Focusing Automatic Code Inspections
暂无分享,去创建一个
[1] Wen-mei W. Hwu,et al. Improving static branch prediction in a compiler , 1998, Proceedings. 1998 International Conference on Parallel Architectures and Compilation Techniques (Cat. No.98EX192).
[2] Audris Mockus,et al. Identifying reasons for software changes using historic databases , 2000, Proceedings 2000 International Conference on Software Maintenance.
[3] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000 .
[4] Norman E. Fenton,et al. Quantitative Analysis of Faults and Failures in a Complex Software System , 2000, IEEE Trans. Software Eng..
[5] E Elena Mumford,et al. Drawing graphs for cartographic applications , 2008 .
[6] A. Frank Ackerman,et al. Software inspections: an effective verification process , 1989, IEEE Software.
[7] Leslie Hatton. Safer C: Developing for High-Integrity and Safety-Critical Systems , 1995 .
[8] Martijn Hendriks,et al. Model checking timed automata : techniques and applications , 2006 .
[9] Nancy G. Leveson,et al. An investigation of the Therac-25 accidents , 1993, Computer.
[10] Leon Moonen,et al. Evaluating the relation between coding standard violations and faultswithin and across software versions , 2009, 2009 6th IEEE International Working Conference on Mining Software Repositories.
[11] Cheun Ngen Chong. Experiments in rights control : expression and enforcement , 2005 .
[12] Erika Ábrahám,et al. An Assertional Proof System for Multithreaded Java - Theory and Tool Support , 2005 .
[13] Ana Sokolova,et al. Coalgebraic analysis of probabilistic systems , 2005 .
[14] Jasen Markovski,et al. Real and stochastic time in process algebras for performance evaluation , 2008 .
[15] Raluca Marin-Perianu,et al. Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning , 2008 .
[16] Wolter Pieters,et al. La volonté machinale: understanding the electronic voting controversy , 2008 .
[17] A. J. Markvoort. Towards hybrid molecular simulations , 2006 .
[18] F. J. Anscombe,et al. Graphs in Statistical Analysis , 1973 .
[19] David Biggs,et al. A method of choosing multiway partitions for classification and decision trees , 1991 .
[20] Gürcan Gülesir,et al. Evolvable Behavior Specifications Using Context-Sensitive Wildcards , 2008 .
[21] S. J. Lipoff,et al. At the crossroads of the information highway: new technology directions in consumer electronics , 1994 .
[22] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[23] J. van den Berg,et al. Reasoning about Java programs in PVS using JML , 2009 .
[24] de Im Ilse Visser,et al. Analyzing user perceived failure severity in consumer electronics products : incorporating the user perspective into the development process , 2008 .
[25] T. van der Storm. Component-based configuration, integration and delivery , 2003 .
[26] Yuanyuan Zhou,et al. Have things changed now?: an empirical study of bug characteristics in modern open source software , 2006, ASID '06.
[27] Ali Mesbah,et al. Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .
[28] Marcin Czenko,et al. TuLiP : reshaping trust management , 2009 .
[29] C.-B. Breunesse. On JML: topics in tool-assisted verification of Java programs , 2006 .
[30] Marius Adrian Marin,et al. An Integrated System to Manage Crosscutting Concerns in Source Code , 2008 .
[31] Claes Wohlin,et al. Software inspection benchmarking-a qualitative and quantitative comparative opportunity , 2002, Proceedings Eighth IEEE Symposium on Software Metrics.
[32] U Uzma Khadim,et al. Process algebras for hybrid systems : comparison and development , 2008 .
[33] D. Graaf,et al. Mining semi-structured data, theoretical and experimental aspects of pattern evaluation , 2008 .
[34] J. Voas,et al. Software Testability: The New Verification , 1995, IEEE Softw..
[35] Sarah Smith Heckman,et al. On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques , 2008, ESEM '08.
[36] M. Kyas. Verifying OCL Specifications of UML models , 2006 .
[37] Tomas Krilavicius,et al. Hybrid Techniques for Hybrid Systems , 2006 .
[38] M. T. Ionita,et al. Scenario-based system architecting : a systematic approach to developing future-proof system architectures , 2005 .
[39] Glen W. Russell,et al. Experience with inspection in ultralarge-scale development , 1991, IEEE Software.
[40] Ivan S. Zapreev. Model checking Markov chains : techniques and tools , 2008 .
[41] Michael A. Harrison,et al. Accurate static estimators for program optimization , 1994, PLDI '94.
[42] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[43] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[44] W. Basalaj,et al. Correlation between coding standards compliance and software quality , 2005 .
[45] Michael E. Fagan. Design and Code Inspections to Reduce Errors in Program Development , 1976, IBM Syst. J..
[46] Richard Lippmann,et al. Testing static analysis tools using exploitable buffer overflows from open source code , 2004, SIGSOFT '04/FSE-12.
[47] Leon Moonen,et al. Assessing the value of coding standards: An empirical study , 2008, 2008 IEEE International Conference on Software Maintenance.
[48] B. Gebremichael-Tesfagiorgis,et al. Expressivity of Timed Automata Models , 2006 .
[49] Peter J. Middleton,et al. Software Inspection , 1994, J. Inf. Technol..
[50] Siegfried Nijssen. Mining Structured Data , 2006 .
[51] Michael W. Godfrey,et al. Facilitating software evolution research with kenyon , 2005, ESEC/FSE-13.
[52] Luigi Lavazza. Providing Automated Support for the GQM Measurement Process , 2000, IEEE Softw..
[53] Harald C. Gall,et al. Populating a Release History Database from version control and bug tracking systems , 2003, International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings..
[54] Peter Zoeteweij,et al. Diagnosis of Embedded Software Using Program Spectra , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).
[55] A Adam Koprowski,et al. Termination of rewriting and its certification , 2004 .
[56] Taghi M. Khoshgoftaar,et al. EMERALD: software metrics and models on the desktop , 1996, Proceedings of the Fourth International Symposium on Assessment of Software Tools.
[57] Gabriele Lenzini,et al. Integration of Analysis Techniques in Security and Fault-Tolerance , 2005 .
[58] Watts S. Humphrey,et al. A discipline for software engineering , 2012, Series in software engineering.
[59] E. P. Doolan,et al. Experience with Fagan's inspection method , 1992, Softw. Pract. Exp..
[60] Andreas Zeller,et al. When do changes induce fixes? , 2005, ACM SIGSOFT Softw. Eng. Notes.
[61] James R. Larus,et al. Static branch frequency and program profile analysis , 1994, MICRO 27.
[62] Aad Mathssen,et al. Logical Calculi for Reasoning with Binding , 2008 .
[63] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[64] de Ism Ivo Jong. Integration and test strategies for complex manufacturing machines , 2008 .
[65] Brent Hailpern,et al. Software debugging, testing, and verification , 2002, IBM Syst. J..
[66] Ileana Buhan,et al. Cryptographic keys from noisy data, theory and applications , 2008 .
[67] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.
[68] Taolue Chen. Clocks, Dice and Processes , 2009 .
[69] Mohammad Ali Abam. New data structures and algorithms for mobile data , 2007 .
[70] Sunghun Kim,et al. Memories of bug fixes , 2006, SIGSOFT '06/FSE-14.
[71] G. Rozenberg,et al. Effective models for the structure of ð-calculus processes with replication , 2001 .
[72] M. J. de Mol,et al. Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .
[73] Tingting Han,et al. Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.
[74] Juan Visente Guillen Scholten,et al. Mobile Channels for Exogenous Coordination of Distributed Systems: Semantics, Implementation and Composition , 2007 .
[75] Bahareh Badban,et al. Verification Techniques for Extensions of Equality Logic , 2006 .
[76] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[77] Jens R. Calamé,et al. Testing reactive systems with data: enumerative methods and constraint solving , 2008 .
[78] Murray Hill,et al. Lint, a C Program Checker , 1978 .
[79] van Mj Muck Weerdenburg,et al. Efficient rewriting techniques , 2009 .
[80] Mohammed G. Khatib. MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .
[81] J. David Morgenthaler,et al. Evaluating static analysis defect warnings on production software , 2007, PASTE '07.
[82] Daniel Jackson,et al. A new model of program dependences for reverse engineering , 1994, SIGSOFT '94.
[83] Rudolf Eigenmann,et al. Demand-Driven, Symbolic Range Propagation , 1995, LCPC.
[84] Michiel van Genuchten. The Impact of Software Growth on the Electronics Industry , 2007, Computer.
[85] R Ronald Ruimerman,et al. Modeling and remodeling in bone tissue , 2005 .
[86] van Mpwj Michiel Osch. Automated model-based testing of hybrid systems , 2009 .
[87] Andreas Zeller,et al. Predicting faults from cached history , 2008, ISEC '08.
[88] Ling Cheung,et al. Reconciling nondeterministic and probabilistic choices , 2006 .
[89] Ichiro Hasuo,et al. Tracing Anonymity with Coalgebras , 2008 .
[90] Arjen van Weelden,et al. Putting Types To Good Use , 2007 .
[91] R.S.S. O'Connor,et al. Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .
[92] Marcel Verhoef,et al. Modeling and validating distributed embedded real-time control systems , 2009 .
[93] Yee Wei Law. Key management and link-layer security of wireless sensor networks: Energy-efficient attack and defense , 2005 .
[94] Jan Jürjens,et al. Comparing Bug Finding Tools with Reviews and Tests , 2005, TestCom.
[95] J. Ketema,et al. Bohm-Like Trees for Rewriting , 2006 .
[96] Cfj Christian Lange,et al. Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .
[97] Ivan Kurtev,et al. Adaptability of model transformations , 2005 .
[98] Nikolay Kavaldjiev,et al. A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .
[99] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[100] Yang Meng Tan,et al. LCLint: a tool for using specifications to check code , 1994, SIGSOFT '94.
[101] R. Boumen,et al. Integration and test plans for complex manufacturing systems , 2007 .
[102] Martijn van Veelen,et al. Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .
[103] A. Rodriguez Yakushev,et al. Towards Getting Generic Programming Ready for Prime Time , 2009 .
[104] Chadd C. Williams,et al. Automatic mining of source code repositories to improve bug finding techniques , 2005, IEEE Transactions on Software Engineering.
[105] Andy Chou,et al. Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code. , 2001, SOSP 2001.
[106] Audris Mockus,et al. Understanding the sources of variation in software inspections , 1998, TSEM.
[107] Eelco Dolstra,et al. The purely functional software deployment model , 2006 .
[108] Andreas Zeller,et al. Mining version archives for co-changed lines , 2006, MSR '06.
[109] Junfeng Yang,et al. MECA: an extensible, expressive system and language for statically checking security properties , 2003, CCS '03.
[110] Hugo Jonker,et al. Security matters : privacy in voting and fairness in digital exchange , 2009 .
[111] Martijn Warnier,et al. Language based security for Java and JML , 2006 .
[112] James Miller,et al. A Comparison of Computer Support Systems for Software Inspection , 2004, Automated Software Engineering.
[113] Shari Lawrence Pfleeger,et al. Preliminary Guidelines for Empirical Research in Software Engineering , 2002, IEEE Trans. Software Eng..
[114] Jeffrey S. Foster,et al. A comparison of bug finding tools for Java , 2004, 15th International Symposium on Software Reliability Engineering.
[115] M. T. de Berg,et al. Algorithms for Fat Objects: Decompositions and Applications , 2004 .
[116] Leon Moonen,et al. Evaluating the Relation Between Coding Standard Violations and Faults Within and Across Software Versions ∗ Cathal Boogerd , 2009 .
[117] Thomas Zimmermann,et al. Automatic Identification of Bug-Introducing Changes , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).
[118] P. Zoeteweij,et al. Composing constraint solvers , 2005 .
[119] Ivan Kurtev Ivanov,et al. Adaptability of model transformations , 2005 .
[120] Thomas W. Reps,et al. Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation , 1995, TAPSOFT.
[121] AJ Arjan Mooij,et al. Constructive formal methods and protocol standardization , 2006 .
[122] L. Moonen,et al. Supporting software inspection with static profiling , 2009 .
[123] Arthur I. Baars,et al. Embedded Compilers , 2009 .
[124] Robert Brijder,et al. Models of natural computation : gene assembly and membrane systems , 2008 .
[125] Gao. Design and verification of lock-free parallel algorithms , 2005 .
[126] Meine van der Meulen,et al. Correlations between Internal Software Metrics and Software Dependability in a Large Population of Small C/C++ Programs , 2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07).
[127] Thomas A. Henzinger,et al. The Blast Query Language for Software Verification , 2004, SAS.
[128] Jason R. C. Patterson,et al. Accurate static branch prediction by value range propagation , 1995, PLDI '95.
[129] David W. Binkley,et al. Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model , 1994, CC.
[130] Jeroen Doumen,et al. Searching in encrypted data , 2004 .
[131] Jeff Tian,et al. Tool support for software measurement, analysis and improvement , 1997, J. Syst. Softw..
[132] H.M.A. van Beek,et al. Specification and analysis of Internet applications , 2005 .
[133] Stefan Wagner,et al. An Evaluation of Two Bug Pattern Tools for Java , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.
[134] T. D. Vu,et al. Semantics and applications of process and program algebra , 2007 .
[135] Sebastiaan Gijsbert Marinus Cornelissen,et al. Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .
[136] G Giovanni Russello,et al. Separation and adaptation of concerns in a shared data space , 2006 .
[137] Anton Wijs,et al. What to do next? Analysing and optimising system behaviour in time , 2007 .
[138] Damiano Bolzoni,et al. Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .
[139] Laurie J. Hendren,et al. Generalized Constant Propagation: A Study in C , 1996, CC.
[140] Ncwm Niels Braspenning. Model-based integration and testing of high-tech multi-disciplinary systems , 2008 .
[141] Thomas Fahringer,et al. A Uniied Symbolic Evaluation Framework for Parallelizing Compilers , 1999 .
[142] M. Torabi Dashti,et al. Keeping Fairness Alive : Design and formal verification of optimistic fair exchange protocols , 2008 .
[143] Scw Bas Ploeger,et al. Improved verification methods for concurrent systems , 2009 .
[144] Hasan Sözer,et al. Architecting Fault-Tolerant Software Systems , 2009 .
[145] Magiel Bruntink,et al. Renovation of idiomatic crosscutting concerns in embedded systems , 2005 .
[146] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[147] Colin Potts,et al. Software-engineering research revisited , 1993, IEEE Software.
[148] Les Hatton,et al. Safer language subsets: an overview and a case history, MISRA C , 2004, Inf. Softw. Technol..
[149] Tibor Gyimóthy,et al. Empirical validation of object-oriented metrics on open source software for fault prediction , 2005, IEEE Transactions on Software Engineering.
[150] David W. Wall,et al. Predicting program behavior using real or estimated profiles , 2004, SIGP.
[151] Michael D. Ernst,et al. Which warnings should I fix first? , 2007, ESEC-FSE '07.
[152] Jurgen Vinju,et al. Analysis and transformation of source code by parsing and rewriting , 2005 .
[153] Joseph A. Fisher,et al. Predicting conditional branch directions from previous runs of a program , 1992, ASPLOS V.
[154] Hausi A. Müller,et al. Predicting fault-proneness using OO metrics. An industrial case study , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.
[155] Susan Horwitz,et al. Fast and accurate flow-insensitive points-to analysis , 1997, POPL '97.
[156] RH Rudolf Mak,et al. Design and performance analysis of data-independent stream processing systems , 2008 .
[157] Bill Brykczynski,et al. Software inspection : an industry best practice , 1996 .
[158] Thomas Wolle,et al. Computational aspects of treewidth : Lower bounds and network reliability , 2005 .
[159] David W. Binkley,et al. Interprocedural slicing using dependence graphs , 1988, SIGP.
[160] Laura Brandán Briones,et al. Theories for Model-based Testing: Real-time and Coverage , 2007 .
[161] Ka Lok Man,et al. Formal specification and analysis of hybrid systems , 2006 .
[162] Junfeng Yang,et al. Correlation exploitation in error ranking , 2004, SIGSOFT '04/FSE-12.
[163] Atze Dijkstra. Stepping through Haskell , 2000 .
[164] J. Kwisthout,et al. The Computational Complexity of Probabilistic Networks , 2009 .
[165] de Hayco Jong. Flexible heterogeneous software systems , 2007 .
[166] Thomas Bäck,et al. Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .
[167] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[168] Dawson R. Engler,et al. Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations , 2003, SAS.
[169] Peter Verbaan,et al. The Computational Complexity of Evolving Systems , 2006 .
[170] Anton Wijs,et al. Silent steps in transition systems and Markov chains , 2007 .
[171] H. Hansen. Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .
[172] Andreas Zeller,et al. How Long Will It Take to Fix This Bug? , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).
[173] Pascal Durr,et al. Resource-based Verification for Robust Composition of Aspects , 2008 .
[174] Goran Frehse,et al. Compositional verification of hybrid systems using simulation relations , 2005 .
[175] Iris Loeb. Natural Deduction, Sharing By Presentation , 2007 .
[176] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[177] James R. Larus,et al. Branch prediction for free , 1993, PLDI '93.
[178] A. L. de Groot,et al. Practical Automaton proofs in PVS , 2000 .
[179] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[180] Tim K. Cocx,et al. Metrics and visualisation for crime analysis and genomics , 2005 .
[181] David A. Wagner,et al. Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.
[182] Bastiaan Heeren,et al. Top quality type error Messages , 2005 .
[183] Michael D. Ernst,et al. Prioritizing Warning Categories by Analyzing Software History , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).
[184] Mari Antonius Cornelis Dekker,et al. Flexible Access Control for Dynamic Collaborative Environments , 2009 .
[185] David Hovemeyer,et al. Tracking defect warnings across versions , 2006, MSR '06.
[186] L. Moonen,et al. Prioritizing Software Inspection Results using Static Profiling , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[187] Les Hatton. Language subsetting in an industrial context: A comparison of MISRA C 1998 and MISRA C 2004 , 2007, Inf. Softw. Technol..
[188] Mohammad Reza Mousavi,et al. Structuring structural operational semantics , 2005 .
[189] Harald C. Gall,et al. Change Analysis with Evolizer and ChangeDistiller , 2009, IEEE Software.
[190] V. Sundramoorthy,et al. At Home in Service Discovery , 2006 .
[191] Joost Noppen,et al. Imperfect Information in Software Design Processes , 2007 .
[192] Mark Lillibridge,et al. Extended static checking for Java , 2002, PLDI '02.
[193] Bastiaan Stephan Graaf,et al. Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[194] Harmen Kastenberg. Graph-based software specification and verification , 2008 .
[195] M. T. de Berg,et al. Multi-functional geometric data structures , 2003 .
[196] M. G. van der Horst,et al. Scalable block processing algorithms , 2008 .
[197] Dmitri Jarnikov,et al. QoS framework for video streaming in home networks , 2007 .
[198] Karina R. Olmos Joffré. Strategies for Context Sensitive Program Transformation , 2009 .
[199] Edward N. Adams,et al. Optimizing Preventive Service of Software Products , 1984, IBM J. Res. Dev..
[200] Thomas W. Reps,et al. Precise interprocedural chopping , 1995, SIGSOFT FSE.
[201] G. V. Kass. An Exploratory Technique for Investigating Large Quantities of Categorical Data , 1980 .
[202] Tim K. Cocx,et al. Algorithmic tools for data-oriented law enforcement , 2009 .
[203] Jeffrey S. Foster,et al. Type qualifiers: lightweight specifications to improve software quality , 2002 .
[204] Michiel van Genuchten,et al. Software Quality in Consumer Electronics Products , 1996, IEEE Softw..
[205] Martin Bravenboer,et al. Exercises in Free Syntax. Syntax Definition, Parsing, and Assimilation of Language Conglomerates , 2003 .
[206] M. A. Valero Espada,et al. Modal Abstraction and Replication of Processes with Data , 2005 .
[207] Flavio D. Garcia. Formal and Computational Cryptography: Protocols, Hashes and Commitments , 2008 .
[208] EM Elena Bortnik,et al. Formal methods in support of SMC design , 2008 .
[209] Leon Moonen,et al. On the Use of Data Flow Analysis in Static Profiling , 2008, 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation.
[210] Alex Groce,et al. Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[211] Jeroen Eggermont,et al. Data Mining using Genetic Programming : Classification and Symbolic Regression , 2005 .
[212] Jens Knoop,et al. Constant Propagation on the Value Graph: Simple Constants and Beyond , 2000, CC.
[213] Ricardo Corin,et al. Analysis Models for Security Protocols , 2006 .