منابع مشابه
Software Fault Localization via Mining Execution Graphs
Software fault localization has attracted a lot of attention recently. Most existing methods focus on finding a single suspicious statement of code which is likelihood of containing bugs. Despite the accuracy of such methods, developers have trouble understanding the context of the bug, given each bug location in isolation. There is a high possibility of locating bug contexts through finding di...
متن کاملContext-Aware Fault Localization via Control Flow Analysis
Coverage-based fault localization techniques are effective to support program debugging. However, these techniques assess the suspiciousness of program entities individually. Such calculation oversimplifies executions and cannot reflect execution contexts. In this paper, we use control flow paths to analyze the execution context, quantify edge profiles to assess how each block contributes to fa...
متن کاملFault Localization via Mining Program Dynamic Execution Graph ⋆
This paper is concerned with the problem of locating the code area related to software potential fault quickly and accurately in software testing period. A new method Sig BB based on graph model is proposed for mining the suspicious fault nodes from the passing and failing execution graphs. Representing each execution of a program as a graph, the graphs are divided into the passing and failing ...
متن کاملModeling for Fault Localization in Data Warehouse Applications
The paper describes first results of an attempt to develop a general tool for localizing faults in applications of data warehouse technology. Genericity is achieved by a modelbased approach: a model of the application is configured from a library of models of standard (types of) modules and exploited by a consistency-based diagnosis algorithm, originally used for diagnosing physical devices. In...
متن کاملFault Localization in Web Applications via Model Finding
We describe a generic technique for fault localization independent from the nature of the object or the specification language used to declare its expected properties. This technique is based on the concept of “repair”, a minimal set of transformations which, when applied to the original object, restores its satisfiability with respect to the specification. We show how this technique can be app...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2010
ISSN: 1545-5971
DOI: 10.1109/tdsc.2009.37