Sciweavers

57 search results - page 3 / 12
» Extraction of bug localization benchmarks from history
Sort
View
PKDD
2009
Springer
120views Data Mining» more  PKDD 2009»
14 years 1 months ago
Variational Graph Embedding for Globally and Locally Consistent Feature Extraction
Existing feature extraction methods explore either global statistical or local geometric information underlying the data. In this paper, we propose a general framework to learn fea...
Shuang-Hong Yang, Hongyuan Zha, Shaohua Kevin Zhou...
IFIP
2010
Springer
13 years 2 months ago
Modular Plans for Secure Service Composition
Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from ...
Gabriele Costa, Pierpaolo Degano, Fabio Martinelli
ICTCS
2005
Springer
14 years 26 days ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ECOOP
2008
Springer
13 years 9 months ago
Practical Object-Oriented Back-in-Time Debugging
Back-in-time debuggers are extremely useful tools for identifying the causes of bugs. Unfortunately the "omniscient" approaches that try to remember all previous states a...
Adrian Lienhard, Tudor Gîrba, Oscar Nierstra...
TSE
2008
165views more  TSE 2008»
13 years 7 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han