Sciweavers

24 search results - page 4 / 5
» issta 2009
Sort
View
142
Voted
ISSTA
2009
ACM
15 years 10 months ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis
121
Voted
ISSTA
2009
ACM
15 years 10 months ago
A comparative study of programmer-written and automatically inferred contracts
Where do contracts — specification elements embedded in executable code — come from? To produce them, should we rely on the programmers, on automatic tools, or some combinati...
Nadia Polikarpova, Ilinca Ciupa, Bertrand Meyer
114
Voted
ISSTA
2009
ACM
15 years 10 months ago
Time-aware test-case prioritization using integer linear programming
Techniques for test-case prioritization re-order test cases to increase their rate of fault detection. When there is a fixed time budget that does not allow the execution of all ...
Lu Zhang, Shan-Shan Hou, Chao Guo, Tao Xie, Hong M...
124
Voted
ISSTA
2009
ACM
15 years 10 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
144
Voted
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...