Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering 2005
DOI: 10.1145/1101908.1101948
|View full text |Cite
|
Sign up to set email alerts
|

Locating faulty code using failure-inducing chops

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
117
0
1

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 149 publications
(122 citation statements)
references
References 16 publications
3
117
0
1
Order By: Relevance
“…Other spectrum-based techniques [20], [25], [43], [52] only use failed executions as the input and systematically alter the program structure or program runtime states to locate faults. Zhang et al [52] search for faulty program predicates by switching the states of program predicates at runtime.…”
Section: A Fault Localizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Other spectrum-based techniques [20], [25], [43], [52] only use failed executions as the input and systematically alter the program structure or program runtime states to locate faults. Zhang et al [52] search for faulty program predicates by switching the states of program predicates at runtime.…”
Section: A Fault Localizationmentioning
confidence: 99%
“…Sterling and Olsson use the concept of program chipping [43] to automatically remove parts of a program so that the part that contributes to the failure may become more apparent. While their tool, ChipperJ, works on syntax trees for Java programs, Gupta et al [20] work on program dependency graphs and use the intersection of forward and backward program slices to reduce the sizes of failure-relevant code for further inspection. Jeffrey et al use a value profile based approach to rank program statements according to their likelihood of being faulty [25].…”
Section: A Fault Localizationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, slicing tends to produce fat slices containing not only the failure inducing dependencies but also benign dependencies. Although various techniques have been proposed to prune dynamic slices [18,19], without using a reference execution to exclude benign chains, inspecting pruned slices still requires non-trivial human effort. Dicing [20] aggregates slices from multiple executions.…”
Section: Related Workmentioning
confidence: 99%
“…It is widely used in debugging [20]. Gupta et al [6] propose a forward dynamic slicing approach to narrow down slices. They further integrate the forward approach with standard dynamic slicing approaches [26].…”
Section: Related Workmentioning
confidence: 99%