Export Ready — 

Mining patterns of unsatisfiable constraints to detect infeasible paths

Detection of infeasible paths is required in many areas including test coverage analysis, test case generation, security vulnerability analysis, etc. Existing approaches typically use static analysis coupled with symbolic evaluation, heuristics, or path-pattern analysis. This paper is related to the...

全面介紹

Saved in:
書目詳細資料
Main Authors: DING, Sun, TAN, Hee Beng Kuan, SHAR, Lwin Khin
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2015
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/4779
https://ink.library.smu.edu.sg/context/sis_research/article/5782/viewcontent/Mining_Patterns_of_Unsatisfiable_Constraints_to_Detect_Infeasible_Paths_AST15.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English