Sciweavers

180 search results - page 27 / 36
» Locating causes of program failures
Sort
View
ICSM
2009
IEEE
14 years 7 months ago
Effective and efficient localization of multiple faults using value replacement
We previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement [9]. The tech...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta
80
Voted
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
61
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
71
Voted
ICSM
1997
IEEE
15 years 1 months ago
Software Change Through Design Maintenance
Conventional software engineering tends to focus on a small part of the software life cycle: the design and implementation of a product. The bulk of the lifetime cost is in the ma...
Ira D. Baxter, Christopher Pidgeon
IJCAI
1989
14 years 10 months ago
Utilization Filtering: A Method for Reducing the Inherent Harmfulness of Deductively Learned Knowledge
This paper highlights a phenomenon that causes deductively learned knowledge to be harmful when used for problem solving. The problem occurs when deductive problem solvers encount...
Shaul Markovitch, Paul D. Scott