Author image not provided
 Suzette J Person

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.31
Citation Count357
Publication count29
Publication years1996-2016
Available for download23
Average downloads per article374.61
Downloads (cumulative)8,616
Downloads (12 Months)689
Downloads (6 Weeks)58
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


29 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 29
Result page: 1 2

Sort by:

1
January 2016 VMCAI 2016: Proceedings of the 17th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 9583
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

A recent trend in the analysis of object-oriented programs is the modeling of references as sets of guarded values, enabling multiple heap shapes to be represented in a single state. A fundamental problem with using these guarded value sets is the inability to generate test inputs in a manner similar ...
Keywords: Constraint-based reasoning, Symbolic execution, Symbolic references

2
November 2015 ASE '15: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Tests are increasingly specified as programs. Expressing tests as code is advantageous in that developers are comfortable writing and running code, and tests can be automated and reused as the software evolves. Tests expressed as code, however, can also contain faults. Some test faults are similar to those found in ...

3
May 2015 ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 22,   Downloads (Overall): 84

Full text available: PDFPDF
Software analysis tools and techniques often leverage structural code coverage information to reason about the dynamic behavior of software. Existing techniques instrument the code with the required structural obligations and then monitor the execution of the compiled code to report coverage. Instrumentation based approaches often incur considerable runtime overhead for ...

4 published by ACM
February 2015 ACM SIGSOFT Software Engineering Notes: Volume 40 Issue 1, January 2015
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 34,   Downloads (Overall): 101

Full text available: PDFPDF
Symbolic execution is a program analysis technique that is used for many purposes, one of which is test case generation. For loop-free programs, this generates a test set that achieves path coverage. Program loops, however, imply exponential growth of the number of paths in the best case and non-termination in ...
Keywords: branch coverage, test case generation, Symbolic execution

5 published by ACM
October 2014 ACM Transactions on Software Engineering and Methodology (TOSEM): Volume 24 Issue 1, September 2014
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 7,   Downloads (12 Months): 58,   Downloads (Overall): 403

Full text available: PDFPDF
The last few years have seen a resurgence of interest in the use of symbolic execution—a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution to real systems remains challenging despite recent algorithmic and technological advances. An effective approach to address scalability ...
Keywords: Program differencing, software evolution, symbolic execution

6 published by ACM
July 2014 ISSTA 2014: Proceedings of the 2014 International Symposium on Software Testing and Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 11,   Downloads (12 Months): 43,   Downloads (Overall): 205

Full text available: PDFPDF
Program invariants can help software developers identify program properties that must be preserved as the software evolves, however, formulating correct invariants can be challenging. In this work, we introduce iDiscovery, a technique which leverages symbolic execution to improve the quality of dynamically discovered invariants computed by Daikon. Candidate invariants generated ...
Keywords: Invariant generation, Model checking, Symbolic execution

7 published by ACM
June 2014 TwinPeaks 2014: Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 52

Full text available: PDFPDF
In our experience at NASA, system engineers generally follow the Twin Peaks approach when developing safety-critical systems. However, iterations between the peaks require considerable manual, and in some cases duplicate, effort. A significant part of the manual effort stems from the fact that requirements are written in English natural language ...
Keywords: Model-Based Development, Formalization, Requirements

8 published by ACM
May 2014 ICSE 2014: Proceedings of the 36th International Conference on Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 2,   Downloads (12 Months): 36,   Downloads (Overall): 215

Full text available: PDFPDF
This paper introduces iProperty, a novel approach that facilitates incremental checking of programs based on a property differencing technique. Specifically, iProperty aims to reduce the cost of checking properties as they are initially developed and as they co-evolve with the program. The key novelty of iProperty is to compute the ...
Keywords: Daikon, change-impact analysis, Symbolic PathFinder, Incremental symbolic execution, assertions

9 published by ACM
May 2014 ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 31,   Downloads (Overall): 202

Full text available: PDFPDF
Tests generated by different approaches can form a rich body of information about the system under test (SUT), which can then be used to amplify the power of test suites. Diversity in test representations, however, creates an obstacle to extracting and using this information. In this work, we introduce a ...
Keywords: regression testing, Automated test generation

10 published by ACM
May 2014 ICSE Companion 2014: Companion Proceedings of the 36th International Conference on Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 109

Full text available: PDFPDF
Recent work on workspace monitoring allows conflict pre- diction early in the development process, however, these approaches mostly use syntactic differencing techniques to compare different program versions. In contrast, traditional change-impact analysis techniques analyze related versions of the program only after the code has been checked into the master repository. ...
Keywords: distributed software development, Change impact analysis, change awareness, conflict prediction

11 published by ACM
February 2014 ACM SIGSOFT Software Engineering Notes: Volume 39 Issue 1, January 2014
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 8,   Downloads (Overall): 58

Full text available: PDFPDF
To explore the state space of programs with complex user-defined data structures, most symbolic execution engines use the lazy initialization algorithm. Symbolic Pathfinder (SPF) is the symbolic execution engine for the Java PathFinder (JPF) model checker; SPF too contains an implementation of the lazy initialization algorithm. A number of extensions ...

12
December 2013 Innovations in Systems and Software Engineering: Volume 9 Issue 4, December 2013
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Software health management (SWHM) techniques complement the rigorous verification and validation processes that are applied to safety-critical systems prior to their deployment. These techniques are used to monitor deployed software in its execution environment, serving as the last line of defense against the effects of a critical fault. SWHM monitors ...
Keywords: Program analysis, Software evolution, Software health management

13
November 2013 ASE'13: Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 11

Full text available: PDFPDF
Adding similar features and bug fixes often requires porting program patches from reference implementations and adapting them to target implementations. Porting errors may result from faulty adaptations or inconsistent updates. This paper investigates (1) the types of porting errors found in practice, and (2) how to detect and characterize potential ...

14 published by ACM
November 2012 ACM SIGSOFT Software Engineering Notes: Volume 37 Issue 6, November 2012
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4,   Downloads (12 Months): 9,   Downloads (Overall): 68

Full text available: PDFPDF
Change impact analysis techniques estimate the potential effects of changes made to software. Directed Incremental Symbolic Execution (DiSE) is a Java PathFinder extension that computes the impact of changes on program execution behaviors. The results of DiSE are a set of impacted path conditions that can be efficiently processed by ...
Keywords: program analysis, visualization

15
September 2012 ICSM '12: Proceedings of the 2012 IEEE International Conference on Software Maintenance (ICSM)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 9

Change impact analysis techniques estimate the potential effects of changes made to software. Directed Incremental Symbolic Execution (DiSE) is an intraprocedural technique for characterizing the impact of software changes on program behaviors. DiSE first estimates the impact of the changes on the source code using program slicing techniques, and then ...
Keywords: Context,Testing,Software maintenance,Debugging,Conferences,Heuristic algorithms

16 published by ACM
June 2011 ACM SIGPLAN Notices - PLDI '11: Volume 46 Issue 6, June 2011
Publisher: ACM
Bibliometrics:
Citation Count: 65
Downloads (6 Weeks): 5,   Downloads (12 Months): 90,   Downloads (Overall): 1,087

Full text available: PDFPDF
The last few years have seen a resurgence of interest in the use of symbolic execution -- a program analysis technique developed more than three decades ago to analyze program execution paths. Scaling symbolic execution and other path-sensitive analysis techniques to large systems remains challenging despite recent algorithmic and technological ...
Keywords: program differencing, software evolution, symbolic execution
Also published in:
June 2011  PLDI '11: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation

17
November 2010 RV'10: Proceedings of the First international conference on Runtime verification
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

Runtime verification has primarily been developed and evaluated as a means of enriching the software testing process. While many researchers have pointed to its potential applicability in online approaches to software fault tolerance, there has been a dearth of work exploring the details of how that might be accomplished. In ...

18
January 2009
Bibliometrics:
Citation Count: 1

Successful software systems tend to be long lived and evolve over time as requirements change and faults are detected. The number of times a system is updated and re-deployed may be in the hundreds, or even thousands. Re-validation of an updated system, before it is released, is a ...

19 published by ACM
November 2008 SIGSOFT '08/FSE-16: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Publisher: ACM
Bibliometrics:
Citation Count: 90
Downloads (6 Weeks): 4,   Downloads (12 Months): 152,   Downloads (Overall): 1,813

Full text available: PDFPDF
Detecting and characterizing the effects of software changes is a fundamental component of software maintenance. Version differencing information can be used to perform version merging, infer change characteristics, produce program documentation, and guide program re-validation. Existing techniques for characterizing code changes, however, are imprecise leading to unnecessary maintenance efforts. In ...
Keywords: program differencing, software evolution, symbolic execution

20 published by ACM
July 2008 ISSTA '08: Proceedings of the 2008 international symposium on Software testing and analysis
Publisher: ACM
Bibliometrics:
Citation Count: 72
Downloads (6 Weeks): 9,   Downloads (12 Months): 72,   Downloads (Overall): 941

Full text available: PDFPDF
We describe an approach to testing complex safety critical software that combines unit-level symbolic execution and system-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have developed Symbolic Java PathFinder, a symbolic execution framework that implements a non-standard bytecode interpreter on top of the Java PathFinder ...
Keywords: software model checking, symbolic execution, system testing, unit testing



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us