1. Y. Zhao, H. Leung, Y. Yang, Y. Zhou,B. Xu, “Towards an Understanding of Change Types in Bug Fixing Code,” Information and Software Technology, Vol. 86, No. 86, pp. 37-53, February 2017 2. Y. Higo, S. Hayashi, H. Hata,M. Nagappan, “Ammonia: An Approach for Deriving Project-Specific Bug Patterns,” Software Engineering, Vol. 25, No. 3, pp. 1951-1979, March 2020 3. M. Broy and E. Denert, “Pioneers and Their Contributions to Software Engineering,” Springer Berlin Heidelberg, 2001 4. Z. Wang, D. Zhang, S. Liu, J. Sun,Y. Zhao, “Adaptive Randomized Scheduling for Concurrency Bug Detection,” inProceedings of 2019 24th International Conference on Engineering of Complex Computer Systems, pp. 124-133, Guangzhou, China, November 2019 5. K. M.Olender and J. M. Bieman, “Using Algebraic Specifications to Find Sequencing Defects,” in Proceedings of International Symposium on Software Reliability Engineering, pp. 226-232, Denver, CO, USA, November 1993 6. Y. Dong, “Fully Detection of Illegal Memory Access Defects,” in Proceedings of 2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), pp. 449-455, Fukuoka, July 2016 7. P. Bian, B. Liang, Y. Zhang, C. Yang, W. Shi,Y. Cai, “Corrections to “Detecting Bugs by Discovering Expectations and Their Violations”,” IEEE Transactions on Software Engineering, Vol. 46, No. 1, pp. 113, January 2020 8. S. Asryan, S. S. Gaissaryan, S. Kurmangaleev, A. M. Aghabalyan, N. G. Hovsepyan,S. Sargsyan, “Dynamic Detection of Use-After-Free Bugs,” Programming and Computer Software, Vol. 45, No. 7, pp. 365-371, December 2019 9. M. Pradel and K. Sen, “DeepBugs: A Learning Approach to Name-based Bug Detection,” Software Engineering, Vol. 2, pp. 147, October 2018 10. Y. Jiang, P. Lu, X. Su,T. Wang, “LTRWES: A New Framework for Security Bug Report Detection,” Information and Software Technology, Vol. 124, pp. 106314, August 2020 11. N. Truong, P. Roe,P. Bancroft, “Static Analysis of Students' Java Programs,” inProceedings of Australasian Computing Education Conference, pp. 317-325, Dunedin, New Zealand, January 2004 12. C. M. Hayden, K. Saur, M. Hicks,J. S. Foster, “A Study of Dynamic Software Update Quiescence for Multithreaded Programs,” in Proceedings of International Workshop on Hot Topics in Software Upgrades, pp. 6-10, Zurich, June 2012 13. Y. W. Zhu, Z. Q. Zuo, L. Z. Wang,X. D. Li, “Memory Leak Intelligent Detection Method for C Programs,” Ruan Jian Xue Bao/Journal of Software, Vol. 30, No. 5, pp. 132-143, August 2019 (in Chinese) 14. J. Huang, M. Allenbond,X. Zhang, “Pallas: Semantic-Aware Checking for Finding Deep Bugs in Fast Path,” inProceedings of Architectural Support for Programming Languages and Operating Systems, pp. 709-722, Xian, China, April 2017 15. Y. Qu, S. K. Guo, H. Li, G. F. Gao, R. Chen,G. Chen, “Surprise Bug Report Prediction Utilizing Optimized Integration with Imbalanced Learning Strategy,” Complexity, Vol. 2020, pp. 1-14, February 2020 16. L. N. Q.Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphyhill, “Just-in-Time Static Analysis,” inProceedings of International Symposium on Software Testing and Analysis, pp. 307-317, Santa Barbara, CA, USA, August 2017 17. J. Friedl, “Mastering Regular Expressions,” O'Reilly Media, Inc., 2006 18. R. H.Carver and K. Tai, “Use of Sequencing Constraints for Specification-based Testing of Concurrent Programs,” IEEE Transactions on Software Engineering, Vol. 24, No. 6, pp. 471-490, June 1998 19. S. S. Some, “Specifying Use Case Sequencing Constraints using Description Elements,” in Proceedings of International Conference on Software Engineering, pp. 4, Minneapolis, MN, May 2007 20. Y. Shi, S. Park, Z. N. Yin, S. Lu,W. M. Zheng, “Do I Use the Wrong Definition?: DeFuse: Definition-Use Invariants for Detecting Concurrency and Sequential Bugs,” inProceedings of Conference on Object-Oriented Programming Systems, Languages, and Applications, pp. 160-174, Reno/Tahoe, Nevada, USA, October 2010 |