An Experience Report on Scaling Tools for Mining Software Repositories Using MapReduce (Englisch)
- Neue Suche nach: Shang, W.
- Neue Suche nach: Adams, B.
- Neue Suche nach: Hassan, A.E.
- Neue Suche nach: Shang, W.
- Neue Suche nach: Adams, B.
- Neue Suche nach: Hassan, A.E.
In:
Automated software engineering; IEEE/ACM International Conference ASE 2010
;
275-284
;
2010
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:An Experience Report on Scaling Tools for Mining Software Repositories Using MapReduce
-
Beteiligte:
-
Kongress:International Conference, Automated software engineering; IEEE/ACM International Conference ASE 2010 ; 2010 ; Antwerp, Belgium
-
Erschienen in:
-
Verlag:
- Neue Suche nach: ACM
-
Erscheinungsort:New York
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:10 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Keynote Address: Towards Compositional Software EngineeringBosch, J. et al. | 2010
- 3
-
Analyzing Security ArchitecturesAbi-Antoun, M. / Barnes, J.M. et al. | 2010
- 13
-
VikiBuilder: End-User Specification and Generation of Visual WikisHirsch, C. / Hosking, J. / Grundy, J. et al. | 2010
- 23
-
Software Design Sketching with CalicoMangano, N. / Baker, A. / Dempsey, M. / Navarro, E. / van der Hoek, A. et al. | 2010
- 33
-
Automatically Documenting Program ChangesBuse, R.P.L. / Weimer, W.R. et al. | 2010
- 43
-
Towards Automatically Generating Summary Comments for Java MethodsSridhara, G. / Hill, E. / Muppaneni, D. / Pollock, L. / Vijay-Shanker, K. et al. | 2010
- 53
-
Automatic Detection of Nocuous Coordination Ambiguities in Natural Language RequirementsYang, H. / Willis, A. / De Roeck, A. / Nuseibeh, B. et al. | 2010
- 63
-
Flexible and Scalable Consistency Checking on Product Line Variability ModelsVierhauser, M. / Grunbacher, P. / Egyed, A. / Rabiser, R. / Heider, W. et al. | 2010
- 73
-
Variability Modeling in the Real: A Perspective from the Operating Systems DomainBerger, T. / She, S. / Lotufo, R. / Wasowski, A. / Czarnecki, K. et al. | 2010
- 83
-
RESISTting Reliability Degradation Through Proactive ReconfigurationCooray, D. / Malek, S. / Roshandel, R. / Kilgore, D. et al. | 2010
- 93
-
Automatic Construction of an Effective Training Set for Prioritizing Static Analysis WarningsLiang, G. / Wu, L. / Wu, Q. / Wang, Q. / Xie, T. / Mei, H. et al. | 2010
- 103
-
An Automated Approach for Finding Variable-Constant Pairing BugsLawall, J. / Lo, D. et al. | 2010
- 113
-
Deviance from Perfection Is a Better Criterion Than Closeness to Evil When Identifying Risky CodeKessentini, M. / Vaucher, S. / Sahraoui, H. et al. | 2010
- 123
-
Seamlessly Integrated, But Loosely Coupled - Building User Interfaces from Heterogeneous ComponentsPaulheim, H. et al. | 2010
- 127
-
Tool Support for Quality-Driven Development of Software ArchitecturesKim, S. / Kim, D.-K. / Park, S. et al. | 2010
- 131
-
MiTV: Multiple-Implementation Testing of User-Input Validators for Web ApplicationsTaneja, K. / Li, N. / Marri, M.R. / Xie, T. / Tillmann, N. et al. | 2010
- 135
-
Model Comparison with GenericDiffXing, Z. et al. | 2010
- 139
-
Eliminating Products to Test in a Software Product LineKim, C.H.P. / Batory, D. / Khurshid, S. et al. | 2010
- 143
-
A Visual Interactive Debugger Based on Symbolic ExecutionHahnle, R. / Baum, M. / Bubel, R. / Rothe, M. et al. | 2010
- 147
-
Model-Driven Reverse Engineering of Legacy Graphical User InterfacesRamon, O.S. / Cuadrado, J.S. / Molina, J.G. et al. | 2010
- 151
-
A Two-Step Technique for Extract Class RefactoringBavota, G. / De Lucia, A. / Marcus, A. / Oliveto, R. et al. | 2010
- 155
-
Detecting User-Visible Failures in AJAX Web Applications by Analyzing Users' Interaction BehaviorsLi, W. / Harrold, M.J. / Gorg, C. et al. | 2010
- 159
-
Architectural Style as an Independent VariableBagheri, H. / Song, Y. / Sullivan, K. et al. | 2010
- 163
-
Text Mining in Supporting Software Systems Risk AssuranceHuang, L. / Port, D. / Wang, L. / Xie, T. / Menzies, T. et al. | 2010
- 167
-
JCCD: A Flexible and Extensible API for Implementing Custom Code Clone DetectorsBiegel, B. / Diehl, S. et al. | 2010
- 169
-
PeerUnit: A Framework for Testing Peer-to-Peer Systemsde Almeida, E.C. / Marynowski, J.E. / Sunye, G. / Valduriez, P. et al. | 2010
- 171
-
Reconfigurable Run-Time Support for Distributed Service Component ArchitecturesMelisson, R. / Merle, P. / Romero, D. / Rouvoy, R. / Seinturier, L. et al. | 2010
- 173
-
MoDisco: A Generic and Extensible Framework for Model Driven Reverse EngineeringBruneliere, H. / Cabot, J. / Jouault, F. / Madiot, F. et al. | 2010
- 175
-
Tool Support for Continuous Maintenance of State Machine Models in Program CodeBalz, M. / Striewe, M. / Goedicke, M. et al. | 2010
- 177
-
Reac2o: A Runtime for Enterprise System ModelsHine, C.M. / Schneider, J.-G. / Versteeg, S. et al. | 2010
- 179
-
Symbolic PathFinder: Symbolic Execution of Java BytecodePasareanu, C.S. / Rungta, N. et al. | 2010
- 181
-
Enumeration Refactoring: A Tool for Automatically Converting Java Constants to Enumerated TypesKhatchadourian, R. / Muskalla, B. et al. | 2010
- 183
-
``The Actual Implementation Will Be Derived From the Formal Specification'' - KBSA 1983Green, C. et al. | 2010
- 185
-
Verification-Driven Slicing of UML/OCL ModelsShaikh, A. / Clariso, R. / Wiil, U.K. / Memon, N. et al. | 2010
- 195
-
Automated Support for Repairing Input-Model FaultsMani, S. / Sinha, V.S. / Dhoolia, P. / Sinha, S. et al. | 2010
- 205
-
Security-Driven Model-Based Dynamic AdaptationMorin, B. / Mouelhi, T. / Fleurey, F. / Le Traon, Y. / Barais, O. / Jezequel, J.-M. et al. | 2010
- 215
-
JRF-E: Using Model Checking to Give Advice on Eliminating Memory Model-Related BugsKim, K. / Yavuz-Kahveci, T. / Sanders, B.A. et al. | 2010
- 225
-
A Bounded Statistical Approach for Model Checking of Unbounded Until PropertiesHe, R. / Jennings, P. / Basu, S. / Ghosh, A.P. / Wu, H. et al. | 2010
- 235
-
Eliminating Navigation Errors in Web Applications Via Model Checking and Runtime Enforcement of Navigation State MachinesHalle, S. / Ettema, T. / Bunch, C. / Bultan, T. et al. | 2010
- 245
-
Towards Mining Replacement Queries for Hard-to-Retrieve TracesGibiec, M. / Czauderna, A. / Cleland-Huang, J. et al. | 2010
- 255
-
Tool Support for Essential Use Cases to Better Capture Software RequirementsKamalrudin, M. / Grundy, J. / Hosking, J. et al. | 2010
- 265
-
Timesheet Assistant: Mining and Reporting Developer EffortSindhgatta, R. / Narendra, N.C. / Sengupta, B. / Visweswariah, K. / Ryman, A.G. et al. | 2010
- 275
-
An Experience Report on Scaling Tools for Mining Software Repositories Using MapReduceShang, W. / Adams, B. / Hassan, A.E. et al. | 2010
- 285
-
iMashup: Assisting End-User Programming for The Service-Oriented WebLiu, X. / Zhao, Q. / Huang, G. / Jin, Z. / Mei, H. et al. | 2010
- 289
-
MODA: Automated Test Generation for Database Applications Via Mock ObjectsTaneja, K. / Zhang, Y. / Xie, T. et al. | 2010
- 293
-
Random Unit-Test Generation with MUT-Aware Sequence RecommendationZheng, W. / Zhang, Q. / Lyu, M. / Xie, T. et al. | 2010
- 297
-
End-User Oriented Critic Specification for Domain-Specific Visual Language ToolsAli, N.M. / Hosking, J. / Grundy, J. / Huh, J. et al. | 2010
- 301
-
Checking Roundoff Errors Using Counterexample-Guided NarrowingNgoc, D.T.B. / Ogawa, M. et al. | 2010
- 305
-
Realizing Architecture Frameworks Through Megamodelling TechniquesHilliard, R. / Malavolta, I. / Muccini, H. / Pelliccione, P. et al. | 2010
- 309
-
Recovering Inter-Project Dependencies in Software EcosystemsLungu, M. / Robbes, R. / Lanza, M. et al. | 2010
- 313
-
Automated Program Repair Through the Evolution of Assembly CodeSchulte, E. / Forrest, S. / Weimer, W. et al. | 2010
- 317
-
Integrating Model Verification and Self-AdaptationBorges, R.V. / Garcez, A.d. / Lamb, L.C. et al. | 2010
- 321
-
When to Use Data from Other Projects for Effort EstimationKocaguneli, E. / Gay, G. / Menzies, T. / Yang, Y. / Keung, J.W. et al. | 2010
- 325
-
Kadre: Domain-Specific Architectural Recovery for Scientific Software SystemsWoollard, D. / Mattmann, C.A. / Popescu, D. / Medvidovic, N. et al. | 2010
- 329
-
Automated SQL Query Generation for Systematic Testing of Database EnginesKhalek, S.A. / Khurshid, S. et al. | 2010
- 333
-
Tag and Prune: A Pragmatic Approach to Software Product Line ImplementationBoucher, Q. / Classen, A. / Heymans, P. / Bourdoux, A. / Demonceau, L. et al. | 2010
- 337
-
Reducing Estimation Uncertainty with Continuous Assessment: Tracking the ``Cone of Uncertainty''Aroonvatanaporn, P. / Sinthop, C. / Boehm, B. et al. | 2010
- 341
-
Using Transitive Changesets to Support Feature LocationRatanotayanon, S. / Choi, H.J. / Sim, S.E. et al. | 2010
- 345
-
RuMoR: Monitoring and Recovery for BPEL ApplicationsSimmonds, J. / Chechik, M. et al. | 2010
- 347
-
Model/Analyzer: A Tool for Detecting, Visualizing and Fixing Design Errors in UMLReder, A. / Egyed, A. et al. | 2010
- 349
-
CoGenTe: A Tool for Code Generator TestingRajeev, A.C. / Sampath, P. / Shashidhar, K.C. / Ramesh, S. et al. | 2010
- 351
-
Impendulo: Debugging the ProgrammerVisser, W. / Geldenhuys, J. et al. | 2010
- 353
-
SpecDiff: Debugging Formal SpecificationsXing, Z. / Sun, J. / Liu, Y. / Dong, J.S. et al. | 2010
- 355
-
Deriving Behavior of Multi-User Processes from Interactive Requirements ValidationGabrysiak, G. / Giese, H. / Seibel, A. et al. | 2010
- 357
-
Tool Support for Code Generation from a UMLsec PropertyMontrieux, L. / Jurjens, J. / Haley, C.B. / Yu, Y. / Schobbens, P.-Y. / Toussaint, H. et al. | 2010
- 359
-
PlayGo: Towards a Comprehensive Tool for Scenario Based ProgrammingHarel, D. / Maoz, S. / Szekely, S. / Barkan, D. et al. | 2010
- 361
-
REMES Tool-Chain: A Set of Integrated Tools for Behavioral Modeling and Analysis of Embedded SystemsIvanov, D. / Orlic, M. / Seceleanu, C. / Vulgarakis, A. et al. | 2010
- 363
-
C2O: A Tool for Guided Decision-MakingNohrer, A. / Egyed, A. et al. | 2010
- 365
-
Model Engineering for Model-Driven Engineeringvan Lamsweerde, A. et al. | 2010
- 367
-
Search-Carrying CodeTaleghani, A. / Atlee, J.M. et al. | 2010
- 377
-
Solving String Constraints LazilyHooimeijer, P. / Weimer, W. et al. | 2010
- 387
-
Scenario-Based and Value-Based Specification Mining: Better TogetherLo, D. / Maoz, S. et al. | 2010
- 397
-
Test Generation to Expose Changes in Evolving ProgramsQi, D. / Roychoudhury, A. / Liang, Z. et al. | 2010
- 407
-
How Did You Specify Your Test Suite?Holzer, A. / Tautschnig, M. / Veith, H. / Schallhart, C. et al. | 2010
- 417
-
Dynamic and Transparent Analysis of Commodity Production SystemsFattori, A. / Paleari, R. / Martignoni, L. / Monga, M. et al. | 2010
- 427
-
Apt-pbo: Solving the Software Dependency Problem Using Pseudo-Boolean OptimizationTrezentos, P. / Lynce, I. / Oliveira, A.L. et al. | 2010
- 437
-
A Sentence-Matching Method for Automatic License Identification of Source Code FilesGerman, D.M. / Manabe, Y. / Inoue, K. et al. | 2010
- 447
-
Detection of Recurring Software VulnerabilitiesPham, N.H. / Nguyen, T.T. / Nguyen, H.A. / Nguyen, T.N. et al. | 2010
- 457
-
Matching Dependence-Related Queries in the System Dependence GraphWang, X. / Lo, D. / Cheng, J. / Zhang, L. / Mei, H. / Yu, J.X. et al. | 2010
- 467
-
PLASMA: A Plan-Based Layered Architecture for Software Model-Driven AdaptationTajalli, H. / Garcia, J. / Edwards, G. / Medvidovic, N. et al. | 2010
- 477
-
A Program Differencing Algorithm for Verilog HDLDuley, A. / Spandikow, C. / Kim, M. et al. | 2010
- 487
-
Error-Avoiding Adaptors for Black-Box Software ComponentsHolotescu, C. et al. | 2010
- 493
-
Automated Model GroupingBecker, M. / Gruhn, V. et al. | 2010
- 499
-
Automatic Inference of Abstract Type BehaviorBalint, M. et al. | 2010
- 505
-
Extraction and Visualization of Traceability Relationships Between Documents and Source CodeChen, X. et al. | 2010
- 511
-
Model Checking Graph Representation of Precise Boolean Inter-Procedural Flow AnalysisLetarte, D. et al. | 2010
- 517
-
The Influence of Multiple Artifacts on the Effectiveness of Software TestingStaats, M. et al. | 2010