实例介绍
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) ACM组织的,在软件测试与分析方面最著名的国际会议,International Symposium on Software Testing and Analysis 2011年的论文集。 传统观点认为这个会议和ICSE,POPL等大会相比层次要稍逊一筹,但我个人认为其专业性较
【实例截图】
【核心代码】
ISSTA2011
└── ISSTA 2011-International Symposium on Software Testing and Analysis 2011
├── Analysis of systems and binary code
│ ├── Defective error pointer interactions in the Linux kernel.pdf
│ ├── Efficient, sensitivity resistant binary instrumentation.pdf
│ └── Recovering the toolchain provenance of binary code.pdf
├── Combinatorial and random testing
│ ├── Adaptive random testing _ an illusion of effectiveness.pdf
│ ├── Feedback driven adaptive combinatorial testing.pdf
│ └── Using binary decision diagrams for combinatorial test design.pdf
├── Concurrency
│ ├── Change-aware preemption prioritization.pdf
│ ├── Persuasive prediction of concurrency access anomalies.pdf
│ └── Testing concurrent programs on relaxed memory models.pdf
├── Faults I
│ ├── Are automated debugging techniques actually helping programmers.pdf
│ ├── Detecting anomalies in the order of equally-typed method arguments.pdf
│ ├── Minimizing reproduction of software failures.pdf
│ └── On the influence of multiple faults on coverage-based fault localization.pdf
├── Faults II
│ ├── Characterizing failure-causing parameter interactions by adaptive testing.pdf
│ ├── Generating analyses for detecting faults in path segments.pdf
│ ├── Selecting peers for execution comparison.pdf
│ └── The use of mutation in testing experiments and its sensitivity to external threats.pdf
├── Models
│ ├── Automated framework for formal operator task analysis.pdf
│ ├── Bounded verification of Ruby on Rails data models.pdf
│ ├── Polyglot _ modeling and analysis for multiple Statechart formalisms.pdf
│ └── Scalable analysis of conceptual data models.pdf
├── Program analysis
│ ├── Demand-driven context-sensitive alias analysis for Java.pdf
│ ├── Geometric encoding _ forging the high performance context sensitive points-to analysis for Java.pdf
│ ├── Path- and index-sensitive string analysis based on monadic second-order logic.pdf
│ └── Saving the world wide web from vulnerable JavaScript.pdf
├── Specification and optimization
│ ├── CoDeSe _ fast deserialization via code generation.pdf
│ ├── Iterative refinement of specification for component based embedded systems.pdf
│ └── Using automatic persistent memoization to facilitate data analysis scripting.pdf
├── Test generation I
│ ├── Automatic partial loop summarization in dynamic test generation.pdf
│ ├── Statically-directed dynamic automated test generation.pdf
│ ├── Symbolic execution with mixed concrete-symbolic solving.pdf
│ └── eXpress _ guided path exploration for efficient regression test generation.pdf
└── Test generation II
├── Combined static and dynamic automated test generation.pdf
├── Generating parameterized unit tests.pdf
└── High coverage testing of Haskell programs.pdf
11 directories, 35 files
标签:
ISSTA 2011-International Symposium on Software Testing and Analysis
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论