ISSTA 2011-International Symposium on Software Testing and Analysis

上传者: qysh123 | 上传时间: 2019-12-21 20:58:57 | 文件大小: 16.51MB | 文件类型: rar
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) ACM组织的,在软件测试与分析方面最著名的国际会议,International Symposium on Software Testing and Analysis 2011年的论文集。 传统观点认为这个会议和ICSE,POPL等大会相比层次要稍逊一筹,但我个人认为其专业性较强,大多数论文也很严谨,近年来发表文章的也多是知名高校与欧美著名研发型公司。很适合软件分析、可信软件、可靠性分析等专业的研究人员和相应测试、开发人员阅读。

文件下载

资源详情

[{"title":"( 35 个子文件 16.51MB ) ISSTA 2011-International Symposium on Software Testing and Analysis","children":[{"title":"ISSTA 2011-International Symposium on Software Testing and Analysis 2011","children":[{"title":"Concurrency","children":[{"title":"Persuasive prediction of concurrency access anomalies.pdf <span style='color:#111;'> 505.53KB </span>","children":null,"spread":false},{"title":"Testing concurrent programs on relaxed memory models.pdf <span style='color:#111;'> 286.61KB </span>","children":null,"spread":false},{"title":"Change-aware preemption prioritization.pdf <span style='color:#111;'> 499.82KB </span>","children":null,"spread":false}],"spread":true},{"title":"Analysis of systems and binary code","children":[{"title":"Efficient, sensitivity resistant binary instrumentation.pdf <span style='color:#111;'> 490.45KB </span>","children":null,"spread":false},{"title":"Defective error pointer interactions in the Linux kernel.pdf <span style='color:#111;'> 262.81KB </span>","children":null,"spread":false},{"title":"Recovering the toolchain provenance of binary code.pdf <span style='color:#111;'> 419.73KB </span>","children":null,"spread":false}],"spread":true},{"title":"Test generation I","children":[{"title":"Symbolic execution with mixed concrete-symbolic solving.pdf <span style='color:#111;'> 300.72KB </span>","children":null,"spread":false},{"title":"eXpress _ guided path exploration for efficient regression test generation.pdf <span style='color:#111;'> 461.16KB </span>","children":null,"spread":false},{"title":"Automatic partial loop summarization in dynamic test generation.pdf <span style='color:#111;'> 421.78KB </span>","children":null,"spread":false},{"title":"Statically-directed dynamic automated test generation.pdf <span style='color:#111;'> 325.20KB </span>","children":null,"spread":false}],"spread":true},{"title":"Combinatorial and random testing","children":[{"title":"Feedback driven adaptive combinatorial testing.pdf <span style='color:#111;'> 332.85KB </span>","children":null,"spread":false},{"title":"Using binary decision diagrams for combinatorial test design.pdf <span style='color:#111;'> 834.10KB </span>","children":null,"spread":false},{"title":"Adaptive random testing _ an illusion of effectiveness.pdf <span style='color:#111;'> 486.87KB </span>","children":null,"spread":false}],"spread":true},{"title":"Test generation II","children":[{"title":"Combined static and dynamic automated test generation.pdf <span style='color:#111;'> 366.78KB </span>","children":null,"spread":false},{"title":"High coverage testing of Haskell programs.pdf <span style='color:#111;'> 383.46KB </span>","children":null,"spread":false},{"title":"Generating parameterized unit tests.pdf <span style='color:#111;'> 439.09KB </span>","children":null,"spread":false}],"spread":true},{"title":"Specification and optimization","children":[{"title":"Iterative refinement of specification for component based embedded systems.pdf <span style='color:#111;'> 1.01MB </span>","children":null,"spread":false},{"title":"Using automatic persistent memoization to facilitate data analysis scripting.pdf <span style='color:#111;'> 441.02KB </span>","children":null,"spread":false},{"title":"CoDeSe _ fast deserialization via code generation.pdf <span style='color:#111;'> 437.24KB </span>","children":null,"spread":false}],"spread":true},{"title":"Faults II","children":[{"title":"Selecting peers for execution comparison.pdf <span style='color:#111;'> 544.32KB </span>","children":null,"spread":false},{"title":"Characterizing failure-causing parameter interactions by adaptive testing.pdf <span style='color:#111;'> 435.49KB </span>","children":null,"spread":false},{"title":"The use of mutation in testing experiments and its sensitivity to external threats.pdf <span style='color:#111;'> 632.55KB </span>","children":null,"spread":false},{"title":"Generating analyses for detecting faults in path segments.pdf <span style='color:#111;'> 324.58KB </span>","children":null,"spread":false}],"spread":true},{"title":"Program analysis","children":[{"title":"Demand-driven context-sensitive alias analysis for Java.pdf <span style='color:#111;'> 610.19KB </span>","children":null,"spread":false},{"title":"Path- and index-sensitive string analysis based on monadic second-order logic.pdf <span style='color:#111;'> 919.91KB </span>","children":null,"spread":false},{"title":"Saving the world wide web from vulnerable JavaScript.pdf <span style='color:#111;'> 329.76KB </span>","children":null,"spread":false},{"title":"Geometric encoding _ forging the high performance context sensitive points-to analysis for Java.pdf <span style='color:#111;'> 1.14MB </span>","children":null,"spread":false}],"spread":true},{"title":"Faults I","children":[{"title":"On the influence of multiple faults on coverage-based fault localization.pdf <span style='color:#111;'> 356.62KB </span>","children":null,"spread":false},{"title":"Detecting anomalies in the order of equally-typed method arguments.pdf <span style='color:#111;'> 344.35KB </span>","children":null,"spread":false},{"title":"Minimizing reproduction of software failures.pdf <span style='color:#111;'> 407.90KB </span>","children":null,"spread":false},{"title":"Are automated debugging techniques actually helping programmers.pdf <span style='color:#111;'> 693.92KB </span>","children":null,"spread":false}],"spread":true},{"title":"Models","children":[{"title":"Polyglot _ modeling and analysis for multiple Statechart formalisms.pdf <span style='color:#111;'> 1.48MB </span>","children":null,"spread":false},{"title":"Automated framework for formal operator task analysis.pdf <span style='color:#111;'> 907.49KB </span>","children":null,"spread":false},{"title":"Bounded verification of Ruby on Rails data models.pdf <span style='color:#111;'> 363.08KB </span>","children":null,"spread":false},{"title":"Scalable analysis of conceptual data models.pdf <span style='color:#111;'> 406.05KB </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]

评论信息

  • saloty :
    很不错的论文集,非常棒!希望楼主把其他年份的论文集也上传上来,赞!
    2015-09-04
  • 过河的卒 :
    很好的资料,有不少软件测试与分析方面的好论文
    2014-05-27
  • zoukind :
    非常有用,很棒
    2014-03-13
  • qq909675470 :
    资源很全,很好
    2012-10-14
  • askhefan :
    很好的资料,有不少软件测试与分析方面的好论文
    2011-11-02

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明