Search Results - "General and reference Cross-computing tools and techniques"

Refine Results
  1. 1

    FAST approaches to scalable similarity-based test case prioritization by Miranda, Breno, Cruciani, Emilio, Verdecchia, Roberto, Bertolino, Antonia

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…Many test case prioritization criteria have been proposed for speeding up fault detection. Among them, similarity-based approaches give priority to the test…”
    Get full text
    Conference Proceeding
  2. 2

    Fixing Large Language Models' Specification Misunderstanding for Better Code Generation by Tian, Zhao, Chen, Junjie, Zhang, Xiangyu

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Code generation is to automatically generate source code conforming to a given programming specification, which has received extensive attention especially…”
    Get full text
    Conference Proceeding
  3. 3

    Parametric Falsification of Many Probabilistic Requirements Under Flakiness by Camilli, Matteo, Mirandola, Raffaela

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Falsification is a popular simulation-based testing method for Cyber-Physical Systems to find inputs that violate a formal requirement. It employs optimization…”
    Get full text
    Conference Proceeding
  4. 4

    Leveraging Propagated Infection to Crossfire Mutants by Du, Hang, Palepu, Vijay Krishna, Jones, James A.

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “… We conducted a study and found that many such surviving mutants (up to 84% for the subjects of our study…”
    Get full text
    Conference Proceeding
  5. 5

    Software Model Evolution with Large Language Models: Experiments on Simulated, Public, and Industrial Datasets by Tinnes, Christof, Welter, Alisa, Apel, Sven

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “… As with other software engineering artifacts, software models are subject to evolution. Supporting modelers in evolving software models with recommendations for model completions is still an open problem, though…”
    Get full text
    Conference Proceeding
  6. 6

    Taming the killer microsecond by Cho, Shenghsun, Suresh, Amoghavarsha, Palit, Tapti, Ferdman, Michael, Honarmand, Nima

    ISBN: 9781538662403, 153866240X
    Published: Piscataway, NJ, USA IEEE Press 20.10.2018
    “… Finding the root cause of this "Killer Microsecond" problem, is the subject of this work…”
    Get full text
    Conference Proceeding
  7. 7

    Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor by Feng, Qiong, Ma, Xiaotian, Ji, Huan, Song, Wei, Liang, Peng

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “… Using three open-source Kotlin-Java mixing projects as our subjects, Depends-Kotlin demonstrates high accuracy and performance in resolving Kotlin-Kotlin and Kotlin-Java dependencies relations…”
    Get full text
    Conference Proceeding
  8. 8

    An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles by Wang, Dinghua, Li, Shuqing, Xiao, Guanping, Liu, Yepang, Sui, Yulei, He, Pinjia, Lyu, Michael R.

    ISSN: 1558-1225
    Published: ACM 14.04.2024
    “… To bridge the research gap and deepen our understanding of UAV anomalies, we carried out an empirical study on this subject…”
    Get full text
    Conference Proceeding
  9. 9

    An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour by Chen, Jinfu, Shang, Weiyi, Hassan, Ahmed E., Wang, Yong, Lin, Jiangbin

    ISSN: 2643-1572
    Published: IEEE 01.11.2019
    “…Designing field-representative load tests is an essential step for the quality assurance of large-scale systems. Practitioners may capture user behaviour at…”
    Get full text
    Conference Proceeding
  10. 10

    The StageNet fabric for constructing resilient multicore systems by Gupta, Shantanu, Feng, Shuguang, Ansari, Amin, Blome, Jason, Mahlke, Scott

    ISBN: 9781424428366, 142442836X
    ISSN: 1072-4451
    Published: Washington, DC, USA IEEE Computer Society 08.11.2008
    “… Consequently, high reliability and fault tolerance, which have traditionally been subjects of interest for high-end server markets, are now getting emphasis in the mainstream desktop and embedded systems space…”
    Get full text
    Conference Proceeding
  11. 11

    Creating a cognitive metric of programming task difficulty by de Alwis, Brian, Murphy, Gail C, Minto, Shawn

    ISBN: 1605580392, 9781605580395
    ISSN: 0270-5257
    Published: 13.05.2008
    “… Despite careful effort in the selection and confirmation from our pilot subjects finding the two tasks to be of equivalent difficulty, the data from the experiment suggest the subjects found one…”
    Get full text
    Journal Article
  12. 12

    SBFT Tool Competition 2024 - Python Test Case Generation Track by Erni, Nicolas, Mohammed, Al-Ameen Mohammed Ali, Birchler, Christian, Derakhshanfar, Pouria, Lukasczyk, Stephan, Panichella, Sebastiano

    Published: ACM 14.04.2024
    “… budget of 400 seconds. We considered one configuration of each tool for each test subject and evaluated the tools…”
    Get full text
    Conference Proceeding
  13. 13

    Accurate Interprocedural Null-Dereference Analysis for Java by Nanda, Mangala Gowri, Sinha, Saurabh

    ISBN: 9781424434534, 142443453X
    ISSN: 0270-5257
    Published: Washington, DC, USA IEEE Computer Society 16.05.2009
    “…Null dereference is a commonly occurring defect in Java programs, and many static-analysis tools identify such defects. However, most of the existing tools…”
    Get full text
    Conference Proceeding
  14. 14

    Precimonious: tuning assistant for floating-point precision by Rubio-González, Cindy, Nguyen, Cuong, Nguyen, Hong Diep, Demmel, James, Kahan, William, Sen, Koushik, Bailey, David H., Iancu, Costin, Hough, David

    ISBN: 9781450323789, 1450323782
    ISSN: 2167-4329
    Published: New York, NY, USA ACM 17.11.2013
    “… Precimonious performs a search on the types of the floating-point program variables trying to lower their precision subject to accuracy constraints and performance goals…”
    Get full text
    Conference Proceeding
  15. 15

    Evaluating the Accuracy of Fault Localization Techniques by Ali, S., Andrews, J.H., Dhandapani, T., Wantao Wang

    ISBN: 1424452597, 9781424452590
    ISSN: 1938-4300
    Published: IEEE 01.11.2009
    “… Most of these claims have to do with evaluating FL accuracy. Our investigation centers on a new subject program having properties useful for FL experiments…”
    Get full text
    Conference Proceeding
  16. 16

    Dataset: Copy-based Reuse in Open Source Software by Jahanshahi, Mahmoud, Mockus, Audris

    ISSN: 2574-3864
    Published: ACM 15.04.2024
    “…In Open Source Software, the source code and any other resources available in a project can be viewed or reused by anyone subject to often permissive licensing restrictions…”
    Get full text
    Conference Proceeding
  17. 17

    Enhancing Incident Management: Insights from a Case Study at ING by Kapel, Eileen, Cruz, Luis, Spinellis, Diomidis, Van Deursen, Arie

    Published: ACM 16.04.2024
    “… This paper aims to enhance understanding of the current state of practice through a single-case exploratory case study, at the international bank ING, by interviewing 15 subject matter experts…”
    Get full text
    Conference Proceeding
  18. 18

    Predicting common web application vulnerabilities from input validation and sanitization code patterns by Shar, Lwin Khin, Tan, Hee Beng Kuan

    ISBN: 1450312047, 9781450312042
    Published: New York, NY, USA ACM 03.09.2012
    “…Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate…”
    Get full text
    Conference Proceeding
  19. 19

    The Effect of Information Content and Length on Name Recollection by Etgar, Asaf, Friedman, Ram, Haiman, Shaked, Perez, Dana, Feitelson, Dror G.

    ISSN: 2643-7171
    Published: ACM 01.05.2022
    “… they are. We show in two independent experiments involving a total of 190 subjects that informative names are usually easier to recollect than similar-length names which contain less focused information…”
    Get full text
    Conference Proceeding
  20. 20

    Ethical Mining - A Case Study on MSR Mining Challenges by Gold, Nicolas E., Krinke, Jens

    ISSN: 2574-3864
    Published: ACM 01.05.2020
    “…Research in Mining Software Repositories (MSR) is research involving human subjects, as the repositories usually contain data about developers' interactions with the repositories…”
    Get full text
    Conference Proceeding