Filters








22 Hits in 3.0 sec

Configuration-aware regression testing

Xiao Qu, Myra B. Cohen, Gregg Rothermel
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
Acknowledgments This work was supported in part by the National Science Foundation through CAREER award CCF-0747009 and award CNS-0454203, and by the Army Research Office through DURIP award W91NF-04-1  ...  ISSTA'08, July 20-24, Seattle, Washington USA.  ...  Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. program start-up or can be changed at run-time, meaning that configurations can be modified by users on-the-fly.  ... 
doi:10.1145/1390630.1390641 dblp:conf/issta/QuCR08 fatcat:ankmwigwhjfj3hbn72m7dqbgve

Automatic documentation inference for exceptions

Raymond P.L. Buse, Westley R. Weimer
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. based on the replacement model [16, 40] .  ...  The total time taken to evaluate all 951 documentation pairs was 3.5 hours; the determination was usually quite direct.  ... 
doi:10.1145/1390630.1390664 dblp:conf/issta/BuseW08a fatcat:brjughw7efguhljhi35ael6a3i

A metric for software readability

Raymond P.L. Buse, Westley R. Weimer
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. a project [1] .  ...  Additionally, there was an option to skip the current snippet; however, it was used very infrequently (15 times in 12,000).  ... 
doi:10.1145/1390630.1390647 dblp:conf/issta/BuseW08 fatcat:pdd6fepgufbpdfcydvqxslsltu

Fault localization using value replacement

Dennis Jeffrey, Neelam Gupta, Rajiv Gupta
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008, Seattle, Washington, USA. Copyright 2008 ACM 978-1-59593-904-3/08/07 ...$5.00. responsible for the failure is executed.  ...  To take potential influence into account, relevant slicing was proposed [11] . Construction of smaller dynamic slices by intersecting multiple slices was studied [4, 21] .  ... 
doi:10.1145/1390630.1390652 dblp:conf/issta/JeffreyGG08 fatcat:kwhtbumdffbntc3aowihgrbywa

Comparing software metrics tools

Rüdiger Lincke, Jonas Lundberg, Welf Löwe
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. that all metrics tools compute / interpret / implement the same metrics in the same way.  ...  The possibility for interfering was limited in our setting.  ... 
doi:10.1145/1390630.1390648 dblp:conf/issta/LinckeLL08 fatcat:rlqsupkxwveafbg4ybruil67je

Finding bugs in java native interface programs

Goh Kondoh, Tamiya Onodera
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008, Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07...$5.00.  ...  First we were not sure how effective the IPA was because we predicted there were many wrapper procedures like Figure 15 .  ... 
doi:10.1145/1390630.1390645 dblp:conf/issta/KondohO08 fatcat:elaf6pbooff3zmmqw7dwj3wlui

Efficient solving of structural constraints

Bassem Elkarablieh, Darko Marinov, Sarfraz Khurshid
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
This work was partially supported by the NSF awards #CCF-0702680, #CNS-0615372, #CNS-0613665, and #IIS-0438967, and a gift from Microsoft.  ...  ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. structure repair.  ...  By treating containers symbolically, we were able to test programs that manipulate such containers, an analysis that was not feasible if the implementation of the container was to be considered.  ... 
doi:10.1145/1390630.1390637 dblp:conf/issta/ElkarabliehMK08 fatcat:saorsc5vybab3hbrpddfzjmjfi

Testing for buffer overflows with length abstraction

Ru-Gang Xu, Patrice Godefroid, Rupak Majumdar
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
Splat was also able to find two previously unknown buffer overflows in a heavily-tested storage system.  ...  In experiments on a set of benchmarks developed independently to evaluate buffer overflow checkers, Splat was able to detect buffer overflows quickly, sometimes several orders of magnitude faster than  ...  Acknowledgments: This work was initiated during a visit of the first author to the second author at Bell Laboratories.  ... 
doi:10.1145/1390630.1390636 dblp:conf/issta/XuGM08 fatcat:nrtgn7asbbctlhbncb5aa2yn6i

Are your votesreallycounted?

Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard Kemmerer, William Robertson, Fredrik Valeur, Giovanni Vigna
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. A quote attributed to Stalin says: "Those who cast the votes decide nothing.  ...  For example, a report published in January 2008 describes the problems encountered in Sarasota County, Florida, when counting the votes in the November 2006 Congressional District 13 election [23] .  ... 
doi:10.1145/1390630.1390660 dblp:conf/issta/BalzarottiBCFKRVV08 fatcat:ejtpj7yw6fbexmc4a3jq2yd2p4

Effective and scalable software compatibility testing

Il-Chul Yoon, Alan Sussman, Atif Memon, Adam Porter
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
This work was also partially supported by the the Office of Naval Research under Grant #N00014-05-1-0421.  ...  Acknowledgments This research was supported by NASA under Grant #NNG06GE75G and NSF under Grants #CNS-0615072, #ATM-0120950, #CCF-0205265 and #CCF-0447864.  ...  ISSTA'08, July 20-24, 2008, Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00. nents, including multiple compilers and third-party libraries.  ... 
doi:10.1145/1390630.1390640 dblp:conf/issta/YoonSMP08 fatcat:ziqlj5nr35g3bo4qlntz6azk4i

The probabilistic program dependence graph and its application to fault diagnosis

George K. Baah, Andy Podgurski, Mary Jean Harrold
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
Acknowledgements This work was supported in part by NSF awards CCF-0429117, CCF-0541049, and CCF-0725202 to Georgia Tech.  ...  ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA.  ...  The faulty-version column shows which version of the Sed program was used and which fault was activated. For example, V6-F1 means version 6 of Sed was used with the first fault activated.  ... 
doi:10.1145/1390630.1390654 dblp:conf/issta/BaahPH08 fatcat:t2x5ah2jrnbfdht3d2wz5vai7m

Using sensitivity analysis to create simplified economic models for regression testing

Hyunsook Do, Gregg Rothermel
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
Acknowledgements This work was supported in part by NSF under Award CNS-0454203 to the University of Nebraska -Lincoln.  ...  ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00.  ...  Only in case (2) does Model 2 find a technique beneficial that was not found so by Model 1 (the mean benefit of Tca increases from -14 to 50); however this difference is small and its effect could be offset  ... 
doi:10.1145/1390630.1390639 dblp:conf/issta/DoR08 fatcat:jbuaqxz6pbgehlkprb7tc6x4wm

Customization change impact analysis for erp professionals via program slicing

Nurit Dor, Tal Lev-Ami, Shay Litvak, Mooly Sagiv, Dror Weiss
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-60558-050-0/08/07 ...$5.00.  ...  . * This work was conducted while visiting Panaya Inc.  ... 
doi:10.1145/1390630.1390644 dblp:conf/issta/DorLLSW08 fatcat:qig64hz7qfbudjc3b2sxnkip4m

Universal symbolic execution and its application to likely data structure invariant generation

Yamini Kannan, Koushik Sen
2008 Proceedings of the 2008 international symposium on Software testing and analysis - ISSTA '08  
ISSTA'08, July 20-24, 2008 , Seattle, Washington, USA. Copyright 2008 ACM 978-1-59593-904-3/08/07 ...$5.00. a large class of data structures [19] .  ...  Note that none of the relevant invariants that KRYSTAL failed to generate, was reported by Daikon.  ... 
doi:10.1145/1390630.1390665 dblp:conf/issta/KannanS08 fatcat:2ufs3ifxrbanzgip4issrateh4

Connecting and Serving the Software Engineering Community

Matthew B. Dwyer, Eric Bodden, Brian Fitzgerald, Miryung Kim, Sunghun Kim, Andrew J. Ko, Emilia Mendes, Raffaela Mirandola, Ana Moreira, Forrest Shull, Stephen Siegel, Tao Xie (+1 others)
2016 IEEE Transactions on Software Engineering  
Tao Xie received the PhD degree in computer science from the University of Washington at Seattle, Seattle, WA, USA, in 2005.  ...  , WA, USA, under the supervision of Dr.  ... 
doi:10.1109/tse.2016.2532379 fatcat:r5fbrd75jvhmddsdmi3gv72tru
« Previous Showing results 1 — 15 out of 22 results