Spelling suggestions: "subject:"debugging inn computer cience"" "subject:"debugging inn computer cscience""
11 |
Techniques to facilitate the debugging of concurrent programsChua, Hong Yau. January 1986 (has links)
Call number: LD2668 .T4 1986 C48 / Master of Science / Computing and Information Sciences
|
12 |
SIGBOT: signature-based multiple-bug localizationZhang, Yiwei, 张益维 January 2009 (has links)
published_or_final_version / Computer Science / Master / Master of Philosophy
|
13 |
On effective fault localization in software debugging /Qi, Yu. January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 106-116)
|
14 |
Hybrid analysis of multi-threaded Java programsWeiser, David A. January 2007 (has links)
Thesis (M.S.)--University of Wyoming, 2007. / Title from PDF title page (viewed on June 15, 2009). Includes bibliographical references (p. 83-84).
|
15 |
Diagnosing and tolerating bugs in deployed systemsBond, Michael David 09 October 2012 (has links)
Deployed software is never free of bugs. These bugs cause software to fail, wasting billions of dollars and sometimes causing injury or death. Bugs are pervasive in modern software, which is increasingly complex due to demand for features, extensibility, and integration of components. Complete validation and exhaustive testing are infeasible for substantial software systems, and therefore deployed software exhibits untested and unanalyzed behaviors. Software behaves differently after deployment due to different environments and inputs, so developers cannot find and fix all bugs before deploying software, and they cannot easily reproduce post-deployment bugs outside of the deployed setting. This dissertation argues that post-deployment is a compelling environment for diagnosing and tolerating bugs, and it introduces a general approach called post-deployment debugging. Techniques in this class are efficient enough to go unnoticed by users and accurate enough to find and report the sources of errors to developers. We demonstrate that they help developers find and fix bugs and help users get more functionality out of failing software. To diagnose post-deployment failures, programmers need to understand the program operations--control and data flow--responsible for failures. Prior approaches for widespread tracking of control and data flow often slow programs by two times or more and increase memory usage significantly, making them impractical for online use. We present novel techniques for representing control and data flow that add modest overhead while still providing diagnostic information directly useful for fixing bugs. The first technique, probabilistic calling context (PCC), provides low-overhead context sensitivity to dynamic analyses that detect new or anomalous deployed behavior. Second, Bell statistically correlates control flow with data, and it reconstructs program locations associated with data. We apply Bell to leak detection, where it tracks and reports program locations responsible for real memory leaks. The third technique, origin tracking, tracks the originating program locations of unusable values such as null references, by storing origins in place of unusable values. These origins are cheap to track and are directly useful for diagnosing real-world null pointer exceptions. Post-deployment diagnosis helps developers find and fix bugs, but in the meantime, users need help with failing software. We present techniques that tolerate memory leaks, which are particularly difficult to diagnose since they have no immediate symptoms and may take days or longer to materialize. Our techniques effectively narrow the gap between reachability and liveness by providing the illusion that dead but reachable objects do not consume resources. The techniques identify stale objects not used in a while and remove them from the application and garbage collector’s working set. The first technique, Melt, relocates stale memory to disk, so it can restore objects if the program uses them later. Growing leaks exhaust the disk eventually, and some embedded systems have no disk. Our second technique, leak pruning, addresses these limitations by automatically reclaiming likely leaked memory. It preserves semantics by waiting until heap exhaustion to reclaim memory--then intercepting program attempts to access reclaimed memory. We demonstrate the utility and efficiency of post-deployment debugging on large, real-world programs--where they pinpoint bug causes and improve software availability. Post-deployment debugging efficiently exposes and exploits programming language semantics and opens up a promising direction for improving software robustness. / text
|
16 |
System based ladder logic simulation and debugging /Krishnan, Krishna Kumar, January 1991 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1991. / Vita. Abstract. Includes bibliographical references (leaves 74-76). Also available via the Internet.
|
17 |
SIGBOT signature-based multiple-bug localization /Zhang, Yiwei, January 2009 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2010. / Includes bibliographical references (leaves 59-61). Also available in print.
|
18 |
Disk based model checking /Bao, Tonglaga, January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 33-34).
|
19 |
Diagnosing and tolerating bugs in deployed systemsBond, Michael David. January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2008. / Vita. Includes bibliographical references.
|
20 |
A research framework for software-fault localization tools /Renieris, Emmanuel. January 2005 (has links)
Thesis (Ph.D.)--Brown University, 2005. / Vita. Thesis advisor: Steven P. Reiss. Includes bibliographical references (leaves 78-86). Also available online.
|
Page generated in 0.1256 seconds