[{"title":"(35个子文件16.51MB)ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis","children":[{"title":"ISSTA2011-InternationalSymposiumonSoftwareTestingandAnalysis2011","children":[{"title":"Concurrency","children":[{"title":"Persuasivepredictionofconcurrencyaccessanomalies.pdf <span style='color:#111;'>505.53KB</span>","children":null,"spread":false},{"title":"Testingconcurrentprogramsonrelaxedmemorymodels.pdf <span style='color:#111;'>286.61KB</span>","children":null,"spread":false},{"title":"Change-awarepreemptionprioritization.pdf <span style='color:#111;'>499.82KB</span>","children":null,"spread":false}],"spread":true},{"title":"Analysisofsystemsandbinarycode","children":[{"title":"Efficient,sensitivityresistantbinaryinstrumentation.pdf <span style='color:#111;'>490.45KB</span>","children":null,"spread":false},{"title":"DefectiveerrorpointerinteractionsintheLinuxkernel.pdf <span style='color:#111;'>262.81KB</span>","children":null,"spread":false},{"title":"Recoveringthetoolchainprovenanceofbinarycode.pdf <span style='color:#111;'>419.73KB</span>","children":null,"spread":false}],"spread":true},{"title":"TestgenerationI","children":[{"title":"Symbolicexecutionwithmixedconcrete-symbolicsolving.pdf <span style='color:#111;'>300.72KB</span>","children":null,"spread":false},{"title":"eXpress_guidedpathexplorationforefficientregressiontestgeneration.pdf <span style='color:#111;'>461.16KB</span>","children":null,"spread":false},{"title":"Automaticpartialloopsummarizationindynamictestgeneration.pdf <span style='color:#111;'>421.78KB</span>","children":null,"spread":false},{"title":"Statically-directeddynamicautomatedtestgeneration.pdf <span style='color:#111;'>325.20KB</span>","children":null,"spread":false}],"spread":true},{"title":"Combinatorialandrandomtesting","children":[{"title":"Feedbackdrivenadaptivecombinatorialtesting.pdf <span style='color:#111;'>332.85KB</span>","children":null,"spread":false},{"title":"Usingbinarydecisiondiagramsforcombinatorialtestdesign.pdf <span style='color:#111;'>834.10KB</span>","children":null,"spread":false},{"title":"Adaptiverandomtesting_anillusionofeffectiveness.pdf <span style='color:#111;'>486.87KB</span>","children":null,"spread":false}],"spread":true},{"title":"TestgenerationII","children":[{"title":"Combinedstaticanddynamicautomatedtestgeneration.pdf <span style='color:#111;'>366.78KB</span>","children":null,"spread":false},{"title":"HighcoveragetestingofHaskellprograms.pdf <span style='color:#111;'>383.46KB</span>","children":null,"spread":false},{"title":"Generatingparameterizedunittests.pdf <span style='color:#111;'>439.09KB</span>","children":null,"spread":false}],"spread":true},{"title":"Specificationandoptimization","children":[{"title":"Iterativerefinementofspecificationforcomponentbasedembeddedsystems.pdf <span style='color:#111;'>1.01MB</span>","children":null,"spread":false},{"title":"Usingautomaticpersistentmemoizationtofacilitatedataanalysisscripting.pdf <span style='color:#111;'>441.02KB</span>","children":null,"spread":false},{"title":"CoDeSe_fastdeserializationviacodegeneration.pdf <span style='color:#111;'>437.24KB</span>","children":null,"spread":false}],"spread":true},{"title":"FaultsII","children":[{"title":"Selectingpeersforexecutioncomparison.pdf <span style='color:#111;'>544.32KB</span>","children":null,"spread":false},{"title":"Characterizingfailure-causingparameterinteractionsbyadaptivetesting.pdf <span style='color:#111;'>435.49KB</span>","children":null,"spread":false},{"title":"Theuseofmutationintestingexperimentsanditssensitivitytoexternalthreats.pdf <span style='color:#111;'>632.55KB</span>","children":null,"spread":false},{"title":"Generatinganalysesfordetectingfaultsinpathsegments.pdf <span style='color:#111;'>324.58KB</span>","children":null,"spread":false}],"spread":true},{"title":"Programanalysis","children":[{"title":"Demand-drivencontext-sensitivealiasanalysisforJava.pdf <span style='color:#111;'>610.19KB</span>","children":null,"spread":false},{"title":"Path-andindex-sensitivestringanalysisbasedonmonadicsecond-orderlogic.pdf <span style='color:#111;'>919.91KB</span>","children":null,"spread":false},{"title":"SavingtheworldwidewebfromvulnerableJavaScript.pdf <span style='color:#111;'>329.76KB</span>","children":null,"spread":false},{"title":"Geometricencoding_forgingthehighperformancecontextsensitivepoints-toanalysisforJava.pdf <span style='color:#111;'>1.14MB</span>","children":null,"spread":false}],"spread":true},{"title":"FaultsI","children":[{"title":"Ontheinfluenceofmultiplefaultsoncoverage-basedfaultlocalization.pdf <span style='color:#111;'>356.62KB</span>","children":null,"spread":false},{"title":"Detectinganomaliesintheorderofequally-typedmethodarguments.pdf <span style='color:#111;'>344.35KB</span>","children":null,"spread":false},{"title":"Minimizingreproductionofsoftwarefailures.pdf <span style='color:#111;'>407.90KB</span>","children":null,"spread":false},{"title":"Areautomateddebuggingtechniquesactuallyhelpingprogrammers.pdf <span style='color:#111;'>693.92KB</span>","children":null,"spread":false}],"spread":true},{"title":"Models","children":[{"title":"Polyglot_modelingandanalysisformultipleStatechartformalisms.pdf <span style='color:#111;'>1.48MB</span>","children":null,"spread":false},{"title":"Automatedframeworkforformaloperatortaskanalysis.pdf <span style='color:#111;'>907.49KB</span>","children":null,"spread":false},{"title":"BoundedverificationofRubyonRailsdatamodels.pdf <span style='color:#111;'>363.08KB</span>","children":null,"spread":false},{"title":"Scalableanalysisofconceptualdatamodels.pdf <span style='color:#111;'>406.05KB</span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]