The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Software Testing and Analysis (ISSTA) (issta)
2009 (conf/issta/2009)

  1. Exception analysis and points-to analysis: better together. [Citation Graph (, )][DBLP]

  2. Analyzing singularity channel contracts. [Citation Graph (, )][DBLP]

  3. Identifying semantic differences in AspectJ programs. [Citation Graph (, )][DBLP]

  4. Advanced code coverage analysis using substring holes. [Citation Graph (, )][DBLP]

  5. A formal analysis of requirements-based testing. [Citation Graph (, )][DBLP]

  6. The influence of size and coverage on test suite effectiveness. [Citation Graph (, )][DBLP]

  7. Efficient mutation testing by checking invariant violations. [Citation Graph (, )][DBLP]

  8. Automatic mining of functionally equivalent code fragments via random testing. [Citation Graph (, )][DBLP]

  9. A comparative study of programmer-written and automatically inferred contracts. [Citation Graph (, )][DBLP]

  10. HAMPI: a solver for string constraints. [Citation Graph (, )][DBLP]

  11. Detecting code clones in binary executables. [Citation Graph (, )][DBLP]

  12. Precise pointer reasoning for dynamic test generation. [Citation Graph (, )][DBLP]

  13. Identifying bug signatures using discriminative graph mining. [Citation Graph (, )][DBLP]

  14. Fault localization and repair for Java runtime exceptions. [Citation Graph (, )][DBLP]

  15. Memory slicing. [Citation Graph (, )][DBLP]

  16. Incremental covering array failure characterization in large configuration spaces. [Citation Graph (, )][DBLP]

  17. Automatic system testing of programs without test oracles. [Citation Graph (, )][DBLP]

  18. Clustering test cases to achieve effective and scalable prioritisation incorporating expert knowledge. [Citation Graph (, )][DBLP]

  19. Time-aware test-case prioritization using integer linear programming. [Citation Graph (, )][DBLP]

  20. Loop-extended symbolic execution on binary programs. [Citation Graph (, )][DBLP]

  21. AVA: automated interpretation of dynamically detected anomalies. [Citation Graph (, )][DBLP]

  22. Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. [Citation Graph (, )][DBLP]

  23. Testing CPU emulators. [Citation Graph (, )][DBLP]

  24. Specifying the worst case: orthogonal modeling of hardware errors. [Citation Graph (, )][DBLP]

  25. Precise interface identification to improve testing and analysis of web applications. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002