Databases Reference
In-Depth Information
[11] Y. Brun and M.D. Ernst. Finding latent code errors via machine learning
over program executions. In Proceedings of ACM/IEEE International
Conference on Software Engineering, pages 480{490, 2004.
[12] G. Canfora and A. Cimitile. Software maintenance. In S.K. Chang,
editor, Handbook of Software Engineering and Knowledge Engineering,
pages 91{120. World Scientic, 2002.
[13] E.M. Clarke, O. Grumberg, and D.A. Peled. Model Checking. MIT Press,
1999.
[14] J.E. Cook and A.L. Wolf. Automating process discovery through event-
data analysis. In Proceedings of ACM/IEEE International Conference on
Software Engineering, pages 73{82, 1995.
[15] V. Dallmeier, C. Lindig, A. Wasylkowski, and A. Zeller. Mining object
behavior with ADABU. In Proceedings of International Workshop on
Dynamic Analysis, pages 17{24, 2006.
[16] W. Damm and D. Harel. LSCs: breathing life into message sequence
charts. Journal on Formal Methods in System Design, 19(1):45{80, 2001.
[17] F.C. de Sousa, N.C. Mendonca, S. Uchitel, and J. Kramer. Detecting
implied scenarios from execution traces. In Proceedings of Working Con-
ference on Reverse Engineering, pages 50{59, 2007.
[18] B. Demsky, M.D. Ernst, P.J. Guo, S. McCamant, J.H. Perkins, and M.C.
Rinard. Inference and enforcement of data structure consistency specifi-
cations. In Proceedings of International Symposium on Software Testing
and Analysis, pages 233{244, 2006.
[19] T.A. Doan, D. Lo, S. Maoz, and S-C. Khoo. LM: a tool for scenario-
based specification mining. In Proceedings of ACM/IEEE International
Conference on Software Engineering, pages 319{320, 2010.
[20] M. El-Ramly, E. Stroulia, and P. Sorenson. From run-time behavior
to usage scenarios: an interaction-pattern mining approach. In Proceed-
ings of ACM International Conference on Knowledge Discovery and Data
Mining, pages 315{324, 2002.
[21] D. Engler, D.Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as de-
viant behavior: a general approach to inferring errors in systems code. In
Proceedings of Symposium on Operating Systems Principles, pages 57{72,
2001.
[22] L. Erlikh. Leveraging legacy system dollars for e-business. IEEE IT Pro,
pages 17{23, 2000.
 
Search WWH ::




Custom Search