7 papers:
- ASPLOS-2014-RuwaseKGM #approach #hardware #named
- Guardrail: a high fidelity approach to protecting hardware devices from buggy drivers (OR, MAK, PBG, TCM), pp. 655–670.
- ICSE-2012-LiE #detection #named
- CBCD: Cloned buggy code detector (JL, MDE), pp. 310–320.
- ASE-2011-NguyenNANN #approach #debugging #topic
- A topic-based approach for narrowing the search space of buggy files from a bug report (ATN, TTN, JMAK, HVN, TNN), pp. 263–272.
- MSR-2011-EyolfsonTL #commit #debugging #developer #experience
- Do time of day and developer experience affect commit bugginess (JE, LT, PL), pp. 153–162.
- ESEC-FSE-2011-MirghasemiBP #execution #named
- Querypoint: moving backwards on wrong values in the buggy execution (SM, JJB, CP), pp. 436–439.
- OOPSLA-2010-GabelYYGS #consistency #detection #nondeterminism #scalability #source code
- Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
- SOFTVIS-2006-VoineaT06a #how #question
- How do changes in buggy Mozilla files propagate? (LV, ACT), pp. 147–148.