Abstract is missing.
- Exception analysis and points-to analysis: better togetherMartin Bravenboer, Yannis Smaragdakis. 1-12 [doi]
- Analyzing singularity channel contractsZachary Stengel, Tevfik Bultan. 13-24 [doi]
- Identifying semantic differences in AspectJ programsMartin Th Görg, Jianjun Zhao. 25-36 [doi]
- Advanced code coverage analysis using substring holesYoram Adler, Eitan Farchi, Moshe Klausner, Dan Pelleg, Orna Raz, Moran Shochat, Shmuel Ur, Aviad Zlotnick. 37-46 [doi]
- A formal analysis of requirements-based testingCharles Pecheur, Franco Raimondi, Guillaume Brat. 47-56 [doi]
- The influence of size and coverage on test suite effectivenessAkbar Siami Namin, James H. Andrews. 57-68 [doi]
- Efficient mutation testing by checking invariant violationsDavid Schuler, Valentin Dallmeier, Andreas Zeller. 69-80 [doi]
- Automatic mining of functionally equivalent code fragments via random testingLingxiao Jiang, Zhendong Su. 81-92 [doi]
- A comparative study of programmer-written and automatically inferred contractsNadia Polikarpova, Ilinca Ciupa, Bertrand Meyer. 93-104 [doi]
- HAMPI: a solver for string constraintsAdam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter Hooimeijer, Michael D. Ernst. 105-116 [doi]
- Detecting code clones in binary executablesAndreas Sæbjørnsen, Jeremiah Willcock, Thomas Panas, Daniel J. Quinlan, Zhendong Su. 117-128 [doi]
- Precise pointer reasoning for dynamic test generationBassem Elkarablieh, Patrice Godefroid, Michael Y. Levin. 129-140 [doi]
- Identifying bug signatures using discriminative graph miningHong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan. 141-152 [doi]
- Fault localization and repair for Java runtime exceptionsSaurabh Sinha, Hina Shah, Carsten Görg, Shujuan Jiang, Mijung Kim, Mary Jean Harrold. 153-164 [doi]
- Memory slicingBin Xin, Xiangyu Zhang. 165-176 [doi]
- Incremental covering array failure characterization in large configuration spacesSandro Fouché, Myra B. Cohen, Adam A. Porter. 177-188 [doi]
- Automatic system testing of programs without test oraclesChristian Murphy, Kuang Shen, Gail E. Kaiser. 189-200 [doi]
- Clustering test cases to achieve effective and scalable prioritisation incorporating expert knowledgeShin Yoo, Mark Harman, Paolo Tonella, Angelo Susi. 201-212 [doi]
- Time-aware test-case prioritization using integer linear programmingLu Zhang, Shan-Shan Hou, Chao Guo, Tao Xie, Hong Mei. 213-224 [doi]
- Loop-extended symbolic execution on binary programsPrateek Saxena, Pongsin Poosankam, Stephen McCamant, Dawn Song. 225-236 [doi]
- AVA: automated interpretation of dynamically detected anomaliesAnton Babenko, Leonardo Mariani, Fabrizio Pastore. 237-248 [doi]
- Penumbra: automatically identifying failure-relevant inputs using dynamic taintingJames A. Clause, Alessandro Orso. 249-260 [doi]
- Testing CPU emulatorsLorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi. 261-272 [doi]
- Specifying the worst case: orthogonal modeling of hardware errorsJewgenij Botaschanjan, Benjamin Hummel. 273-284 [doi]
- Precise interface identification to improve testing and analysis of web applicationsWilliam G. J. Halfond, Saswat Anand, Alessandro Orso. 285-296 [doi]