Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(bug detection). Showing records 1 – 25 of 25 total matches.

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of New South Wales

1. Yan, Hua. Program analysis of temporal memory mismanagement.

Degree: Computer Science & Engineering, 2018, University of New South Wales

 In the use of C/C++ programs, the performance benefits obtained from flexible low-level memory access and management sacrifice language-level support for memory safety and garbage… (more)

Subjects/Keywords: Bug detection; Program analysis; Memory error

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, H. (2018). Program analysis of temporal memory mismanagement. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/59503 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48807/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yan, Hua. “Program analysis of temporal memory mismanagement.” 2018. Doctoral Dissertation, University of New South Wales. Accessed December 03, 2020. http://handle.unsw.edu.au/1959.4/59503 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48807/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yan, Hua. “Program analysis of temporal memory mismanagement.” 2018. Web. 03 Dec 2020.

Vancouver:

Yan H. Program analysis of temporal memory mismanagement. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2020 Dec 03]. Available from: http://handle.unsw.edu.au/1959.4/59503 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48807/SOURCE02?view=true.

Council of Science Editors:

Yan H. Program analysis of temporal memory mismanagement. [Doctoral Dissertation]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/59503 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48807/SOURCE02?view=true


University of Waterloo

2. Hanam, Quinn. Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking.

Degree: 2014, University of Waterloo

 Static analysis (SA) tools that find bugs by inferring programmer beliefs (e.g., FindBugs) are commonplace in today’s software industry. While they find a large number… (more)

Subjects/Keywords: Static analysis; bug detection; alert classification; machine learning; alert patterns

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hanam, Q. (2014). Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8753

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hanam, Quinn. “Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking.” 2014. Thesis, University of Waterloo. Accessed December 03, 2020. http://hdl.handle.net/10012/8753.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hanam, Quinn. “Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking.” 2014. Web. 03 Dec 2020.

Vancouver:

Hanam Q. Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10012/8753.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hanam Q. Finding Patterns in Static Analysis Alerts: Improving Actionable Alert Ranking. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8753

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

3. Ibrar, Fahad. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.

Degree: MS, Computer Science and Applications, 2020, Virginia Tech

 Every software code has bugs in it that can change its expected behavior. There have been a lot of efforts to automate the process of… (more)

Subjects/Keywords: Software Engineering; Software/Program Verification; Automatic Bug Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibrar, F. (2020). Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/97934

Chicago Manual of Style (16th Edition):

Ibrar, Fahad. “Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.” 2020. Masters Thesis, Virginia Tech. Accessed December 03, 2020. http://hdl.handle.net/10919/97934.

MLA Handbook (7th Edition):

Ibrar, Fahad. “Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate.” 2020. Web. 03 Dec 2020.

Vancouver:

Ibrar F. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10919/97934.

Council of Science Editors:

Ibrar F. Strip-Miner: Automatic Bug Detection in Large Software Code with Low False Positive Rate. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/97934


The Ohio State University

4. Chen, Zhezhe. System Support for Improving the Reliability of MPI Applications and Libraries.

Degree: PhD, Computer Science and Engineering, 2013, The Ohio State University

 Although the Message Passing Interface (MPI) is widely used to develop parallel programs on computing systems such as clusters, MPI applications and libraries suffer from… (more)

Subjects/Keywords: Computer Engineering; Computer Science; Software Reliability, Bug Detection, Message Passing Interface

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2013). System Support for Improving the Reliability of MPI Applications and Libraries. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1375880144

Chicago Manual of Style (16th Edition):

Chen, Zhezhe. “System Support for Improving the Reliability of MPI Applications and Libraries.” 2013. Doctoral Dissertation, The Ohio State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1375880144.

MLA Handbook (7th Edition):

Chen, Zhezhe. “System Support for Improving the Reliability of MPI Applications and Libraries.” 2013. Web. 03 Dec 2020.

Vancouver:

Chen Z. System Support for Improving the Reliability of MPI Applications and Libraries. [Internet] [Doctoral dissertation]. The Ohio State University; 2013. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1375880144.

Council of Science Editors:

Chen Z. System Support for Improving the Reliability of MPI Applications and Libraries. [Doctoral Dissertation]. The Ohio State University; 2013. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1375880144

5. Wong, Edmund. Improving Software Dependability through Documentation Analysis.

Degree: 2019, University of Waterloo

 Software documentation contains critical information that describes a system’s functionality and requirements. Documentation exists in several forms, including code comments, test plans, manual pages, and… (more)

Subjects/Keywords: natural language processing; code clone detection; documentation analysis; symbolic execution; code comment generation; bug detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, E. (2019). Improving Software Dependability through Documentation Analysis. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14452

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wong, Edmund. “Improving Software Dependability through Documentation Analysis.” 2019. Thesis, University of Waterloo. Accessed December 03, 2020. http://hdl.handle.net/10012/14452.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wong, Edmund. “Improving Software Dependability through Documentation Analysis.” 2019. Web. 03 Dec 2020.

Vancouver:

Wong E. Improving Software Dependability through Documentation Analysis. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10012/14452.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wong E. Improving Software Dependability through Documentation Analysis. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14452

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

6. Zhang, Tong. Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns.

Degree: PhD, Computer Science and Applications, 2020, Virginia Tech

 Software bugs have caused many real-world problems, e.g., the 2003 Northeast blackout and the Facebook stock price mismatch. Finding bugs is critical to solving those… (more)

Subjects/Keywords: Software Bug Detection; Compilers; Commodity Hardware; Data Race Detection; Memory Safety; Permission Check Placement Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, T. (2020). Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/96422

Chicago Manual of Style (16th Edition):

Zhang, Tong. “Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns.” 2020. Doctoral Dissertation, Virginia Tech. Accessed December 03, 2020. http://hdl.handle.net/10919/96422.

MLA Handbook (7th Edition):

Zhang, Tong. “Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns.” 2020. Web. 03 Dec 2020.

Vancouver:

Zhang T. Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns. [Internet] [Doctoral dissertation]. Virginia Tech; 2020. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10919/96422.

Council of Science Editors:

Zhang T. Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns. [Doctoral Dissertation]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/96422


University of Waterloo

7. Zhang, Lei. DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation.

Degree: 2014, University of Waterloo

 Software testing is crucial for uncovering software defects and ensuring software reliability. Symbolic execution has been utilized for automatic test generation to improve testing effectiveness.… (more)

Subjects/Keywords: Automated Test Generation; Bug Detection; Symbolic Execution; Path Pruning; Documentation Analysis; Natural Language Processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, L. (2014). DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/8532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Lei. “DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation.” 2014. Thesis, University of Waterloo. Accessed December 03, 2020. http://hdl.handle.net/10012/8532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Lei. “DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation.” 2014. Web. 03 Dec 2020.

Vancouver:

Zhang L. DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation. [Internet] [Thesis]. University of Waterloo; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10012/8532.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang L. DASE: Document-Assisted Symbolic Execution for Improving Automated Test Generation. [Thesis]. University of Waterloo; 2014. Available from: http://hdl.handle.net/10012/8532

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

8. Patel, Vishal. Near-Duplicate Detection Using Instance Level Constraints.

Degree: MSc Engg, Faculty of Engineering, 2011, Indian Institute of Science

 For the task of near-duplicate document detection, comparison approaches based on bag-of-words used in information retrieval community are not sufficiently accurate. This work presents novel… (more)

Subjects/Keywords: Document Clustering - Artificial Intelligence; Latent Dirichlet Allocation; Information Retrieval; Near-Duplicate Detection; Constrained Clustering; Group LDA; Duplicate Bug Report Detection; Near-Duplicate Document Detection; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, V. (2011). Near-Duplicate Detection Using Instance Level Constraints. (Masters Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/1346

Chicago Manual of Style (16th Edition):

Patel, Vishal. “Near-Duplicate Detection Using Instance Level Constraints.” 2011. Masters Thesis, Indian Institute of Science. Accessed December 03, 2020. http://etd.iisc.ac.in/handle/2005/1346.

MLA Handbook (7th Edition):

Patel, Vishal. “Near-Duplicate Detection Using Instance Level Constraints.” 2011. Web. 03 Dec 2020.

Vancouver:

Patel V. Near-Duplicate Detection Using Instance Level Constraints. [Internet] [Masters thesis]. Indian Institute of Science; 2011. [cited 2020 Dec 03]. Available from: http://etd.iisc.ac.in/handle/2005/1346.

Council of Science Editors:

Patel V. Near-Duplicate Detection Using Instance Level Constraints. [Masters Thesis]. Indian Institute of Science; 2011. Available from: http://etd.iisc.ac.in/handle/2005/1346


Indian Institute of Science

9. Samak, Malavika. Targeted Client Synthesis for Detecting Concurrency Bugs.

Degree: PhD, Faculty of Engineering, 2018, Indian Institute of Science

 Detecting concurrency bugs can be challenging due to the intricacies associated with their manifestation. These intricacies correspond to identifying the methods that need to be… (more)

Subjects/Keywords: Concurrency Bugs; Dynamic Analysis; Program Synthesis; Deadlock Detection; Bytecode Instrumentation; Targeted Client Synthesis; Dynamic Deadlock Detection; Multithreaded Client Synthesis; Atomicity Violations; Shared Memory; Dynamic Concurrency Bug Detectors; Racy Tests; Bug Detection; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Samak, M. (2018). Targeted Client Synthesis for Detecting Concurrency Bugs. (Doctoral Dissertation). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/2943

Chicago Manual of Style (16th Edition):

Samak, Malavika. “Targeted Client Synthesis for Detecting Concurrency Bugs.” 2018. Doctoral Dissertation, Indian Institute of Science. Accessed December 03, 2020. http://etd.iisc.ac.in/handle/2005/2943.

MLA Handbook (7th Edition):

Samak, Malavika. “Targeted Client Synthesis for Detecting Concurrency Bugs.” 2018. Web. 03 Dec 2020.

Vancouver:

Samak M. Targeted Client Synthesis for Detecting Concurrency Bugs. [Internet] [Doctoral dissertation]. Indian Institute of Science; 2018. [cited 2020 Dec 03]. Available from: http://etd.iisc.ac.in/handle/2005/2943.

Council of Science Editors:

Samak M. Targeted Client Synthesis for Detecting Concurrency Bugs. [Doctoral Dissertation]. Indian Institute of Science; 2018. Available from: http://etd.iisc.ac.in/handle/2005/2943

10. Wang, Song. Leveraging Machine Learning to Improve Software Reliability.

Degree: 2019, University of Waterloo

 Finding software faults is a critical task during the lifecycle of a software system. While traditional software quality control practices such as statistical defect prediction,… (more)

Subjects/Keywords: machine learning; software reliability; software engineering; software testing; code review; static bug detection; static code analysis

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, S. (2019). Leveraging Machine Learning to Improve Software Reliability. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Song. “Leveraging Machine Learning to Improve Software Reliability.” 2019. Thesis, University of Waterloo. Accessed December 03, 2020. http://hdl.handle.net/10012/14334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Song. “Leveraging Machine Learning to Improve Software Reliability.” 2019. Web. 03 Dec 2020.

Vancouver:

Wang S. Leveraging Machine Learning to Improve Software Reliability. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10012/14334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang S. Leveraging Machine Learning to Improve Software Reliability. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/14334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

11. Shetty, Rithin Kumar. HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector.

Degree: MS, Computer Science, 2005, North Carolina State University

 Enabling memory-related bug detection in production runs is important for detecting and pinpointing bugs that survive debugging. Left undetected, such bugs may be manifested in… (more)

Subjects/Keywords: Automatic Bug Detection; Architectural support for Software Reliability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shetty, R. K. (2005). HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector. (Thesis). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shetty, Rithin Kumar. “HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector.” 2005. Thesis, North Carolina State University. Accessed December 03, 2020. http://www.lib.ncsu.edu/resolver/1840.16/2153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shetty, Rithin Kumar. “HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector.” 2005. Web. 03 Dec 2020.

Vancouver:

Shetty RK. HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector. [Internet] [Thesis]. North Carolina State University; 2005. [cited 2020 Dec 03]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/2153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shetty RK. HeapMon: a Low Overhead, Automatic, and Programmable Memory Bug Detector. [Thesis]. North Carolina State University; 2005. Available from: http://www.lib.ncsu.edu/resolver/1840.16/2153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

12. Rajagopalan, Arun Krishnakumar. Fast and Precise On-The-Fly Data Race Detection.

Degree: MS, Computer Science, 2016, Texas A&M University

 While concurrent programming is quickly gaining popularity lately, developing bug-free programs is still challenging. Although developers have a wide choice of race detection tools available,… (more)

Subjects/Keywords: bug detection; concurrency; debugging; dynamic analysis; parallelism; performance analysis; runtime monitoring; software engineering; redundancy; data race; missing events; precise detection; happens-before; maximal thread causality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajagopalan, A. K. (2016). Fast and Precise On-The-Fly Data Race Detection. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/157131

Chicago Manual of Style (16th Edition):

Rajagopalan, Arun Krishnakumar. “Fast and Precise On-The-Fly Data Race Detection.” 2016. Masters Thesis, Texas A&M University. Accessed December 03, 2020. http://hdl.handle.net/1969.1/157131.

MLA Handbook (7th Edition):

Rajagopalan, Arun Krishnakumar. “Fast and Precise On-The-Fly Data Race Detection.” 2016. Web. 03 Dec 2020.

Vancouver:

Rajagopalan AK. Fast and Precise On-The-Fly Data Race Detection. [Internet] [Masters thesis]. Texas A&M University; 2016. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1969.1/157131.

Council of Science Editors:

Rajagopalan AK. Fast and Precise On-The-Fly Data Race Detection. [Masters Thesis]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/157131


Queensland University of Technology

13. Nantes, Alfredo. Computational approaches to the visual validation of 3D virtual environments.

Degree: 2011, Queensland University of Technology

 Virtual environments can provide, through digital games and online social interfaces, extremely exciting forms of interactive entertainment. Because of their capability in displaying and manipulating… (more)

Subjects/Keywords: virtual environment testing; virtual environment validation; virtual environment consistency; rendering system validation; computer game testing; visual bug detection; visual inconsistency detection; synthetic image processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nantes, A. (2011). Computational approaches to the visual validation of 3D virtual environments. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/48341/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nantes, Alfredo. “Computational approaches to the visual validation of 3D virtual environments.” 2011. Thesis, Queensland University of Technology. Accessed December 03, 2020. https://eprints.qut.edu.au/48341/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nantes, Alfredo. “Computational approaches to the visual validation of 3D virtual environments.” 2011. Web. 03 Dec 2020.

Vancouver:

Nantes A. Computational approaches to the visual validation of 3D virtual environments. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2020 Dec 03]. Available from: https://eprints.qut.edu.au/48341/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nantes A. Computational approaches to the visual validation of 3D virtual environments. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/48341/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Gao, Qi. Runtime Support for Improving Reliability in System Software.

Degree: PhD, Computer Science and Engineering, 2010, The Ohio State University

  As software is becoming increasingly complex, software reliability is getting more and more important. In particular, the reliability of system software is critical to… (more)

Subjects/Keywords: Computer Science; Software Reliability; Bug Detection; Bug Diagnosis; Fault Tolerance; Runtime Support

…19 3.1 20 1.3 2. 3. Static and Dynamic Bug Detection . . Software Testing and Model… …dissertation proposes novel methods for bug manifestation, bug detection, bug diagnosis, failure… …dissertation proposes to use automated bug detection and diagnosis techniques for improving… …in many tasks such as bug detection, runtime monitoring, failure diagnosis, fault tolerance… …proposes novel methods for bug manifestation, bug detection, bug diagnosis, failure recovery and… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, Q. (2010). Runtime Support for Improving Reliability in System Software. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1267818711

Chicago Manual of Style (16th Edition):

Gao, Qi. “Runtime Support for Improving Reliability in System Software.” 2010. Doctoral Dissertation, The Ohio State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267818711.

MLA Handbook (7th Edition):

Gao, Qi. “Runtime Support for Improving Reliability in System Software.” 2010. Web. 03 Dec 2020.

Vancouver:

Gao Q. Runtime Support for Improving Reliability in System Software. [Internet] [Doctoral dissertation]. The Ohio State University; 2010. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1267818711.

Council of Science Editors:

Gao Q. Runtime Support for Improving Reliability in System Software. [Doctoral Dissertation]. The Ohio State University; 2010. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1267818711


Virginia Tech

15. Reis, Matthew Douglas. An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior.

Degree: MSin Life Sciences, Entomology, 2010, Virginia Tech

 This study attempts to elucidate bed bug behavior in response to host cues and aggregation cues from conspecifics. Both fed and unfed bed bugs were… (more)

Subjects/Keywords: Circadian Activity; Aggregation; Host Detection; Movement; Cimex lectularius; Bed Bug

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reis, M. D. (2010). An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/36053

Chicago Manual of Style (16th Edition):

Reis, Matthew Douglas. “An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior.” 2010. Masters Thesis, Virginia Tech. Accessed December 03, 2020. http://hdl.handle.net/10919/36053.

MLA Handbook (7th Edition):

Reis, Matthew Douglas. “An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior.” 2010. Web. 03 Dec 2020.

Vancouver:

Reis MD. An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10919/36053.

Council of Science Editors:

Reis MD. An Evaluation of Bed Bug (Cimex lectularius L.) Host Location and Aggregation Behavior. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/36053

16. Zhang, Wenbin. Libra: Detecting Unbalance MPI Collective Calls.

Degree: MS, Computer Science and Engineering, 2011, The Ohio State University

  Collective calls in MPI applications allow all processes within the same communicator to collaborate with each other, while missing to call in any process… (more)

Subjects/Keywords: Computer Engineering; MPI; Collective call; Unbalance; Bug detection

…29 6.2 Result from Libra Bug Detection . . . . . . . . . . . . . . . . . . . . 30 6.3… …FIGURES Figure Page 1.1 Bug Case of Missing MPI Barrier()… …3 1.2 CFG: Bug Case of Missing MPI Barrier()… …gives the high level extraction of a real world bug example which is caused by a missing call… …is the CFG corresponding to the bug example in Figure 1.1: 2 Figure 1.1: Bug Case of… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, W. (2011). Libra: Detecting Unbalance MPI Collective Calls. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1313160584

Chicago Manual of Style (16th Edition):

Zhang, Wenbin. “Libra: Detecting Unbalance MPI Collective Calls.” 2011. Masters Thesis, The Ohio State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1313160584.

MLA Handbook (7th Edition):

Zhang, Wenbin. “Libra: Detecting Unbalance MPI Collective Calls.” 2011. Web. 03 Dec 2020.

Vancouver:

Zhang W. Libra: Detecting Unbalance MPI Collective Calls. [Internet] [Masters thesis]. The Ohio State University; 2011. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1313160584.

Council of Science Editors:

Zhang W. Libra: Detecting Unbalance MPI Collective Calls. [Masters Thesis]. The Ohio State University; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1313160584

17. -2178-1988. Program analysis techniques for algorithmic complexity and relational properties.

Degree: PhD, Computer Science, 2019, University of Texas – Austin

 Analyzing standard safety properties of a given program has traditionally been the primary focus of the program analysis community. Unfortunately, there are still many interesting… (more)

Subjects/Keywords: Complexity testing; Optimal program synthesis; Fuzzing; Genetic programming; Performance bug; Vulnerability detection; Side channel; Static analysis; Relational verification; Reinforcement learning; Policy gradient

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2178-1988. (2019). Program analysis techniques for algorithmic complexity and relational properties. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2181

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed December 03, 2020. http://dx.doi.org/10.26153/tsw/2181.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Web. 03 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2020 Dec 03]. Available from: http://dx.doi.org/10.26153/tsw/2181.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/2181

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


The Ohio State University

18. Wei, Pihui. Dynamic Bug Detection in TinyOS Operating Environments.

Degree: MS, Computer Science and Engineering, 2009, The Ohio State University

  Wireless sensor network applications run on resource scarce sensor nodes. A sensor node usually has extremely limited resources in order to run long time… (more)

Subjects/Keywords: Computer Science; Sensor network; Bug detection; Dynamic analysis; TinyOS; NesC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, P. (2009). Dynamic Bug Detection in TinyOS Operating Environments. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1238166929

Chicago Manual of Style (16th Edition):

Wei, Pihui. “Dynamic Bug Detection in TinyOS Operating Environments.” 2009. Masters Thesis, The Ohio State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1238166929.

MLA Handbook (7th Edition):

Wei, Pihui. “Dynamic Bug Detection in TinyOS Operating Environments.” 2009. Web. 03 Dec 2020.

Vancouver:

Wei P. Dynamic Bug Detection in TinyOS Operating Environments. [Internet] [Masters thesis]. The Ohio State University; 2009. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1238166929.

Council of Science Editors:

Wei P. Dynamic Bug Detection in TinyOS Operating Environments. [Masters Thesis]. The Ohio State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1238166929

19. Sagdeo, Parth. Improved software verification through program path-based analysis.

Degree: MS, 1200, 2013, University of Illinois – Urbana-Champaign

 This thesis describes the generation and use of program invariants to improve software reliability. It introduces PRECIS, a technique for automatic invariant generation based on… (more)

Subjects/Keywords: Fault Detection; Fault Tolerance; Bug Localization; Software Maintenance; Software Reliability; Invariant Generation; Assertion Generation

detection, and bug localization. For each of these three techniques, the path information gathered… …Despite this, the goal of “bug-free” software remains as elusive as ever. As software grows in… …analysis of a program’s runtime state, such as in unit testing, invariant generation, and bug… …invariants [17, 18]. Inevitably bugs will escape detection until after a program is… …released. Automated bug localization tools use a dynamic statistical analysis of captured program… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sagdeo, P. (2013). Improved software verification through program path-based analysis. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/42281

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sagdeo, Parth. “Improved software verification through program path-based analysis.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed December 03, 2020. http://hdl.handle.net/2142/42281.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sagdeo, Parth. “Improved software verification through program path-based analysis.” 2013. Web. 03 Dec 2020.

Vancouver:

Sagdeo P. Improved software verification through program path-based analysis. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/2142/42281.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sagdeo P. Improved software verification through program path-based analysis. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/42281

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Chollak, Devin. Software Bug Detection Using the N-gram Language Model.

Degree: 2015, University of Waterloo

 Over the years many techniques have been proposed to infer programming rules in order to improve software reliability. The techniques use violations of these programming… (more)

Subjects/Keywords: Bug Detection; Static Analysis; Programming Rules; Natural Language Models; N-gram

…Introduction Even in mature software projects, existing bug detection techniques have shown that it… …or documentation [14, 15]. Bug detection techniques will often use these mined… …this work, a number of existing rule-based bug detection approaches [3–5, 7, 16]… …techniques. These bug detection approaches identify frequent method calls and variable accesses as… …be expected to then call method C. Bug detection tools such as PR-Miner [3] would… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chollak, D. (2015). Software Bug Detection Using the N-gram Language Model. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/9250

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chollak, Devin. “Software Bug Detection Using the N-gram Language Model.” 2015. Thesis, University of Waterloo. Accessed December 03, 2020. http://hdl.handle.net/10012/9250.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chollak, Devin. “Software Bug Detection Using the N-gram Language Model.” 2015. Web. 03 Dec 2020.

Vancouver:

Chollak D. Software Bug Detection Using the N-gram Language Model. [Internet] [Thesis]. University of Waterloo; 2015. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10012/9250.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chollak D. Software Bug Detection Using the N-gram Language Model. [Thesis]. University of Waterloo; 2015. Available from: http://hdl.handle.net/10012/9250

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Cao, Man. Efficient, Practical Dynamic Program Analyses for Concurrency Correctness.

Degree: PhD, Computer Science and Engineering, 2017, The Ohio State University

 Shared-memory parallel programs are notoriously difficult to be both scalable and correct. One of the most problematic concurrency bugs is data race. Data races are… (more)

Subjects/Keywords: Computer Science; Computer Engineering; concurrency, runtime, parallelism, correctness, bug detection, performance, data race, dynamic analysis

…Lightweight Data Race Detection for Production Runs. In International Conference on Compiler… …together atomically. (A notable exception is data race detection, which requires only… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cao, M. (2017). Efficient, Practical Dynamic Program Analyses for Concurrency Correctness. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1492703503634986

Chicago Manual of Style (16th Edition):

Cao, Man. “Efficient, Practical Dynamic Program Analyses for Concurrency Correctness.” 2017. Doctoral Dissertation, The Ohio State University. Accessed December 03, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492703503634986.

MLA Handbook (7th Edition):

Cao, Man. “Efficient, Practical Dynamic Program Analyses for Concurrency Correctness.” 2017. Web. 03 Dec 2020.

Vancouver:

Cao M. Efficient, Practical Dynamic Program Analyses for Concurrency Correctness. [Internet] [Doctoral dissertation]. The Ohio State University; 2017. [cited 2020 Dec 03]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1492703503634986.

Council of Science Editors:

Cao M. Efficient, Practical Dynamic Program Analyses for Concurrency Correctness. [Doctoral Dissertation]. The Ohio State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1492703503634986


Lincoln University

22. Nixon, Laura. Identification of biogenic volatile organic compounds for improved border biosecurity.

Degree: 2017, Lincoln University

 Effective border biosecurity is a high priority in New Zealand. A fragile and unique natural ecosystem combined with multiple crop systems, which contribute substantially to… (more)

Subjects/Keywords: Halyomorpha halys; Pentatomidae; (E)-2-decenal; 4-oxo-(E)-2-hexenal; border biosecurity; invasive invertebrates; brown marmorated stink bug; detection; volatile organic compounds; tridecane; dodecane; gas-chromatography mass-spectrometry (GC-MS); risk management; 060201 Behavioural Ecology; 060299 Ecology not elsewhere classified; 030199 Analytical Chemistry not elsewhere classified; 06 Biological Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nixon, L. (2017). Identification of biogenic volatile organic compounds for improved border biosecurity. (Thesis). Lincoln University. Retrieved from http://hdl.handle.net/10182/9900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nixon, Laura. “Identification of biogenic volatile organic compounds for improved border biosecurity.” 2017. Thesis, Lincoln University. Accessed December 03, 2020. http://hdl.handle.net/10182/9900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nixon, Laura. “Identification of biogenic volatile organic compounds for improved border biosecurity.” 2017. Web. 03 Dec 2020.

Vancouver:

Nixon L. Identification of biogenic volatile organic compounds for improved border biosecurity. [Internet] [Thesis]. Lincoln University; 2017. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10182/9900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nixon L. Identification of biogenic volatile organic compounds for improved border biosecurity. [Thesis]. Lincoln University; 2017. Available from: http://hdl.handle.net/10182/9900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Ray, Baishakhi. Analysis of cross-system porting and porting errors in software projects.

Degree: PhD, Electrical and Computer Engineering, 2013, University of Texas – Austin

 Software forking – creating a variant product by copying and modifying an existing project – is often considered an ad hoc, low cost alternative to principled product… (more)

Subjects/Keywords: Software evolution; Forking; Porting; Repetitive changes; Code clones; Static analysis; Subgraph isomorphism; Bug; Error detection; Copy-paste error

…art tools, DejaVu [28] and Jiang et al.’s 8 clone related bug detection tool… …with two existing error detection tools, SPA outperforms them with 14% to 17% better… …Detection of Porting Errors . . . . . . . . . . 2.5 Program Differencing Tools… …Appendix B. Porting Error 134 Appendix C. SPA C.1 Example of Type-A inconsistency detection C.2… …Example of Type-B1 inconsistency detection C.3 Example of Type-C inconsistency detection C.4… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ray, B. (2013). Analysis of cross-system porting and porting errors in software projects. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/22103

Chicago Manual of Style (16th Edition):

Ray, Baishakhi. “Analysis of cross-system porting and porting errors in software projects.” 2013. Doctoral Dissertation, University of Texas – Austin. Accessed December 03, 2020. http://hdl.handle.net/2152/22103.

MLA Handbook (7th Edition):

Ray, Baishakhi. “Analysis of cross-system porting and porting errors in software projects.” 2013. Web. 03 Dec 2020.

Vancouver:

Ray B. Analysis of cross-system porting and porting errors in software projects. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2013. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/2152/22103.

Council of Science Editors:

Ray B. Analysis of cross-system porting and porting errors in software projects. [Doctoral Dissertation]. University of Texas – Austin; 2013. Available from: http://hdl.handle.net/2152/22103

24. Khusheef, Ahmed S. Investigation on the mobile robot navigation in an unknown environment.

Degree: 2013, Edith Cowan University

 Mobile robots could be used to search, find, and relocate objects in many types of manufacturing operations and environments. In this scenario, the target objects… (more)

Subjects/Keywords: mobile robots; autonomous robots; design and construction; control systems; robot vision; search robots; hexapod; camera rotation; exploration path; gripper; motion control; sensor configuration; object detection; searching mode; bug algorithms; Robotics

…52 5.2 MOTIVATION FOR BUG ALGORITHMS… …53 5.2.1 Bug Family Close Review… …53 5.3 THE BUG-LIKE ALGORITHM… …73 CHAPTER 6 OBJECT DETECTION-BASED ON VISION SYSTEM ........................ 74 6.1… …74 6.2 OBJECT DETECTION PROBLEM… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khusheef, A. S. (2013). Investigation on the mobile robot navigation in an unknown environment. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/537

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khusheef, Ahmed S. “Investigation on the mobile robot navigation in an unknown environment.” 2013. Thesis, Edith Cowan University. Accessed December 03, 2020. https://ro.ecu.edu.au/theses/537.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khusheef, Ahmed S. “Investigation on the mobile robot navigation in an unknown environment.” 2013. Web. 03 Dec 2020.

Vancouver:

Khusheef AS. Investigation on the mobile robot navigation in an unknown environment. [Internet] [Thesis]. Edith Cowan University; 2013. [cited 2020 Dec 03]. Available from: https://ro.ecu.edu.au/theses/537.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khusheef AS. Investigation on the mobile robot navigation in an unknown environment. [Thesis]. Edith Cowan University; 2013. Available from: https://ro.ecu.edu.au/theses/537

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Campbell, Keith A. Robust and reliable hardware accelerator design through high-level synthesis.

Degree: PhD, Electrical & Computer Engr, 2017, University of Illinois – Urbana-Champaign

 System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling-driven complexity has resulted in a variety… (more)

Subjects/Keywords: High-level synthesis (HLS); Automation; Error detection; Scheduling; Binding; Compiler transformation; Compiler optimization; Pipelining; Modulo arithmetic; Modulo-3; Logic optimization; State machine; Datapath; Control logic; Shadow datapath; Modulo datapath; Low cost; High performance; Electrical bug; Aliasing; Stuck-at fault; Soft error; Timing error; Checkpointing; Rollback; Recovery; Pre-silicon validation; Post-silicon validation; Pre-silicon debug; Post-silicon debug; Accelerator; System on a chip; Signature generation; Execution signature; Execution hash; Logic bug; Nondeterministic bug; Masked error; Circuit reliability; Hot spot; Wear out; Silent data corruption; Observability; Detection latency; Mixed datapath; Diversity; Checkpoint corruption; Error injection; Error removal; Quick Error Detection (QED); Hybrid Quick Error Detection (H-QED); Instrumentation; Hybrid co-simulation; Hardware/software; Integration testing; Hybrid tracing; Hybrid hashing; Source-code localization; Software debugging tool; Valgrind; Clang sanitizer; Clang static analyzer; Cppcheck; Root cause analysis; Execution tracing; Realtime error detection; Simulation trigger; Nonintrusive; Address conversion; Undefined behavior; High-level synthesis (HLS) bug; Detection coverage; Gate-level architecture; Mersenne modulus; Full adder; Half adder; Quarter adder; Wraparound; Modulo reducer; Modulo adder; Modulo multiplier; Modulo comparator; Cross-layer; Algorithm; Instruction; Architecture; Logic synthesis; Physical design; Algorithm-based fault tolerance (ABFT); Error detection by duplicated instructions (EDDI); Parity; Flip-flop hardening; Layout design through error-aware transistor positioning dual interlocked storage cell (LEAP-DICE); Cost-effective; Place-and-route; Field programmable gate array (FPGA) emulation; Application specific integrated circuit (ASIC); Field programmable gate array (FPGA); Energy; Area; Latency

…reproduced and false bug detection positives will occur). 4. Compute a running hash to combine… …assertions. 4. Hybrid hashing enables very short error detection latencies and high bug coverage… …12 12 14 17 CHAPTER 3 RELATED WORK . . 3.1 Hybrid Quick Error Detection 3.2 Modulo Shadow… …19 19 21 23 CHAPTER 4 HYBRID QUICK ERROR DETECTION 4.1 Basic Principles… …Simulation Breakpoint Trigger . . . . . . . . . . . . . 5.4 Bug Example… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Campbell, K. A. (2017). Robust and reliable hardware accelerator design through high-level synthesis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/99294

Chicago Manual of Style (16th Edition):

Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed December 03, 2020. http://hdl.handle.net/2142/99294.

MLA Handbook (7th Edition):

Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Web. 03 Dec 2020.

Vancouver:

Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2017. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/2142/99294.

Council of Science Editors:

Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/99294

.