Author:
Chen Jie,Yu Dongjin,Hu Haiyang
Funder
National Science Foundation of China
Zhejiang Provincial National Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Safety, Risk, Reliability and Quality,Software
Reference29 articles.
1. Campos, E. C., & Maia, M. D. A. (2017). Common bug-fix patterns: a large-scale observational study. In ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. ACM.
2. Cherem, S., Princehouse, L., & Rugina. R. (2007). Practical memory leak detection using guarded value-flow analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 480–491.
3. Christopher, T. W. (1984). Reference count garbage collection. Software: Practice and Experience, 14(6), 503–507.
4. Clause, J., & Orso, A. (2010). Leakpoint: Pinpointing the causes of memory leaks. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering (vol. 1), ICSE ’10, pp. 515–524.
5. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms. MIT Press, Cambridge, MA, third edition.