Abstract is missing.
- Expressing and checking intended changes via software change contractsJooyong Yi, Dawei Qi, Shin Hwei Tan, Abhik Roychoudhury. 1-11 [doi]
- Finding rare numerical stability errors in concurrent computationsHana Chockler, Karine Even, Eran Yahav. 12-22 [doi]
- Parallel bounded analysis in code with rich invariants by refinement of field boundsNicolás Rosner, Juan P. Galeotti, Santiago Bermúdez, Guido Marucci Blas, Santiago Perez De Rosso, Lucas Pizzagalli, Luciano Zemín, Marcelo F. Frias. 23-33 [doi]
- Efficient and flexible GUI test execution via test mergingPranavadatta Devaki, Suresh Thummalapenta, Nimit Singhania, Saurabh Sinha. 34-44 [doi]
- Automatically repairing broken workflows for evolving GUI applicationsSai Zhang, Hao Lü, Michael D. Ernst. 45-55 [doi]
- Semi-valid input coverage for fuzz testingPetar Tsankov, Mohammad Torabi Dashti, David A. Basin. 56-66 [doi]
- Automated testing with targeted event sequence generationCasper Svenning Jensen, Mukul R. Prasad, Anders Møller. 67-77 [doi]
- Calculating source line level energy information for Android applicationsDing Li, Shuai Hao, William G. J. Halfond, Ramesh Govindan. 78-89 [doi]
- Context-sensitive delta inference for identifying workload-dependent performance bottlenecksXusheng Xiao, Shi Han, Dongmei Zhang, Tao Xie. 90-100 [doi]
- Combining model checking and testing with an application to reliability prediction and distributionLin Gui 0002, Jun Sun 0001, Yang Liu, Yuan Jie Si, Jin Song Dong, Xinyu Wang. 101-111 [doi]
- Dynamically validating static memory leak warningsMengchen Li, Yuanjun Chen, Linzhang Wang, Guoqing Xu. 112-122 [doi]
- Collecting a heap of shapesEarl T. Barr, Christian Bird, Mark Marron. 123-133 [doi]
- Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugsSangmin Park, Mary Jean Harrold, Richard W. Vuduc. 134-144 [doi]
- Variable and thread bounding for systematic testing of multithreaded programsSandeep Bindal, Sorav Bansal, Akash Lal. 145-155 [doi]
- EnforceMOP: a runtime property enforcement system for multithreaded programsQingzhou Luo, Grigore Rosu. 156-166 [doi]
- SimRacer: an automated framework to support testing for process-level racesTingting Yu, Witawas Srisa-an, Gregg Rothermel. 167-177 [doi]
- Practical static race detection for Java parallel loopsCosmin Radoi, Danny Dig. 178-190 [doi]
- Using automated program repair for evaluating the effectiveness of fault localization techniquesYuhua Qi, Xiaoguang Mao, Yan Lei, Chengsong Wang. 191-201 [doi]
- Data model property inference and repairJaideep Nijjar, Tevfik Bultan. 202-212 [doi]
- F3: fault localization for field failuresWei Jin, Alessandro Orso. 213-223 [doi]
- Selective mutation testing for concurrent codeMilos Gligoric, Lingming Zhang, Cristiano Pereira, Gilles Pokam. 224-234 [doi]
- Faster mutation testing inspired by test prioritization and reductionLingming Zhang, Darko Marinov, Sarfraz Khurshid. 235-245 [doi]
- Declarative mockingHesam Samimi, Rebecca Hicks, Ari Fogel, Todd D. Millstein. 246-256 [doi]
- Orthogonal exploration of the search space in evolutionary test case generationFitsum Meshesha Kifetew, Annibale Panichella, Andrea De Lucia, Rocco Oliveto, Paolo Tonella. 257-267 [doi]
- Hybrid learning: interface generation through static, dynamic, and symbolic analysisFalk Howar, Dimitra Giannakopoulou, Zvonimir Rakamaric. 268-279 [doi]
- Optimizing monitoring of finite state properties through monitor compactionRahul Purandare, Matthew B. Dwyer, Sebastian G. Elbaum. 280-290 [doi]
- Does automated white-box test generation really help software testers?Gordon Fraser, Matt Staats, Phil McMinn, Andrea Arcuri, Frank Padberg. 291-301 [doi]
- Comparing non-adequate test suites using coverage criteriaMilos Gligoric, Alex Groce, Chaoqiang Zhang, Rohan Sharma, Mohammad Amin Alipour, Darko Marinov. 302-313 [doi]
- Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locatorsFriedrich Steimann, Marcus Frenkel, Rui Abreu. 314-324 [doi]
- An empirical study of PHP feature usage: a static analysis perspectiveMark Hills, Paul Klint, Jurgen J. Vinju. 325-335 [doi]
- Practical blended taint analysis for JavaScriptShiyi Wei, Barbara G. Ryder. 336-346 [doi]
- Finding your way in the testing jungle: a learning approach to web security testingOmer Tripp, Omri Weisman, Lotem Guy. 347-357 [doi]
- Debugging non-deadlock concurrency bugsSangmin Park. 358-361 [doi]
- Generation of Java programs properties from test purposesSimone Hanazumi, Ana Cristina Vieira de Melo. 362-365 [doi]
- Generation of test databases using sampling methodsTeodora Sandra Buda. 366-369 [doi]
- Analysis of performance regression testing data by transaction profilesShadi Ghaith. 370-373 [doi]
- Product-line verification with feature-oriented contractsThomas Thüm. 374-377 [doi]
- Formal safety proof: a real case study in a railway interlocking systemAndrea Bonacchi. 378-381 [doi]