Detecting resource leaks through dynamical mining of resource usage patterns
暂无分享,去创建一个
[1] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[2] Benjamin Livshits,et al. DynaMine: finding common error patterns by mining software revision histories , 2005, ESEC/FSE-13.
[3] Amir Michail,et al. Data mining library reuse patterns using generalized association rules , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[4] George C. Necula,et al. Mining Temporal Specifications for Error Detection , 2005, TACAS.
[5] Jonathan I. Maletic,et al. An approach to mining call-usage patternswith syntactic context , 2007, ASE.
[6] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[7] Siau-Cheng Khoo,et al. SMArTIC: towards building an accurate, robust and scalable specification miner , 2006, SIGSOFT '06/FSE-14.
[8] Chadd C. Williams,et al. Automatic mining of source code repositories to improve bug finding techniques , 2005, IEEE Transactions on Software Engineering.
[9] Zhendong Su,et al. Symbolic mining of temporal specifications , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[10] Jian Pei,et al. MAPO: mining API usages from open source repositories , 2006, MSR '06.
[11] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[12] Manuvir Das,et al. Perracotta: mining temporal API rules from imperfect traces , 2006, ICSE.
[13] Dawson R. Engler,et al. From uncertainty to belief: inferring the specification within , 2006, OSDI '06.
[14] Tao Xie,et al. Inferring Resource Specifications from Natural Language API Documentation , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[15] Atsushi Igarashi,et al. Resource usage analysis , 2002, POPL '02.
[16] Jian Pei,et al. Mining API patterns as partial orders from source code: from usage scenarios to specifications , 2007, ESEC-FSE '07.
[17] Zhongming Wu,et al. An Empirical Study of Data Mining Code Defect Patterns in Large Software Repositories , 2009 .