Mining Control Flow Abnormality for Logic Error Isolation
暂无分享,去创建一个
[1] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[2] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[3] Benjamin Livshits,et al. DynaMine: finding common error patterns by mining software revision histories , 2005, ESEC/FSE-13.
[4] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[5] Gregg Rothermel,et al. An empirical investigation of program spectra , 1998, PASTE '98.
[6] Gregg Rothermel,et al. Empirical Studies of a Safe Regression Test Selection Technique , 1998, IEEE Trans. Software Eng..
[7] Yuanyuan Zhou,et al. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.
[8] Prabhakar Raghavan,et al. A Linear Method for Deviation Detection in Large Databases , 1996, KDD.
[9] Yuriy Brun,et al. Finding latent code errors via machine learning over program executions , 2004, Proceedings. 26th International Conference on Software Engineering.
[10] Bruce Elliott,et al. Testing Computer Software , 1994 .
[11] Bin Wang,et al. Automated support for classifying software failure reports , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[12] A. Zeller. Isolating cause-effect chains from computer programs , 2002, SIGSOFT '02/FSE-10.
[13] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[14] Thomas J. Ostrand,et al. Experiments on the effectiveness of dataflow- and control-flow-based test adequacy criteria , 1994, Proceedings of 16th International Conference on Software Engineering.
[15] David Leon,et al. Finding failures by cluster analysis of execution profiles , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[16] Raymond T. Ng,et al. Distance-based outliers: algorithms and applications , 2000, The VLDB Journal.
[17] Chao Liu,et al. SOBER: statistical model-based bug localization , 2005, ESEC/FSE-13.
[18] Klaus Havelund,et al. Model Checking Programs , 2004, Automated Software Engineering.
[19] James M. Rehg,et al. Active learning for automatic classification of software behavior , 2004, ISSTA '04.
[20] RothermelGregg,et al. Empirical Studies of a Safe Regression Test Selection Technique , 1998 .
[21] Philip S. Yu,et al. Outlier detection for high dimensional data , 2001, SIGMOD '01.
[22] Yuanyuan Zhou,et al. Mining block correlations to improve storage performance , 2005, TOS.
[23] Sigrid Eldh. Software Testing Techniques , 2007 .
[24] Chao Liu,et al. Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs , 2005, SDM.
[25] Xifeng Yan,et al. CloSpan: Mining Closed Sequential Patterns in Large Datasets , 2003, SDM.
[26] Phyllis G. Frankl,et al. Further empirical studies of test effectiveness , 1998, SIGSOFT '98/FSE-6.
[27] Gerard J. Holzmann,et al. Economics of software verification , 2001, PASTE '01.
[28] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.