Interactive semi-automated specification mining for debugging: An experience report
Tài liệu tham khảo
Ackermann, 2010, Automatic requirement extraction from test cases, 1
Al-Sharif, 2009
Biermann, 1972, On the synthesis of finite-state machines from samples of their behavior, IEEE Trans. Comput., 100, 592, 10.1109/TC.1972.5009015
Böhme, 2017, Where is the bug and how is it fixed? An experiment with practitioners, 1
Bruneliere, 2014, Modisco: a model driven reverse engineering framework, Inf. Softw. Technol., 56, 1012, 10.1016/j.infsof.2014.04.007
Cheng, 2009, Identifying bug signatures using discriminative graph mining, 141
Christodorescu, 2007, Mining specifications of malicious behavior, 5
Cook, 1998, Discovering models of software processes from event-based data, ACM Trans. Softw. Eng. Methodol., 7, 215, 10.1145/287000.287001
Cornelissen, 2009, A systematic survey of program comprehension through dynamic analysis, IEEE Trans. Softw. Eng., 35, 684, 10.1109/TSE.2009.28
Dallmeier, 2010, Generating test cases for specification mining, 85
Dallmeier, 2006, Mining object behavior with ADABU, 17
Dallmeier, 2009, Generating fixes from object behavior anomalies, 550
Damas, 2005, Generating annotated behavior models from end-user scenarios, IEEE Trans. Softw. Eng., 31, 1056, 10.1109/TSE.2005.138
Dupont, 2008, The QSM algorithm and its application to software behavior model induction, Appl. Artif. Intell., 22, 77, 10.1080/08839510701853200
Ernst, 2007, The Daikon system for dynamic detection of likely invariants, Sci. Comput. Program., 69, 35, 10.1016/j.scico.2007.01.015
Fraser, 2012, Behaviourally adequate software testing, 300
Friedrich, 1999, Model-based diagnosis of hardware designs, Artif. Intell., 111, 3, 10.1016/S0004-3702(99)00034-X
Goldstein, 2017, Experience report: Log-based behavioral differencing, 282
Guest, 2006, How many interviews are enough? An experiment with data saturation and variability, Field Methods, 18, 59, 10.1177/1525822X05279903
Hassan, 2015, Software reverse engineering to requirement engineering for evolution of legacy system, 1
Hemmati, 2017, Analytics-based safety monitoring and verification, 3608
D. Hiebert, Exuberant ctags, 1999.
Hsu, 2008, Rapid: Identifying bug signatures to support debugging activities, 439
Isenberg, 2013, A systematic review on the practice of evaluating visualization, IEEE Trans. Vis. Comput. Graph., 19, 2818, 10.1109/TVCG.2013.126
Krka, 2010, Using dynamic execution traces and program invariants to enhance behavioral model inference, 179
Lang, 1998, Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm, 1
Le, 2015, Synergizing specification miners through model fissions and fusions (t), 115
Lemieux, 2015, General LTL specification mining (t), 81
Lo, 2011
Lo, 2008, Mining scenario-based triggers and effects, 109
Lo, 2009, Mining hierarchical scenario-based specifications, 359
Lo, 2012, Scenario-based and value-based specification mining: better together, Autom. Softw. Eng., 19, 423, 10.1007/s10515-012-0103-x
Lo, 2007, Mining modal scenario-based specifications from execution traces of reactive systems, 465
Lo, 2012, Learning extended FSA from software: an empirical assessment, J. Syst. Softw., 85, 2063, 10.1016/j.jss.2012.04.001
Lorenzoli, 2008, Automatic generation of software behavioral models, 501
Malik, 2013, Automatic detection of performance deviations in the load testing of large scale systems, 1012
Maoz, 2009, Using model-based traces as runtime models, Computer (Long Beach Calif), 42, 28
Mateis, 2000, Modeling java programs for diagnosis, 171
Mayer, 2007, Model-based debugging–state of the art and future challenges, Electron. Notes Theor. Comput. Sci., 174, 61, 10.1016/j.entcs.2006.12.030
Neil Walkinshaw, Model inference tool, 2018. https://github.com/neilwalkinshaw/mintframework, Last accessed on 2019-02-25.
Nielsen, 1990, Heuristic evaluation of user interfaces, 249
Parmar, 2016, Software fault localization: a survey, Int. J. Comput. Appl., 154, 6
Pradel, 2010, A framework for the evaluation of specification miners based on finite state machines, 1
Pradel, 2012, Leveraging test generation and specification mining for automated bug detection without false positives, 288
Shang, 2013, Assisting developers of Big Data analytics applications when deploying on Hadoop clouds, 402
Shoham, 2008, Static specification mining using automata-based abstractions, IEEE Trans. Softw. Eng., 34, 651, 10.1109/TSE.2008.63
Spinellis, 2016
Sun, 2013, Mining succinct predicated bug signatures, 576
Taylor, 2012, Using behaviour inference to optimise regression test sets, 184
Valdes, 2000, Adaptive, model-based monitoring for cyber attack detection, 80
Valdes, 2000, Adaptive, model-based monitoring for cyber attack detection, 80
Walkinshaw, 2008, Inferring finite-state models with temporal constraints, 248
Walkinshaw, 2007, Reverse engineering state machines by interactive grammar inference, 209
Walkinshaw, 2007, Reverse engineering state machines by interactive grammar inference, 209
Walkinshaw, 2016, Inferring extended finite state machine models from software executions, Empir. Softw. Eng., 21, 811, 10.1007/s10664-015-9367-7
Wong, 2016, A survey on software fault localization, IEEE Trans. Softw. Eng., 42, 707, 10.1109/TSE.2016.2521368
Xia, 2017, “Automated debugging considered harmful” considered harmful: a user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, 267
Xie, 2016, Revisit of automatic debugging via human focus-tracking analysis, 808
Yan, 2008, Mining significant graph patterns by leap search, 433
Ziadi, 2014, Towards a language-independent approach for reverse-engineering of software product lines, 1064
Zuo, 2014, Efficient predicated bug signature mining via hierarchical instrumentation, 215
