Automated API property inference techniques

MP Robillard, E Bodden, D Kawrykow… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
Frameworks and libraries offer reusable and customizable functionality through Application
Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …

Learning to log: Helping developers make informed logging decisions

J Zhu, P He, Q Fu, H Zhang, MR Lyu… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Logging is a common programming practice of practical importance to collect system
runtime information for postmortem analysis. Strategic logging placement is desired to cover …

Are code examples on an online q&a forum reliable? a study of api misuse on stack overflow

T Zhang, G Upadhyaya, A Reinhardt, H Rajan… - Proceedings of the 40th …, 2018 - dl.acm.org
Programmers often consult an online Q&A forum such as Stack Overflow to learn new APIs.
This paper presents an empirical study on the prevalence and severity of API misuse on …

General LTL specification mining (T)

C Lemieux, D Park… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Temporal properties are useful for describing and reasoning about software behavior, but
developers rarely write down temporal specifications of their systems. Prior work on inferring …

A systematic evaluation of static api-misuse detectors

S Amann, HA Nguyen, S Nadi… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions
on call order or call conditions. API misuses, ie, violations of these constraints, may lead to …

Bugram: bug detection with n-gram language models

S Wang, D Chollak, D Movshovitz-Attias… - Proceedings of the 31st …, 2016 - dl.acm.org
To improve software reliability, many rule-based techniques have been proposed to infer
programming rules and detect violations of these rules as bugs. These rule-based …

Performance debugging in the large via mining millions of stack traces

S Han, Y Dang, S Ge, D Zhang… - 2012 34th International …, 2012 - ieeexplore.ieee.org
Given limited resource and time before software release, development-site testing and
debugging become more and more insufficient to ensure satisfactory software performance …

API-misuse detection driven by fine-grained API-constraint knowledge graph

X Ren, X Ye, Z Xing, X Xia, X Xu, L Zhu… - Proceedings of the 35th …, 2020 - dl.acm.org
API misuses cause significant problem in software development. Existing methods detect
API misuses against frequent API usage patterns mined from codebase. They make a naive …

Bug characteristics in blockchain systems: a large-scale empirical study

Z Wan, D Lo, X Xia, L Cai - 2017 IEEE/ACM 14th International …, 2017 - ieeexplore.ieee.org
Bugs severely hurt blockchain system dependability. A thorough understanding of
blockchain bug characteristics is required to design effective tools for preventing, detecting …

Mining temporal specifications from object usage

A Wasylkowski, A Zeller - Automated Software Engineering, 2011 - Springer
A caller must satisfy the callee's precondition—that is, reach a state in which the callee may
be called. Preconditions describe the state that needs to be reached, but not how to reach it …