Databases Reference
In-Depth Information
[27] Suresh Thummalapenta and Tao Xie. Alattin: mining alternative pat-
terns for detecting neglected conditions. In Proceedings of the 24th
IEEE/ACM International Conference on Automated Software Engineer-
ing (ASE), pages 283{294, IEEE Computer Society, 2009.
[28] Suresh Thummalapenta and Tao Xie. Mining exception-handling rules
as sequence association rules. In Proceedings of the 31st IEEE Interna-
tional Conference on Software Engineering (ICSE), pages 496{506, IEEE
Computer Society, 2009.
[29] Jianyong Wang and Jiawei Han. BIDE: ecient mining of frequent closed
sequences. In Proceedings of the 20th International Conference on Data
Engineering (ICDE), pages 79{80, IEEE Computer Society, 2004.
[30] Andrzej Wasylkowski, Andreas Zeller, and Christian Lindig. Detecting
object usage anomalies. In Proceedings of the 6th Joint Meeting of the Eu-
ropean Software Engineering Conference and the ACM SIGSOFT Sym-
posium on The Foundations of Software Engineering (ESEC/FSE), pages
35{44, ACM Press, 2007.
[31] J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta:
mining temporal API rules from imperfect traces. In Proceedings of the
28th International Conference on Software Engineering (ICSE), pages
282{291, ACM Press, 2006.
 
Search WWH ::




Custom Search