Databases Reference
In-Depth Information
of the 2006 International Workshop on Dynamic Systems Analysis, pages
17{24, ACM Press, New York, 2006.
[8] Brian Demsky and Martin Rinard. Role-based exploration of object-
oriented programs. In ICSE '02: Proceedings of the 24th International
Conference on Software Engineering, pages 313{324, ACM Press, New
York, 2002
[9] Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, and Ben-
jamin Chelf. Bugs as deviant behavior: a general approach to inferring
errors in systems code. In SOSP '01: Proceedings of the Eighteenth ACM
Symposium on Operating Systems Principles, pages 57{72, ACM Press,
2001.
[10] Michael D. Ernst, Jake Cockrell, William G. Griswold, and David Notkin.
Dynamically discovering likely program invariants to support program
evolution. IEEE Transactions on Software Engineering, 27(2):99{123,
February 2001.
[11] Stephen Fink, Eran Yahav, Nurit Dor, G. Ramalingam, and Emmanuel
Geay. Effective typestate verification in the presence of aliasing. In
ISSTA '06: Proceedings of the 2006 International Symposium on Software
Testing and Analysis, pages 133{144, ACM Press, New York, 2006.
[12] Stephen J. Fink, Eran Yahav, Nurit Dor, G. Ramalingam, and Em-
manuel Geay. Effective typestate verification in the presence of aliasing.
ACM Transactions on Software Engineering and Methodology, 17(2):1{
34, 2008.
[13] Gallery
of
mined
specification.
http://tinyurl.com/23qct8
or
http://docs.google.com/View?docid=ddhtqgv6 10hbczjd.
[14] E.M. Gold. Language identification in the limit. Information and Control,
10:447{474, 1967.
[15] Sudheendra Hangal and Monica S. Lam. Tracking down software bugs
using automatic anomaly detection. May 2002.
[16] Viktor Kuncak, Patrick Lam, and Martin Rinard. Role analysis. In Proc.
ACM Symp. on Principles of Programming Languages, Portland, January
2002.
[17] Patrick Lam and Martin Rinard. A type system and analysis for the
automatic extraction and enforcement of design information. In ECOOP,
2003.
[18] David Lie, Andy Chou, Dawson Engler, and David L. Dill. A simple
method for extracting models for protocol code. In ISCA '01: Proceedings
of the 28th Annual International Symposium on Computer Architecture,
pages 192{203, ACM Press, New York, 2001.
 
Search WWH ::




Custom Search