-
1
-
-
37849002654
-
Mining API patterns as partial orders from source code: From usage scenarios to specifications
-
M. Acharya, T. Xie, J. Pei, and J. Xu, "Mining API patterns as partial orders from source code: from usage scenarios to specifications," Proc. ESEC/FSE, 2007, pp. 25-34.
-
Proc. ESEC/FSE, 2007
, pp. 25-34
-
-
Acharya, M.1
Xie, T.2
Pei, J.3
Xu, J.4
-
2
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," Proc. VLDB, 1994, pp. 487-499.
-
Proc. VLDB, 1994
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
79551665779
-
Performance analysis of idle programs
-
E. Altman, M. Arnold, S. Fink, and N. Mitchell, "Performance analysis of idle programs," Proc. OOPSLA, 2010, pp. 739-753.
-
Proc. OOPSLA, 2010
, pp. 739-753
-
-
Altman, E.1
Arnold, M.2
Fink, S.3
Mitchell, N.4
-
4
-
-
0036038253
-
Mining specifications
-
G. Ammons, R. Bodik, and J.R. Larus, "Mining specifications," Proc. POPL, 2002, pp. 4-16.
-
Proc. POPL, 2002
, pp. 4-16
-
-
Ammons, G.1
Bodik, R.2
Larus, J.R.3
-
5
-
-
35048884256
-
Finding and removing performance bottlenecks in large systems
-
G. Ammons, J.-D. Choi, M. Gupta, and N. Swamy, "Finding and removing performance bottlenecks in large systems," Proc. ECOOP, 2004, pp. 170-194.
-
Proc. ECOOP, 2004
, pp. 170-194
-
-
Ammons, G.1
Choi, J.-D.2
Gupta, M.3
Swamy, N.4
-
6
-
-
34548210865
-
Finding what's not there: A new approach to revealing neglected conditions in software
-
R.-Y. Chang, A. Podgurski, and J. Yang, "Finding what's not there: a new approach to revealing neglected conditions in software," Proc. ISSTA, 2007, pp. 163-173.
-
Proc. ISSTA, 2007
, pp. 163-173
-
-
Chang, R.-Y.1
Podgurski, A.2
Yang, J.3
-
7
-
-
79959572813
-
Code clone detection experience at Microsoft
-
Y. Dang, S. Ge, R. Huang, and D. Zhang, "Code clone detection experience at Microsoft," Proc. IWSC, 2011, pp. 63-64.
-
Proc. IWSC, 2011
, pp. 63-64
-
-
Dang, Y.1
Ge, S.2
Huang, R.3
Zhang, D.4
-
8
-
-
0034997451
-
Finding failures by cluster analysis of execution profiles
-
W. Dickinson, D. Leon, and A. Podgurski, "Finding failures by cluster analysis of execution profiles," Proc. ICSE, 2001, pp. 339-348.
-
Proc. ICSE, 2001
, pp. 339-348
-
-
Dickinson, W.1
Leon, D.2
Podgurski, A.3
-
9
-
-
72249113391
-
Debugging in the (very) large: Ten years of implementation and experience
-
K. Glerum, K. Kinshumann, S. Greenberg, G. Aul, V. Orgovan, G. Nichols, D. Grant, G. Loihle, and G. Hunt, "Debugging in the (very) large: ten years of implementation and experience," Proc. SOSP, 2009, pp. 103-116.
-
Proc. SOSP, 2009
, pp. 103-116
-
-
Glerum, K.1
Kinshumann, K.2
Greenberg, S.3
Aul, G.4
Orgovan, V.5
Nichols, G.6
Grant, D.7
Loihle, G.8
Hunt, G.9
-
10
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software codes
-
Z. Li and Y. Zhou, "PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software codes," Proc. ESEC/FSE, 2005, pp. 306-315.
-
Proc. ESEC/FSE, 2005
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
11
-
-
0038716503
-
Bug isolation via remote program sampling
-
B. Liblit, A. Aiken, A. X. Zheng, and M. I. Jordan, "Bug isolation via remote program sampling," Proc. PLDI, 2003, pp. 141-154.
-
Proc. PLDI, 2003
, pp. 141-154
-
-
Liblit, B.1
Aiken, A.2
Zheng, A.X.3
Jordan, M.I.4
-
12
-
-
60849125713
-
Sourcerer: Mining and searching internet-scale software repositories
-
Apr.
-
E. Linstead, S. K. Bajracharya, T. C. Ngo, P. Rigor, C. V. Lopes, and P. Baldi, "Sourcerer: mining and searching internet-scale software repositories," Data Min. Knowl. Discov., vol.18, no.2, Apr. 2009, pp. 300-336.
-
(2009)
Data Min. Knowl. Discov.
, vol.18
, Issue.2
, pp. 300-336
-
-
Linstead, E.1
Bajracharya, S.K.2
Ngo, T.C.3
Rigor, P.4
Lopes, C.V.5
Baldi, P.6
-
13
-
-
57349167281
-
Automatic generation of software behavioral models
-
D. Lorenzoli, L. Mariani, and M. Pezzè, "Automatic generation of software behavioral models," Proc. ICSE, 2008, pp. 501-510.
-
Proc. ICSE, 2008
, pp. 501-510
-
-
Lorenzoli, D.1
Mariani, L.2
Pezzè, M.3
-
14
-
-
0036980108
-
Gamma system: Continuous evolution of software after deployment
-
A. Orso, D. Liang, M. J. Harrold, and R. J. Lipton, "Gamma system: continuous evolution of software after deployment," Proc. ISSTA, 2002, pp. 65-69.
-
Proc. ISSTA, 2002
, pp. 65-69
-
-
Orso, A.1
Liang, D.2
Harrold, M.J.3
Lipton, R.J.4
-
15
-
-
34547137910
-
Skoll: A process and infrastructure for distributed continuous quality assurance
-
Aug.
-
A. A. Porter, C. Yilmaz, A. M. Memon, D. C. Schmidt, and B. Natarajan, "Skoll: A process and infrastructure for distributed continuous quality assurance," IEEE Trans. Software Eng., vol.33, no.8, Aug. 2007, pp. 510-525.
-
(2007)
IEEE Trans. Software Eng.
, vol.33
, Issue.8
, pp. 510-525
-
-
Porter, A.A.1
Yilmaz, C.2
Memon, A.M.3
Schmidt, D.C.4
Natarajan, B.5
-
16
-
-
34548783828
-
Path-sensitive inference of function precedence protocols
-
M.K. Ramanathan, A. Grama, and S. Jagannathan, "Path-sensitive inference of function precedence protocols," Proc. ICSE, 2007, pp. 240-250.
-
Proc. ICSE, 2007
, pp. 240-250
-
-
Ramanathan, M.K.1
Grama, A.2
Jagannathan, S.3
-
17
-
-
0032075067
-
Learning string-edit distance
-
May
-
E. S. Ristad and P. N. Yianilos, "Learning string-edit distance," IEEE Trans. PAMI, vol.20, no.5, May 1998, pp.522-532.
-
(1998)
IEEE Trans. PAMI
, vol.20
, Issue.5
, pp. 522-532
-
-
Ristad, E.S.1
Yianilos, P.N.2
-
18
-
-
57349115239
-
Mining framework usage changes from instantiation code
-
T. Schäfer, J. Jonas, and M. Mezini, "Mining framework usage changes from instantiation code," Proc. ICSE, 2008, pp. 471-480.
-
Proc. ICSE, 2008
, pp. 471-480
-
-
Schäfer, T.1
Jonas, J.2
Mezini, M.3
-
19
-
-
0035007190
-
An information exploration tool for performance analysis of Java programs
-
G. Sevitsky, W. De Pauw, and R. Konuru, "An information exploration tool for performance analysis of Java programs," Proc. TOOLS Euro, 2001, pp. 85-101.
-
Proc. TOOLS Euro, 2001
, pp. 85-101
-
-
Sevitsky, G.1
De Pauw, W.2
Konuru, R.3
-
20
-
-
32344438702
-
Summarizing application performance from a components perspective
-
K. Srinivas and H. Srinivasan, "Summarizing application performance from a components perspective," Proc. ESEC/FSE, 2005, pp. 136-145.
-
Proc. ESEC/FSE, 2005
, pp. 136-145
-
-
Srinivas, K.1
Srinivasan, H.2
-
21
-
-
77952148651
-
Alattin: Mining alternative patterns for detecting neglected conditions
-
S. Thummalapenta and T. Xie, "Alattin: mining alternative patterns for detecting neglected conditions," Proc. ASE, 2009, pp. 283-294.
-
Proc. ASE, 2009
, pp. 283-294
-
-
Thummalapenta, S.1
Xie, T.2
-
22
-
-
69449108102
-
Mining exception-handling rules as sequence association rules
-
S. Thummalapenta and T. Xie, "Mining exception-handling rules as sequence association rules," Proc. ICSE, 2009, pp. 496-506.
-
Proc. ICSE, 2009
, pp. 496-506
-
-
Thummalapenta, S.1
Xie, T.2
-
23
-
-
2442446148
-
BIDE: Efficient mining of frequent closed sequences
-
J. Wang and J. Han, "BIDE: Efficient mining of frequent closed sequences," Proc. ICDE, 2004, pp. 79-90.
-
Proc. ICDE, 2004
, pp. 79-90
-
-
Wang, J.1
Han, J.2
-
24
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das, "Perracotta: mining temporal API rules from imperfect traces," Proc. ICSE, 2006, pp. 282-291.
-
Proc. ICSE, 2006
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
25
-
-
84864238065
-
-
http://channel9.msdn.com/Blogs/Charles/Inside-Windows-7-Reliability- Performance-and-PerfTrack
-
-
-
-
26
-
-
84864203207
-
-
http://en.wikipedia.org/wiki/DTrace
-
-
-
-
27
-
-
84864266305
-
-
http://en.wikipedia.org/wiki/Wait-for-graph
-
-
-
-
28
-
-
84864231941
-
-
http://msdn.microsoft.com/enus/library/windows/desktop/bb968803(v=vs.85). aspx
-
-
-
-
29
-
-
84864231947
-
-
http://research.csc.ncsu.edu/ase/projects/perfanalysis/
-
-
-
|