Sciweavers

ISSTA
2000
ACM
13 years 9 months ago
Which pointer analysis should I use?
During the past two decades many di erent pointer analysis algorithms have been published. Although some descriptions include measurements of the e ectiveness of the algorithm, qu...
Michael Hind, Anthony Pioli
ISSTA
2000
ACM
13 years 9 months ago
Simplifying failure-inducing input
Given some test case, a program fails. Which part of the test case is responsible for the particular failure? We show how our delta debugging algorithm generalizes and simplifies...
Ralf Hildebrandt, Andreas Zeller
ISSTA
2000
ACM
13 years 9 months ago
UML-Based integration testing
Increasing numbers of software developers are using the Unified Modeling Language (UML) and associated visual modeling tools as a basis for the design and implementation of their ...
Jean Hartmann, Claudio Imoberdorf, Michael Meising...
ISSTA
2000
ACM
13 years 9 months ago
A framework for testing database applications
David Chays, Saikat Dan, Phyllis G. Frankl, Filipp...
ISSTA
2000
ACM
13 years 9 months ago
Automated Testing of Classes
Ugo A. Buy, Alessandro Orso, Mauro Pezzè
ISSTA
2000
ACM
13 years 9 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
ISSTA
2000
ACM
13 years 9 months ago
Putting static analysis to work for verification: A case study
Tal Lev-Ami, Thomas W. Reps, Shmuel Sagiv, Reinhar...