-
1
-
-
72749095310
-
The Ariane 5 software failure
-
M. Dowson, "The Ariane 5 software failure," SIGSOFT Softw. Eng. Notes, vol. 22, no. 2, p. 84, 1997.
-
(1997)
SIGSOFT Softw. Eng. Notes
, vol.22
, Issue.2
, pp. 84
-
-
Dowson, M.1
-
2
-
-
35448996514
-
Practical memory leak detection using guarded value-flow analysis
-
S. Cherem, L. Princehouse, and R. Rugina, "Practical memory leak detection using guarded value-flow analysis," SIGPLAN Not., vol. 42, no. 6, pp. 480-491, 2007.
-
(2007)
SIGPLAN Not.
, vol.42
, Issue.6
, pp. 480-491
-
-
Cherem, S.1
Princehouse, L.2
Rugina, R.3
-
3
-
-
49449093324
-
Do crosscutting concerns cause defects?
-
M. Eaddy, T. Zimmermann, K. D. Sherwood, V. Garg, G. C. Murphy, N. Nagappan, and A. V. Aho, "Do crosscutting concerns cause defects?" IEEE Trans. Softw. Eng., vol. 34, no. 4, pp. 497-515, 2008.
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.4
, pp. 497-515
-
-
Eaddy, M.1
Zimmermann, T.2
Sherwood, K.D.3
Garg, V.4
Murphy, G.C.5
Nagappan, N.6
Aho, A.V.7
-
4
-
-
33244495360
-
Context-sensitive program analysis as database queries
-
M. S. Lam, J. Whaley, V. B. Livshits, M. C. Martin, D. Avots, M. Carbin, and C. Unkel, "Context-sensitive program analysis as database queries," in PODS '05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, 2005, pp. 1-12.
-
PODS '05: Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2005
, pp. 1-12
-
-
Lam, M.S.1
Whaley, J.2
Livshits, V.B.3
Martin, M.C.4
Avots, D.5
Carbin, M.6
Unkel, C.7
-
5
-
-
0020736536
-
Complexity of analyzing the synchronization structure of concurrent programs
-
R. N. Taylor, "Complexity of analyzing the synchronization structure of concurrent programs," Acta Informatica, vol. 19, no. 1, pp. 57-84, 1983.
-
(1983)
Acta Informatica
, vol.19
, Issue.1
, pp. 57-84
-
-
Taylor, R.N.1
-
6
-
-
84888548305
-
-
"Klocwork k7," http://www.klocwork.com/.
-
Klocwork K7
-
-
-
7
-
-
47249162470
-
-
"Coverity prevent," http://www.coverity.com/products/coverity- prevent.html.
-
Coverity Prevent
-
-
-
8
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem, "Checking system rules using system-specific, programmer-written compiler extensions," in OSDI'00: Proceedings of the 4th conference on Symposium on Operating System Design & Implementation, 2000, pp. 1-1.
-
OSDI'00: Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation, 2000
, pp. 1-1
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
9
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
Jan/Feb
-
D. Evans and D. Larochelle, "Improving security using extensible lightweight static analysis," Software, IEEE, vol. 19, no. 1, pp. 42-51, Jan/Feb 2002.
-
(2002)
Software, IEEE
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
12
-
-
38849096440
-
Specification of software component requirements using the trace function method
-
C. Quinn, S. Vilkomir, D. Parnas, and S. Kostic, "Specification of software component requirements using the trace function method," in ICSEA '06: Proceedings of the International Conference on Software Engineering Advances, 2006, p. 50.
-
ICSEA '06: Proceedings of the International Conference on Software Engineering Advances, 2006
, pp. 50
-
-
Quinn, C.1
Vilkomir, S.2
Parnas, D.3
Kostic, S.4
-
13
-
-
34247330209
-
Testing, abstraction, theorem proving: Better together!
-
G. Yorsh, T. Ball, and M. Sagiv, "Testing, abstraction, theorem proving: better together!" in ISSTA '06: Proceedings of the 2006 international symposium on Software testing and analysis, 2006, pp. 145-156.
-
ISSTA '06: Proceedings of the 2006 International Symposium on Software Testing and Analysis, 2006
, pp. 145-156
-
-
Yorsh, G.1
Ball, T.2
Sagiv, M.3
|