Databases Reference
In-Depth Information
[15] Dawson R. Engler, David Yu Chen, and Andy Chou. Bugs as deviant
behavior: a general approach to inferring errors in systems code. In Sym-
posium on Operating Systems Principles, pages 57{72, 2001.
[16] Michael D. Ernst, Jake Cockrell, William G. Griswold, and David Notkin.
Dynamically discovering likely program invariants to support program
evolution.
IEEE Transactions on Software Engineering, 27(2):99{123,
2001.
[17] Michael D. Ernst, Jeff H. Perkins, Philip J. Guo, Stephen McCamant,
Carlos Pacheco, Matthew S. Tschantz, and Chen Xiao. The Daikon sys-
tem for dynamic detection of likely invariants. Science of Computer Pro-
gramming, 2006.
[18] Michael Fischer, Martin Pinzger, and Harald Gall. Analyzing and relat-
ing bug report data for feature tracking. In Proceedings of the Work-
ing Conference on Reverse Engineering, pages 90{101, Victoria, British
Columbia, Canada, November 2003.
[19] Harald Gall, Karin Hajek, and Mehdi Jazayeri. Detection of logical cou-
pling based on product release history. In Proceedings of the International
Conference on Software Maintenance, pages 190{198, Washington, D.C.,
November 1998.
[20] Harald Gall, Mehdi Jazayeri, and Jacek Krajewski. CVS release history
data for detecting logical couplings. In Proceedings International Work-
shop on Principles of Software Evolution, pages 13{23, Helsinki, Finland,
September 2003.
[21] S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language
for building system-specific, static analyses. In Proceedings of the Con-
ference on Programming Language Design and Implementation, pages
69{82, Berlin, Germany, 2002.
[22] R. Hastings and B. Joyce. Purify: fast detection of memory leaks and
access errors. In Proceedings of the Winter USENIX Conference, pages
125{138, San Francisco, CA, December 1992.
[23] David Heine and Monica Lam. A practical flow-sensitive and context-
sensitive C and C++ memory leak detector. In Conference on Program-
ming Language Design and Implementation (PLDI), pages 168{181, San
Diego, CA, June 2003.
[24] Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai
Lee, and Sy-Yen Kuo. Securing web application code by static analysis
and runtime protection. In Proceedings of the 13th Conference on World
Wide Web, pages 40{52, New York, May 2004.
 
Search WWH ::




Custom Search