International audienceWe introduce in this paper an itemset mining approach to tackle the fault localization problem, which is one of the most difficult processes in software debug- ging. We formalize the problem of fault localization as finding the k best patterns satisfying a set of constraints modelling the most suspicious statements. We use a Constraint Programming (CP) approach to model and to solve our itemset based fault localization problem. Our approach consists of two steps: (i) mining top-k suspicious suites of statements; (ii) fault localization by processing top-k patterns. Experiments performed on standard benchmark programs show that our approach enables to pro- pose a more precise localization than a standard approac
International audienceConstraint programs such as those written in highlevel modeling languages (e.g...
—Constraint programs such as those written in high-level modeling languages (e.g., OPL [15], ZINC [1...
Model-based program debugging exploits discrepancies between the program behavior anticipated by a p...
International audienceWe introduce in this paper an itemset mining approach to tackle the fault loca...
International audienceWe introduce in this paper an itemset mining approach to tackle the fault loca...
International audienceFault localization problem is one of the most difficult processes in software ...
Discovering the set of closed frequent itemsets is one of the fundamental problems in Data Mining. R...
Discovering the set of closed frequent itemsets is one of the fundamental problems in Data Mining. R...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
Abstract—Fault localization has been widely recognized as one of the most costly activities in softw...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceConstraint programs such as those written in highlevel modeling languages (e.g...
International audienceConstraint programs such as those written in highlevel modeling languages (e.g...
—Constraint programs such as those written in high-level modeling languages (e.g., OPL [15], ZINC [1...
Model-based program debugging exploits discrepancies between the program behavior anticipated by a p...
International audienceWe introduce in this paper an itemset mining approach to tackle the fault loca...
International audienceWe introduce in this paper an itemset mining approach to tackle the fault loca...
International audienceFault localization problem is one of the most difficult processes in software ...
Discovering the set of closed frequent itemsets is one of the fundamental problems in Data Mining. R...
Discovering the set of closed frequent itemsets is one of the fundamental problems in Data Mining. R...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceWe have proposed an interactive fault localization method based on two data mi...
Abstract—Fault localization has been widely recognized as one of the most costly activities in softw...
International audienceWe have proposed an interactive fault localization method based on two data mi...
International audienceConstraint programs such as those written in highlevel modeling languages (e.g...
International audienceConstraint programs such as those written in highlevel modeling languages (e.g...
—Constraint programs such as those written in high-level modeling languages (e.g., OPL [15], ZINC [1...
Model-based program debugging exploits discrepancies between the program behavior anticipated by a p...