Sciweavers

SIGSOFT
2010
ACM
13 years 5 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
SIGSOFT
2010
ACM
13 years 5 months ago
LINKSTER: enabling efficient manual inspection and annotation of mined data
While many uses of mined software engineering data are automatic in nature, some techniques and studies either require, or can be improved, by manual methods. Unfortunately, manua...
Christian Bird, Adrian Bachmann, Foyzur Rahman, Ab...
SIGSOFT
2010
ACM
13 years 5 months ago
Directed test suite augmentation: techniques and tradeoffs
Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements. Our preliminary...
Zhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rotherme...
SIGSOFT
2010
ACM
13 years 5 months ago
Language-based replay via data flow cut
A replay tool aiming to reproduce a program's execution interposes itself at an appropriate replay interface between the program and the environment. During recording, it log...
Ming Wu, Fan Long, Xi Wang, Zhilei Xu, Haoxiang Li...
SIGSOFT
2010
ACM
13 years 5 months ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
SIGSOFT
2010
ACM
13 years 5 months ago
Combining hardware and software instrumentation to classify program executions
Several research efforts have studied ways to infer properties of software systems from program spectra gathered from the running systems, usually with software-level instrumentat...
Cemal Yilmaz, Adam A. Porter
SIGSOFT
2010
ACM
13 years 5 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
SIGSOFT
2010
ACM
13 years 5 months ago
A trace simplification technique for effective debugging of concurrent programs
Concurrent programs are notoriously difficult to debug. We see two main reasons for this: 1) concurrency bugs are often difficult to reproduce, 2) traces of buggy concurrent execu...
Nicholas Jalbert, Koushik Sen
SIGSOFT
2010
ACM
13 years 5 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
SIGSOFT
2010
ACM
13 years 5 months ago
Locating need-to-translate constant strings in web applications
Software internationalization aims to make software accessible and usable by users all over the world. For a Java application that does not consider internationalization at the be...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...