BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
path (10)
detect (7)
test (3)
analysi (3)
program (3)

Stem infeas$ (all stems)

18 papers:

ICSTICST-2015-BardinDDKPTM #detection #requirements
Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
SANERCSMR-WCRE-2014-DingZT #branch #detection
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
ICEISICEIS-v3-2012-WangWZLW #detection #modelling #process
Detecting Infeasible Traces in Process Models (ZW, LW, XZ, YL, JW), pp. 212–217.
CAVCAV-2012-ArltS #detection #java #named
Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
DATEDATE-2011-AndalamRG #analysis #source code
Pruning infeasible paths for tight WCRT analysis of synchronous programs (SA, PSR, AG), pp. 204–209.
ICSTICST-2010-DelahayeBG
Explanation-Based Generalization of Infeasible Path (MD, BB, AG), pp. 215–224.
DACDAC-2009-ArbelER
Resurrecting infeasible clock-gating functions (EA, CE, OR), pp. 160–165.
SASSAS-2008-BalakrishnanSIWG #analysis #detection #named #refinement
SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
STOCSTOC-2008-FortnowS
Infeasibility of instance compression and succinct PCPs for NP (LF, RS), pp. 133–142.
ESEC-FSEESEC-FSE-2007-NgoT #detection #scalability
Detecting large number of infeasible paths through recognizing their patterns (MNN, HBKT), pp. 215–224.
DACDAC-2006-SuhendraMRC #analysis #detection #performance
Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
SCAMSCAM-J-2001-SouterP02 #automation #identification
Characterization and automatic identification of type infeasible call chains (ALS, LLP), pp. 721–732.
SCAMSCAM-2001-SouterP
Type Infeasible Call Chains (ALS, LLP), pp. 196–205.
ASEASE-2000-BuenoJ #identification #monitoring #testing
Identification of Potentially Infeasible Program Paths by Monitoring the Search for Test Data (PMSB, MJ), pp. 209–218.
ESECESEC-FSE-1997-BodikGS #data flow #using
Refining Data Flow Information Using Infeasible Paths (RB, RG, MLS), pp. 361–377.
SACSAC-1993-SekharanW #algorithm #search-based
Manipulating Subpopulations of Feasible and Infeasible Solutions in Genetic Algorithms (DAS, RLW), pp. 118–125.
ISSTATAV-1989-YatesM #branch #testing
Reducing the Effects of Infeasible Paths in Branch Testing (DFY, NM), pp. 48–54.
ICSEICSE-1985-HedleyH #source code
The Causes and Effects of Infeasible Paths in Computer Programs (DH, MAH), pp. 259–267.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.