Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs
暂无分享,去创建一个
Mark Harman | Paolo Tonella | Yue Jia | Alessandro Marchetto | Duy Cu Nguyen | Kiran Lakhotia | P. Tonella | M. Harman | Yue Jia | A. Marchetto | Kiran Lakhotia
[1] Yuriy Brun,et al. Using dynamic execution traces and program invariants to enhance behavioral model inference , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[2] Leonardo Mariani,et al. Dynamic Detection of COTS Component Incompatibility , 2007, IEEE Software.
[3] Sriram Raghavan,et al. Regular Expression Learning for Information Extraction , 2008, EMNLP.
[4] Steven P. Reiss,et al. Encoding program executions , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[5] DebK.,et al. A fast and elitist multiobjective genetic algorithm , 2002 .
[6] Leonardo Mariani,et al. Automated Identification of Failure Causes in System Logs , 2008, 2008 19th International Symposium on Software Reliability Engineering (ISSRE).
[7] Jerome A. Feldman,et al. On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.
[8] Stefan C. Kremer,et al. Inducing Grammars from Sparse Data Sets: A Survey of Algorithms and Results , 2003, J. Mach. Learn. Res..
[9] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[10] Neil Walkinshaw,et al. A framework for the competitive evaluation of model inference techniques , 2010, MIIT '10.
[11] Aurélien Lemay,et al. Learning regular languages using RFSAs , 2004, Theor. Comput. Sci..
[12] Paolo Tonella,et al. State-Based Testing of Ajax Web Applications , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.
[13] Andreas Zeller,et al. Mining object behavior with ADABU , 2006, WODA '06.
[14] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[15] Christoph C. Michael,et al. Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report , 2000, Recent Advances in Intrusion Detection.
[16] Alexander L. Wolf,et al. Discovering models of software processes from event-based data , 1998, TSEM.
[17] Marijn J. H. Heule,et al. Exact DFA Identification Using SAT Solvers , 2010, ICGI.
[18] Rajesh Parekh,et al. Grammar Inference Automata Induction and Language Acquisition , 2005 .
[19] Leonardo Mariani,et al. Automatic generation of software behavioral models , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[20] J. Feldman,et al. Learning Automata from Ordered Examples , 1991 .
[21] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[22] Paolo Tonella,et al. Search-Based Testing of Ajax Web Applications , 2009, 2009 1st International Symposium on Search Based Software Engineering.