DynaMine: Finding Usage Patterns and Their Violations by Mining Software Repositories
暂无分享,去创建一个
[1] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[2] Manuvir Das,et al. Perracotta: mining temporal API rules from imperfect traces , 2006, ICSE.
[3] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[4] Benjamin Livshits,et al. DynaMine: finding common error patterns by mining software revision histories , 2005, ESEC/FSE-13.
[5] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[6] Andreas Zeller,et al. Lightweight Defect Localization for Java , 2005, ECOOP.
[7] Chadd C. Williams,et al. Automatic mining of source code repositories to improve bug finding techniques , 2005, IEEE Transactions on Software Engineering.
[8] Chadd C. Williams,et al. Recovering system specific rules from software repositories , 2005, MSR '05.
[9] George C. Necula,et al. Mining Temporal Specifications for Error Detection , 2005, TACAS.
[10] G. Brat,et al. Precise and Scalable Static Program Analysis of NASA Flight Software , 2005, 2005 IEEE Aerospace Conference.
[11] Pavol Cerný,et al. Synthesis of interface specifications for Java classes , 2005, POPL '05.
[12] Andreas Zeller,et al. Mining Version Histories to Guide Software Changes , 2004 .
[13] Gail C. Murphy,et al. Predicting source code changes by mining change history , 2004, IEEE Transactions on Software Engineering.
[14] D. T. Lee,et al. Securing web application code by static analysis and runtime protection , 2004, WWW '04.
[15] Dewayne E. Perry,et al. Towards Understanding the Rhetoric of Small Changes , 2004, MSR.
[16] Serge Demeyer,et al. Mining Version Control Systems for FACs (Frequently Applied Changes) , 2004, MSR.
[17] Thomas Zimmermann,et al. Preprocessing CVS Data for Fine-Grained Analysis , 2004, MSR.
[18] Harald C. Gall,et al. Analyzing and relating bug report data for feature tracking , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[19] E. James Whitehead,et al. Identification of software instabilities , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[20] Oleg Sokolsky,et al. Electronic Notes in Theoretical Computer Science: Preface , 2003 .
[21] Harald C. Gall,et al. CVS release history data for detecting logical couplings , 2003, Sixth International Workshop on Principles of Software Evolution, 2003. Proceedings..
[22] Andreas Zeller,et al. How history justifies system architecture (or not) , 2003, Sixth International Workshop on Principles of Software Evolution, 2003. Proceedings..
[23] Patrick Lam,et al. A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information , 2003, ECOOP.
[24] Patrick Cousot,et al. A static analyzer for large safety-critical software , 2003, PLDI.
[25] James M. Bieman,et al. Understanding change-proneness in OO software through visualization , 2003, 11th IEEE International Workshop on Program Comprehension, 2003..
[26] Monica S. Lam,et al. A practical flow-sensitive and context-sensitive C and C++ memory leak detector , 2003, PLDI '03.
[27] Monica S. Lam,et al. Automatic extraction of object-oriented component interfaces , 2002, ISSTA '02.
[28] Dawson R. Engler,et al. A system and language for building system-specific, static analyses , 2002, PLDI '02.
[29] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[30] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[31] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[32] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[33] Amir Michail,et al. Data mining library reuse patterns using generalized association rules , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[34] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[35] Amir Michail,et al. Data mining library reuse patterns in user-selected applications , 1999, 14th IEEE International Conference on Automated Software Engineering.
[36] William G. Griswold,et al. Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[37] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[38] Harald C. Gall,et al. Detection of logical coupling based on product release history , 1998, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272).
[39] Michael Burrows,et al. Eraser: a dynamic data race detector for multi-threaded programs , 1997, TOCS.
[40] Heikki Mannila,et al. Efficient Algorithms for Discovering Association Rules , 1994, KDD Workshop.