Debugging Reinvented: Asking and Answering Why and Why Not Questions about Program Behavior [1/17]

Subscribers:
345,000
Published on ● Video Link: https://www.youtube.com/watch?v=ScZfggGa4qs



Duration: 1:17:18
164 views
3


Most software undergoes a brief period of rapid development, followed by a much longer period of maintenance and adaptation. As a result, software developers spend most of their time exploring a system's underlying source code to determine the parts of the system that are relevant to their tasks. Because these parts are often distributed throughout a system's modules, and because they can interact in complex and unpredictable ways, this process of understanding a program's execution can be extremely difficult. The primary cause of this difficulty is that developers must answer their questions about a system's behavior by guessing. For example, a developer wondering, Why




Other Videos By Microsoft Research


2016-09-06Statistical Spoken Language Generation of Stylistic Variation
2016-09-06The Quest for the Minimal Hardness Assumptions
2016-09-06Delimited and Composable Continuations in PLT Scheme
2016-09-06Critical Data Protection for Reliability and Security
2016-09-06Multi-view approaches for camera calibration and image-based modeling
2016-09-06Securing the Web With Decentralized Information Flow Control
2016-09-06Reconstruction and visualization of large photo collections
2016-09-06Media Computation: Introducing Computing Contextualized in Video and Audio Processing
2016-09-06MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition
2016-09-06Computational Insights Into the Social Life of Zebras and Other Animals
2016-09-06Debugging Reinvented: Asking and Answering Why and Why Not Questions about Program Behavior [1/17]
2016-09-06CitySense: A Vision for an Urban-Scale Wireless Sensor Testbed
2016-09-06Why task-structure matters: The effects of task and social forces on software development
2016-09-06Robust Face Recognition via Sparse Representation
2016-09-06How to make Discretionary Access Control Resistant to Trojan Horses
2016-09-06Modeling Intention in Email: Speech Acts, Information Leaks and User Ranking Methods [1/2]
2016-09-06Techniques and Tools for Engineering Secure Web Applications
2016-09-06Should Machines Emulate Human Speech Recognition?
2016-09-06PLOW: A Collaborative Task Learning Agent
2016-09-06Building Bodies of Knowledge about Software Development Practices
2016-09-06The Manticore Project



Tags:
microsoft research