BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (23)
atom (16)
softwar (9)
constraint (8)
analysi (8)

Stem violat$ (all stems)

70 papers:

TACASTACAS-2015-ZengSLH #precise #predict
A Method for Improving the Precision and Coverage of Atomicity Violation Predictions (RZ, ZS, SL, XH), pp. 116–130.
SANERSANER-2015-HeroldEBCC #detection #modelling
Detection of violation causes in reflexion models (SH, ME, JB, SC, MÓC), pp. 565–569.
SANERSANER-2015-OumarouAEDK #identification
Identifying the exact fixing actions of static rule violation (HO, NA, AE, SD, DTK), pp. 371–379.
SACSAC-2015-AwadBESAS #anti #approach #detection #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-SenaCK #exception #product line
An investigation on the evolutionary nature of exception handling violations in software product lines (DS, RC, UK), pp. 1616–1623.
ESEC-FSEESEC-FSE-2015-SamakR #detection #testing
Synthesizing tests for detecting atomicity violations (MS, MKR), pp. 131–142.
ICSEICSE-v1-2015-AvgustinovBHLMM #developer #static analysis
Tracking Static Analysis Violations over Time to Capture Developer Characteristics (PA, AIB, ASH, RGL, GM, OdM, MS, JT), pp. 437–447.
ICLPICLP-J-2015-MannaRT #consistency #query #scalability
Taming primary key violations to query large inconsistent data via ASP (MM, FR, GT), pp. 696–710.
DACDAC-2014-WuWNBP #on the
On Timing Closure: Buffer Insertion for Hold-Violation Removal (PCW, MDFW, IN, SB, VP), p. 6.
SEFMSEFM-2014-ChristakisMW #detection #invariant #testing
Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations (MC, PM, VW), pp. 65–80.
OOPSLAOOPSLA-2014-LiuTZ #named
Flint: fixing linearizability violations (PL, OT, XZ), pp. 543–560.
RERE-2014-TsigkanosPMGN #adaptation #requirements #runtime #security
Engineering topology aware adaptive security: Preventing requirements violations at runtime (CT, LP, CM, CG, BN), pp. 203–212.
ISSTAISSTA-2014-ZhangW #concurrent #parallel #runtime #thread
Runtime prevention of concurrency related type-state violations in multithreaded applications (LZ, CW), pp. 1–12.
DACDAC-2013-ChakrabortyCRA #pipes and filters
Efficiently tolerating timing violations in pipelined microprocessors (KC, BC, SR, DMA), p. 8.
SIGMODSIGMOD-2013-GraefeLKTV
Controlled lock violation (GG, ML, HAK, JT, ACV), pp. 85–96.
ICPCICPC-2013-PruijtKB #analysis #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
WCREWCRE-2013-MaffortVBAH #architecture #heuristic
Heuristics for discovering architectural violations (CAM, MTV, MAdSB, NA, AH), pp. 222–231.
HCIHIMI-HSM-2013-KarashimaN #behaviour #safety
Influence of the Safety Margin on Behavior that Violates Rules (MK, HN), pp. 497–506.
ASPLOSASPLOS-2013-QianTSQ #consistency #detection #named #precise #scalability
Volition: scalable and precise sequential consistency violation detection (XQ, JT, BS, DQ), pp. 535–548.
DACDAC-2012-RoyC #analysis #predict
Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
WCREWCRE-2012-BrunetBGF #architecture #on the
On the Evolutionary Nature of Architectural Violations (JB, RAB, DSG, JCAdF), pp. 257–266.
PLDIPLDI-2012-PradelG #automation #concurrent #detection #precise #safety #thread
Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
ICSEICSE-2012-LiuZ #automation #constraints #named
Axis: Automatically fixing atomicity violations through solving control constraints (PL, CZ), pp. 299–309.
ASEASE-2011-Ganai #analysis #precise #scalability
Scalable and precise symbolic analysis for atomicity violations (MKG), pp. 123–132.
CSMRCSMR-2011-FreyH #architecture #constraints #detection #legacy #migration
An Extensible Architecture for Detecting Violations of a Cloud Environment’s Constraints during Legacy Software System Migration (SF, WH), pp. 269–278.
MSRMSR-2011-HemelKVD #clone detection #detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
PLDIPLDI-2011-JinSZLL #automation
Automated atomicity-violation fixing (GJ, LS, WZ, SL, BL), pp. 389–400.
EDOCEDOC-2011-Halle #contract #logic #message passing
Causality in Message-Based Contract Violations: A Temporal Logic “Whodunit” (SH), pp. 171–180.
ICSEICSE-2011-WongCKD #composition #detection
Detecting software modularity violations (SW, YC, MK, MD), pp. 411–420.
ECSAECSA-2010-ScandariatoBJ #architecture #automation #detection
Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
VLDBVLDB-2010-BeskalesIG #constraints #dependence #functional
Sampling the Repairs of Functional Dependency Violations under Hard Constraints (GB, IFI, LG), pp. 197–207.
TACASTACAS-2010-WangLGG #analysis
Trace-Based Symbolic Analysis for Atomicity Violations (CW, RL, MKG, AG), pp. 328–342.
FSEFSE-2010-SorrentinoFM #named #thread #weaving
PENELOPE: weaving threads to expose atomicity violations (FS, AF, PM), pp. 37–46.
ICSEICSE-2010-LaiCC #detection #parallel #random #source code #testing #thread
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing (ZL, SCC, WKC), pp. 235–244.
DATEDATE-2009-GhoseGDAW #architecture #detection #memory management
Architectural support for low overhead detection of memory violations (SG, LG, PD, AA, CW), pp. 652–657.
DATEDATE-2009-YanHL #detection #fault #online
A unified online Fault Detection scheme via checking of Stability Violation (GY, YH, XL), pp. 496–501.
FASEFASE-2009-ChenWYS #detection #named #static analysis
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
TACASTACAS-2009-FarzanM #complexity #predict
The Complexity of Predicting Atomicity Violations (AF, PM), pp. 155–169.
MSRMSR-2009-BoogerdM #standard
Evaluating the relation between coding standard violations and faultswithin and across software versions (CB, LM), pp. 41–50.
SEKESEKE-2009-BrownBD #detection #named #open source
FiGD: An Open Source Intellectual Property Violation Detector (CDB, DB, DD), pp. 536–541.
SIGIRSIGIR-2009-CumminsO09a #constraints #information retrieval
Measuring constraint violations in information retrieval (RC, CO), pp. 722–723.
SACSAC-2009-ChavezSL #approach #detection #uml
An approach to detection of UML-based ownership violation (HMC, WS, SL), pp. 541–542.
ASPLOSASPLOS-2009-ParkLZ #debugging #named
CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
CGOCGO-2009-DuanFWZY #c #c++ #concurrent #consistency #detection #source code
Detecting and Eliminating Potential Violations of Sequential Consistency for Concurrent C/C++ Programs (YD, XF, LW, CZ, PCY), pp. 25–34.
CAVCAV-2009-FarzanMS
Meta-analysis for Atomicity Violations under Nested Locking (AF, PM, FS), pp. 248–262.
ISSTAISSTA-2009-SchulerDZ #invariant #mutation testing #performance #testing
Efficient mutation testing by checking invariant violations (DS, VD, AZ), pp. 69–80.
DATEDATE-2008-ZhangZYZSPZCMSIC #multi #network
Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network (WZ, YZ, WY, LZ, RS, HP, ZZ, LCE, RM, TS, NI, CKC), pp. 537–540.
SEKESEKE-2008-TsigkritisS #dependence #runtime #security
Diagnosing Runtime Violations of Security & Dependability Properties (TT, GS), pp. 661–666.
FSEFSE-2008-KingJJS #data flow #effectiveness
Effective blame for information-flow violations (DK, TJ, SJ, SAS), pp. 250–260.
FSEFSE-2008-ParkS #concurrent #detection #random #source code
Randomized active atomicity violation detection in concurrent programs (CSP, KS), pp. 135–145.
ICSEICSE-2008-HammerDVT #detection
Dynamic detection of atomic-set-serializability violations (CH, JD, MV, FT), pp. 231–240.
DACDAC-2007-SundaresanM #analysis #distributed
An Analysis of Timing Violations Due to Spatially Distributed Thermal Effects in Global Wires (KS, NRM), pp. 515–520.
DATEDATE-2007-SinanogluS #modelling
Diagnosis, modeling and tolerance of scan chain hold-time violations (OS, PS), pp. 516–521.
CSMRCSMR-2007-BourqunK #architecture #refactoring
High-impact Refactoring Based on Architecture Violations (FB, RKK), pp. 149–158.
ESEC-FSEESEC-FSE-2007-YeCCX #composition #detection
Detection and resolution of atomicity violation in service composition (CY, SCC, WKC, CX), pp. 235–244.
ASPLOSASPLOS-2006-LuTQZ #detection #invariant #named
AVIO: detecting atomicity violations via access interleaving invariants (SL, JT, FQ, YZ), pp. 37–48.
VLDBVLDB-2005-YaoWJ
Checking for k-Anonymity Violation by Views (CY, XSW, SJ), pp. 910–921.
PLDIPLDI-2005-ElmasTQ #concurrent #detection #named #runtime #source code #verification
VYRD: verifYing concurrent programs by runtime refinement-violation detection (TE, ST, SQ), pp. 27–37.
PLDIPLDI-2005-XuBH #detection #source code
A serializability violation detector for shared-memory server programs (MX, RB, MDH), pp. 1–14.
CAiSECAiSE-2005-CabotT #constraints #ocl
Computing the Relevant Instances That May Violate an OCL Constraint (JC, ET), pp. 48–62.
EDOCEDOC-2005-GovernatoriM #contract #domain-specific language
Dealing with contract violations: formalism and domain specific language (GG, ZM), pp. 46–57.
ESEC-FSEESEC-FSE-2005-LiZ #automation #detection #named #programming #scalability
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code (ZL, YZ), pp. 306–315.
KDDKDD-2004-KantarciogluJC #data mining #mining #privacy #question
When do data mining results violate privacy? (MK, JJ, CC), pp. 599–604.
UMLUML-2004-CabotT #constraints
Determining the Structural Events That May Violate an Integrity Constraint (JC, ET), pp. 320–334.
ASEASE-2003-XieN #testing
Tool-Assisted Unit Test Selection Based on Operational Violations (TX, DN), pp. 40–48.
SEKESEKE-2002-JohanssonH #design #metric #product line
Tracking degradation in software product lines through measurement of design rule violations (EJ, MH), pp. 249–254.
HPCAHPCA-2002-CintraT #learning #parallel #thread
Speculative Multithreading Eliminating Squashes through Learning Cross-Thread Violations in Speculative Parallelization for Multiprocessors (MHC, JT), pp. 43–54.
ICPRICPR-v1-2000-TordoffM #geometry #self
Violating Rotating Camera Geometry: The Effect of Radial Distortion on Self-Calibration (BT, DWM), pp. 1423–1427.
ICSMECSM-1993-ChowdhuryM #automation #constraints #detection #maintenance
Facilitating Software Maintenance by Automated Detection of Constraint Violations (AC, SM), pp. 262–271.
STOCSTOC-1992-LinV #approximate #constraints
epsilon-Approximations with Minimum Packing Constraint Violation (Extended Abstract) (JHL, JSV), pp. 771–782.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.