Proceedings of the 21st International Symposium on Software Testing and Analysis
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Mats Per Erik Heimdahl, Zhendong Su
Proceedings of the 21st International Symposium on Software Testing and Analysis
ISSTA, 2012.

TEST
DBLP
Scholar
Full names Links ISxN
@proceedings{ISSTA-2012,
	acmid         = "2338965",
	address       = "Minneapolis, Minnesota, USA",
	editor        = "Mats Per Erik Heimdahl and Zhendong Su",
	isbn          = "978-1-4503-1454-1",
	publisher     = "{ACM}",
	title         = "{Proceedings of the 21st International Symposium on Software Testing and Analysis}",
	year          = 2012,
}

Contents (31 items)

ISSTA-2012-ThiesB #java #named #refactoring #source code
RefaFlex: safer refactorings for reflective Java programs (AT, EB), pp. 1–11.
ISSTA-2012-Walcott-JusticeMS #hardware #monitoring #named #testing
THeME: a system for testing by hardware monitoring events (KWJ, JM, MLS), pp. 12–22.
ISSTA-2012-YuL #approach #data flow #dependence #named #parallel #profiling
Multi-slicing: a compiler-supported parallel approach to data dependence profiling (HY, ZL), pp. 23–33.
ISSTA-2012-JensenJM
Remedying the eval that men do (SHJ, PAJ, AM), pp. 34–44.
ISSTA-2012-AlshahwanH #detection #fault #testing #web
State aware test case regeneration for improving web application test suite coverage and fault detection (NA, MH), pp. 45–55.
ISSTA-2012-AlkhalafCFBOK #analysis #consistency #difference #named #nondeterminism #string #validation
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
ISSTA-2012-GrossFZ #search-based #testing
Search-based system testing: high coverage, no false alarms (FG, GF, AZ), pp. 67–77.
ISSTA-2012-GroceZECR #testing
Swarm testing (AG, CZ, EE, YC, JR), pp. 78–88.
ISSTA-2012-ZhangED #composition #generative #pipes and filters #testing
Compositional load test generation for software pipelines (PZ, SGE, MBD), pp. 89–99.
ISSTA-2012-NguyenMT #combinator #effectiveness #generative #modelling #testing
Combining model-based and combinatorial testing for effective test case generation (CDN, AM, PT), pp. 100–110.
ISSTA-2012-ZhangJWLZ #algorithm #detection #towards
A first step towards algorithm plagiarism detection (FZ, YcJ, DW, PL, SZ), pp. 111–121.
ISSTA-2012-CanaliLBKCK #detection
A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
ISSTA-2012-CaballeroGMN #detection #named #pointer
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
ISSTA-2012-YangPK #execution #symbolic computation
Memoized symbolic execution (GY, CSP, SK), pp. 144–154.
ISSTA-2012-StrejcekT
Abstracting path conditions (JS, MT), pp. 155–165.
ISSTA-2012-GeldenhuysDV #execution #probability #symbolic computation
Probabilistic symbolic execution (JG, MBD, WV), pp. 166–176.
ISSTA-2012-FryLW #maintenance
A human study of patch maintainability (ZPF, BL, WW), pp. 177–187.
ISSTA-2012-StaatsHKR #comprehension #correctness #invariant
Understanding user understanding: determining correctness of generated program invariants (MS, SH, MK, GR), pp. 188–198.
ISSTA-2012-IqbalAB #algorithm #embedded #empirical #modelling #realtime #testing
Empirical investigation of search algorithms for environment model-based testing of real-time embedded software (MZZI, AA, LCB), pp. 199–209.
ISSTA-2012-HongAPKH #concurrent #source code #testing
Testing concurrent programs to achieve high synchronization coverage (SH, JA, SP, MK, MJH), pp. 210–220.
ISSTA-2012-ZhaiXCT #approach #named #parallel #thread
CARISMA: a context-sensitive approach to race-condition sample-instance selection for multithreaded applications (KZ, BX, WKC, THT), pp. 221–231.
ISSTA-2012-YiDFF #concurrent #java #thread
Cooperative types for controlling thread interference in Java (JY, TD, SNF, CF), pp. 232–242.
ISSTA-2012-ZhangLE #fault #parallel #thread #user interface
Finding errors in multithreaded GUI applications (SZ, HL, MDE), pp. 243–253.
ISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
ISSTA-2012-PradelHG #detection #parametricity #static analysis #type system
Static detection of brittle parameter typing (MP, SH, TRG), pp. 265–275.
ISSTA-2012-CoughlinCDS #source code #what
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say (DC, BYEC, AD, JGS), pp. 276–286.
ISSTA-2012-TombF #analysis #consistency #detection #nondeterminism #reachability
Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
ISSTA-2012-LiRCS #debugging #detection #precise #predict
Residual investigation: predictive and precise bug detection (KL, CR, CC, YS), pp. 298–308.
ISSTA-2012-RobetalerFZO #generative #testing
Isolating failure causes through test case generation (JR, GF, AZ, AO), pp. 309–319.
ISSTA-2012-KimCHKOSPMN #performance #testing
Efficient regression testing of ontology-driven systems (MK, JC, MJH, TMK, AO, JHS, ARP, KM, SBN), pp. 320–330.
ISSTA-2012-ZhangMZK #mutation testing #testing
Regression mutation testing (LZ, DM, LZ, SK), pp. 331–341.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.