We present an effective static deadlock detection algorithm for Java. Our algorithm uses a novel combination of static analyses each of which approximates a different necessary co...
Mayur Naik, Chang-Seo Park, Koushik Sen, David Gay
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
We present a new automated white box fuzzing technique and a tool, BuzzFuzz, that implements this technique. Unlike standard fuzzing techniques, which randomly change parts of the...
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
Features express the variabilities and commonalities among programs in a software product line (SPL). A feature model defines the valid combinations of features, where each combin...
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Context-aware Web services are currently emerging as an important technology for building innovative contextaware applications. Unfortunately, context-aware Web services are still...
Quan Z. Sheng, Sam Pohlenz, Jian Yu, Hoi S. Wong, ...