enter search term and/or author name
PrIMe: A methodology for developing provenance-aware applications
Simon Miles, Paul Groth, Steve Munroe, Luc Moreau
Article No.: 8
Provenance refers to the past processes that brought about a given (version of an) object, item or entity. By knowing the provenance of data, users can often better understand, trust, reproduce, and validate it. A provenance-aware application has...
Temporal dependency-based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems
Jinjun Chen, Yun Yang
Article No.: 9
In a scientific workflow system, a checkpoint selection strategy is used to select checkpoints along scientific workflow execution for verifying temporal constraints so that we can identify any temporal violations and handle them in time in order...
Reducing the effort of bug report triage: Recommenders for development-oriented decisions
John Anvik, Gail C. Murphy
Article No.: 10
A key collaborative hub for many software development projects is the bug report repository. Although its use can improve the software development process in a number of ways, reports added to the repository need to be triaged. A triager...
This article presents an improved approach to assist diagnosis of failures in software (fault localisation) by ranking program statements or blocks in accordance with to how likely they are to be buggy. We present a very simple single-bug program...
FlagRemover: A testability transformation for transforming loop-assigned flags
David W. Binkley, Mark Harman, Kiran Lakhotia
Article No.: 12
Search-Based Testing is a widely studied technique for automatically generating test inputs, with the aim of reducing the cost of software engineering activities that rely upon testing. However, search-based approaches degenerate to random testing...
A revisit of fault class hierarchies in general boolean specifications
Zhenyu Chen, Tsong Yueh Chen, Baowen Xu
Article No.: 13
Recently, Kapoor and Bowen  have extended the works by Kuhn , Tsuchiya and Kikuno , and Lau and Yu . However, their proofs overlook the possibility that a mutant of the Boolean specifications under test may be equivalent....