Open Access
Issue
MATEC Web Conf.
Volume 189, 2018
2018 2nd International Conference on Material Engineering and Advanced Manufacturing Technology (MEAMT 2018)
Article Number 04005
Number of page(s) 10
Section Circuit Analysis
DOI https://doi.org/10.1051/matecconf/201818904005
Published online 10 August 2018
  1. Renieris M and Reiss SP 2003 Fault Localization With Nearest Neighbor Queries Proc. Int. Conf. on Automated Software Engineering(Montreal) vol 2003 (IEEE) pp 30-39 [Google Scholar]
  2. Kang F, Wang Q, Xiao YN and Huang HJ 2013 Research on key functions locating technique based on software execution trace difference comparison Journal on Communications 34 chapter 9 pp 177-184 [Google Scholar]
  3. Huang XH 2017 Fault Localization Method Based on Path Clustering Software Guide 16 chapter 3 pp 3-6 [Google Scholar]
  4. Ye JM, Xie Q, Jiang L, Li SS and Xu L 2011 Generation of a Consensus Sequence and its Applications in the Fault Location Computer Science 38 chapter 3 pp 162-165 [Google Scholar]
  5. Chen K 2010 Case Study of Feature Location Using Dependece Graph, after 10 Years Int. Conf. on Program Comprehension(Braga) vol 2010 (IEEE) pp 1-3 [Google Scholar]
  6. Zhang ZY, Chan WK, Tse TH, Jiang B and Wang XM 2009 Capturing propagation of infected program states The Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering(Amsterdam) (ACM) pp 43-52 [Google Scholar]
  7. Baah GK, Podgurski A and Harrold MJ 2009 The probabilistic program dependence graph and its application to fault diagnosis Software Engineering IEEE Transactions on 36 chapter 4 pp 528-545 [Google Scholar]
  8. Wen WZ and Chen S 2015 Concurrent Sequence Slice Scientific and Technological Innovation 35 pp 15-16 [Google Scholar]
  9. Teng QY 2016 Fault Localization Based on Dynamic Program Slicing Nanjing University of Posts and Telecommunications [Google Scholar]
  10. Eisenberg AD and Volder KD 2005 Dynamic feature traces: finding features in unfamiliar code Int. Conf. on Software Maintenance(Budapset) vol 2005 (IEEE) pp 337-346 [Google Scholar]
  11. Xie YM, Shu H, Chen JM and Xiong XB 2009 Location of MFC messages processing functions in converse analysis Journal of Computer Applications 29 chapter 5 pp 1393-1396 [Google Scholar]
  12. Oprisnik A, Hein D and Teufl P 2016 Identifying Cryptographic Functionality in Android Applications Int. Conf. on Security and Cryptography(Vienna) vol 2016 (IEEE) pp 151-162 [Google Scholar]
  13. Calvet J and Marion JY 2012 Aligot:cryptographic function identification in obfuscated binary programs ACM Conference on Computer and Communications Security(Raleigh) (ACM) pp 169-182 [Google Scholar]
  14. Derek LB 2004 Efcient, Transparent, and Comprehensive Runtime Code Manipulation Massachusetts Institute of Technology [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.