메뉴 건너뛰기




Volumn , Issue , 2011, Pages 131-140

Static extraction of program configuration options

Author keywords

configuration; documentation; experiences; static analysis

Indexed keywords

CONFIGURATION; CONFIGURATION OPTIONS; EXPERIENCES; LINES OF CODE; OPEN SOURCES;

EID: 79959900039     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985793.1985812     Document Type: Conference Paper
Times cited : (106)

References (32)
  • 1
    • 79959874882 scopus 로고    scopus 로고
    • Apache Derby. http://db.apache.org/derby/.
  • 2
    • 79959883925 scopus 로고    scopus 로고
    • HBase. http://hbase.apache.org/.
  • 6
    • 79959860486 scopus 로고    scopus 로고
    • Abstract parsing: Static analysis of dynamically generated string output using lr-parsing technology
    • K.-G. Doh, H. Kim, and D. A. Schmidt. Abstract parsing: Static analysis of dynamically generated string output using lr-parsing technology. In Symposium on Static Analysis, 2009.
    • Symposium on Static Analysis, 2009
    • Doh, K.-G.1    Kim, H.2    Schmidt, D.A.3
  • 8
    • 79953889531 scopus 로고    scopus 로고
    • Tuning database configuration parameters with iTuned
    • S. Duan, V. Thummala, and S. Babu. Tuning database configuration parameters with iTuned. VLDB, 2009.
    • (2009) VLDB
    • Duan, S.1    Thummala, V.2    Babu, S.3
  • 9
    • 79959865827 scopus 로고    scopus 로고
    • Hadoop. http://hadoop.apache.org/.
  • 10
    • 0031642547 scopus 로고    scopus 로고
    • Using static single assignment form to improve flow-insensitive pointer analysis
    • R. Hasti and S. Horwitz. Using static single assignment form to improve flow-insensitive pointer analysis. In PLDI, 1998.
    • (1998) PLDI
    • Hasti, R.1    Horwitz, S.2
  • 13
    • 53349161146 scopus 로고    scopus 로고
    • ConfErr: A tool for assessing resilience to human configuration errors
    • L. Keller, P. Upadhyaya, and G. Candea. ConfErr: A tool for assessing resilience to human configuration errors. In DSN, 2008.
    • (2008) DSN
    • Keller, L.1    Upadhyaya, P.2    Candea, G.3
  • 15
    • 0003093390 scopus 로고    scopus 로고
    • Design recovery by automated search for structural design patterns in object-oriented software
    • C. Kramer and L. Prechelt. Design recovery by automated search for structural design patterns in object-oriented software. In Working Conference on Reverse Engineering, 1996.
    • Working Conference on Reverse Engineering, 1996
    • Kramer, C.1    Prechelt, L.2
  • 16
    • 77949371828 scopus 로고    scopus 로고
    • From uncertainty to belief: Inferring the specification within
    • T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: inferring the specification within. In OSDI, 2006.
    • (2006) OSDI
    • Kremenek, T.1    Twohey, P.2    Back, G.3    Ng, A.4    Engler, D.5
  • 17
    • 62949138847 scopus 로고    scopus 로고
    • Cassandra: A Structured Storage System on a P2P Network
    • A. Lakshman, P. Malik, and K. Ranganathan. Cassandra: A Structured Storage System on a P2P Network. In SIGMOD, 2008.
    • (2008) SIGMOD
    • Lakshman, A.1    Malik, P.2    Ranganathan, K.3
  • 18
    • 0242578047 scopus 로고    scopus 로고
    • How software engineers use documentation: The state of the practice
    • T. Lethbridge, J. Singer, and A. Forward. How software engineers use documentation: The state of the practice. IEEE software, pages 35-39, 2003.
    • (2003) IEEE Software , pp. 35-39
    • Lethbridge, T.1    Singer, J.2    Forward, A.3
  • 23
    • 79959866124 scopus 로고    scopus 로고
    • M. Naik. JChord. http://jchord.googlecode.com.
    • Naik, M.1
  • 24
    • 77954702589 scopus 로고    scopus 로고
    • Using symbolic evaluation to understand behavior in configurable software systems
    • E. Reisner, C. Song, K. Ma, J. Foster, and A. Porter. Using symbolic evaluation to understand behavior in configurable software systems. In ICSE, 2010.
    • (2010) ICSE
    • Reisner, E.1    Song, C.2    Ma, K.3    Foster, J.4    Porter, A.5
  • 25
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware, 2001.
    • (2001) Middleware
    • Rowstron, A.1    Druschel, P.2
  • 26
    • 77954699809 scopus 로고    scopus 로고
    • Expect the unexpected: Error code mismatches between documentation and the real world
    • C. Rubio-González and B. Liblit. Expect the unexpected: error code mismatches between documentation and the real world. In PASTE, 2010.
    • (2010) PASTE
    • Rubio-González, C.1    Liblit, B.2
  • 27
    • 65049083334 scopus 로고    scopus 로고
    • Improving static resolution of dynamic class loading in java using dynamically gathered environment information
    • J. Sawin and A. Rountev. Improving static resolution of dynamic class loading in java using dynamically gathered environment information. In Automated Software Engineering, 2009.
    • (2009) Automated Software Engineering
    • Sawin, J.1    Rountev, A.2
  • 30
    • 70449956042 scopus 로고    scopus 로고
    • Autobash: Improving configuration management with operating system causality analysis
    • Y.-Y. Su, M. Attariyan, and J. Flinn. Autobash: improving configuration management with operating system causality analysis. In SOSP, 2007.
    • (2007) SOSP
    • Su, Y.-Y.1    Attariyan, M.2    Flinn, J.3
  • 31
    • 50649093917 scopus 로고    scopus 로고
    • Triage: Diagnosing production run failures at the user's site
    • J. Tucek, S. Lu, C. Huang, S. Xanthos, and Y. Zhou. Triage: diagnosing production run failures at the user's site. In SOSP, 2007.
    • (2007) SOSP
    • Tucek, J.1    Lu, S.2    Huang, C.3    Xanthos, S.4    Zhou, Y.5
  • 32
    • 70349276979 scopus 로고    scopus 로고
    • Towards automatic reverse engineering of software security configurations
    • R. Wang, X. Wang, K. Zhang, and Z. Li. Towards automatic reverse engineering of software security configurations. In CCS, 2008.
    • (2008) CCS
    • Wang, R.1    Wang, X.2    Zhang, K.3    Li, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.