


default search action
ISSTA 2004: Boston, Massachusetts, USA
- George S. Avrunin, Gregg Rothermel:

Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2004, Boston, Massachusetts, USA, July 11-14, 2004. ACM 2004, ISBN 1-58113-820-2
Program analysis I
- Atanas Rountev, Scott Kagan, Michael Gibas:

Static and dynamic analysis of call chains in Java. 1-11 - Nurit Dor, Stephen Adams, Manuvir Das, Zhe Yang:

Software validation via scalable path-sensitive value flow analysis. 12-22 - Chen Fu, Barbara G. Ryder, Ana L. Milanova, David Wonnacott:

Testing of java web services for robustness. 23-34 - Mihai Christodorescu, Somesh Jha:

Testing malware detectors. 34-44
Testing I
- Cemal Yilmaz

, Myra B. Cohen, Adam A. Porter:
Covering arrays for efficient fault characterization in complex configuration spaces. 45-54 - Lev Nachmanson, Margus Veanes, Wolfram Schulte, Nikolai Tillmann, Wolfgang Grieskamp:

Optimal strategies for testing nondeterministic systems. 55-64
Empirical studies
- Sebastian G. Elbaum, Madeline Hardojo:

An empirical study of profiling strategies for released software and their impact on testing activities. 65-75 - David Saff, Michael D. Ernst:

An experimental evaluation of continuous testing during development. 76-85 - Thomas J. Ostrand, Elaine J. Weyuker, Robert M. Bell:

Where the bugs are. 86-96
Test generation
- Willem Visser, Corina S. Pasareanu, Sarfraz Khurshid:

Test input generation with java PathFinder. 97-107 - André Baresel, David W. Binkley, Mark Harman, Bogdan Korel:

Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach. 108-118 - Paolo Tonella

:
Evolutionary testing of classes. 119-128 - Alan Hartman, Kenneth Nagin:

The AGEDIS tools for model based testing. 129-132
Testing II
- Kevin J. Sullivan

, Jinlin Yang, David Coppit, Sarfraz Khurshid, Daniel Jackson:
Software assurance by bounded exhaustive testing. 133-142 - Karl Meinke:

Automated black-box testing of functional correctness using function approximation. 143-153 - Sandro Morasca, Stefano Serra-Capizzano:

On the analytical comparison of testing techniques. 154-164
Model checking I
- Greg Dennis, Robert Seater, Derek Rayside, Daniel Jackson:

Automating commutativity analysis at the design level. 165-174 - César A. Muñoz, Gilles Dowek, Victor Carreño:

Modeling and verification of an air traffic concept of operations. 175-182 - James R. Ezick:

An optimizing compiler for batches of temporal logic formulas. 183-194
Program analysis II
- James F. Bowring, James M. Rehg, Mary Jean Harrold:

Active learning for automatic classification of software behavior. 195-205 - Lee Lin, Michael D. Ernst:

Improving the adaptability of multi-mode systems via program steering. 206-216 - S. Ramesh, Aditya Rajeev Kulkarni, Viraj Kamat:

Slicing tools for synchronous reactive programs. 217-220
Program analysis III
- Cormac Flanagan, Stephen N. Freund

, Shaz Qadeer:
Exploiting purity for atomicity. 221-231 - Jonathan Edwards, Daniel Jackson, Emina Torlak, Vincent Yeung:

Faster constraint solving with subtypes. 232-242 - Darrell Reimer, Edith Schonberg, Kavitha Srinivas, Harini Srinivasan, Bowen Alpern, Robert D. Johnson, Aaron Kershenbaum, Larry Koved:

SABER: smart analysis based error reduction. 243-251
Model checking II
- Xiang Fu, Tevfik Bultan, Jianwen Su:

Model checking XML manipulating software. 252-262 - Matteo Rossi, Dino Mandrioli:

A formal approach for modeling and verification of RTCORBA-based applications. 263-273 - Barbara Staudt Lerner:

Verifying process models built using parameterized state machines. 274-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














