Software Fault Localization Using N-gram Analysis

被引:0
|
作者
Nessa, Syeda [1 ]
Abedin, Muhammad [1 ]
Wong, W. Eric [1 ]
Khan, Latifur [1 ]
Qi, Yu [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A major portion of software development effort, is spent in testing and debugging. Execution sequence collected ill the testing phase call be a rich source of information for locating the fault ill the program, but the exact execution sequence of a program, i.e., the actual order of execution of the statements in die program, is seldom Used due. to the. huge volume. In this Study, we apply data mining techniques on this data to reduce the debugging time by narrowing down the possible location of the fault. Our method applies N-gram analysis to rank the executable statements of a software by level of suspicion. We conducted three case studies to demonstrate the effectiveness of our proposed method. We. also present comparison with other approaches. and illustrate the potential of, our method.
引用
收藏
页码:548 / 559
页数:12
相关论文
共 50 条
  • [1] Sentiment Analysis Using N-gram Technique
    Chidananda, Himadri Tanaya
    Das, Debashis
    Sagnika, Santwana
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 359 - 367
  • [2] Using n-gram analysis to cluster heartbeat signals
    Yu-Chen Huang
    Hanjun Lin
    Yeh-Liang Hsu
    Jun-Lin Lin
    [J]. BMC Medical Informatics and Decision Making, 12
  • [3] Using n-gram analysis to cluster heartbeat signals
    Huang, Yu-Chen
    Lin, Hanjun
    Hsu, Yeh-Liang
    Lin, Jun-Lin
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2012, 12
  • [4] HTTP attack detection using n-gram analysis
    Oza, Aditya
    Ross, Kevin
    Low, Richard M.
    Stamp, Mark
    [J]. COMPUTERS & SECURITY, 2014, 45 : 242 - 254
  • [5] A software birthmark based on dynamic opcode n-gram
    Bin Lu
    Liu, Fenlin
    Ge, Xin
    Bin Liu
    Luo, Xiangyang
    [J]. ICSC 2007: INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, PROCEEDINGS, 2007, : 37 - +
  • [6] Classification of facemarks using N-gram
    Yamada, Thichi
    Tsuchiya, Seiji
    Kuroiwa, Shiongo
    Ren, Fuji
    [J]. PROCEEDINGS OF THE 2007 IEEE INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING AND KNOWLEDGE ENGINEERING (NLP-KE'07), 2007, : 322 - +
  • [7] N-gram Analysis of a Mongolian Text
    Altangerel, Khuder
    Tsend, Ganbat
    Jalsan, Khash-Erdene
    [J]. IFOST 2008: PROCEEDING OF THE THIRD INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGIES, 2008, : 258 - 259
  • [8] N-GRAM ANALYSIS IN THE ENGINEERING DOMAIN
    Leary, Martin
    Pearson, Geoff
    Burvill, Colin
    Mazur, Maciej
    Subic, Aleksandar
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN (ICED 11): IMPACTING SOCIETY THROUGH ENGINEERING DESIGN, VOL 6: DESIGN INFORMATION AND KNOWLEDGE, 2011, 6 : 414 - 423
  • [9] Using N-Gram Variations in Static Analysis for Malware Detection
    Radovancovici, Marco
    Galis, Darius
    Pungila, Ciprian
    [J]. 2022 24TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, SYNASC, 2022, : 195 - 199
  • [10] Predicting Vulnerable Software Components through N-gram Analysis and Statistical Feature Selection
    Pang, Yulei
    Xue, Xiaozhen
    Namin, Akbar Siami
    [J]. 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 543 - 548