SS Rathore, S Kumar - Soft Computing, 2017 - Springer
… capability of six fault prediction techniques such as genetic programming, multilayer perceptron… libraries and command line tools to help in building Java applications. It is written in Java …
… In this section, we focus on Android applicationprograms, and explore how to use the formal framework introduced in Sect. 3 to model Permissions, an implementation mechanism …
A Shye, J Blomstedt, T Moseley… - … on Dependable and …, 2008 - ieeexplore.ieee.org
… and libraries, but the source code for legacy programs is … software-implemented technique for transient fault tolerance. PLR creates a set of redundant processes per original application …
… According to the findings of this study, a novel strategy for estimating the quality of software may be derived from the application of the Support Vector Machine (SVM) to the classification …
… Since neither a test suite nor a set of known faults exists for our subject programs, we use Apollo’s combined concrete and symbolic execution technique that was presented in Section 3 …
F Qin, J Tucek, J Sundaresan, Y Zhou - Proceedings of the twentieth …, 2005 - dl.acm.org
… can quickly recover programs from many types of software bugs, … avoids software defects in the four tested server applications … Also, as we find that most faults are detected promptly (…
J Carreira, H Madeira, JG Silva - … Computing and Fault Tolerant …, 1998 - researchgate.net
… By directly programming the debugging … inject faults with minimum interference with the target application. Unlike previous softwarefault injectors, with Xception the target application is …
… The aim of this study is to systematically review existing research on MFL in the software fault localization (SFL) domain. This study also aims to identify, categorize, and synthesize …
PE Ammann, JC Knight - Ieee transactions on computers, 1988 - ieeexplore.ieee.org
… in the reliability of software for crucial applications. At execution time, the fault-tolerant structure … of several failure regions for faults in programs used in a previous experiment [7]. The …