首页 课程资源 软件测试     /    ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis

ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis

上传者: qysh123 | 上传时间:2022/9/4 5:30:56 | 文件大小:16.51MB | 文件类型:rar
ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴味,可以访问:http://qysh123.download.csdn.net/查看我上传的所有资料。
内容比较多,需要大家人工手动查找。
另外,资料顺序并不按照时间排列,只是想起来了就上传。
请大家见谅。
)ACM组织的,在软件测试与分析方面最著名的国际会议,InternationalSymposiumonSoftwareTestingandAnalysis2011年的论文集。
传统观点认为这个会议和ICSE,POPL等大会相比层次要稍逊一筹,但我个人认为其专业性较强,大多数论文也很严谨,近年来发表文章的也多是知名高校与欧美著名研发型公司。
很适合软件分析、可信软件、可靠性分析等专业的研究人员和相应测试、开发人员阅读。

文件下载

资源详情

[{"title":"(35个子文件16.51MB)ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis","children":[{"title":"ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis2011","children":[{"title":"Concurrency","children":[{"title":"Persuasivepredictionofconcurrencyaccessanomalies.pdf <span style='color:#111;'>505.53KB</span>","children":null,"spread":false},{"title":"Testingconcurrentprogramsonrelaxedmemorymodels.pdf <span style='color:#111;'>286.61KB</span>","children":null,"spread":false},{"title":"Change-awarepreemptionprioritization.pdf <span style='color:#111;'>499.82KB</span>","children":null,"spread":false}],"spread":true},{"title":"Analysisofsystemsandbinarycode","children":[{"title":"Efficient,sensitivityresistantbinaryinstrumentation.pdf <span style='color:#111;'>490.45KB</span>","children":null,"spread":false},{"title":"DefectiveerrorpointerinteractionsintheLinuxkernel.pdf <span style='color:#111;'>262.81KB</span>","children":null,"spread":false},{"title":"Recoveringthetoolchainprovenanceofbinarycode.pdf <span style='color:#111;'>419.73KB</span>","children":null,"spread":false}],"spread":true},{"title":"TestgenerationI","children":[{"title":"Symbolicexecutionwithmixedconcrete-symbolicsolving.pdf <span style='color:#111;'>300.72KB</span>","children":null,"spread":false},{"title":"eXpress_guidedpathexplorationforefficientregressiontestgeneration.pdf <span style='color:#111;'>461.16KB</span>","children":null,"spread":false},{"title":"Automaticpartialloopsummarizationindynamictestgeneration.pdf <span style='color:#111;'>421.78KB</span>","children":null,"spread":false},{"title":"Statically-directeddynamicautomatedtestgeneration.pdf <span style='color:#111;'>325.20KB</span>","children":null,"spread":false}],"spread":true},{"title":"Combinatorialandrandomtesting","children":[{"title":"Feedbackdrivenadaptivecombinatorialtesting.pdf <span style='color:#111;'>332.85KB</span>","children":null,"spread":false},{"title":"Usingbinarydecisiondiagramsforcombinatorialtestdesign.pdf <span style='color:#111;'>834.10KB</span>","children":null,"spread":false},{"title":"Adaptiverandomtesting_anillusionofeffectiveness.pdf <span style='color:#111;'>486.87KB</span>","children":null,"spread":false}],"spread":true},{"title":"TestgenerationII","children":[{"title":"Combinedstaticanddynamicautomatedtestgeneration.pdf <span style='color:#111;'>366.78KB</span>","children":null,"spread":false},{"title":"HighcoveragetestingofHaskellprograms.pdf <span style='color:#111;'>383.46KB</span>","children":null,"spread":false},{"title":"Generatingparameterizedunittests.pdf <span style='color:#111;'>439.09KB</span>","children":null,"spread":false}],"spread":true},{"title":"Specificationandoptimization","children":[{"title":"Iterativerefinementofspecificationforcomponentbasedembeddedsystems.pdf <span style='color:#111;'>1.01MB</span>","children":null,"spread":false},{"title":"Usingautomaticpersistentmemoizationtofacilitatedataanalysisscripting.pdf <span style='color:#111;'>441.02KB</span>","children":null,"spread":false},{"title":"CoDeSe_fastdeserializationviacodegeneration.pdf <span style='color:#111;'>437.24KB</span>","children":null,"spread":false}],"spread":true},{"title":"FaultsII","children":[{"title":"Selectingpeersforexecutioncomparison.pdf <span style='color:#111;'>544.32KB</span>","children":null,"spread":false},{"title":"Characterizingfailure-causingparameterinteractionsbyadaptivetesting.pdf <span style='color:#111;'>435.49KB</span>","children":null,"spread":false},{"title":"Theuseofmutationintestingexperimentsanditssensitivitytoexternalthreats.pdf <span style='color:#111;'>632.55KB</span>","children":null,"spread":false},{"title":"Generatinganalysesfordetectingfaultsinpathsegments.pdf <span style='color:#111;'>324.58KB</span>","children":null,"spread":false}],"spread":true},{"title":"Programanalysis","children":[{"title":"Demand-drivencontext-sensitivealiasanalysisforJava.pdf <span style='color:#111;'>610.19KB</span>","children":null,"spread":false},{"title":"Path-andindex-sensitivestringanalysisbasedonmonadicsecond-orderlogic.pdf <span style='color:#111;'>919.91KB</span>","children":null,"spread":false},{"title":"SavingtheworldwidewebfromvulnerableJavaScript.pdf <span style='color:#111;'>329.76KB</span>","children":null,"spread":false},{"title":"Geometricencoding_forgingthehighperformancecontextsensitivepoints-toanalysisforJava.pdf <span style='color:#111;'>1.14MB</span>","children":null,"spread":false}],"spread":true},{"title":"FaultsI","children":[{"title":"Ontheinfluenceofmultiplefaultsoncoverage-basedfaultlocalization.pdf <span style='color:#111;'>356.62KB</span>","children":null,"spread":false},{"title":"Detectinganomaliesintheorderofequally-typedmethodarguments.pdf <span style='color:#111;'>344.35KB</span>","children":null,"spread":false},{"title":"Minimizingreproductionofsoftwarefailures.pdf <span style='color:#111;'>407.90KB</span>","children":null,"spread":false},{"title":"Areautomateddebuggingtechniquesactuallyhelpingprogrammers.pdf <span style='color:#111;'>693.92KB</span>","children":null,"spread":false}],"spread":true},{"title":"Models","children":[{"title":"Polyglot_modelingandanalysisformultipleStatechartformalisms.pdf <span style='color:#111;'>1.48MB</span>","children":null,"spread":false},{"title":"Automatedframeworkforformaloperatortaskanalysis.pdf <span style='color:#111;'>907.49KB</span>","children":null,"spread":false},{"title":"BoundedverificationofRubyonRailsdatamodels.pdf <span style='color:#111;'>363.08KB</span>","children":null,"spread":false},{"title":"Scalableanalysisofconceptualdatamodels.pdf <span style='color:#111;'>406.05KB</span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]

评论信息

  • saloty:
    很不错的论文集,非常棒!希望楼主把其他年份的论文集也上传上来,赞!2015-09-04
  • 过河的卒:
    很好的资料,有不少软件测试与分析方面的好论文2014-05-27
  • zoukind:
    非常有用,很棒2014-03-13
  • qq909675470:
    资源很全,很好2012-10-14
  • askhefan:
    很好的资料,有不少软件测试与分析方面的好论文2011-11-02

免责申明

【好快吧下载】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【好快吧下载】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【好快吧下载】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,8686821#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明