25 Hits in 6.9 sec

Program structure aware fault localization

Heng Li, Yuzhen Liu, Zhenyu Zhang, Jian Liu
2014 Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices - InnoSWDev 2014  
To facilitate the debugging task, statistical fault localization estimates the location of faults in programs automatically by analyzing the program executions to narrow down the suspicious code region  ...  In this paper, we emphasize the biases caused by program structure in fault localization, and propose a method to address them.  ...  , due to the bias caused by specific program structure related to it".  ... 
doi:10.1145/2666581.2666593 dblp:conf/sigsoft/LiLZL14 fatcat:6mo5px6zrzcgtjna4wso7khizq

2020 Index IEEE Transactions on Reliability Vol. 69

2020 IEEE Transactions on Reliability  
Shi, H., +, TR Sept. 2020 851-862 J Java Improving Fault-Localization Accuracy by Referencing Debugging History to Alleviate Structure Bias in Code Suspiciousness.  ...  Deng, X., +, TR Dec. 2020 1323-1340 C C language Improving Fault-Localization Accuracy by Referencing Debugging History to Alleviate Structure Bias in Code Suspiciousness.  ... 
doi:10.1109/tr.2021.3050424 fatcat:fpn4y3gddvfobm3v7c25iogmxi

Exploring Microtask Crowdsourcing as a Means of Fault Localization [article]

Christian Medeiros Adriano, Andre van der Hoek
2016 arXiv   pre-print
In this paper, we explore how microtask crowdsourcing might serve as a means of fault localization.  ...  We particularly take a first step in assessing whether a crowd of workers can correctly locate known faults in a few lines of code (code fragments) taken from different open source projects.  ...  We would also like to thank Danilo Cardoso, Iago Moreira, and Nathan Martins for helping to code and test the various versions of the crowdsourcing environment.  ... 
arXiv:1612.03015v1 fatcat:23crdlggxfazrdcrdtx4vckr3e

Leveraging Light-Weight Analyses to Aid Software Maintenance

Zachary P. Fry, Westley Weimer
2013 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation  
By evaluating the associated techniques on programs spanning different languages and domains that contain thousands of bug reports and millions of lines of code, the results presented in this dissertation  ...  The work in this dissertation aims to avoid these weaknesses by providing fully automated, widely-applicable techniques that both reduce the cost of software maintenance and meet relevant human-centric  ...  to validate candidate repairs), improves performance by 80% overall in terms of test suite evaluations [173, Fig. 2 ], but is invisible to a cost model defined solely in terms of fault localization.  ... 
doi:10.1109/icst.2013.77 dblp:conf/icst/FryW13 fatcat:lcayagsfkfc37fh6smvwur2pcu

Praise for Object-Oriented Reengineering Patterns [chapter]

2003 Object-Oriented Reengineering Patterns  
Note that some configuration management systems keep track of renaming operations which will of course alleviate the problem. Referenced from: Factor out Strategy [p. 295].  ...  Not only will the refactoring process improve your understanding of the code, but this understanding will also become explicit in the structure of the code.  ...  Referenced from: Look for the Contracts [p. 137]. A.3.13 Visitor Intent Represent an operation to be performed on the elements of an object structure.  ... 
doi:10.1016/b978-155860639-5/50000-6 fatcat:yfchb4mlyvfj3l5w422zp3y47q

Scalable deep learning for bug detection [article]

Rafael-Michael Karampatsis, University Of Edinburgh, Charles Sutton, Maria Lapata
It continues by showing that the improvement in language modelling transfers to downstream SE tasks by finding that the BPE NLMs are more effective in highlighting buggy code than previous LMs.  ...  Driven by this finding and from recent advances in NLP it also investigates the idea of transferring language model representations to program repair systems.  ...  Probabilistic causality models are the most common utilized in fault localization. Their objective is to identify suspicious code and quantify its responsibility for execution failures.  ... 
doi:10.7488/era/1074 fatcat:wj7uxlm73fehxlxrqx35f6rreu

Understanding And Mapping Big Data

Rajendra Akerkar, Guillermo Vega-Gorgojo, Grunde Løvoll, Stephane Grumbach, Aurelien Faravelon, Rachel Finn, Kush Wadhwa, Anna Donovan, Lorenzo Bigagli
2015 Zenodo  
Appleby, op. cit., 2013. • Validity / accuracy of the data • Issues related to interpretation, bias and unequal power relations BYTE deliverable 3.2 examining big data in crisis informatics will examine  ...  This is achieved by utilizing demand plans and forecasts, sales history, external predictors of future performance such as category trends, weather patterns, local events and so on, allowing retailers  ... 
doi:10.5281/zenodo.49161 fatcat:wz3cwet3wfbmvfzucivu3t64eq

A Fault-Based Model of Fault Localization Techniques

Mark Hays
Inspired by this problem, we issue a challenge to the fault proneness community to use their huge collection of metrics to propose actionable development plans to improve code quality.  ...  Our challenge to the fault proneness community is to use fault proneness metrics to make specific code improvement recommendations.  ... 

A model for contextual data sharing in smartphone applications

Harshvardhan J. Pandit, Adrian O'Riordan
2015 Zenodo  
An approach to model the Context Definitions using computer science concepts such as object-oriented data structures provides flexibility.  ...  The advent of smartphones as a computing device has resulted in a shift in focus towards the design and development of smartphone applications or apps, that allow the user to complete a wide range of tasks  ...  If any fault of error is generated during an operation in the Context Manager, then the fault or error is generated as part of the user app.  ... 
doi:10.5281/zenodo.3244326 fatcat:aejfbu4avraaljfto55okdcpdi

Self-healing in Wireless Sensor Networks

Themistoklis Bourdenas, Morris Sloman, Emil Lupu
The self-healing service accurately identifies erroneous sensors and is capable to effectively reconfigure network assets to improve quality of information while maintaining long life expectancy of the  ...  We describe a fault detection mechanism for sensor readings based on heuristic and Bayesian probabilistic approaches that accurately identifies error occurrences in readings and minimises false positives  ...  Acknowledgements I need to thank my thesis supervisor, Professor Morris Sloman, for his strong support and  ... 
doi:10.25560/9523 fatcat:qpj7nzm22nc3pedc7gg2vmzlk4

Intensional Cyberforensics [article]

Serguei A. Mokhov
2014 arXiv   pre-print
This approach is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in previous work.  ...  is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an eductive manner of evaluation.  ...  RIPE in GIPSY to improve the usability of the system.  ... 
arXiv:1312.0466v2 fatcat:q5ovtsdzt5hqbn7rxpiobhjgzi

Mining and checking object behavior [article]

Valentin Dallmeier, Universität Des Saarlandes, Universität Des Saarlandes
In a controlled experiment, PACHIKA was able to synthesize fixes for real bugs mined from the history of two open-source projects. iv  ...  We leverage the structure of object-oriented programs to derive models that describe the behavior of individual objects.  ...  A big thank you also goes to Sebastian Hack for being my second examiner and for sharing his wisdom on static analysis.  ... 
doi:10.22028/d291-26007 fatcat:gtutj6myffgejeid54trt266ya

Applied Machine Learning [article]

Michael Richter, University Of Calgary, University Of Calgary
The fault currents that a transformer undergoes are another factor that improves the accuracy of the prediction.  ...  order to create an environment that is able to run suspicious code and identify its malicious features.  ...  In this step, we do the final forecasting on the decision variable by the following procedure. 7.1. Repeat Step 1 to 3 to fuzzify the testing data set. 7.2.  ... 
doi:10.11575/prism/30968 fatcat:xqt6oao23rczhlrppigmd5hjfu

Student Modeling [chapter]

L. Enrique Sucar, Julieta Noguez
Statistics in Practice  
With sound motivation and many worked practical examples, the books show in down-to-earth terms how to select and use an appropriate range of statistical techniques in a particular practical field within  ...  Statistics in Practice is an important international series of texts which provide detailed coverage of statistical concepts, methods and worked case studies in specific fields of investigation and study  ...  Acknowledgment The results presented in this work were supported by CONYCIT-Chile, under grant FONDEF D01-1016, 'Chilean Red Wine Classification by means of Intelligent Instrumentation'.  ... 
doi:10.1002/9780470994559.ch10 fatcat:jzbotiwcy5aj7hndarqvmb2ruq

LIPIcs, Volume 71, SNAPL'17, Complete Volume [article]

Benjamin S. Lerner, Rastislav Bodík, Shriram Krishnamurthi
Amal Ahmed led an extremely stimulating discussion on the nature and limitation of the full abstraction results provided by factorization through canonical forms in Theorem 2, which we tried to summarize  ...  We thank the anonymous reviewers for their feedback and suggestions to improve our manuscript. Acknowledgements.  ...  In these situations, we plan to build on existing automated fault localization techniques [18, 38, 39] . Note that features like these are not themselves novel.  ... 
doi:10.4230/lipics.snapl.2017 fatcat:tmxd6cpxebfbdi6xs3ki5cbgfi
« Previous Showing results 1 — 15 out of 25 results