Three Views of Log Trace Triaging
暂无分享,去创建一个
[1] Nadia Tawbi,et al. Execution monitoring enforcement under memory-limitation constraints , 2008, Inf. Comput..
[2] Leon Henkin,et al. The completeness of the first-order functional calculus , 1949, Journal of Symbolic Logic.
[3] Danièle Beauquier,et al. Languages and Scanners , 1991, Theor. Comput. Sci..
[4] Robert A. Wagner,et al. Order-n correction for regular languages , 1974, CACM.
[5] Kishor S. Trivedi,et al. A Classification of Software Faults , 2011 .
[6] Arie van Deursen,et al. Visualizing Testsuites to Aid in Software Understanding , 2006, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[7] Kevin W. Hamlen,et al. Model-Checking In-Lined Reference Monitors , 2010, VMCAI.
[8] Jun Yan,et al. Automatic Bug Triage using Semi-Supervised Text Classification , 2017, SEKE.
[9] Yann-Gaël Guéhéneuc,et al. Automatic Generation of Detection Algorithms for Design Defects , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).
[10] Edward Y. Chang,et al. The Safety-Progress Classification , 1993 .
[11] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[12] Gail C. Murphy,et al. Scaling an object-oriented system execution visualizer through sampling , 2003, 11th IEEE International Workshop on Program Comprehension, 2003..
[13] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[14] Peter H. Carstensen,et al. Let's Talk About Bugs! , 1995, Scand. J. Inf. Syst..
[15] Philip W. L. Fong. Access control by tracking shallow execution history , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[16] Tevfik Bultan,et al. Automatically computing path complexity of programs , 2015, ESEC/SIGSOFT FSE.
[17] Martin Leucker,et al. A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..
[18] Henryk Krawczyk,et al. Classification of software defects in parallel programs , 2007 .
[19] Stefan Wagner,et al. Defect classification and defect types revisited , 2008, DEFECTS '08.
[20] Bowen Alpern,et al. Recognizing safety and liveness , 2005, Distributed Computing.
[21] Martin Leucker,et al. Comparing LTL Semantics for Runtime Verification , 2010, J. Log. Comput..
[22] Adrian Kuhn,et al. Exploiting the Analogy Between Traces and Signal Processing , 2006, 2006 22nd IEEE International Conference on Software Maintenance.
[23] Gerard J. Holzmann,et al. An improvement in formal verification , 1994, FORTE.
[24] L. Moonen,et al. On Large Execution Traces and Trace Abstraction Techniques , 2008 .
[25] Jan Friso Groote,et al. An Efficient Algorithm for Branching Bisimulation and Stuttering Equivalence , 1990, ICALP.
[26] Kenneth Magel,et al. Efficient Bug Triaging Using Text Mining , 2013, J. Softw..
[27] Naresh Kumar Nagwani,et al. CLUBAS: An Algorithm and Java Based Tool for Software Bug Classification Using Bug Attributes Similarities , 2012 .
[28] Sylvain Hallé,et al. A generalized monitor verdict for log trace triaging , 2015, 2015 IEEE 6th International Workshop on Program Comprehension through Dynamic Analysis (PCODA).
[29] Jiawei Han,et al. Classification of software behaviors for failure detection: a discriminative pattern mining approach , 2009, KDD.
[30] Atanas Rountev,et al. Object naming analysis for reverse-engineered sequence diagrams , 2005, ICSE.