6 papers:
- ISSTA-2013-ParkHV #comprehension #concurrent #data access #debugging #named
- Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
- WCRE-2011-CheathamR
- Function Insight: Highlighting Suspicious Sections in Binary Run Traces (MC, JR), pp. 433–434.
- RecSys-2010-WuGC #identification #multi
- Merging multiple criteria to identify suspicious reviews (GW, DG, PC), pp. 241–244.
- ICML-2009-MaSSV #identification #learning #online #scalability
- Identifying suspicious URLs: an application of large-scale online learning (JM, LKS, SS, GMV), pp. 681–688.
- KDD-2009-MaSSV #detection #learning #web
- Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
- LCTES-2007-HuangCTC #automation #fault #locality #statistics
- Automated fault localization with statistically suspicious program states (TYH, PCC, CHT, HAC), pp. 11–20.