2011 27th IEEE International Conference on Software Maintenance (ICSM) 2011
DOI: 10.1109/icsm.2011.6080789
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting text mining techniques in the analysis of execution traces

Abstract: The analysis of execution traces can be useful in many software engineering activities including debugging, feature enhancement, performance analysis, and any other task that requires some degree of understanding of the way a system behaves. Traces, however, tend to be considerably large, which often hinders effective analysis of their content.There is a need to investigate ways to help software engineers find and understand important information conveyed in a trace despite the trace being massive. Motivated b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…Random sampling may generate in samples that are not representative of the original trace. This work was extended [16] by extracting higher-level views that characterize the relevant information about execution traces.…”
Section: Related Workmentioning
confidence: 99%
“…Random sampling may generate in samples that are not representative of the original trace. This work was extended [16] by extracting higher-level views that characterize the relevant information about execution traces.…”
Section: Related Workmentioning
confidence: 99%
“…These methods primarily involve removing trivial behaviors, such as repetitive behaviors [6], [10], [14], and implementation details [9]. Another approach is to divide an execution trace into several phases [8], [11], [21]- [23] that correspond with the starting points of tasks.…”
Section: Coping With a Scalability Issue Of A Reverseengineered Sequementioning
confidence: 99%
“…They demonstrate two different styles of concept visualization, which show the proportion of overall time spent in each concept and the sequence of concept execution, respectively. Pirzadeh et al [2011] propose a trace exploration approach based on examining trace execution phases by adopting the Term Frequency, Inverse Document Frequency (TF-IDF) technique and the cosine similarity measure. Benomar et al [2014] propose an automatic approach for the detection of high-level execution phases from previously recorded execution traces, based on object lives, and without the specification of parameters or thresholds.…”
Section: Quality Of the Real-time Detectormentioning
confidence: 99%
“…Request permissions from permissions@acm.org. understanding Peleg and Mendelson [2007], Singer and Kirkham [2008], Pirzadeh et al [2011], Benomar et al [2014]. They are further interested in phases as a program runs in order to determine whether the program is operating as expected.…”
Section: Introductionmentioning
confidence: 99%