Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
Identifying patch correctness in test-based program repairXiong, Yingfei ; Liu, Xinyuan ; Zeng, Muhan ; Zhang, Lu ; Huang, Gang2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018, p.789-799New York, NY, USA: ACMTexto completo disponível |
2 |
Material Type: Ata de Congresso
|
![]() |
Towards practical program repair with on-demand candidate generationHua, Jinru ; Zhang, Mengshi ; Wang, Kaiyuan ; Khurshid, Sarfraz2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018, p.12-23New York, NY, USA: ACMTexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference TechniquesKucuk, Yigit ; Henderson, Tim A. D. ; Podgurski, Andy2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021, p.649-660IEEETexto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
Code completion with statistical language modelsRaychev, Veselin ; Vechev, Martin ; Yahav, EranProceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014, p.419-428New York, NY, USA: ACMTexto completo disponível |
5 |
Material Type: Ata de Congresso
|
![]() |
Concurrent Separation Logic Meets Template GamesMelliès, Paul-André ; Stefanesco, LéoProceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020, p.742-755New York, NY, USA: ACMTexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
Before we knew it: an empirical study of zero-day attacks in the real worldBilge, Leyla ; Dumitraş, TudorProceedings of the 2012 ACM conference on Computer and communications security, 2012, p.833-844New York, NY, USA: ACMTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradictionHuang, Jianjun ; Zhang, Xiangyu ; Tan, Lin ; Wang, Peng ; Liang, BinProceedings of the 36th International Conference on Software Engineering, 2014, p.1036-1046New York, NY, USA: ACMTexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
Scalable Quantitative Verification for Deep Neural NetworksBaluta, Teodora ; Chua, Zheng Leong ; Meel, Kuldeep S. ; Saxena, Prateek2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021, p.312-323IEEETexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Towards optimal concolic testingWang, Xinyu ; Sun, Jun ; Chen, Zhenbang ; Zhang, Peixin ; Wang, Jingyi ; Lin, Yun2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018, p.291-302New York, NY, USA: ACMTexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
Chucky: exposing missing checks in source code for vulnerability discoveryYamaguchi, Fabian ; Wressnegger, Christian ; Gascon, Hugo ; Rieck, KonradProceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, p.499-510New York, NY, USA: ACMTexto completo disponível |