• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 818
Next 10 →

Stuck-Fault Tests vs. Actual Defects

by Edward Mccluskey And , 2000
"... This paper studies some manufacturing test data collected for an experimental digital IC. Test results for a large variety of single-stuck fault based test sets are shown and compared with a number of test sets based on other fault models. The defects present in the chips studied are characterized b ..."
Abstract - Add to MetaCart
This paper studies some manufacturing test data collected for an experimental digital IC. Test results for a large variety of single-stuck fault based test sets are shown and compared with a number of test sets based on other fault models. The defects present in the chips studied are characterized

Extended Static Checking for Java

by Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, Raymie Stata , 2002
"... Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces the Extended Static Checker for Java (ESC/Java), an experimental compile-time program checker that finds common programming ..."
Abstract - Cited by 638 (24 self) - Add to MetaCart
Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces the Extended Static Checker for Java (ESC/Java), an experimental compile-time program checker that finds common

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one

SPACE-TIME DEFECTS AND TELEPARALLELISM

by J. W. Maluf, A. Goya , 2001
"... We consider the class of space-time defects investigated by Puntigam and Soleng. These defects describe space-time dislocations and disclinations (cosmic strings), and are in close correspondence to the actual defects that arise in crystals and metals. It is known that in such materials dislocations ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We consider the class of space-time defects investigated by Puntigam and Soleng. These defects describe space-time dislocations and disclinations (cosmic strings), and are in close correspondence to the actual defects that arise in crystals and metals. It is known that in such materials

The CAD Triad Hypothesis: A Mapping Between Three Moral Emotions (Contempt

by Paul Rozin, Laura Lowery, Sumio Imada, Jonathan Haidt - Disgust) and Three Moral Codes (Community, Autonomy, Divinity), Journal of Personality and Social Psychology 76/4 , 1999
"... It is proposed that 3 emotions—contempt, anger, and disgust—are typically elicited, across cultures, by violations of 3 moral codes proposed by R. A. Shweder and his colleagues (R. A. Shweder, N. C. Much, M. Mahapatra, & L. Park, 1997). The proposed alignment links anger to autonomy (individual ..."
Abstract - Cited by 150 (5 self) - Add to MetaCart
actually made by Americans to the descriptions of these situations. Mora) judgment and the condemnation of others, including fictional others and others who have not harmed the self, is a universal and essential feature of human social life. Many social animals respond to violations, attacks, or defections

Using abstraction and model checking to detect safety violations in requirements specifications

by Constance Heitmeyer, James Kirby, Bruce Labaw, Myla Archer, Ramesh Bharadwaj - IEEE Transactions on Software Engineering , 1998
"... Abstract—Exposing inconsistencies can uncover many defects in software specifications. One approach to exposing inconsistencies analyzes two redundant specifications, one operational and the other property-based, and reports discrepancies. This paper describes a “practical ” formal method, based on ..."
Abstract - Cited by 97 (38 self) - Add to MetaCart
, possibly infinite, type sets of certain variables with smaller type sets. Analyzing the reduced specification with the model checker Spin uncovered a possible safety violation. Simulation demonstrated that the safety violation was not spurious but an actual defect in the original specification.

An Investigation into Coupling Measures for C++

by Lionel Briand, Prem Devanbu, Walcelio Melo - IN PROCEEDINGS OF THE 19 TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING , 1997
"... This paper proposes a comprehensive suite of measures to quantify the level of class coupling during the design of object-oriented systems. This suite takes into account the different OO design mechanisms provided by the C++ language (e.g., friendship between classes, specialization, and aggregation ..."
Abstract - Cited by 136 (19 self) - Add to MetaCart
, and aggregation) but it can be tailored to other OO languages. The different measures in our suite thus reflect different hypotheses about the different mechanisms of coupling in OO systems. Based on actual project defect data, the hypotheses underlying our coupling measures are empirically validated by analyzing

Requirements Volatility and Defect Density

by Yashwant K. Malaiya , Jason Denton - PROC. INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING , 1999
"... In an ideal situation the requirements for a software system should be completely and unambiguously determined before design, coding and testing take place. In actual practice, often there are changes in the requirements, causing some of the software components to be redesigned, deleted or added. Hi ..."
Abstract - Cited by 29 (1 self) - Add to MetaCart
In an ideal situation the requirements for a software system should be completely and unambiguously determined before design, coding and testing take place. In actual practice, often there are changes in the requirements, causing some of the software components to be redesigned, deleted or added

A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect Content

by L. C. Briand , K. El-Emam , B. G. Freimut, O. Laitenberger , 2001
"... An important requirement to control the inspection of software artifacts is to be able to decide, based on more objective information, whether the inspection can stop or whether it should continue to achieve a suitable level of artifact quality. A prediction of the number of remaining defects in an ..."
Abstract - Cited by 42 (10 self) - Add to MetaCart
in an inspected artifact can be used for decision making. Several studies in software engineering have considered capture-recapture models, originally proposed by biologists to estimate animal populations, to make a prediction. However, few studies compare the actual number of remaining defects to the one

Quantitative Quality Management through Defect

by Pankaj Jalote, K. Dinesh, S. Raghavan, M. R. Bhashyam, M. Ramakrishnan, K. Dinesh, S. Raghavan, M. R. Bhashyam, S. Ramakrishnan Infosys - Prediction and Statistical Process Control” Proc. Second World Quality Congress for Software , 2000
"... To produce high quality software, the final software should have as few defects as possible. The task of quality management in a software project is to plan suitable quality control activities, and properly execute and control these activities such that most of the defects are detected “in-process”, ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
. In this approach, a quality goal is set for a project in terms of the defect density delivered. To achieve the goal, the defect levels for different phases in the process are estimated using past data. During the execution of the project, the actual defect numbers are compared with the estimates to see
Next 10 →
Results 1 - 10 of 818
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University