Databases Reference
In-Depth Information
[19] V. Benjamin Livshits and Thomas Zimmermann. Dynamine: finding com-
mon error patterns by mining software revision histories. In Proceedings
of the 13th ACM SIGSOFT International Symposium on the Foundations
of Software Engineering (FSE-13), pages 296{305, September 2005.
[20] David Lo and Siau-Cheng Khoo. SMArTIC: towards building an ac-
curate, robust and scalable specication miner. In SIGSOFT '06/FSE-
14: Proceedings of the 14th ACM SIGSOFT International Symposium on
Foundations of Software Engineering, pages 265{275, ACM Press, New
York, 2006.
[21] Davide Lorenzoli, Leonardo Mariani, and Mauro Pezze. Towards self-
protecting enterprise applications. In 18th IEEE International Sympo-
sium on Software Reliability Engineering (ISSRE 2007), November 2007.
[22] David Mandelin, Lin Xu, Rastislav Bodik, and Doug Kimelman. Jungloid
mining: helping to navigate the API jungle. In PLDI '05: Proceedings of
the 2005 ACM SIGPLAN Conference on Programming Language Design
and Implementation, pages 48{61, ACM Press, New York, 2005.
[23] L. Mariani and M. Pezze. Dynamic detection of COTS components in-
compatibility. IEEE Software, 24(5):76{85, September/October 2007.
[24] Mangala Gowri Nanda, Christian Grothoff, and Satish Chandra. Deriving
object typestates in the presence of inter-object references. In OOPSLA
'05: Proceedings of the 20th annual ACM SIGPLAN Conference on Object
Oriented Programming, Systems, Languages, and Applications, pages 77{
96, ACM Press, New York, 2005.
[25] Marco Pistoia, Duane Reller, Deepak Gupta, Milind Nagnur, and
Ashok K. Ramani. Java 2 Network Security. Prentice Hall PTR, Upper
Saddle River, NJ, August 1999.
[26] T. Reps, S. Horwitz, and M. Sagiv. Precise interprocedural dataflow
analysis via graph reachability. In Proc. ACM Symposium on Principles
of Programming Languages, pages 49{61, 1995.
[27] Alexandru Salcianu and Matin Rinard. Purity and side effect analysis
for Java programs. In VMCAI'05: Proceedings of the 6th International
Conference on Verification, Model Checking, and Abstract Interpretation,
2005.
[28] WALA:
The
T.
J.
Watson
Libraries
for
Analysis.
http://wala.sourceforge.net.
[29] Andrzej Wasylkowski, Andreas Zeller, and Christian Lindig. Detecting
object usage anomalies. In ESEC-FSE '07: Proceedings of the 6th Joint
Meeting of the European Software Engineering Conference and the ACM
 
Search WWH ::




Custom Search