Author of the publication

Automatic recovery from resource exhaustion exceptions by collecting leaked resources.

, , , and . Journal of Zhejiang University - Science C, 15 (8): 622-635 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking Compliance to Coding Standards for x86 Executables., , , , and . UIC/ATC Workshops, page 449-455. IEEE Computer Society, (2010)The strength of random search on automated program repair., , , , and . ICSE, page 254-265. ACM, (2014)Finding related events for specification mining., , , , and . ISSRE (Supplemental Proceedings), page 1-2. IEEE Computer Society, (2013)Effective Fault Localization Approach Using Feedback., , , and . IEICE Transactions, 95-D (9): 2247-2257 (2012)Resco: Automatic Collection of Leaked Resources., , , , and . IEICE Transactions, 96-D (1): 28-39 (2013)More efficient automatic repair of large-scale programs using weak recompilation., , , , and . SCIENCE CHINA Information Sciences, 55 (12): 2785-2799 (2012)Slice-based statistical fault localization., , , , and . Journal of Systems and Software, (2014)Automatic recovery from resource exhaustion exceptions by collecting leaked resources., , , and . Journal of Zhejiang University - Science C, 15 (8): 622-635 (2014)Mining and checking web services behavior., , and . INDIN, page 1004-1009. IEEE, (2012)Light-Weight Test Oracles for Resource Leaks Based on Finalizers., , , and . APSEC Workshops, page 73-79. IEEE, (2012)