Of all software development activities, debugging---locating the defective source code statements that cause a failure---can be by far the most time-consuming. We employ probabilistic modeling to support programmers in finding defective code. Most defects are identifiable in control flow graphs of software traces. A trace is represented by a sequence of code positions (line numbers in source filenames) that are executed when the software runs. The control flow graph represents the finite state machine of the program, in which states depict code positions and arcs indicate valid follow up code positions. In this work, we extend this definition towards an n-gram control flow graph, where a state represents a fragment of subsequent code positi...
Computer software is constantly increasing in complexity; this requires more developer time, effort,...
Software bug localization is the problem of determining buggy statements in a software system. It is...
Abstract—The vast majority of security breaches encountered today are a direct result of insecure co...
Of all software development activities, debugging---locating the defective source code statements t...
We devise a graphical model that supports the process of debugging software by guiding developers to...
Access restricted to the OSU CommunityThis thesis shows how probabilistic graphical models may be ap...
Probabilistic programming languages allow domain ex-perts to specify generative models in a high-lev...
Complex functional integration leads to intricate logical control flows which in turn presents a gre...
In recent years, several probabilistic techniques have been applied to various debugging problems. H...
Debugging is a search process to find, understand and fix the root cause of software defects. Can de...
During software maintenance, bug report is an effective way to identify potential bugs hidden in a s...
Software covers every corner of our lives, so do software faults. Currently, a popular approach in f...
Abstract. Detection of infeasible code has recently been identified as a scalable and automated tech...
To date, software engineers charged with debugging complex software packages have had few automated ...
Abstract—We exploit recent advances in analysis of graph topology to better understand software evol...
Computer software is constantly increasing in complexity; this requires more developer time, effort,...
Software bug localization is the problem of determining buggy statements in a software system. It is...
Abstract—The vast majority of security breaches encountered today are a direct result of insecure co...
Of all software development activities, debugging---locating the defective source code statements t...
We devise a graphical model that supports the process of debugging software by guiding developers to...
Access restricted to the OSU CommunityThis thesis shows how probabilistic graphical models may be ap...
Probabilistic programming languages allow domain ex-perts to specify generative models in a high-lev...
Complex functional integration leads to intricate logical control flows which in turn presents a gre...
In recent years, several probabilistic techniques have been applied to various debugging problems. H...
Debugging is a search process to find, understand and fix the root cause of software defects. Can de...
During software maintenance, bug report is an effective way to identify potential bugs hidden in a s...
Software covers every corner of our lives, so do software faults. Currently, a popular approach in f...
Abstract. Detection of infeasible code has recently been identified as a scalable and automated tech...
To date, software engineers charged with debugging complex software packages have had few automated ...
Abstract—We exploit recent advances in analysis of graph topology to better understand software evol...
Computer software is constantly increasing in complexity; this requires more developer time, effort,...
Software bug localization is the problem of determining buggy statements in a software system. It is...
Abstract—The vast majority of security breaches encountered today are a direct result of insecure co...