Results 1 - 10
of
62
Changes and Bugs – Mining and Predicting Development Activities
"... Software development results in a huge amount of data: changes to source code are recorded in version archives, bugs are reported to issue tracking systems, and communications are archived in e-mails and newsgroups. We present techniques for mining version archives and bug databases to understand an ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and support software development. First, we introduce the concept of co-addition of method calls, which we use to identify patterns that describe how methods should be called. We use dynamic analysis to validate these patterns and identify violations. The co-addition of method calls can also detect cross
Colloquium: Time-reversal violation with quantum-entangled B mesons Colloquium: Time-reversal violation with quantum-entangled B mesons
, 2014
"... Symmetry transformations have been proven a bedrock tool for understanding the nature of particle interac-tions, formulating and testing fundamental theories. Based on the up to now unbroken CPT symmetry, the violation of the CP symmetry between matter and antimatter by weak interactions, discovered ..."
Abstract
- Add to MetaCart
, discovered in the decay of kaons in 1964 and observed more recently in 2001 in B mesons, strongly suggests that the behavior of these particles under weak interactions must also be asymmetric under time reversal T. However, until the recent years there has not been a direct detection of the expected time
Performance Assertion Checking
, 1992
"... Performance assertion checking is an approach to describing and monitoring the performance of complex software systems. The idea is simple: system implementors write assertions that capture their expectations for performance, the system is instrumented to collect performance data, and then the asser ..."
Abstract
-
Cited by 42 (2 self)
- Add to MetaCart
, and then the assertions are checked automatically against the data to detect violations signifying potential performance bugs. Because performance assertions provide a means of filtering data based on expectations, they form a good basis for tools. Data indicating that a system is performing as expected can be discarded
Efficient intrusion detection using automaton inlining
- In Proceedings of the IEEE Symposium on Security and Privacy
, 2005
"... Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit ..."
Abstract
-
Cited by 26 (3 self)
- Add to MetaCart
Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit
Variably interprocedural program analysis for runtime error detection
- In ISSTA
, 2007
"... This paper describes an analysis approach based on a combination of static and dynamic techniques to find run-time errors in Java code. It uses symbolic execution to find constraints under which an error (e.g., a null pointer dereference, array out of bounds access, or assertion violation) may occur ..."
Abstract
-
Cited by 24 (2 self)
- Add to MetaCart
occur and then solves these constraints to find test inputs that may expose the error. It only alerts the user to the possibility of a real error when it detects the expected exception during a program run. The analysis is customizable in two important ways. First, we can adjust how deeply to follow
Efficient, Context-Sensitive Detection of Real-World Semantic Attacks ∗
"... Software developers are increasingly choosing memory-safe languages. As a result, semantic vulnerabilities—omitted security checks, misconfigured security policies, and other software design errors—are supplanting memory-corruption exploits as the primary cause of security violations. Semantic attac ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
subtle bugs in Java applications and libraries, using legal program executions that nevertheless violate programmers ’ expectations. Anomaly detection must balance precision and sensitivity: high sensitivity leads to many benign behaviors appearing anomalous (false positives), while low sensitivity may
Cultural Biases in Economic Exchange",
, 2004
"... Abstract How much do cultural biases affect economic exchange? We try to answer this question by using the relative trust European citizens have for citizens of other countries. First, we document that this trust is affected not only by objective characteristics of the country being trusted, but al ..."
Abstract
-
Cited by 57 (4 self)
- Add to MetaCart
to explain how these customary beliefs may enter into the standard economic model. Since Muth (1960Muth ( , 1961 and Lucas (1976) nearly all research in economics has endogenized beliefs, under the rational expectations assumption that subjective and objective beliefs coincide. But the assumption
IOTA: Detecting Erroneous I/O Behavior via I/O Transaction Auditing
"... The correctness of the I/O system—and thus the correctness of the computer—can be compromised by hardware faults, driver bugs, and security breaches in downloaded device drivers. To detect erroneous I/O behavior, we have developed I/O Transaction Auditing (IOTA), which checks the high-level behavior ..."
Abstract
- Add to MetaCart
The correctness of the I/O system—and thus the correctness of the computer—can be compromised by hardware faults, driver bugs, and security breaches in downloaded device drivers. To detect erroneous I/O behavior, we have developed I/O Transaction Auditing (IOTA), which checks the high
1 Variably Interprocedural Program Analysis for RuntimeError Detection
"... ABSTRACT This paper describes an analysis approach based on a combination of static and dynamic techniques to find run-time errors in Java code. It uses symbolic execution to find constraints under which an error (e.g., a null pointer dereference, array out of bounds access, or assertion violation) ..."
Abstract
- Add to MetaCart
) may occur and then solves these constraints to find test inputs that may expose the error. It only alerts the user to the possibility of a real error when it detects the expected exception during a program run. The analysis is customizable in two important ways. First, we can adjust how deeply
Testing Concurrent Programs on Relaxed Memory Models
"... High-performance concurrent libraries, such as lock-free data structures and custom synchronization primitives, are notoriously difficult to write correctly. Such code is often implemented without locks, instead using plain loads and stores and low-level operations like atomic compare-and-swaps and ..."
Abstract
-
Cited by 14 (2 self)
- Add to MetaCart
sequential consistency violation. These executions can be used to test whether or not a program works as expected when the underlying memory model is not sequentially consistent. We have implemented RELAXER for C and have evaluated it on several synchronization algorithms, concurrent data structures
Results 1 - 10
of
62