SEARCH

SEARCH BY CITATION

References

  • 1
    LaToza T, Venolia G, DeLine R. Maintaining mental models: a study of developer work habits. In Proc. ICSE, 2006. DOI:10.1145/1134285.1134355.
  • 2
    Śliwerski J, Zimmermann T, Zeller A. When do changes induce fixes? In Proc. MSR, 2005.
  • 3
    Sinha V, Sinha S, Rao S. BUGINNINGS: identifying the origins of a bug. In Proc. ISEC, 2010.
  • 4
    Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P. Fair and balanced?: bias in bug-fix datasets. In Proc. ESEC/FSE, 2009.
  • 5
    Corley C, Kraft N, Etzkorn L, Lukins S. Recovering traceability links between source code and fixed bugs via patch analysis. In Proc. TEFSE, 2011.
  • 6
    Fischer M. Pinzger M, Gall H. Populating a Release History Database from version control and bug tracking systems. In Proc. ICSM, 2003. DOI:10.1109/ICSM.2003.1235403.
  • 7
    Kim S, Zimmermann T, Pan K, Whitehead Jr EJ. Automatic identification of bug-introducing changes. In Proc. ASE, 2006.
  • 8
    Ottenstein K, Ottenstein L. The program dependence graph in a software development environment. ACM Sigplan Notices 1984; 19(5): 177184.
  • 9
    Horwitz S, Reps T, Binkley D. Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems 1990; 12(1): 229243.
  • 10
    Larsen L, Harrold M. Slicing object-oriented software. In Proc. ICSE, 1996.
  • 11
    Liang D, Harrold M. Slicing objects using system dependence graphs. In Proc. ICSM, 1998.
  • 12
    Kovács G, Magyar F, Gyimóthy T. Static slicing of java programs. Technical Report December, 1996.
  • 13
    Zhao J. Applying program dependence analysis to Java software. In Proceedings of Workshop on Software Engineering and Database, 1998.
  • 14
    Walkinshaw N, Roper M, Wood M. The Java system dependence graph. In Proc. SCAM, 2003.
  • 15
    Apiwattanapong T, Orso A, Harrold M. JDiff: a differencing technique and tool for object-oriented programs. Automated Software Engineering 2006; 14(1). DOI:10.1007/s10515-006-0002-0.
  • 16
    [online]Available from: http://www.eclipse.org/jdt/.
  • 17
  • 18
    [online]Available from: http://code.google.com/p/crystalsaf/.
  • 19
    Luo Z, Hillis L, Das R, Qi Y. Effective static analysis to find concurrency bugs in Java. In Proc. SCAM, September 2010. DOI:10.1109/SCAM.2010.20.
  • 20
    Williams C, Spacco J. SZZ revisited: verifying when changes induce fixes. In Proc. DEFECTS, 2008.
  • 21
  • 22
    Jung Y, Oh H, Yi K. Identifying static analysis techniques for finding non-fix hunks in fix revisions. In Proc. DSMM, 2009. DOI:10.1145/1651309.1651313.
  • 23
    Zeller A, Hildebrandt R. Simplifying and isolating failure-inducing input. IEEE TSE 2002; 28(2): 183200.
  • 24
    Artho C. Iterative delta debugging. LNCS 2009; 5394. DOI:10.1007/978-3-642-01702-5_13.
  • 25
    Endres A. An analysis of errors and their causes in system programs. ACM SIGPLAN Notices 1975; 10(6). DOI:10.1145/390016.808455.
  • 26
    Basili V, Perricone B. Software errors and complexity: an empirical investigation. CACM 1984; 27(1). DOI:10.1145/69605.2085.
  • 27
    Sullivan M, Chillarege R. A comparison of software defects in database management systems and operating systems. In FTCS-22. Digest of Papers., 1992. DOI:10.1109/FTCS.1992.243586.
  • 28
    Chou A, Yang J, Chelf B, Hallem S, Engler D. An empirical study of operating systems errors. In Proc. SOSP, 2001 5. DOI:10.1145/502034.502042.
  • 29
    Zimmermann T, Zeller A. HATARI: raising risk awareness. In Proc. ESEC/FSE, 2005. DOI:10.1145/1095430.1081725.
  • 30
    Kim S, Zimmermann T, Whitehead Jr. EJ, Zeller A. Predicting faults from cached history. In Proc. ICSE, May 2007. DOI:10.1109/ICSE.2007.66.
  • 31
    Available from: http://www.eclipse.org.
  • 32
  • 33
    Available from: http://www.nongnu.org/cvs/.
  • 34
    Boetticher G, Menzies T, Ostrand T. PROMISE Repository of empirical software engineering data, 2007. Available from: http://promisedata.org/?p=17.
  • 35
    Available from: http://flossmetrics.org/.
  • 36
    Available from: http://jedit.org/.
  • 37
    Dit B, Revelle M, Gethers M, Poshyvanyk D. Feature location in source code: a taxonomy and survey. JSME, November 2011. DOI:10.1002/smr.567.
  • 38
    Available from: http://www.bugzilla.org.
  • 39
    Available from: http://www.viewvc.org/.
  • 40
    Fluri B, Wuersch M, Pinzger M, Gall H. Change distilling: tree differencing for fine-grained source code change extraction. IEEE TSE 2007; 33(11). DOI:10.1109/TSE.2007.70731.
  • 41
    Zimmermann T, Weißgerber P, Diehl S, Zeller A. Mining version histories to guide software changes. IEEE TSE 2005; 31(6). DOI:10.1109/TSE.2005.72.