPLOS-XII '06, pages 61-72, 2006.
-
(2006)
ASPLOS-XII '06
, pp. 61-72
-
-
Bond, M.1
McKinley, K.2
-
4
-
-
63549090530
-
Tolerating memory leaks
-
M. Bond and K. McKinley. Tolerating memory leaks. In OOPSLA '08, pages 109-126, 2008.
-
(2008)
OOPSLA '08
, pp. 109-126
-
-
Bond, M.1
McKinley, K.2
-
5
-
-
85008256270
-
Identifying bug signatures using discriminative graph mining
-
New York, NY, USA
-
H. Cheng, D. Lo, Y. Zhou, X. Wang, and X. Yan. Identifying bug signatures using discriminative graph mining. In ISSTA '09, pages 141-152, New York, NY, USA, 2009.
-
(2009)
ISSTA '09
, pp. 141-152
-
-
Cheng, H.1
Lo, D.2
Zhou, Y.3
Wang, X.4
Yan, X.5
-
6
-
-
52649163329
-
Direct discriminative pattern mining for effective classification
-
H. Cheng, X. Yan, J. Han, and P. Yu. Direct discriminative pattern mining for effective classification. In ICDE '07, pages 169-178, 2008.
-
(2008)
ICDE '07
, pp. 169-178
-
-
Cheng, H.1
Yan, X.2
Han, J.3
Yu, P.4
-
7
-
-
49749102365
-
GApprox: Mining frequent approximate patterns from a massive network
-
C. Chent, X. Yan, F. Zhu, and J. Han. gApprox: Mining frequent approximate patterns from a massive network. In ICDM '07, pages 445-450, 2007.
-
(2007)
ICDM '07
, pp. 445-450
-
-
Chent, C.1
Yan, X.2
Zhu, F.3
Han, J.4
-
8
-
-
35448996514
-
Practical memory leak detection using guarded value-flow analysis
-
S. Cherem, L. Princehouse, and R. Rugina. Practical memory leak detection using guarded value-flow analysis. In PLDI '07, pages 480-491, 2007.
-
(2007)
PLDI '07
, pp. 480-491
-
-
Cherem, S.1
Princehouse, L.2
Rugina, R.3
-
9
-
-
0027652468
-
Substructure discovery using minimum description length and background knowledge
-
D. Cook and L. Holder. Substructure discovery using minimum description length and background knowledge. JAIR, 1:231-255, 1994.
-
(1994)
JAIR
, vol.1
, pp. 231-255
-
-
Cook, D.1
Holder, L.2
-
11
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD '00, pages 1-12, 2000.
-
(2000)
SIGMOD '00
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
12
-
-
0000596666
-
Purify: A tool for detecting memory leaks and access errors in c and c++ programs
-
R. Hastings and B. Joyce. Purify: A tool for detecting memory leaks and access errors in c and c++ programs. In Winter USENIX Conference, pages 125-138, 1992.
-
(1992)
Winter USENIX Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
13
-
-
12344327721
-
Low-overhead memory leak detection using adaptive statistical profiling
-
M. Hauswirth and T. Chilimbi. Low-overhead memory leak detection using adaptive statistical profiling. In ASPLOS-XI '04, pages 156-164, 2004.
-
(2004)
ASPLOS-XI '04
, pp. 156-164
-
-
Hauswirth, M.1
Chilimbi, T.2
-
14
-
-
1442337850
-
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
-
D. Heine and M. Lam. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In PLDI '03, pages 168-181, 2003.
-
(2003)
PLDI '03
, pp. 168-181
-
-
Heine, D.1
Lam, M.2
-
15
-
-
32844460819
-
MDL-based context-free graph grammar induction and applications
-
I. Jonyer, L. Holder, and D. Cook. MDL-based context-free graph grammar induction and applications. IJAIT, 13(1):65-79, 2004.
-
(2004)
IJAIT
, vol.13
, Issue.1
, pp. 65-79
-
-
Jonyer, I.1
Holder, L.2
Cook, D.3
-
16
-
-
34548259241
-
Cork: Dynamic memory leak detection for garbage-collected languages
-
M. Jump and K. McKinley. Cork: dynamic memory leak detection for garbage-collected languages. In POPL '07, pages 31-38, 2007.
-
(2007)
POPL '07
, pp. 31-38
-
-
Jump, M.1
McKinley, K.2
-
18
-
-
78149312583
-
Frequent subgraph discovery
-
M. Kuramochi and G. Karypis. Frequent subgraph discovery. In ICDM '01, pages 313-320, 2001.
-
(2001)
ICDM '01
, pp. 313-320
-
-
Kuramochi, M.1
Karypis, G.2
-
19
-
-
84976651458
-
A fast algorithm for finding dominators in a flowgraph
-
T. Lengauer and R. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst., 1(1):121-141, 1979.
-
(1979)
ACM Trans. Program. Lang. Syst.
, vol.1
, Issue.1
, pp. 121-141
-
-
Lengauer, T.1
Tarjan, R.2
-
20
-
-
84880122671
-
Mining behavior graphs for "backtrace" of noncrashing bugs
-
C. Liu, X. Yan, H. Yu, J. Han, and P. Yu. Mining behavior graphs for "backtrace" of noncrashing bugs. In SDM '05, pages 286-297.
-
SDM '05
, pp. 286-297
-
-
Liu, C.1
Yan, X.2
Yu, H.3
Han, J.4
Yu, P.5
-
21
-
-
47349083499
-
The runtime structure of object ownership
-
D. Thomas, editor
-
N. Mitchell. The runtime structure of object ownership. In D. Thomas, editor, ECOOP '06, 2006.
-
(2006)
ECOOP '06
-
-
Mitchell, N.1
-
22
-
-
33746632902
-
LeakBot: An automated and lightweight tool for diagnosing memory leaks in large java applications
-
N. Mitchell and G. Sevitsky. LeakBot: An automated and lightweight tool for diagnosing memory leaks in large java applications. In ECOOP '03, 2003.
-
(2003)
ECOOP '03
-
-
Mitchell, N.1
Sevitsky, G.2
-
23
-
-
42149169980
-
The causes of bloat, the limits of health
-
N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. In OOPSLA '07, pages 245-260, 2007.
-
(2007)
OOPSLA '07
, pp. 245-260
-
-
Mitchell, N.1
Sevitsky, G.2
-
24
-
-
67650085819
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI '07, pages 89-100, 2007.
-
(2007)
PLDI '07
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
25
-
-
33749842455
-
Memory leak analysis by contradiction
-
Springer
-
M. Orlovich and R. Rugina. Memory leak analysis by contradiction. In Lecture Notes in Computer Science, volume 4134, pages 405-424. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4134
, pp. 405-424
-
-
Orlovich, M.1
Rugina, R.2
-
26
-
-
0034499541
-
Visualizing reference patterns for solving memory leaks in java
-
W. De Pauw and G. Sevitsky. Visualizing reference patterns for solving memory leaks in java. Concurrency - Practice and Experience, 12(14):1431-1454, 2000.
-
(2000)
Concurrency - Practice and Experience
, vol.12
, Issue.14
, pp. 1431-1454
-
-
De Pauw, W.1
Sevitsky, G.2
-
27
-
-
84917687527
-
Fault localization with nearest neighbor queries
-
M. Renieris and S. Reiss. Fault localization with nearest neighbor queries. In ASE '03, pages 30-39, 2003.
-
(2003)
ASE '03
, pp. 30-39
-
-
Renieris, M.1
Reiss, S.2
-
29
-
-
77954022242
-
Program, enhance thyself! demand-driven pattern-oriented program enhancement
-
April
-
E. Tilevich and G. Back. Program, enhance thyself! demand-driven pattern-oriented program enhancement. In AOSD '08, pages 13-24, April 2008.
-
(2008)
AOSD '08
, pp. 13-24
-
-
Tilevich, E.1
Back, G.2
-
30
-
-
34547674949
-
Memtracker: Efficient and programmable support for memory access monitoring and debugging
-
G. Venkataramani, B. Roemer, Y. Solihin, and M. Prvulovic. Memtracker: Efficient and programmable support for memory access monitoring and debugging. In HPCA '07, pages 273-284, 2007.
-
(2007)
HPCA '07
, pp. 273-284
-
-
Venkataramani, G.1
Roemer, B.2
Solihin, Y.3
Prvulovic, M.4
-
31
-
-
69449096143
-
Data mining for software engineering
-
Aug
-
T. Xie, S. Thummalapenta, D. Lo, and C. Liu. Data Mining for Software Engineering. IEEE Computer, Vol. 42(8):35-42, Aug 2009.
-
(2009)
IEEE Computer
, vol.42
, Issue.8
, pp. 35-42
-
-
Xie, T.1
Thummalapenta, S.2
Lo, D.3
Liu, C.4
-
32
-
-
32344440613
-
Context- and path-sensitive memory leak detection
-
Y. Xie and A. Aiken. Context- and path-sensitive memory leak detection. In ESEC/FSE-13, pages 115-125, 2005.
-
(2005)
ESEC/FSE-13
, pp. 115-125
-
-
Xie, Y.1
Aiken, A.2
-
33
-
-
67650714764
-
Precise memory leak detection for java software using container profiling
-
G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In ICSE '08, pages 151-160, 2008.
-
(2008)
ICSE '08
, pp. 151-160
-
-
Xu, G.1
Rountev, A.2
-
34
-
-
57149124218
-
Mining significant graph patterns by leap search
-
X. Yan, H. Cheng, J. Han, and P. Yu. Mining significant graph patterns by leap search. In SIGMOD '08, pages 433-444, 2008.
-
(2008)
SIGMOD '08
, pp. 433-444
-
-
Yan, X.1
Cheng, H.2
Han, J.3
Yu, P.4
-
35
-
-
78149333073
-
GSpan: Graph-based substructure pattern mining
-
X. Yan and J. Han. gSpan: graph-based substructure pattern mining. In ICDM '02, pages 721-724, 2002.
-
(2002)
ICDM '02
, pp. 721-724
-
-
Yan, X.1
Han, J.2
-
36
-
-
77952334885
-
CloseGraph: Mining closed frequent graph patterns
-
956784
-
X. Yan and J. Han. CloseGraph: mining closed frequent graph patterns. In SIGKDD '03, pages 286-295, 2003. 956784.
-
(2003)
SIGKDD '03
, pp. 286-295
-
-
Yan, X.1
Han, J.2
-
37
-
-
34547455408
-
Out-of-core coherent closed quasi-clique mining from large dense graph databases
-
Z. Zeng, J. Wang, L. Zhou, and G. Karypis. Out-of-core coherent closed quasi-clique mining from large dense graph databases. ACM TODS, 32(2), 2007.
-
(2007)
ACM TODS
, vol.32
, Issue.2
-
-
Zeng, Z.1
Wang, J.2
Zhou, L.3
Karypis, G.4
|