全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

C程序隐式规则自动提取与反例检测

DOI: 10.3969/j.issn.0372-2112.2013.02.007, PP. 248-254

Keywords: 频繁闭合项集挖掘,程序规则提取,反例检测,软件缺陷检测,静态分析

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出一种通用且高效的隐式规则自动提取与反例检测方法,使用频繁闭合项集挖掘技术挖掘包含多种程序元素的编程模式,然后由编程模式产生编程规则;引入正序规则的概念,以避免从同一个编程模式中产生多个冗余规则.在此基础上,提出一种高效的反例检测算法检测违反规则的程序片段.实验结果表明,该方法能够自动提取程序中存在的隐式编程规则,并快速有效地检测违反规则的反例.

References

[1]  Acharya M,Xie T.Mining API error-handling specifications from source code[A].Proceedings of the 12th International Conference on Fundamental Approach to Software Engineering .Heidelberg:Springer-Verlag,2009.370-384.
[2]  Lu S,Park S,Zhou Y Y.MUVI:automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs[A].Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles[C].New York:ACM Press,2007.103-116.
[3]  Li Z M,Zhou Y Y.PR-Miner:automatically extracting implicit programming rules and detecting violations in large software code[A].13th ACM SIGSOFT Symposium on the Foundations of Software Enginerring[C].New York:ACM Press,2005.306-315.
[4]  Pei J,Han J W,Mao R Y.CLOSET:an efficient algorithm for mining frequent closed itemsets[A].ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery[C].New York:ACM Press,2000 21-30.
[5]  Graphne G,Zhu J F.High performance mining of maximal frequent itemsets[A].ISAM03 Workshop on High Performance Data Mining:Pervasive and Data Stream Mining[C].New York:ACM Press,2003.135-143.
[6]  Chen H,Wagner D.MOPS:An infrastructure for examining security properties of software[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].New York:ACM Press,2002.235-244.
[7]  Thummalapenta S,Xie T.Mining exception-handling rules as sequence association rules[A].Proceedings of the 31st International Conference on Software Engineering[C].Washington D C:IEEE Computer Society Press,2009.496-506.
[8]  Chang R Y,Podgurski A.Discovering programming rules and violations by mining international dependences [J].Journal of Software Maintenance and Evolution:Research and Practice,2011,23(3):160-175.
[9]  Wang J Y,Han J W,Pei J.CLOSET+:searching for the best strategies for mining frequent closed itemsets[A].Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].New York:ACM Press,2003.236-245.
[10]  Graphne G,Zhu J F.Efficiently using prefix-tress in mining frequent itemsets[A].Proceedings of the 12th ACM SIGSOFT Symposium on Operating Systems Design and Implementation[C].New York:ACM Press,2003.110-119.
[11]  Han J W,Pei J,Yin Y W.Mining frequent patterns without candidate generation[A].Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data[C].New York:ACM Press,2000.1-12.
[12]  刘晓东,刘大有.数据挖掘专利综述[J].电子学报,2003,31(12A):1989-1993. Liu Xiaodong,Liu Dayou.Data Mining Patent Summarization[J].Acta Electronica Sinica,2003,31(12A):1989-1993.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133