Databases Reference
In-Depth Information
[37] Darrell Reimer, Edith Schonberg, Kavitha Srinivas, Harini Srinivasan,
Bowen Alpern, Robert D. Johnson, Aaron Kershenbaum, and Larry
Koved. SABER: Smart Analysis Based Error Reduction. In Proceed-
ings of the International Symposium on Software Testing and Analysis,
pages 243{251, Boston, MA, July 2004.
[38] Filip Van Rysselberghe and Serge Demeyer. Mining version control sys-
tems for FACs (frequently applied changes). In Proceedings of the Inter-
national Workshop on Mining Software Repositories, pages 48{52, Edin-
burgh, Scotland, May 2004.
[39] Stefan Savage, Michael Burrows, Greg Nelson, Patrick Sobalvarro, and
Thomas Anderson. Eraser: a dynamic data race detector for multi-
threaded programs. ACM Transactions on Computer Systems, 15(4):391{
411, 1997.
[40] Stephen R. Schach. Object-Oriented and Classical Software Engineering.
McGraw-Hill Science/Engineering/Math, 2004.
[41] Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner. De-
tecting format string vulnerabilities with type qualifiers. In Proceedings of
the 2001 Usenix Security Conference, pages 201{220, Washington, D.C.,
2001.
[42] Bruce Tate, Mike Clark, Bob Lee, and Patrick Linskey.
Bitter EJB.
Manning Publications, 2003.
[43] D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards
automated detection of buffer overrun vulnerabilities. In Proceedings of
Network and Distributed Systems Security Symposium, pages 3{17, San
Diego, CA, February 2000.
[44] Westley Weimer and George Necula. Mining temporal specifications for
error detection. In Proceedings of the 11th International Conference on
Tools and Algorithms for the Construction and Analysis of Systems, pages
461{476, April 2005.
[45] J. Whaley, M. Martin, and M. Lam. Automatic extraction of object-
oriented component interfaces. In Proceedings of the International Sym-
posium of Software Testing and Analysis, pages 218{228, Rome, Italy,
July 2002.
[46] Chadd C. Williams and Jeffrey K. Hollingsworth. Automatic mining
of source code repositories to improve bug finding techniques.
IEEE
Transactions on Software Engineering, 31(6):466{480, June 2005.
[47] Chadd C. Williams and Jeffrey K. Hollingsworth. Recovering system spe-
cific rules from software repositories. In Proceedings of the International
Workshop on Mining Software Repositories, pages 7{11, May 2005.
 
Search WWH ::




Custom Search