-
1
-
-
34247165942
-
A family of test adequacy criteria for database-driven applications
-
ACM
-
G. M. Kapfhammer and M. L. Soffa, "A family of test adequacy criteria for database-driven applications," in Proc. 11th ACM SIGSOFT FSE. ACM, 2003, pp. 98-107.
-
(2003)
Proc. 11th ACM SIGSOFT FSE
, pp. 98-107
-
-
Kapfhammer, G.M.1
Soffa, M.L.2
-
3
-
-
0026867276
-
Specification-based Test Oracles for Reactive Systems
-
D. J. Richardson, S. Leif-Aha, and T. O. O'Malley, "Specification- based Test Oracles for Reactive Systems," in Proceedings of the 14th ICSE, May 1992, pp. 105-118.
-
Proceedings of the 14th ICSE, May 1992
, pp. 105-118
-
-
Richardson, D.J.1
Leif-Aha, S.2
O'Malley, T.O.3
-
4
-
-
0010319740
-
-
New York, NY, USA: John Wiley & Sons, Inc.
-
C. Kaner, J. Bach, and B. Pettichord, Lessons Learned in Software Testing. New York, NY, USA: John Wiley & Sons, Inc., 2001.
-
(2001)
Lessons Learned in Software Testing
-
-
Kaner, C.1
Bach, J.2
Pettichord, B.3
-
6
-
-
85008258390
-
The influence of size and coverage on test suite effectiveness
-
ACM
-
A. S. Namin and J. H. Andrews, "The influence of size and coverage on test suite effectiveness," in Proc. 18th ISSTA. ACM, 2009, pp. 57-68.
-
(2009)
Proc. 18th ISSTA
, pp. 57-68
-
-
Namin, A.S.1
Andrews, J.H.2
-
7
-
-
0031354777
-
Software unit test coverage and adequacy
-
H. Zhu, P. A. V. Hall, and J. H. R. May, "Software unit test coverage and adequacy," ACM Comput. Surv., vol. 29, no. 4, pp. 366-427, 1997.
-
(1997)
ACM Comput. Surv.
, vol.29
, Issue.4
, pp. 366-427
-
-
Zhu, H.1
Hall, P.A.V.2
May, J.H.R.3
-
8
-
-
77955990901
-
-
Working Paper 15703, January [Online]. Available
-
J. T. Alexander, M. Davern, and B. Stevenson, "Inaccurate age and sex data in the census pums files: Evidence and implications," National Bureau of Economic Research, Working Paper 15703, January 2010. [Online]. Available: http://www.nber.org/papers/w15703
-
(2010)
Inaccurate Age and Sex Data in the Census Pums Files: Evidence and Implications
-
-
Alexander, J.T.1
Davern, M.2
Stevenson, B.3
-
9
-
-
79952014468
-
Census bureau obscured personal data - Too well, some say
-
Feb.
-
C. Bialik, "Census bureau obscured personal data - too well, some say," The Wall Street Journal, Feb. 2010.
-
(2010)
The Wall Street Journal
-
-
Bialik, C.1
-
13
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. Knowl. Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
15
-
-
70849095741
-
Anonymized data: Generation, models, usage
-
ACM
-
G. Cormode and D. Srivastava, "Anonymized data: generation, models, usage," in Proc. 35th ACM SIGMOD. ACM, 2009, pp. 1015-1018.
-
(2009)
Proc. 35th ACM SIGMOD
, pp. 1015-1018
-
-
Cormode, G.1
Srivastava, D.2
-
16
-
-
0027029758
-
Undecidability of static analysis
-
W. Landi, "Undecidability of static analysis," ACM Lett. Program. Lang. Syst., vol. 1, no. 4, pp. 323-337, 1992.
-
(1992)
ACM Lett. Program. Lang. Syst.
, vol.1
, Issue.4
, pp. 323-337
-
-
Landi, W.1
-
17
-
-
63749093602
-
Attribute selection in multivariate microaggregation
-
ACM
-
J. Nin, J. Herranz, and V. Torra, "Attribute selection in multivariate microaggregation," in Proc. PAIS. ACM, 2008, pp. 51-60.
-
(2008)
Proc. PAIS
, pp. 51-60
-
-
Nin, J.1
Herranz, J.2
Torra, V.3
-
18
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
IEEE
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Mondrian multidimensional k-anonymity," in Proc. 22nd ICDE. IEEE, 2006, p. 25.
-
(2006)
Proc. 22nd ICDE
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
19
-
-
33749857160
-
Cute and jCute: Concolic unit testing and explicit path model-checking tools
-
Springer, Aug.
-
K. Sen and G. Agha, "Cute and jCute: Concolic unit testing and explicit path model-checking tools," in Proc. CAV. Springer, Aug. 2006, pp. 419-423.
-
(2006)
Proc. CAV
, pp. 419-423
-
-
Sen, K.1
Agha, G.2
-
20
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
21
-
-
0036041041
-
A history-based test prioritization technique for regression testing in resource constrained environments
-
J.-M. Kim and A. A. Porter, "A history-based test prioritization technique for regression testing in resource constrained environments," in ICSE, 2002, pp. 119-129.
-
(2002)
ICSE
, pp. 119-129
-
-
Kim, J.-M.1
Porter, A.A.2
-
22
-
-
0027625420
-
A methodology for controlling the size of a test suite
-
Jul.
-
M. J. Harrold, R. Gupta, and M. L. Soffa, "A methodology for controlling the size of a test suite," ACM Trans. Softw. Eng. Methodol., vol. 2, no. 3, pp. 270-285, Jul. 1993.
-
(1993)
ACM Trans. Softw. Eng. Methodol.
, vol.2
, Issue.3
, pp. 270-285
-
-
Harrold, M.J.1
Gupta, R.2
Soffa, M.L.3
-
23
-
-
56249095536
-
Test-suite augmentation for evolving software
-
R. A. Santelices, P. K. Chittimalli, T. Apiwattanapong, A. Orso, and M. J. Harrold, "Test-suite augmentation for evolving software," in ASE, 2008, pp. 218-227.
-
(2008)
ASE
, pp. 218-227
-
-
Santelices, R.A.1
Chittimalli, P.K.2
Apiwattanapong, T.3
Orso, A.4
Harrold, M.J.5
-
24
-
-
17044394341
-
Chianti: A tool for change impact analysis of java programs
-
X. Ren, F. Shah, F. Tip, B. G. Ryder, and O. Chesley, "Chianti: a tool for change impact analysis of java programs," in OOPSLA, 2004, pp. 432-448.
-
(2004)
OOPSLA
, pp. 432-448
-
-
Ren, X.1
Shah, F.2
Tip, F.3
Ryder, B.G.4
Chesley, O.5
-
25
-
-
77957793391
-
Better bug reporting with better privacy
-
ACM, Mar. [Online]. Available
-
M. Castro, M. Costa, and J.-P. Martin, "Better bug reporting with better privacy," in Proc. 13th ASPLOS. ACM, Mar. 2008, pp. 319-328. [Online]. Available: http://research.microsoft.com/ jpmartin/papers/- Castro08Better.pdf
-
(2008)
Proc. 13th ASPLOS
, pp. 319-328
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
-
26
-
-
31844450371
-
Dart: Directed automated random testing
-
ACM, Jun.
-
P. Godefroid, N. Klarlund, and K. Sen, "Dart: Directed automated random testing," in Proc. ACM SIGPLAN PLDI. ACM, Jun. 2005, pp. 213-223.
-
(2005)
Proc. ACM SIGPLAN PLDI
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
28
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
USENIX, Dec.
-
C. Cadar, D. Dunbar, and D. R. Engler, "Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs," in Proc. 8th USENIX OSDI. USENIX, Dec. 2008, pp. 209-224.
-
(2008)
Proc. 8th USENIX OSDI
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.R.3
-
29
-
-
57349101753
-
DySy: Dynamic symbolic execution for invariant inference
-
ACM, May
-
C. Csallner, N. Tillmann, and Y. Smaragdakis, "DySy: Dynamic symbolic execution for invariant inference," in Proc. 30th ACM/IEEE ICSE. ACM, May 2008, pp. 281-290.
-
(2008)
Proc. 30th ACM/IEEE ICSE
, pp. 281-290
-
-
Csallner, C.1
Tillmann, N.2
Smaragdakis, Y.3
|