BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
sourc (420)
generat (314)
use (281)
base (240)
analysi (182)

Stem code$ (all stems)

2605 papers:

CCCC-2020-BrauckmannGEC #graph #learning #modelling
Compiler-based graph representations for deep learning models of code (AB, AG, SE, JC), pp. 201–211.
CCCC-2020-Castro-PerezY #compilation #first-order #parallel
Compiling first-order functions to session-typed parallel code (DCP, NY), pp. 143–154.
ASEASE-2019-Boronat #agile #modelling
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling (AB), pp. 874–886.
ASEASE-2019-BuiYJ #named #network
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation (NDQB, YY, LJ), pp. 38–41.
ASEASE-2019-DuCWLSC #graph #named
CocoQa: Question Answering for Coding Conventions Over Knowledge Graphs (TD, JC, QW, WL, BS, YC), pp. 1086–1089.
ASEASE-2019-Gu00 #api #approach #graph #kernel #named
CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples (XG, HZ0, SK0), pp. 590–601.
ASEASE-2019-Jiang #analysis #commit #generative #semantics
Boosting Neural Commit Message Generation with Code Semantic Analysis (SJ), pp. 1280–1282.
ASEASE-2019-JiangRXZ #program transformation
Inferring Program Transformations From Singular Examples via Big Code (JJ, LR, YX, LZ), pp. 255–266.
ASEASE-2019-KangB0
Assessing the Generalizability of Code2vec Token Embeddings (HJK, TFB, DL0), pp. 1–12.
ASEASE-2019-LiuHGN #predict #source code
Predicting Licenses for Changed Source Code (XL, LH, JG, VN), pp. 686–697.
ASEASE-2019-NafiKRRS #api #clone detection #detection #documentation #named #using
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASEASE-2019-Nam #api #design
API Design Implications of Boilerplate Client Code (DN), pp. 1253–1255.
ASEASE-2019-NamHMMV #api #identification #mining #named #problem #usability
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems (DN, AH, AM, BAM, BV), pp. 615–627.
ASEASE-2019-NguyenNLW #program analysis #statistics
Combining Program Analysis and Statistical Language Model for Code Statement Completion (SVN, TNN, YL, SW0), pp. 710–721.
ASEASE-2019-NguyenNTTN #configuration management
Feature-Interaction Aware Configuration Prioritization for Configurable Code (SN, HN, NMT, HT, TNN), pp. 489–501.
ASEASE-2019-PiskachevDJB #automation #detection #named
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods (GP, LNQD, OJ, EB), pp. 1094–1097.
ASEASE-2019-ReicheltKH #identification #named #performance
PeASS: A Tool for Identifying Performance Changes at Code Level (DGR, SK, WH), pp. 1146–1149.
ASEASE-2019-SaifullahAR #api #learning
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets (CMKS, MA, CKR), pp. 243–254.
ASEASE-2019-SondhiP #consistency #named #nondeterminism #semantics #specification #string
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs (DS, RP), pp. 200–212.
ASEASE-2019-TokumotoT #development #metric #named #quality
PHANTA: Diversified Test Code Quality Measurement for Modern Software Development (ST, KT), pp. 1206–1207.
ASEASE-2019-WangLZX #co-evolution #named
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer (MW, ZL, YZ, BX), pp. 1050–1061.
ASEASE-2019-WanSSXZ0Y #learning #multi #network #retrieval #semantics #source code
Multi-modal Attention Network Learning for Semantic Source Code Retrieval (YW, JS, YS, GX, ZZ, JW0, PSY), pp. 13–25.
ASEASE-2019-YangJ0WSLZX #automation #self #test coverage
Automatic Self-Validation for Code Coverage Profilers (YY, YJ0, ZZ0, YW, HS, HL, YZ, BX), pp. 79–90.
ASEASE-2019-ZhouSZ #named #what
Lancer: Your Code Tell Me What You Need (SZ, BS, HZ), pp. 1202–1205.
ESEC-FSEESEC-FSE-2019-CambroneroLKS0 #code search #learning
When deep learning met code search (JC, HL, SK, KS, SC0), pp. 964–974.
ESEC-FSEESEC-FSE-2019-He #comprehension #scalability #source code
Understanding source code comments at large-scale (HH), pp. 1217–1219.
ESEC-FSEESEC-FSE-2019-HiraoMIM #approach #code review #empirical #graph #overview
The review linkage graph for code review analytics: a recovery approach and empirical study (TH, SM, AI, KM), pp. 578–589.
ESEC-FSEESEC-FSE-2019-IvankovicPJF #test coverage
Code coverage at Google (MI, GP, RJ, GF), pp. 955–963.
ESEC-FSEESEC-FSE-2019-Khanve #empirical #game studies #smell #web
Are existing code smells relevant in web games? an empirical study (VK), pp. 1241–1243.
ESEC-FSEESEC-FSE-2019-MostaeenSRRS #machine learning #named #validation
CloneCognition: machine learning based code clone validation tool (GM, JS, BR, CKR, KAS), pp. 1105–1109.
ESEC-FSEESEC-FSE-2019-SafwanS #commit #developer #perspective
Decomposing the rationale of code commits: the software developer's perspective (KAS, FS), pp. 397–408.
ESEC-FSEESEC-FSE-2019-Sonnekalb #detection #source code
Machine-learning supported vulnerability detection in source code (TS), pp. 1180–1183.
ESEC-FSEESEC-FSE-2019-Wang0LXBXW #approach #automation #documentation #source code #taxonomy
A learning-based approach for automatic construction of domain glossary from source code and documentation (CW, XP0, ML, ZX, XB, BX, TW), pp. 97–108.
ESEC-FSEESEC-FSE-2019-ZhouVK #case study #performance #social #what
What the fork: a study of inefficient and efficient forking practices in social coding (SZ, BV, CK), pp. 350–361.
GPCEGPCE-2019-Chiba #interface #migration
Foreign language interfaces by code migration (SC), pp. 1–13.
GPCEGPCE-2019-FeichtingerHLPG #analysis #constraints #dependence #evolution #feature model
Supporting feature model evolution by suggesting constraints from code-level dependency analyses (KF, DH, LL, HP, PG), pp. 129–142.
CCCC-2019-KimHLS0K #automation
Spinal code: automatic code extraction for near-user computation in fogs (BK, SH, GL, SS, JK0, HK), pp. 87–98.
CCCC-2019-LiuHWCL0X #compilation #concurrent #kernel #named #thread
PPOpenCL: a performance-portable OpenCL compiler with host and kernel thread code fusion (YL, LH, MW, HC, FL, XF0, JX), pp. 2–16.
FASEFASE-2019-ParkJR #automation #javascript #modelling #static analysis
Automatic Modeling of Opaque Code for JavaScript Static Analysis (JP, AJ, SR), pp. 43–60.
ECMFAECMFA-2018-Cuadrado #ocl #optimisation
Optimising OCL Synthesized Code (JSC), pp. 28–45.
MoDELSMoDELS-2018-HenriquesLAG #developer #experience #modelling #process
Improving the Developer Experience with a Low-Code Process Modelling Language (HH, HL, VA, MG), pp. 200–210.
ASEASE-2018-ChenSXHJ #approach #automation #execution #metric #test coverage
An automated approach to estimating code coverage measures via execution logs (BC, JS, PX, XH, ZM(J), pp. 305–316.
ASEASE-2018-ChenZ #framework #retrieval #source code #summary
A neural framework for retrieval and summarization of source code (QC, MZ), pp. 826–831.
ASEASE-2018-Cosmo #source code
Software heritage: collecting, preserving, and sharing all our source code (keynote) (RDC), pp. 1–2.
ASEASE-2018-GafurovHM #automation #industrial #testing
Achieving test automation with testers without coding skills: an industrial report (DG, AEH, MM), pp. 749–756.
ASEASE-2018-GharibiTL #automation #generative #graph #named #python #source code
Code2graph: automatic generation of static call graphs for Python source code (GG, RT, YL), pp. 880–883.
ASEASE-2018-HaririS #c #mutation testing #named #representation #source code #testing #tool support
SRCIROR: a toolset for mutation testing of C source code and LLVM intermediate representation (FH, AS), pp. 860–863.
ASEASE-2018-HuangCPZWLZ #difference #generative #named
ClDiff: generating concise linked code differences (KH, BC0, XP0, DZ, YW, YL0, WZ), pp. 679–690.
ASEASE-2018-JanesMR #developer #lens #named
code_call_lens: raising the developer awareness of critical code (AJ, MM, BR), pp. 876–879.
ASEASE-2018-LiuHZLLPZ #detection #named #similarity
αDiff: cross-version binary code similarity detection with DNN (BL, WH, CZ0, WL, FL, AP, WZ), pp. 667–678.
ASEASE-2018-OzdemirTEA #lightweight #monitoring #source code
Lightweight source code monitoring with Triggr (AO, AT, HE, RA), pp. 864–867.
ASEASE-2018-SharifAGZ #named
TRIMMER: application specialization for code debloating (HS, MA, AG, FZ), pp. 329–339.
ASEASE-2018-VassalloPBG #quality #question
Continuous code quality: are we (really) doing that? (CV, FP, AB, HCG), pp. 790–795.
ASEASE-2018-WanZYXY0Y #automation #learning #source code #summary
Improving automatic source code summarization via deep reinforcement learning (YW, ZZ, MY0, GX, HY, JW0, PSY), pp. 397–407.
ESEC-FSEESEC-FSE-2018-0002JCHZ #code review #developer #overview #perspective
Salient-class location: help developers understand code change in code review (YH0, NJ, XC, KH, ZZ), pp. 770–774.
ESEC-FSEESEC-FSE-2018-BianLSH0 #debugging #detection #named
NAR-miner: discovering negative association rules from code for bug detection (PB, BL0, WS, JH0, YC0), pp. 411–422.
ESEC-FSEESEC-FSE-2018-GlonduJS
Ten years of hunting for similar code for fun and profit (keynote) (SG, LJ, ZS), p. 2.
ESEC-FSEESEC-FSE-2018-HashimotoMI #automation #debugging #semantics #source code
Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes (MH, AM, TI), pp. 598–609.
ESEC-FSEESEC-FSE-2018-HenkelLLR #comprehension #embedded #source code
Code vectors: understanding programs through embedded abstracted symbolic traces (JH, SKL, BL, TWR), pp. 163–174.
ESEC-FSEESEC-FSE-2018-Hosseini #android #natural language #policy #privacy #semantics
Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
ESEC-FSEESEC-FSE-2018-Ketkar #migration #scalability
Type migration in large-scale code bases (AK), pp. 965–967.
ESEC-FSEESEC-FSE-2018-McNamaraSM #development #question
Does ACM's code of ethics change ethical decision making in software development? (AM, JS0, ERMH), pp. 729–733.
ESEC-FSEESEC-FSE-2018-RamSCB #empirical #overview #what
What makes a code change easier to review: an empirical investigation on code change reviewability (AR, AAS, MC, AB), pp. 201–212.
ESEC-FSEESEC-FSE-2018-RenYHFK #development #towards
Towards quantifying the development value of code contributions (JR, HY, QH, AF, WK), pp. 775–779.
ESEC-FSEESEC-FSE-2018-ZhaoH #functional #learning #named #similarity
DeepSim: deep learning code functional similarity (GZ, JH0), pp. 141–151.
CCCC-2018-ErtelGAC #compilation #performance
Compiling for concise code and efficient I/O (SE, AG, JA, JC), pp. 104–115.
CAVCAV-2018-CookKKTTT #model checking
Model Checking Boot Code from AWS Data Centers (BC, KK, DK, ST, MT, MRT), pp. 467–486.
HaskellHaskell-2017-Remy #automation #named #parametricity #reuse
Ornaments: exploiting parametricity for safer, more automated code refactorization and code reuse (invited talk) (DR), p. 1.
ECMFAECMFA-2017-KlugeSGSM #c #embedded #generative #modelling #named #network
cMoflon: Model-Driven Generation of Embedded C Code for Wireless Sensor Networks (RK, MS, DG, AS, MM), pp. 109–125.
MoDELSMoDELS-2017-EgeaD #automation #code generation #named #ocl #sql
SQL-PL4OCL: An Automatic Code Generator from OCL to SQL Procedural Language (ME, CD), p. 54.
MoDELSMoDELS-2017-KlareBKLSR #java #metamodelling #named #tool support
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools (HK, EB, MEK, ML, TS, RHR), pp. 221–228.
ASEASE-2017-AhmedBIR #analysis #code review #interactive #named #overview #sentiment
SentiCR: a customized sentiment analysis tool for code review interactions (TA, AB, AI, SR), pp. 106–111.
ASEASE-2017-Holzmann #interactive
Cobra - an interactive static code analyzer (GJH), p. 1.
ASEASE-2017-KargenS #robust #towards
Towards robust instruction-level trace alignment of binary code (UK, NS), pp. 342–352.
ASEASE-2017-LessenichAKSS #performance #precise
Renaming and shifted code in structured merging: looking ahead for precision and performance (OL, SA, CK, GS, JS), pp. 543–553.
ASEASE-2017-LinMXXSPLZD #design #mining #reuse
Mining implicit design templates for actionable code reuse (YL0, GM, YX, ZX, JS0, XP0, YL0, WZ, JSD), pp. 394–404.
ASEASE-2017-LinZZX #concept #retrieval #source code #using
Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
ASEASE-2017-MenariniYG #case study #code review #overview #performance #semantics #user study
Semantics-assisted code review: an efficient toolchain and a user study (MM, YY, WGG), pp. 554–565.
ASEASE-2017-RahmanR #concept #documentation #query #using
Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
ASEASE-2017-ScalabrinoBVVPO #automation #how #question
Automatically assessing code understandability: how far are we? (SS, GB, CV, MLV, DP, RO), pp. 417–427.
ASEASE-2017-Sultana #metric #predict #towards #using
Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
ASEASE-2017-WangW #analysis #fuzzing #in memory #similarity
In-memory fuzzing for binary code similarity analysis (SW0, DW), pp. 319–330.
ASEASE-2017-XinR #automation #program repair
Leveraging syntax-related code for automated program repair (QX, SPR), pp. 660–670.
ASEASE-2017-YangJ0SGL
A language model for statements of software code (YY, YJ0, MG0, JS, JG, HL), pp. 682–687.
ASEASE-2017-ZhongW
Boosting complete-code tool for partial program (HZ, XW), pp. 671–681.
ESEC-FSEESEC-FSE-2017-BunyakiatiP #commit #multi
Cherry-picking of code commits in long-running, multi-release software (PB, CP), pp. 994–998.
ESEC-FSEESEC-FSE-2017-GlanzAERHLM #named #obfuscation
CodeMatch: obfuscation won't conceal your repackaged app (LG, SA, ME, MR, BH, JL, MM), pp. 638–648.
ESEC-FSEESEC-FSE-2017-GopsteinIYDZYC #comprehension #source code
Understanding misunderstandings in source code (DG, JI, YY, LD, YZ, MKCY, JC), pp. 129–139.
ESEC-FSEESEC-FSE-2017-GuoWW #execution #logic #programmable #symbolic computation
Symbolic execution of programmable logic controller code (SG, MW, CW0), pp. 326–336.
ESEC-FSEESEC-FSE-2017-HellendoornD #modelling #network #question #source code
Are deep neural networks the best choice for modeling source code? (VJH, PTD), pp. 763–773.
ESEC-FSEESEC-FSE-2017-Jaffe #approach
Suggesting meaningful variable names for decompiled code: a machine translation approach (AJ), pp. 1050–1052.
ESEC-FSEESEC-FSE-2017-LongAR #automation #generative
Automatic inference of code transforms for patch generation (FL, PA, MR), pp. 727–739.
ESEC-FSEESEC-FSE-2017-MartieHK #code search #comprehension
Understanding the impact of support for iteration on code search (LM, AvdH, TK), pp. 774–785.
ESEC-FSEESEC-FSE-2017-NunezMR #comprehension #named
ARCC: assistant for repetitive code comprehension (WZN, VJM, CRR), pp. 999–1003.
ESEC-FSEESEC-FSE-2017-Sidiroglou-Douskos
CodeCarbonCopy (SSD, EL, AE, FL, MR), pp. 95–105.
GPCEGPCE-2017-Courtes #staging
Code staging in GNU Guix (LC), pp. 41–48.
SLESLE-2017-LuhunuS #code generation #comparison #performance #tool support
Comparison of the expressiveness and performance of template-based code generation tools (LL, ES), pp. 206–216.
CCCC-2017-WimmerJEW #compilation
One compiler: deoptimization to optimized code (CW, VJ, EE, TW), pp. 55–64.
MoDELSMoDELS-2016-Blache #bound #c #development #embedded #modelling #safety #using
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
MoDELSMoDELS-2016-DasGJBHD #animation #code generation #development #embedded #modelling #monitoring #realtime #runtime
Supporting the model-driven development of real-time embedded systems with run-time monitoring and animation via highly customizable code generation (ND, SG, LJ, MB, NH, JD), pp. 36–43.
MoDELSMoDELS-2016-HarrandFMH #code generation #framework #named
ThingML: a language and code generation framework for heterogeneous targets (NH, FF, BM, KEH), pp. 125–135.
ASEASE-2016-DotzlerP #difference #source code
Move-optimized source code tree differencing (GD, MP), pp. 660–671.
ASEASE-2016-HannebauerPSG #automation #code review #comparison #empirical #recommendation
Automatically recommending code reviewers based on their expertise: an empirical comparison (CH, MP, SS, VG), pp. 99–110.
ASEASE-2016-ProkschANM #recommendation
Evaluating the evaluations of code recommender systems: a reality check (SP, SA, SN, MM), pp. 111–121.
ASEASE-2016-RahmanRRC #code review #git #named #recommendation
CORRECT: code reviewer recommendation at GitHub for Vendasta technologies (MMR, CKR, JR, JAC), pp. 792–797.
ASEASE-2016-Rodriguez-Cancio #automation #benchmark #constant #generative
Automatic microbenchmark generation to prevent dead code elimination and constant folding (MRC, BC, BB), pp. 132–143.
ASEASE-2016-WhiteTVP #clone detection #detection #learning
Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
FSEFSE-2016-Alexandru #network #synthesis #using
Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
FSEFSE-2016-BaumLNS #code review #industrial #overview #process
Factors influencing code review processes in industry (TB, OL, KN, KS), pp. 85–96.
FSEFSE-2016-HasabnisS #code generation #execution #semantics #symbolic computation
Extracting instruction semantics via symbolic execution of code generators (NH, RS), pp. 301–313.
FSEFSE-2016-LiWWYXM #code search #framework #javascript
Relationship-aware code search for JavaScript frameworks (XL, ZW, QW, SY, TX0, HM), pp. 690–701.
FSEFSE-2016-Meng #fine-grained #identification
Fine-grained binary code authorship identification (XM), pp. 1097–1099.
FSEFSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics #using
API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
FSEFSE-2016-NguyenRNKN #api #named #statistics
T2API: synthesizing API code usage templates from English texts with statistical translation (TVN, PCR, ATN0, MK, TNN), pp. 1013–1017.
FSEFSE-2016-OosterwaalDCSB #code review #overview #perspective #visualisation
Visualizing code and coverage changes for code review (SO, AvD, RC, AAS, AB), pp. 1038–1041.
FSEFSE-2016-Rolim #automation #using
Automating repetitive code changes using examples (RR), pp. 1063–1065.
FSEFSE-2016-SuBHSKJ #detection
Code relatives: detecting similarly behaving software (FHS, JB0, KH, SS, GEK, TJ), pp. 702–714.
FSEFSE-2016-WangFMKDR #java #named #reuse
Hunter: next-generation code reuse for Java (YW, YF, RM, AK, ID, SPR), pp. 1028–1032.
FSEFSE-2016-ZhangJKKGH #developer #recommendation
Bing developer assistant: improving developer productivity by recommending sample code (HZ0, AJ, GK, CK, SG, WH), pp. 956–961.
FSEFSE-2016-ZhouW #analysis #api #detection #web
API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
FSEFSE-2016-ZhuZM #effectiveness #tool support
Effectiveness of code contribution: from patch-based to pull-request-based tools (JZ, MZ, AM), pp. 871–882.
GPCEGPCE-2016-AdamKS #automation #case study #code generation #embedded #experience
Automatic code generation in practice: experiences with embedded robot controllers (SA, MK, UPS), pp. 104–108.
GPCEGPCE-2016-BoussaaBBS #automation #code generation #non-functional #product line #testing
Automatic non-functional testing of code generators families (MB, OB, BB, GS), pp. 202–212.
SLESLE-2016-AmorimEWV #code completion #using
Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
SLESLE-2016-GoncharenkoZ #design #implementation
Language design and implementation for the domain of coding conventions (BG, VZ), pp. 90–104.
SLESLE-2016-ParrV #machine learning #towards
Towards a universal code formatter through machine learning (TP, JJV), pp. 137–151.
CBSECBSE-2015-KramerLMSB #architecture #component #consistency #contract #modelling
Change-Driven Consistency for Component Code, Architectural Models, and Contracts (MEK, ML, DM, SS, EB), pp. 21–26.
CSEETCSEET-2015-SripadaRS #bibliography #code review #re-engineering
In Support of Peer Code Review and Inspection in an Undergraduate Software Engineering Course (SS, YRR, AS), pp. 3–6.
ITiCSEITiCSE-2015-BergesH #evaluation #source code
Evaluation of Source Code with Item Response Theory (MB, PH), pp. 51–56.
ITiCSEITiCSE-2015-InsaS #assessment #automation #domain-specific language #java #library
Semi-Automatic Assessment of Unrestrained Java Code: A Library, a DSL, and a Workbench to Assess Exams and Exercises (DI, JS), pp. 39–44.
ITiCSEITiCSE-2015-Kumar #problem #semantics
Solving Code-tracing Problems and its Effect on Code-writing Skills Pertaining to Program Semantics (ANK), pp. 314–319.
ITiCSEITiCSE-2015-Pritchard #named #online
Websheets: A Templated Online Coding Exercise System (DAGP), p. 335.
ITiCSEITiCSE-2015-ScottG #assessment #code review #education #quality #reliability
Reliability in the Assessment of Program Quality by Teaching Assistants During Code Reviews (MJS, GG), p. 346.
SCAMSCAM-J-2013-CeruloPBCC15 #detection #markov #named
Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
SCAMSCAM-J-2013-MarcozziVH15 #database #execution #relational #source code #sql #symbolic computation #testing
Relational symbolic execution of SQL code for unit testing of database programs (MM, WV, JLH), pp. 44–72.
ICPCICPC-2015-BusjahnBBCPSST #eye tracking #linear #order
Eye movements in code reading: relaxing the linear order (TB, RB, AB, MEC, JHP, CS, BS, ST), pp. 255–265.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how #using
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-JordanRHBB #feature model #industrial #source code
Manually locating features in industrial source code: the search actions of software nomads (HRJ, JR, SH, GB, JB), pp. 174–177.
ICPCICPC-2015-MacLeodSB #developer #documentation #how #using
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-SabiMHK #code search #keyword #order
Reordering results of keyword-based code search for supporting simultaneous code changes (YS, HM, YH, SK), pp. 289–290.
ICPCICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICPCICPC-2015-SaiedABS #api #library #question #source code #using
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-Balachandran #query #repository #scalability
Query by example in large-scale code repositories (VB), pp. 467–476.
ICSMEICSME-2015-BavotaR #code review #quality
Four eyes are better than two: On the impact of code reviews on software quality (GB, BR), pp. 81–90.
ICSMEICSME-2015-Fenske #configuration management #smell
Code smells in highly configurable software (WF), pp. 602–605.
ICSMEICSME-2015-JansenH #dataset #industrial #smell #spreadsheet
Code smells in spreadsheet formulas revisited on an industrial dataset (BJ, FH), pp. 372–380.
ICSMEICSME-2015-KononenkoBGCG #bibliography #code review #matter #people #quality #question
Investigating code review quality: Do people and participation matter? (OK, OB, LG, YC, MWG), pp. 111–120.
ICSMEICSME-2015-MondalRS #case study #comparative
A comparative study on the bug-proneness of different types of code clones (MM, CKR, KAS), pp. 91–100.
ICSMEICSME-2015-PawelkaJ #case study #identifier #natural language
Is this code written in English? A study of the natural language of comments and identifiers in practice (TP, EJ), pp. 401–410.
ICSMEICSME-2015-SantosAEDV #program transformation #source code
System specific, source code transformations (GS, NA, AE, SD, MTV), pp. 221–230.
ICSMEICSME-2015-VahabzadehF0 #debugging #empirical
An empirical study of bugs in test code (AV, AMF, AM), pp. 101–110.
ICSMEICSME-2015-WangPV #corpus #mining #scalability
Developing a model of loop actions by mining loop characteristics from a large code corpus (XW, LLP, KVS), pp. 51–60.
MSRMSR-2015-BirdCG #code review #framework #lessons learnt #overview #platform
Lessons Learned from Building and Deploying a Code Review Analytics Platform (CB, TC, MG), pp. 191–201.
MSRMSR-2015-BosuGB #code review #empirical
Characteristics of Useful Code Reviews: An Empirical Study at Microsoft (AB, MG, CB), pp. 146–156.
MSRMSR-2015-CoelhoAGD #android #debugging #exception #git
Unveiling Exception Handling Bug Hazards in Android Based on GitHub and Google Code Issues (RC, LA, GG, AvD), pp. 134–145.
MSRMSR-2015-DiamantopoulosS #source code #stack overflow
Employing Source Code Information to Improve Question-Answering in Stack Overflow (TGD, ALS), pp. 454–457.
MSRMSR-2015-DuijnKB #quality #stack overflow
Quality Questions Need Quality Code: Classifying Code Fragments on Stack Overflow (MD, AK, AB), pp. 410–413.
MSRMSR-2015-ErcanSB #automation #predict #stack overflow
Automatic Assessments of Code Explanations: Predicting Answering Times on Stack Overflow (SE, QS, AB), pp. 442–445.
MSRMSR-2015-GreilerHC #quality #replication
Code Ownership and Software Quality: A Replication Study (MG, KH, JC), pp. 2–12.
MSRMSR-2015-HellendoornDB #modelling
Will They Like This? Evaluating Code Contributions with Language Models (VH, PTD, AB), pp. 157–167.
MSRMSR-2015-HigoOHHK #reuse #towards
Toward Reusing Code Changes (YH, AO, SH, HH, SK), pp. 372–376.
MSRMSR-2015-JiangA #co-evolution #empirical #framework #source code
Co-evolution of Infrastructure and Source Code — An Empirical Study (YJ, BA), pp. 45–55.
MSRMSR-2015-LinW #fine-grained #why
Why Power Laws? An Explanation from Fine-Grained Code Changes (ZL, JW), pp. 68–75.
MSRMSR-2015-MartieH #code search #empirical #named
Sameness: An Experiment in Code Search (LM, AvdH), pp. 76–87.
MSRMSR-2015-PalombaNTBOPL #dataset #evaluation #named #open data #smell
Landfill: An Open Dataset of Code Smells with Public Evaluation (FP, DDN, MT, GB, RO, DP, ADL), pp. 482–485.
MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
MSRMSR-2015-TaoK #clustering #code review #overview #perspective
Partitioning Composite Code Changes to Facilitate Code Review (YT, SK), pp. 180–190.
MSRMSR-2015-ThongtanunamMHI #code review #empirical #overview
Investigating Code Review Practices in Defective Files: An Empirical Study of the Qt System (PT, SM, AEH, HI), pp. 168–179.
MSRMSR-2015-Zacchiroli #dataset #metadata #source code
The Debsources Dataset: Two Decades of Debian Source Code Metadata (SZ), pp. 466–469.
SANERSANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support
Scaling up evaluation of code search tools through developer usage metrics (KD, DCS, LLP), pp. 181–190.
SANERSANER-2015-DiasBGCD #fine-grained
Untangling fine-grained code changes (MD, AB, GG, DC, SD), pp. 341–350.
SANERSANER-2015-HashimotoMI #fine-grained #scalability #source code
A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
SANERSANER-2015-JiangPWXZ
Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changes (QJ, XP, HW, ZX, WZ), pp. 361–370.
SANERSANER-2015-Keivanloo0Z #clone detection #detection #java #repository #scalability
Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
SANERSANER-2015-KochharTL #debugging #effectiveness #empirical #scalability #test coverage #testing
Code coverage and test suite effectiveness: Empirical study with real bugs in large systems (PSK, FT, DL), pp. 560–564.
SANERSANER-2015-LuSWLD #code search #effectiveness #query
Query expansion via WordNet for effective code search (ML, XS, SW, DL, YD), pp. 545–549.
SANERSANER-2015-MondalRS #mining #named #refactoring
SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking (MM, CKR, KAS), pp. 484–488.
SANERSANER-2015-MoralesMK #case study #code review #design #overview #quality
Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projects (RM, SM, FK), pp. 171–180.
SANERSANER-2015-NairJNH #analysis
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support
Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
SANERSANER-2015-QiuSM #graph #identification #library #morphism #using
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SANERSANER-2015-ThongtanunamTKY #approach #code review #overview #perspective #recommendation
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
SANERSANER-2015-TymchukML #code review #overview
Code review: Veni, ViDI, vici (YT, AM, ML), pp. 151–160.
SANERSANER-2015-WongLT #automation #generative #mining #named #source code
CloCom: Mining existing source code for automatic comment generation (EW, TL, LT), pp. 380–389.
SCAMSCAM-2015-BaloghSB #eclipse #named #source code
CodeMetropolis: Eclipse over the city of source code (GB, AS, ÁB), pp. 271–276.
SCAMSCAM-2015-BrandtnerLG #dependence #integration #source code #testing
Intent, tests, and release dependencies: Pragmatic recipes for source code integration (MB, PL, HCG), pp. 11–20.
SCAMSCAM-2015-FaragoHF #cumulative #maintenance
Cumulative code churn: Impact on maintainability (CF, PH, RF), pp. 141–150.
SCAMSCAM-2015-FenskeSMS #detection #smell #variability
When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAMSCAM-2015-HuckBU #c++
Checking C++ codes for compatibility with operator overloading (AH, CB, JU), pp. 91–100.
SCAMSCAM-2015-LawrieB #navigation #source code #word
Navigating source code with words (DL, DB), pp. 71–80.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-SantosEADV #game studies #program transformation #source code
Recording and replaying system specific, source code transformations (GS, AE, NA, SD, MTV), pp. 221–230.
SCAMSCAM-2015-SzokeNFFG #automation #named #refactoring #smell #tool support
FaultBuster: An automatic code smell refactoring toolset (GS, CN, LJF, RF, TG), pp. 253–258.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
CIAACIAA-2015-Ade-IbijolaES #programming
Introducing Code Adviser: A DFA-driven Electronic Programming Tutor (AAI, SE, IDS), pp. 307–312.
DLTDLT-2015-HanKS #fault
Generalizations of Code Languages with Marginal Errors (YSH, SKK, KS), pp. 264–275.
ICALPICALP-v1-2015-HemenwayW #linear
Linear-Time List Recovery of High-Rate Expander Codes (BH, MW), pp. 701–712.
ICALPICALP-v1-2015-MolinaroWY #complexity
Amplification of One-Way Information Complexity via Codes and Noise Sensitivity (MM, DPW, GY), pp. 960–972.
LATALATA-2015-AnselmoGM #2d #decidability
Structure and Measure of a Decidable Class of Two-dimensional Codes (MA, DG, MM), pp. 315–327.
LATALATA-2015-LopezN
Coding Non-orientable Laminations (LML, PN), pp. 340–352.
FMFM-2015-FernandezAKK #automation #verification
Automated Verification of RPC Stub Code (MF, JA, GK, IK), pp. 273–290.
SEFMSEFM-2015-RockaiSB #c #c++ #model checking
Techniques for Memory-Efficient Model Checking of C and C++ Code (PR, VS, JB), pp. 268–282.
HaskellHaskell-2015-McDonellCGN #code generation #runtime #type safety
Type-safe runtime code generation: accelerate to LLVM (TLM, MMTC, VG, RRN), pp. 201–212.
ICFPICFP-2015-RompfA #c #compilation #functional #sql
Functional pearl: a SQL to C compiler in 500 lines of code (TR, NA), pp. 2–9.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance #using
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
CHICHI-2015-BakerML #named
StructJumper: A Tool to Help Blind Programmers Navigate and Understand the Structure of Code (CMB, LRM, REL), pp. 3043–3052.
CHICHI-2015-LaseckiGLLBD #behaviour #crowdsourcing #privacy #trade-off #video
Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
HCIDUXU-UI-2015-HeidtKBR #difference #gender #human-computer
Incommensurable Writings — Examining the Status of Gender Difference Within HCI Coding Practices (MH, KK, AB, PR), pp. 196–205.
HCIHIMI-IKC-2015-WatanabeTA #abstraction #development #learning #source code
Development of a Learning Support System for Reading Source Code by Stepwise Abstraction (KW, TT, TA), pp. 387–394.
HCILCT-2015-Chu #editing
Dual-Coding Strategy for the Chinese Characters Learners: Chinese PCS Editor (CNC), pp. 43–49.
ICEISICEIS-v3-2015-SantosTF #process
Investigating Completeness of Coding in Business Process Model and Notation (CHdS, LHT, MF), pp. 328–333.
ICMLICML-2015-AllamanisTGW #modelling #natural language #source code
Bimodal Modelling of Source Code and Natural Language (MA, DT, ADG, YW), pp. 2123–2132.
ICMLICML-2015-PiechHNPSG #feedback #learning #student
Learning Program Embeddings to Propagate Feedback on Student Code (CP, JH, AN, MP, MS, LJG), pp. 1093–1102.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank #using
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-YogatamaFDS #learning #word
Learning Word Representations with Hierarchical Sparse Coding (DY, MF, CD, NAS), pp. 87–96.
KDDKDD-2015-SomanchiALEG #predict #using
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
SEKESEKE-2015-HesseKPRB #implementation
Documenting Implementation Decisions with Code Annotations (TMH, AK, BP, TR, BB), pp. 152–157.
SEKESEKE-2015-SchreiberMRM #comprehension #named #object-oriented #source code
TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension (DS, ALAM, SSR, AM), pp. 278–283.
SEKESEKE-2015-XuLZ #overview #visualisation
To Enlighten Hidden Facts in The Code: A Review of Software Visualization Metaphors (YX, YL, JZ), pp. 294–297.
SPLCSPLC-2015-FilhoABAB #empirical #java #product line #source code
Assessing product line derivation operators applied to Java source code: an empirical study (JBFF, SA, OB, MA, BB), pp. 36–45.
OOPSLAOOPSLA-2015-FuBS #analysis #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
OOPSLAOOPSLA-2015-SrinivasanR #partial evaluation
Partial evaluation of machine code (VS, TWR), pp. 860–879.
PADLPADL-2015-DymchenkoM #problem
Declaratively Solving Google Code Jam Problems with Picat (SD, MM), pp. 50–57.
PEPMPEPM-2015-VinayakaraoPN #source code
Structurally Heterogeneous Source Code Examples from Unstructured Knowledge Sources (VV, RP, AVN), pp. 21–26.
PLDIPLDI-2015-MendisBWKRPZA #domain-specific language #kernel #named
Helium: lifting high-performance stencil kernels from stripped x86 binaries to halide DSL code (CM, JB, KW, SK, JRK, SP, QZ, SPA), pp. 391–402.
PLDIPLDI-2015-Sidiroglou-Douskos #automation #fault #multi
Automatic error elimination by horizontal code transfer across multiple applications (SSD, EL, FL, MR), pp. 43–54.
PLDIPLDI-2015-SrinivasanR #semantics #synthesis
Synthesis of machine code from semantics (VS, TWR), pp. 596–607.
PLDIPLDI-2015-VenkatHS #data transformation #matrix
Loop and data transformations for sparse matrix code (AV, MWH, MS), pp. 521–532.
POPLPOPL-2015-Agten0P #c #composition #verification
Sound Modular Verification of C Code Executing in an Unverified Context (PA, BJ, FP), pp. 581–594.
POPLPOPL-2015-Lee
Coding by Everyone, Every Day (PL), p. 485.
POPLPOPL-2015-RaychevVK #predict
Predicting Program Properties from “Big Code” (VR, MTV, AK), pp. 111–124.
ASEASE-2015-FudabaOANHSTN #automation #named #pseudo #source code
Pseudogen: A Tool to Automatically Generate Pseudo-Code from Source Code (HF, YO, KA, GN, HH, SS, TT, SN), pp. 824–829.
ASEASE-2015-GroceAJM #how #verification
How Verified is My Code? Falsification-Driven Verification (T) (AG, IA, CJ, PEM), pp. 737–748.
ASEASE-2015-KeSGB #code search #semantics #source code
Repairing Programs with Semantic Code Search (T) (YK, KTS, CLG, YB), pp. 295–306.
ASEASE-2015-LvZLWZZ #api #code search #comprehension #effectiveness #named
CodeHow: Effective Code Search Based on API Understanding and Extended Boolean Model (E) (FL, HZ, JGL, SW, DZ, JZ), pp. 260–270.
ASEASE-2015-MartieLH #named #query
CodeExchange: Supporting Reformulation of Internet-Scale Code Queries in Context (T) (LM, TDL, AvdH), pp. 24–35.
ASEASE-2015-NguyenNN #approach #divide and conquer #migration #multi #source code #statistics
Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) (ATN, TTN, TNN), pp. 585–596.
ASEASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics #using
Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
ASEASE-2015-VasquezLVP #database #developer #documentation #how #source code
How do Developers Document Database Usages in Source Code? (N) (MLV, BL, CV, DP), pp. 36–41.
ESEC-FSEESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GongPS #javascript #named
JITProf: pinpointing JIT-unfriendly JavaScript code (LG, MP, KS), pp. 357–368.
ESEC-FSEESEC-FSE-2015-HeuleSC #modelling #named
Mimic: computing models for opaque code (SH, MS, SC), pp. 710–720.
ESEC-FSEESEC-FSE-2015-Janjua
OnSpot system: test impact visibility during code edits in real software (MUJ), pp. 994–997.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code #using
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-Konopka #dependence #eye tracking #identification #navigation
Combining eye tracking with navigation paths for identification of cross-language code dependencies (MK), pp. 1057–1059.
ESEC-FSEESEC-FSE-2015-LinPXZZ #interactive #recommendation
Clone-based and interactive recommendation for modifying pasted code (YL, XP, ZX, DZ, WZ), pp. 520–531.
ESEC-FSEESEC-FSE-2015-NagappanRKTMMH #c #empirical #git #goto #repository
An empirical study of goto in C code from GitHub repositories (MN, RR, YK, ÉT, SM, AM, AEH), pp. 404–414.
ESEC-FSEESEC-FSE-2015-PhamSS #automation #developer #recommendation
Automatically recommending test code examples to inexperienced developers (RP, YS, KS), pp. 890–893.
ESEC-FSEESEC-FSE-2015-PrauseJ #gamification
Gamification for enforcing coding conventions (CRP, MJ), pp. 649–660.
ESEC-FSEESEC-FSE-2015-SadowskiSE #case study #developer #how
How developers search for code: a case study (CS, KTS, SGE), pp. 191–201.
ESEC-FSEESEC-FSE-2015-Vinayakarao #comprehension
Spotting familiar code snippet structures for program comprehension (VV), pp. 1054–1056.
ICSEICSE-v1-2015-BarnettBBL #automation #code review #composition #developer #overview
Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets (MB, CB, JB, SKL), pp. 134–144.
ICSEICSE-v1-2015-LavalleeR #case study #developer #quality #why
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality (ML, PNR), pp. 677–687.
ICSEICSE-v1-2015-NanzF #case study #comparative #programming language
A Comparative Study of Programming Languages in Rosetta Code (SN, CAF), pp. 778–788.
ICSEICSE-v1-2015-NguyenN #graph #statistics
Graph-Based Statistical Language Model for Code (ATN, TNN), pp. 858–868.
ICSEICSE-v1-2015-TufanoPBOPLP #smell #why
When and Why Your Code Starts to Smell Bad (MT, FP, GB, RO, MDP, ADL, DP), pp. 403–414.
ICSEICSE-v1-2015-YoonM #editing #undo
Supporting Selective Undo in a Code Editor (YY, BAM), pp. 223–233.
ICSEICSE-v1-2015-ZhangSPK #code review #interactive #overview
Interactive Code Review for Systematic Changes (TZ, MS, JP, MK), pp. 111–122.
ICSEICSE-v2-2015-AbreuEP #fine-grained #monitoring #named
CodeAware: Sensor-Based Fine-Grained Monitoring and Management of Software Artifacts (RA, HE, AP), pp. 551–554.
ICSEICSE-v2-2015-AlexandruG #agile #analysis #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-BishopHXTH #contest #experience #scalability
Code Hunt: Experience with Coding Contests at Scale (JB, RNH, TX, NT, JdH), pp. 398–407.
ICSEICSE-v2-2015-CzerwonkaGT #code review #debugging #how #overview
Code Reviews Do Not Find Bugs. How the Current Code Review Best Practice Slows Us Down (JC, MG, JT), pp. 27–28.
ICSEICSE-v2-2015-FranksTDH #modelling #named
CACHECA: A Cache Language Model Based Code Suggestion Tool (CF, ZT, PTD, VH), pp. 705–708.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-McBurney #automation #documentation #generative #source code #summary
Automatic Documentation Generation via Source Code Summarization (PWM), pp. 903–906.
ICSEICSE-v2-2015-McCarthyRS #comprehension #consistency #named
Bixie: Finding and Understanding Inconsistent Code (TM, PR, MS), pp. 645–648.
ICSEICSE-v2-2015-NguyenKN #embedded #ide #named #php #web
Varis: IDE Support for Embedded Client Code in PHP Web Applications (HVN, CK, TNN), pp. 693–696.
ICSEICSE-v2-2015-Palomba #analysis #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-Roos #code completion #performance #precise #statistics
Fast and Precise Statistical Code Completion (PR), pp. 757–759.
ICSEICSE-v2-2015-SanchezW #source code #stack overflow
Source Code Curation on StackOverflow: The Vesperin System (HS, JW), pp. 661–664.
ICSEICSE-v2-2015-Sant #assessment
Code Repurposing as an Assessment Tool (JS), pp. 295–298.
ICSEICSE-v2-2015-Szabo #comprehension #maintenance
Novice Code Understanding Strategies during a Software Maintenance Assignment (CS), pp. 276–284.
SACSAC-2015-DAvanzoFGS #estimation #functional #metric #mobile
COSMIC functional measurement of mobile applications and code size estimation (LD, FF, CG, PS), pp. 1631–1636.
SACSAC-2015-DieumegardGKTT #compilation #contract
Compilation of synchronous observers as code contracts (AD, PLG, TK, AT, XT), pp. 1933–1939.
SACSAC-2015-DymchenkoM #eclipse #problem #prolog
Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system (SD, MM), pp. 2122–2124.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-JeremicPM #array #performance #random
Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requests (NJ, HP, GM), pp. 2007–2014.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #analysis #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-PalviainenKKLMN #collaboration #design #developer #experience #framework
Design framework enhancing developer experience in collaborative coding environment (JP, TK, JK, JL, TM, AN), pp. 149–156.
SACSAC-2015-RodriguesAFSB #approach #ontology #simulation
An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
GPCEGPCE-2015-ByalikCT #automation #named #programming #synthesis
Native-2-native: automated cross-platform code synthesis from web-based programming resources (AB, SC, ET), pp. 99–108.
GPCEGPCE-2015-MakarovH #compilation #multi #named
CLOP: a multi-stage compiler to seamlessly embed heterogeneous code (DM, MH), pp. 109–112.
GPCEGPCE-2015-RingertRW #behaviour #code generation
Composing code generators for C&C ADLs with Application-specific behavior languages (JOR, BR, AW), pp. 113–116.
CASECASE-2015-GleesonBBCL #automation #code generation #optimisation
Optimizing robot trajectories for automatic robot code generation (DG, SB, RB, JSC, BL), pp. 495–500.
CASECASE-2015-RacchettiTF #automation #documentation #generative #lifecycle #usability
Generating automatically the documentation from PLC code by D4T3 to improve the usability and life cycle management of software in automation (LR, LT, CF), pp. 168–173.
CASECASE-2015-ZhuCS #energy #linear #process #recognition #using
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CCCC-2015-AllenSK #analysis #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CCCC-2015-BourkeCPPP #code generation #hybrid
A Synchronous-Based Code Generator for Explicit Hybrid Systems Languages (TB, JLC, BP, CP, MP), pp. 69–88.
CCCC-2015-NgCY #code generation #protocol
Protocols by Default — Safe MPI Code Generation Based on Session Types (NN, JGdFC, NY), pp. 212–232.
CGOCGO-2015-HasabnisQS #architecture #code generation #correctness #specification
Checking correctness of code generator architecture specifications (NH, RQ, RS), pp. 167–178.
CGOCGO-2015-HawkinsDBZ #optimisation
Optimizing binary translation of dynamically generated code (BH, BD, DB, QZ), pp. 68–78.
DATEDATE-2015-DamschenRVP
Transparent offloading of computational hotspots from binary code to Xeon Phi (MD, HR, GV, CP), pp. 1078–1083.
DATEDATE-2015-DinizSDBH #architecture #hardware #performance #standard #video
A deblocking filter hardware architecture for the high efficiency video coding standard (CMD, MS, FVD, SB, JH), pp. 1509–1514.
DATEDATE-2015-FuWH #code generation
Improving SIMD code generation in QEMU (SYF, JJW, WCH), pp. 1233–1236.
DATEDATE-2015-KainthKNVT #obfuscation
Hardware-assisted code obfuscation for FPGA soft microprocessors (MK, LK, CN, SGV, RT), pp. 127–132.
DATEDATE-2015-ZhongLLZLZS #mobile #named
nCode: limiting harmful writes to emerging mobile NVRAM through code swapping (KZ, DL, LL, XZ, WL, QZ, EHMS), pp. 1305–1310.
HPCAHPCA-2015-KimSE #flexibility #memory management #reliability
Bamboo ECC: Strong, safe, and flexible codes for reliable computer memory (JK, MS, ME), pp. 101–112.
PDPPDP-2015-EvrardL #automation #code generation #concurrent #distributed #formal method #modelling #process
Automatic Distributed Code Generation from Formal Models of Asynchronous Concurrent Processes (HE, FL), pp. 459–466.
PPoPPPPoPP-2015-RavishankarDEPRRS #code generation #distributed #memory management
Distributed memory code generation for mixed Irregular/Regular computations (MR, RD, VE, LNP, JR, AR, PS), pp. 65–75.
SOSPSOSP-2015-CurtsingerB #named #profiling
Coz: finding code that counts with causal profiling (CC, EDB), pp. 184–197.
STOCSTOC-2015-AbbeSW #fault #random
Reed-Muller Codes for Random Erasures and Errors (EA, AS, AW), pp. 297–306.
STOCSTOC-2015-BaconFHS #quantum
Sparse Quantum Codes from Quantum Circuits (DB, STF, AWH, JS), pp. 327–334.
STOCSTOC-2015-BhowmickL
The List Decoding Radius of Reed-Muller Codes over Small Fields (AB, SL), pp. 277–285.
TACASTACAS-2015-DjoudiB #analysis #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
ICSTICST-2015-MondalHD #multi #test coverage #testing
Exploring Test Suite Diversification and Code Coverage in Multi-Objective Test Case Selection (DM, HH, SD), pp. 1–10.
ICSTICST-2015-Oriol #embedded #legacy #re-engineering #testing
Testing Legacy Embedded Code: Landing on a Software Engineering Desert Island (MO), pp. 1–2.
ICSTICST-2015-PankumhangR #test coverage
Iterative Instrumentation for Code Coverage in Time-Sensitive Systems (TP, MR), pp. 1–10.
ISSTAISSTA-2015-GongPSS #javascript #named
DLint: dynamically checking bad coding practices in JavaScript (LG, MP, MS, KS), pp. 94–105.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
ECSAECSA-2014-CavalcanteOB #architecture #code generation #implementation
Architecture-Based Code Generation: From π-ADL Architecture Descriptions to Implementations in the Go Language (EC, FO, TVB), pp. 130–145.
DocEngDocEng-2014-UlichneyGS
Circular coding with interleaving phase (RU, MG, SJS), pp. 21–24.
SIGMODSIGMOD-2014-TranNST #approach #clustering #named
JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
VLDBVLDB-2014-NagelBV #code generation #performance #query
Code Generation for Efficient Query Processing in Managed Runtimes (FN, GMB, SDV), pp. 1095–1106.
ITiCSEITiCSE-2014-HakulinenM #assessment #automation #programming
QR code programming tasks with automated assessment (LH, LM), pp. 177–182.
ITiCSEITiCSE-2014-LakanenIL #comprehension #difference #student
Understanding differences among coding club students (AJL, VI, VL), pp. 159–164.
ITiCSEITiCSE-2014-SimonCSCJ #student
Student perceptions of the acceptability of various code-writing practices (S, BC, JS, AC, CJ), pp. 105–110.
ITiCSEITiCSE-2014-StrieweG14a #runtime #using
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WhalleyK
A qualitative think-aloud study of novice programmers’ code writing strategies (JLW, NK), pp. 279–284.
SIGITESIGITE-2014-VihavainenLI #analysis #source code
Analysis of source code snapshot granularity levels (AV, ML, PI), pp. 21–26.
SANERCSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial #risk management
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, , EW, JW, AH, JH), pp. 154–163.
SANERCSMR-WCRE-2014-DamevskiSP #case study #code search
A case study of paired interleaving for evaluating code search techniques (KD, DCS, LLP), pp. 54–63.
SANERCSMR-WCRE-2014-DingZT #branch #detection
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
SANERCSMR-WCRE-2014-EspinhaZG #api #developer #web
Web API growing pains: Stories from client developers and their code (TE, AZ, HGG), pp. 84–93.
SANERCSMR-WCRE-2014-GoeminneDM #co-evolution #data-driven
Co-evolving code-related and database-related changes in a data-intensive software system (MG, AD, TM), pp. 353–357.
SANERCSMR-WCRE-2014-HillRFM #case study #code search #query #refinement #user study
NL-based query refinement and contextualized code search results: A user study (EH, MRV, JAF, GM), pp. 34–43.
SANERCSMR-WCRE-2014-OliveiraVL #metric #source code
Extracting relative thresholds for source code metrics (PO, MTV, FPL), pp. 254–263.
SANERCSMR-WCRE-2014-OsmanLN #debugging #mining
Mining frequent bug-fix code changes (HO, ML, ON), pp. 343–347.
SANERCSMR-WCRE-2014-QuanteTS #c #case study #towards
Towards recovering and exploiting domain knowledge from C code: A case study on automotive software (JQ, MT, JS), pp. 383–386.
ICPCICPC-2014-BinkleyHLO #analysis #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICPCICPC-2014-GhafariGMT #mining #recommendation #testing
Mining unit tests for code recommendation (MG, CG, AM, GT), pp. 142–145.
ICPCICPC-2014-GuptaSVU #assessment #industrial #named #quality #scalability
SCQAM: a scalable structured code quality assessment method for industrial software (SG, HKS, RDV, UU), pp. 244–252.
ICPCICPC-2014-HossenKP #maintenance #source code
Amalgamating source code authors, maintainers, and change proneness to triage change requests (KH, HHK, DP), pp. 130–141.
ICPCICPC-2014-JbaraF #comprehension #on the
On the effect of code regularity on comprehension (AJ, DGF), pp. 189–200.
ICPCICPC-2014-JbaraF14a #comprehension #named #visual notation
JCSD: visual support for understanding code control structure (AJ, DGF), pp. 300–303.
ICPCICPC-2014-KulkarniM #framework #obfuscation #using
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-McBurneyLMW #source code #summary #topic
Improving topic model source code summarization (PWM, CL, CM, TW), pp. 291–294.
ICPCICPC-2014-McBurneyM #automation #documentation #generative #source code #summary
Automatic documentation generation via source code summarization of method context (PWM, CM), pp. 279–290.
ICPCICPC-2014-PanichellaCPO #empirical #evolution #how
How the evolution of emerging collaborations relates to code changes: an empirical study (SP, GC, MDP, RO), pp. 177–188.
ICPCICPC-2014-VassalloPPC #developer #mining #named #source code
CODES: mining source code descriptions from developers discussions (CV, SP, MDP, GC), pp. 106–109.
ICPCICPC-2014-ZapalowskiNN #architecture #source code
Revealing the relationship between architectural elements and source code characteristics (VZ, IN, DJN), pp. 14–25.
ICSMEICSME-2014-AsaduzzamanRSH #code completion #named #performance
CSCC: Simple, Efficient, Context Sensitive Code Completion (MA, CKR, KAS, DH), pp. 71–80.
ICSMEICSME-2014-AsaduzzamanRSH14a #api #code completion #usability
Context-Sensitive Code Completion Tool for Better API Usability (MA, CKR, KAS, DH), pp. 621–624.
ICSMEICSME-2014-ChaparroBMP #metric #on the #quality #refactoring
On the Impact of Refactoring Operations on Code Quality Metrics (OC, GB, AM, MDP), pp. 456–460.
ICSMEICSME-2014-EddyK #code search #query #source code #using
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-Ghafari #testing
Extracting Code Examples from Unit Test Cases (MG), p. 667.
ICSMEICSME-2014-GuanaGS #named #towards
ChainTracker: Towards a Comprehensive Tool for Building Code-Generation Environments (VG, KG, ES), pp. 613–616.
ICSMEICSME-2014-HabringerMP #case study #experience #legacy #reverse engineering #sql
Reverse Engineering PL/SQL Legacy Code: An Experience Report (MH, MM, JP), pp. 553–556.
ICSMEICSME-2014-HallKWM #automation #source code #tool support
Establishing the Source Code Disruption Caused by Automated Remodularisation Tools (MH, MAK, NW, PM), pp. 466–470.
ICSMEICSME-2014-LinsbauerAGLPLE #variability
Recovering Feature-to-Code Mappings in Mixed-Variability Software Systems (LL, FA, PG, DL, HP, RELH, AE), pp. 426–430.
ICSMEICSME-2014-LinXPL0ZD #maintenance #named
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance (YL, ZX, XP, YL, JS, WZ, JSD), pp. 341–350.
ICSMEICSME-2014-MondalRS #analysis #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #analysis #clustering #overview
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-OliveiraLVS #metric #named #source code
RTTool: A Tool for Extracting Relative Thresholds for Source Code Metrics (PO, FPL, MTV, AS), pp. 629–632.
ICSMEICSME-2014-PalombaBPOL #case study #developer #smell
Do They Really Smell Bad? A Study on Developers’ Perception of Bad Code Smells (FP, GB, MDP, RO, ADL), pp. 101–110.
ICSMEICSME-2014-PanichellaBPCA #developer #how
How Developers’ Collaborations Identified from Different Sources Tell Us about Code Changes (SP, GB, MDP, GC, GA), pp. 251–260.
ICSMEICSME-2014-Reiss #code search #testing #towards #using
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-SahinTMPC #energy #how #obfuscation #question
How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
ICSMEICSME-2014-SvajlenkoIKRM #benchmark #big data #metric #towards
Towards a Big Data Curated Benchmark of Inter-project Code Clones (JS, JFI, IK, CKR, MMM), pp. 476–480.
ICSMEICSME-2014-ThongtanunamYYKCFI #code review #dataset #named #overview #visualisation
ReDA: A Web-Based Visualization Tool for Analyzing Modern Code Review Dataset (PT, XY, NY, RGK, AECC, KF, HI), pp. 605–608.
ICSMEICSME-2014-VasilescuSWSB #empirical #git #integration
Continuous Integration in a Social-Coding World: Empirical Evidence from GitHub (BV, SvS, JW, AS, MvdB), pp. 401–405.
ICSMEICSME-2014-ZhuZXJL0 #api #mining
Mining API Usage Examples from Test Code (ZZ, YZ, BX, YJ, ZL, LZ), pp. 301–310.
MSRMSR-2014-BellerBZJ #code review #open source #problem #question
Modern code reviews in open-source projects: which problems do they fix? (MB, AB, AZ, EJ), pp. 202–211.
MSRMSR-2014-GuoLM #exclamation #question
Oops! where did that code snippet come from? (LG, JLL, GM), pp. 52–61.
MSRMSR-2014-KevicF #source code #taxonomy
A dictionary to translate change tasks to source code (KK, TF), pp. 320–323.
MSRMSR-2014-KrutzL #clone detection
A code clone oracle (DEK, WL), pp. 388–391.
MSRMSR-2014-LemosPZL #automation #code search #interface #query
Thesaurus-based automatic query expansion for interface-driven code search (OALL, ACdP, FCZ, CVL), pp. 212–221.
MSRMSR-2014-McIntoshKAH #case study #code review #overview #quality
The impact of code review coverage and code review participation on software quality: a case study of the qt, VTK, and ITK projects (SM, YK, BA, AEH), pp. 192–201.
MSRMSR-2014-SteidlHJ #analysis #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
MSRMSR-2014-VasquezHBP #android #library #obfuscation #reuse
Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
MSRMSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code
Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-Cortes-CoyVAP #automation #commit #generative #on the #source code #summary
On Automatically Generating Commit Messages via Summarization of Source Code Changes (LFCC, MLV, JA, DP), pp. 275–284.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring #using
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-MarsavinaRZ #co-evolution #fine-grained
Studying Fine-Grained Co-evolution Patterns of Production and Test Code (CM, DR, AZ), pp. 195–204.
SCAMSCAM-2014-RahmanR #empirical
A Change-Type Based Empirical Study on the Stability of Cloned Code (MSR, CKR), pp. 31–40.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation #using
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
SCAMSCAM-2014-SajnaniSL #case study #comparative #debugging #java
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code (HS, VS, CVL), pp. 21–30.
SCAMSCAM-2014-SzokeANFG #quality #question #refactoring
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? (GS, GA, CN, RF, TG), pp. 95–104.
SCAMSCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
DLTDLT-J-2013-AnselmoGM14 #2d #decidability
Prefix Picture codes: a Decidable class of Two-Dimensional codes (MA, DG, MM), pp. 1017–1032.
LATALATA-2014-AnselmoGM #finite
Picture Codes with Finite Deciphering Delay (MA, DG, MM), pp. 88–100.
IFMIFM-2014-FurstHBDSM #code generation
Code Generation for Event-B (AF, TSH, DAB, KD, NS, KM), pp. 323–338.
SEFMSEFM-2014-Leroy #code generation #proving #tool support #verification
Formal Proofs of Code Generation and Verification Tools (XL), pp. 1–4.
HaskellHaskell-2014-Chakravarty
Foreign inline code: systems demonstration (MMTC), pp. 119–120.
LISPILC-2014-Nunes-Harwitt14a #approach #code generation #evaluation #semantics
Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
CHICHI-2014-DunwellFPHALS #approach #game studies #learning #safety
A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CHICHI-2014-HenleyF #editing #navigation #performance #towards
The patchworks code editor: toward faster navigation with less code arranging and fewer navigation mistakes (AZH, SDF), pp. 2511–2520.
CHICHI-2014-LieberBM #concept #programming #visualisation
Addressing misconceptions about code with always-on programming visualizations (TL, JRB, RCM), pp. 2481–2490.
CHICHI-2014-SwiftSMG
Coding livecoding (BS, AS, MAM, HJG), pp. 1021–1024.
CSCWCSCW-2014-MatthiesenBP #development #how #quote
“Figure out how to code with the hands of others”: recognizing cultural blind spots in global software development (SM, PB, LMP), pp. 1107–1119.
HCIDUXU-TMT-2014-ZellerGD #design
basil.js — Bridging Mouse and Code Based Design Strategies (LZ, BG, TD), pp. 686–696.
HCIHCI-AIMT-2014-KashimaMY #programming
Proposal of a Method to Measure Difficulty Level of Programming Code with Eye-Tracking (TK, SM, SY), pp. 264–272.
HCIHIMI-AS-2014-AraiKTKA #comprehension #development #learning #source code
Development of a Learning Support System for Source Code Reading Comprehension (TA, HK, TT, YK, TA), pp. 12–19.
HCIHIMI-DE-2014-WinterhollerBCM #adaptation
Information Coding by Means of Adaptive Controlling Torques (JW, JB, KC, TM), pp. 271–280.
VISSOFTVISSOFT-2014-HomerN
Combining Tiled and Textual Views of Code (MH, JN), pp. 1–10.
VISSOFTVISSOFT-2014-TartariTHKRFMBLB #visualisation
Mr. Clean: A Tool for Tracking and Comparing the Lineage of Scientific Visualization Code (GT, LT, EH, KK, IAR, BF, NM, JMB, EL, LAB), pp. 75–78.
CAiSECAiSE-2014-PadilhaPFAGS #detection #effectiveness #empirical #metric #on the #smell
On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
ICEISICEIS-v2-2014-BelgamoHZRF #abstraction #case study #visualisation
Code Inspection Supported by Stepwise Abstraction and Visualization — An Experimental Study (AB, EMH, AZ, RSR, SF), pp. 39–48.
ICMLICML-c2-2014-0001MS #random
Coding for Random Projections (PL, MM, AS), pp. 676–684.
ICMLICML-c2-2014-Cherian #nearest neighbour #using
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-MaddisonT #generative #modelling #source code
Structured Generative Models of Natural Source Code (CJM, DT), pp. 649–657.
ICPRICPR-2014-ChoiCKD #distance #towards
Toward Sparse Coding on Cosine Distance (JC, HC, JK, LSD), pp. 4423–4428.
ICPRICPR-2014-DuZCW #flexibility #learning #linear #random
Learning Flexible Binary Code for Linear Projection Based Hashing with Random Forest (SD, WZ, SC, YW), pp. 2685–2690.
ICPRICPR-2014-FuKGYZ #ranking
Binary Code Reranking Method Based on Bit Importance (HF, XK, YG, XY, LZ), pp. 2679–2684.
ICPRICPR-2014-HouHW #modelling #synthesis #video
Cloud Model-Based Dynamic Texture Synthesis for Video Coding (ZH, RH, ZW), pp. 838–842.
ICPRICPR-2014-KhanWBF #recognition
Scale Coding Bag-of-Words for Action Recognition (FSK, JvdW, ADB, MF), pp. 1514–1519.
ICPRICPR-2014-KimP #recognition
Ancient Coin Recognition Based on Spatial Coding (JK, VP), pp. 321–326.
ICPRICPR-2014-KusumotoHC #hybrid #recognition
Hybrid Aggregation of Sparse Coded Descriptors for Food Recognition (RK, XHH, YWC), pp. 1490–1495.
ICPRICPR-2014-LiWQ #visual notation
Visual Tracking via Saliency Weighted Sparse Coding Appearance Model (WL, PW, HQ), pp. 4092–4097.
ICPRICPR-2014-LuoJ #encoding #image #learning #retrieval #semantics
Learning Semantic Binary Codes by Encoding Attributes for Image Retrieval (JL, ZJ), pp. 279–284.
ICPRICPR-2014-LuoYQY
Nuclear Norm Regularized Sparse Coding (LL, JY, JQ, JY), pp. 1834–1839.
ICPRICPR-2014-MarroccoT #fault
Bit Error Recovery in ECOC Systems through LDPC Codes (CM, FT), pp. 1454–1459.
ICPRICPR-2014-RahmaniMHM #classification #linear
Action Classification with Locality-Constrained Linear Coding (HR, AM, DQH, ASM), pp. 3511–3516.
ICPRICPR-2014-Shirakawa #multi #performance #similarity #using
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-WalhaDLGA #approach #image #learning #taxonomy
Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
ICPRICPR-2014-WangJ
Attribute Augmentation with Sparse Coding (XW, QJ), pp. 4352–4357.
ICPRICPR-2014-WangWCY #geometry
Fingerprint Geometric Hashing Based on Binary Minutiae Cylinder Codes (YW, LW, YmC, PCY), pp. 690–695.
ICPRICPR-2014-Xiang0L #classification #hybrid #image
Local Hybrid Coding for Image Classification (WX, JW, ML), pp. 3744–3749.
KEODKEOD-2014-TakahashiTTL #automation #industrial #standard #web
An Automatic Coding System with a Three-Grade Confidence Level Corresponding to the National/International Occupation and Industry Standard — Open to the Public on the Web (KT, HT, ST, WL), pp. 369–375.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
SEKESEKE-2014-Al-MsiedeenSHUV #implementation #object-oriented #source code
Documenting the Mined Feature Implementations from the Object-oriented Source Code of a Collection of Software Product Variants (RAM, AS, MH, CU, SV), pp. 138–143.
SEKESEKE-2014-ParkHL #power management #refactoring
Investigation for Software Power Consumption of Code Refactoring Techniques (JJP, JEH, SHL), pp. 717–722.
SEKESEKE-2014-SantosBSC #game studies #learning #programming #semantics #source code
A Semantic Analyzer for Simple Games Source Codes to Programming Learning (ECOdS, GBB, VHVdS, EC), pp. 522–527.
SEKESEKE-2014-ZhuangZL #fine-grained #framework #layout #reuse #runtime
Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization (YZ, TZ, ZL), pp. 609–614.
SIGIRSIGIR-2014-LengCL #image #learning #random #retrieval #scalability
Random subspace for binary codes learning in large scale image retrieval (CL, JC, HL), pp. 1031–1034.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy #using
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-ZhangBBEHKW #code generation #concurrent #java #state machine #towards
Towards Verified Java Code Generation from Concurrent State Machines (DZ, DB, MvdB, LE, CH, RK, AW), pp. 64–69.
ICMTICMT-2014-GuanaS #analysis
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
SPLCSPLC-2014-AngererPLGG #dependence #graph #identification #product line
Identifying inactive code in product lines with configuration-aware system dependence graphs (FA, HP, DL, AG, PG), pp. 52–61.
SPLCSPLC-2014-HellebrandS0ZSS #case study #industrial #modelling #variability
Coevolution of variability models and code: an industrial case study (RH, AS, MB, BZ, KS, JS), pp. 274–283.
ECOOPECOOP-2014-NittaKT #framework #identification
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
ECOOPECOOP-2014-OkurED #abstraction #low level #parallel
Converting Parallel Code from Low-Level Abstractions to Higher-Level Abstractions (SO, CE, DD), pp. 515–540.
OOPSLAOOPSLA-2014-RadoiFRS #imperative #pipes and filters
Translating imperative code to MapReduce (CR, SJF, RMR, MS), pp. 909–927.
PLATEAUPLATEAU-2014-DornerFM #named
EUKLAS: Supporting Copy-and-Paste Strategies for Integrating Example Code (CD, AF, BAM), pp. 13–20.
PPDPPPDP-J-2012-Emden14 #matrix
Matrix Code (MHvE), pp. 3–21.
HILTHILT-2014-HuguesG #ada #modelling
Leveraging Ada 2012 and SPARK 2014 for assessing generated code from AADL models (JH, CG), pp. 39–46.
PADLPADL-2014-Clifton-EverestMCK
Embedding Foreign Code (RCE, TLM, MMTC, GK), pp. 136–151.
PEPMPEPM-2014-KameyamaKS #code generation #combinator
Combinators for impure yet hygienic code generation (YK, OK, CcS), pp. 3–14.
PLDIPLDI-2014-DavidY #bytecode #code search
Tracelet-based code search in executables (YD, EY), p. 37.
PLDIPLDI-2014-GreenawayLAK #c #verification
Don’t sweat the small stuff: formal verification of C code without the pain (DG, JL, JA, GK), p. 45.
PLDIPLDI-2014-RaychevVY #code completion #modelling #statistics
Code completion with statistical language models (VR, MTV, EY), p. 44.
ASEASE-2014-BajajPM #code completion #javascript #named
Dompletion: DOM-aware JavaScript code completion (KB, KP, AM), pp. 43–54.
ASEASE-2014-FalleriMBMM #difference #fine-grained #source code
Fine-grained and accurate source code differencing (JRF, FM, XB, MM, MM), pp. 313–324.
ASEASE-2014-HigoK #consistency #named #nondeterminism #source code
MPAnalyzer: a tool for finding unintended inconsistencies in program source code (YH, SK), pp. 843–846.
ASEASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
ASEASE-2014-PadhyeMS #modelling #named
NeedFeed: taming change notifications by modeling code relevance (RP, SM, VSS), pp. 665–676.
ASEASE-2014-RamaK #dynamic analysis #refactoring
A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
ASEASE-2014-TillmannHX #automation #generative #testing
Transferring an automated test generation tool to practice: from pex to fakes and code digger (NT, JdH, TX), pp. 385–396.
ASEASE-2014-WangLJ #code search #feedback
Active code search: incorporating user feedback to improve code search relevance (SW, DL, LJ), pp. 677–682.
FSEFSE-2014-AllamanisBBS #learning
Learning natural coding conventions (MA, ETB, CB, CAS), pp. 281–293.
FSEFSE-2014-AllamanisS #mining #source code
Mining idioms from source code (MA, CAS), pp. 472–483.
FSEFSE-2014-AlvesSK #code review #named #overview #refactoring
RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits (ELGA, MS, MK), pp. 751–754.
FSEFSE-2014-BaltesSD #diagrams #sketching #source code
Linking sketches and diagrams to source code artifacts (SB, PS, SD), pp. 743–746.
FSEFSE-2014-BosuCHHJ #empirical #identification
Identifying the characteristics of vulnerable code changes: an empirical study (AB, JCC, MH, PH, DJ), pp. 257–268.
FSEFSE-2014-FritzSKSB #developer #modelling
Developers’ code context models for change tasks (TF, DCS, KK, WS, CB), pp. 7–18.
FSEFSE-2014-HigoK #case study #functional #how #java #source code
How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
FSEFSE-2014-LuoMW0Z #comparison #detection #obfuscation #semantics #similarity
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
FSEFSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
FSEFSE-2014-Nguyen0NR #api #corpus #mining #scalability
Mining preconditions of APIs in large-scale code corpus (HAN, RD, TNN, HR), pp. 166–177.
FSEFSE-2014-NguyenKN #embedded #graph #web
Building call graphs for embedded client-side code in dynamic web applications (HVN, CK, TNN), pp. 518–529.
FSEFSE-2014-RayPFD #case study #git #programming language #quality #scalability
A large scale study of programming languages and code quality in github (BR, DP, VF, PTD), pp. 155–165.
FSEFSE-2014-YingR #summary
Selection and presentation practices for code example summarization (ATTY, MPR), pp. 460–471.
FSEFSE-2014-ZhangSK #code review #interactive #named #overview
Critics: an interactive code review tool for searching and inspecting systematic changes (TZ, MS, MK), pp. 755–758.
ICSEICSE-2014-GalensonRBHS #interactive #named #synthesis
CodeHint: dynamic and interactive synthesis of code snippets (JG, PR, RB, BH, KS), pp. 653–663.
ICSEICSE-2014-GopinathJG #developer #evaluation #test coverage
Code coverage for suite evaluation by developers (RG, CJ, AG), pp. 72–82.
ICSEICSE-2014-KeivanlooRZ
Spotting working code examples (IK, JR, YZ), pp. 664–675.
ICSEICSE-2014-LinXXLPSZ #detection #difference #multi
Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
ICSEICSE-2014-NegaraCDJ #detection #fine-grained #mining
Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
ICSEICSE-2014-RodegheroMMBD #automation #source code #summary
Improving automated source code summarization via an eye-tracking study of programmers (PR, CM, PWM, NB, SKD), pp. 390–401.
ICSEICSE-2014-SiegmundKAPBLSB #comprehension #functional #source code
Understanding understanding source code with functional magnetic resonance imaging (JS, CK, SA, CP, AB, TL, GS, AB), pp. 378–389.
SACSAC-2014-Al-RefaiCF #modelling #runtime #using
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-CaniGSST #automation #code generation #integration #towards
Towards automated malware creation: code generation and code integration (AC, MG, ES, GS, APT), pp. 157–160.
SACSAC-2014-CostaKAC #case study #commit #developer
Unveiling developers contributions behind code commits: an exploratory study (DAdC, UK, EA, RC), pp. 1152–1157.
SACSAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SACSAC-2014-HusemannR #multi #predict #scalability #video
Introduction of a multi-layer predictive search strategy for scalable video coding (RH, VR), pp. 985–986.
SACSAC-2014-KangI #dynamic analysis
Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SACSAC-2014-ParkPJ #artificial reality #education #online
QR-code based online robot augmented reality system for education (JPP, MWP, SKJ), pp. 180–185.
SACSAC-2014-PotocnikCS #debugging #named #problem #scala
Linter: a tool for finding bugs and potential problems in scala code (MP, UC, BS), pp. 1615–1616.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-WijenayakeP #estimation #using #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
GPCEGPCE-2014-SteindorferV #memory management #performance
Code specialization for memory efficient hash tries (MJS, JJV), pp. 11–14.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction #using
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
CCCC-2014-CharlesCLEG #code generation
deGoal a Tool to Embed Dynamic Code Generators into Applications (HPC, DC, VL, FAE, RG), pp. 107–112.
CCCC-2014-Dinechin #code generation #using
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SrinivasanR #composition
Recovery of Class Hierarchies and Composition Relationships from Machine Code (VS, TWR), pp. 61–84.
CCCC-2014-WangPFO #legacy #parallel
Exploitation of GPUs for the Parallelisation of Probably Parallel Legacy Code (ZW, DCP, BF, MFPO), pp. 154–173.
CGOCGO-2014-JimboreanKSBK #approach #compilation #hardware #scalability
Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
CGOCGO-2014-JuegaGTC #adaptation #automation #code generation #parametricity
Adaptive Mapping and Parameter Selection Scheme to Improve Automatic Code Generation for GPUs (JCJ, JIG, CT, FC), p. 251.
CGOCGO-2014-VenkatSHS #code generation
Non-affine Extensions to Polyhedral Code Generation (AV, MS, MWH, MMS), p. 185.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-EldibWTS #named #source code
QMS: Evaluating the Side-Channel Resistance of Masked Software from Source Code (HE, CW, MMIT, PS), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RehmanKSSH #adaptation #code generation #dependence #named #process #reliability
dTune: Leveraging Reliable Code Generation for Adaptive Dependability Tuning under Process Variation and Aging-Induced Effects (SR, FK, DS, MS, JH), p. 6.
DATEDATE-2014-BraojosDBAA #approach #hardware #manycore #power management
Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
DATEDATE-2014-GuoWWH #automation #effectiveness #named #test coverage
EATBit: Effective automated test for binary translation with high code coverage (HG, ZW, CW, RH), pp. 1–6.
DATEDATE-2014-HillerS #performance
Increasing the efficiency of syndrome coding for PUFs with helper data compression (MH, GS), pp. 1–6.
DATEDATE-2014-KhanSH #architecture #manycore #performance #power management #video
Software architecture of High Efficiency Video Coding for many-core systems with power-efficient workload balancing (MUKK, MS, JH), pp. 1–6.
DATEDATE-2014-LiM #memory management
Write-once-memory-code phase change memory (JL, KM), pp. 1–6.
DATEDATE-2014-LiuSXL #injection #programmable #thread
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy (ZL, WS, SX, ZL), pp. 1–6.
DATEDATE-2014-MaurichG #configuration management #encryption #lightweight
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices (IvM, TG), pp. 1–6.
DATEDATE-2014-MembarthRHT #android #architecture #code generation #embedded
Code generation for embedded heterogeneous architectures on android (RM, OR, FH, JT), pp. 1–6.
DATEDATE-2014-PalominoSASH #named #performance #video
hevcDTM: Application-driven Dynamic Thermal Management for High Efficiency Video Coding (DP, MS, HA, AAS, JH), pp. 1–4.
DATEDATE-2014-SampaioSZBH #architecture #distributed #energy #memory management #named #performance #video
dSVM: Energy-efficient distributed Scratchpad Video Memory Architecture for the next-generation High Efficiency Video Coding (FS, MS, BZ, SB, JH), pp. 1–6.
HPDCHPDC-2014-MuCWZ #network #replication #state machine
When paxos meets erasure code: reduce network and storage cost in state machine replication (SM, KC, YW, WZ), pp. 61–72.
LCTESLCTES-2014-KochFBD #reduction #similarity
Exploiting function similarity for code size reduction (TJKEvK, BF, PB, AD), pp. 85–94.
LCTESLCTES-2014-LozanoCBS #combinator #optimisation
Combinatorial spill code optimization and ultimate coalescing (RCL, MC, GHB, CS), pp. 23–32.
LCTESLCTES-2014-SpinkWFT #code generation #performance
Efficient code generation in a region-based dynamic binary translator (TS, HW, BF, NPT), pp. 3–12.
OSDIOSDI-2014-KuznetsovSPCSS
Code-Pointer Integrity (VK, LS, MP, GC, RS, DS), pp. 147–163.
PDPPDP-2014-DAmbrosioSPRFSIM #modelling #parallel
Lava Flow Modeling by the Sciara-Fv3 Parallel Numerical Code (DD, WS, RP, RR, GF, DS, GI, DM), pp. 330–338.
PDPPDP-2014-ShalabyRGFK #communication #network
Hierarchical Network Coding for Collective Communication on HPC Interconnects (AS, MESR, VG, IF, MK), pp. 98–102.
PPoPPPPoPP-2014-AgustonBH #parallel
Parallelization hints via code skeletonization (CA, YBA, GH), pp. 373–374.
STOCSTOC-2014-AggarwalDL #combinator
Non-malleable codes from additive combinatorics (DA, YD, SL), pp. 774–783.
STOCSTOC-2014-BravyiH
Homological product codes (SB, MBH), pp. 273–282.
STOCSTOC-2014-BunUV #approximate #difference #privacy
Fingerprinting codes and the price of approximate differential privacy (MB, JU, SPV), pp. 1–10.
STOCSTOC-2014-GhaffariHS #adaptation #fault #interactive
Optimal error rates for interactive coding I: adaptivity and other settings (MG, BH, MS), pp. 794–803.
STOCSTOC-2014-GuruswamiHHSV
Super-polylogarithmic hypergraph coloring hardness via low-degree long codes (VG, PH, JH, SS, GV), pp. 614–623.
STOCSTOC-2014-RudraW
Every list-decodable code for high noise has abundant near-optimal rate puncturings (AR, MW), pp. 764–773.
CAVCAV-2014-FilliatreGP
The Spirit of Ghost Code (JCF, LG, AP), pp. 1–16.
ICSTICST-2014-MiicBT #analysis #automation #multi #platform #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSSICTSS-2014-El-FakihSY #assessment #automaton #on the #test coverage #testing
On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment (KEF, TS, NY), pp. 198–204.
ISSTAISSTA-2014-BaudryAM #program transformation #source code
Tailored source code transformations to synthesize computationally diverse program variants (BB, SA, MM), pp. 149–159.
ISSTAISSTA-2014-MarinescuHC #analysis #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TillmannHXB
Constructing coding duels in Pex4Fun and code hunt (NT, JdH, TX, JB), pp. 445–448.
ISSTAISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
VMCAIVMCAI-2014-Romano #float #integer #testing
Practical Floating-Point Tests with Integer Code (AR), pp. 337–356.
CBSECBSE-2013-GortonLLED #case study #component #experience #platform #using
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
ICDARICDAR-2013-KumarBTMNJ #documentation #image
Sparse Document Image Coding for Restoration (VK, AB, GHT, AM, AMN, CVJ), pp. 713–717.
ICDARICDAR-2013-ShekharJ #documentation #retrieval #word
Document Specific Sparse Coding for Word Retrieval (RS, CVJ), pp. 643–647.
ICDARICDAR-2013-WalhaDLGA #clustering #image #multi
Multiple Learned Dictionaries Based Clustered Sparse Coding for the Super-Resolution of Single Text Image (RW, FD, FL, CG, AMA), pp. 484–488.
VLDBVLDB-2013-SathiamoorthyAPDVCB #big data #novel
XORing Elephants: Novel Erasure Codes for Big Data (MS, MA, DSP, AGD, RV, SC, DB), pp. 325–336.
CSEETCSEET-2013-FritzBD
Explorable Code Slides (MF, BB, SD), pp. 199–208.
ITiCSEITiCSE-2013-EsperFG #named #programming
CodeSpells: embodying the metaphor of wizardry for programming (SE, SRF, WGG), pp. 249–254.
ITiCSEITiCSE-2013-Kumar #case study #problem
A study of the influence of code-tracing problems on code-writing skills (ANK), pp. 183–188.
ITiCSEITiCSE-2013-Law #interactive #using
Interactive lectures using quick response codes (RL), p. 317.
ITiCSEITiCSE-2013-ScottG #learning #programming #question
Implicit theories of programming aptitude as a barrier to learning to code: are they distinct from intelligence? (MJS, GG), p. 347.
ITiCSEITiCSE-2013-VihavainenVLP #learning #student #using
Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
SIGITESIGITE-2013-HeinonenHLV #agile #learning #re-engineering #using
Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
CSMRCSMR-2013-AnicheOG #case study #industrial #open source #quality #testing #what
What Do the Asserts in a Unit Test Tell Us about Code Quality? A Study on Open Source and Industrial Projects (MFA, GAO, MAG), pp. 111–120.
CSMRCSMR-2013-AsgharMSS #metric #requirements #traceability #using
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMRCSMR-2013-BertranGCS #architecture #detection
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMRCSMR-2013-KazatoHKOOMHS #feature model #identification #incremental #source code
Incremental Feature Location and Identification in Source Code (HK, SH, TK, TO, SO, SM, TH, MS), pp. 371–374.
CSMRCSMR-2013-MazzeoTBS #source code
Linking E-Mails and Source Code with LASCO (LM, AT, RB, GS), pp. 421–424.
CSMRCSMR-2013-Molitorisz #process #refactoring #source code
Pattern-Based Refactoring Process of Sequential Source Code (KM), pp. 357–360.
CSMRCSMR-2013-OuniKS #refactoring #search-based #using
Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMRCSMR-2013-Pichler #documentation #experience #fortran #industrial #source code
Extraction of Documentation from Fortran 90 Source Code: An Industrial Experience (JP), pp. 399–402.
CSMRCSMR-2013-ScannielloGT #comprehension #diagrams #sequence chart #source code
An Early Investigation on the Contribution of Class and Sequence Diagrams in Source Code Comprehension (GS, CG, GT), pp. 367–370.
CSMRCSMR-2013-ThungBLJ #git #network #social
Network Structure of Social Coding in GitHub (FT, TFB, DL, LJ), pp. 323–326.
CSMRCSMR-2013-TothNFS #source code #using #version control
Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPCICPC-2013-BeckMDR #comprehension #performance #visual notation
In situ understanding of performance bottlenecks through visually augmented code (FB, OM, SD, GDR), pp. 63–72.
ICPCICPC-2013-BernhartG #code review #comprehension #on the #source code
On the understanding of programs with continuous code reviews (MB, TG), pp. 192–198.
ICPCICPC-2013-DiazBMOTL #traceability #using
Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICPCICPC-2013-EddyRKC #replication #source code #summary
Evaluating source code summarization techniques: Replication and expansion (BPE, JAR, NAK, JCC), pp. 13–22.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-SteidlHJ #analysis #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AlhindawiDCM #feature model #source code
Improving Feature Location by Enhancing Source Code with Stereotypes (NA, ND, MLC, JIM), pp. 300–309.
ICSMEICSM-2013-AsaduzzamanRSP #approach #hybrid #independence #named #source code
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
ICSMEICSM-2013-AsaduzzamanRSP13a #maintenance #named #process #source code
LHDiff: Tracking Source Code Lines to Support Software Maintenance Activities (MA, CKR, KAS, MDP), pp. 484–487.
ICSMEICSM-2013-Beck #analysis #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-FontanaFMWM #empirical #quality #smell
Investigating the Impact of Code Smells on System’s Quality: An Empirical Study on Systems of Different Application Domains (FAF, VF, AM, BW, PM), pp. 260–269.
ICSMEICSM-2013-FontanaZMM #approach #detection #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-Harder #developer #evolution #how #multi
How Multiple Developers Affect the Evolution of Code Clones (JH), pp. 30–39.
ICSMEICSM-2013-Hegedus #maintenance
Revealing the Effect of Coding Practices on Software Maintainability (PH), pp. 578–581.
ICSMEICSM-2013-LiguCCY #identification #smell
Identification of Refused Bequest Code Smells (EL, AC, TC, NY), pp. 392–395.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #analysis #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-MorenoBHM #debugging #on the #source code
On the Relationship between the Vocabulary of Bug Reports and Source Code (LM, WB, SH, AM), pp. 452–455.
ICSMEICSM-2013-Roldan-VegaMHF #code search #named #query #refinement
CONQUER: A Tool for NL-Based Query Refinement and Contextualizing Code Search Results (MRV, GM, EH, JAF), pp. 512–515.
ICSMEICSM-2013-ScannielloR #fault #identifier #source code
Dealing with Faults in Source Code: Abbreviated vs. Full-Word Identifier Names (GS, MR), pp. 190–199.
ICSMEICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-Yamashita #case study #comparative #how #maintenance #smell
How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case Study (AY), pp. 566–571.
ICSMEICSM-2013-YukselS #analysis #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-AllamanisS #stack overflow #topic #what #why
Why, when, and what: analyzing stack overflow questions by topic, type, and code (MA, CAS), pp. 53–56.
MSRMSR-2013-AllamanisS13a #mining #modelling #repository #source code #using
Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSRMSR-2013-HamasakiKYCFI #code review #dataset #overview #repository #what
Who does what during a code review? datasets of OSS peer review repositories (KH, RGK, NY, AECC, KF, HI), pp. 49–52.
MSRMSR-2013-HerzigZ #co-evolution
The impact of tangled code changes (KH, AZ), pp. 121–130.
MSRMSR-2013-HowardGPV #automation #mining #semantics #word
Automatically mining software-based, semantically-similar words from comment-code mappings (MJH, SG, LLP, KVS), pp. 377–386.
MSRMSR-2013-JanjicHSA #dataset #research #reuse #source code
An unabridged source code dataset for research in software reuse (WJ, OH, MS, CA), pp. 339–342.
MSRMSR-2013-KhooMA #named
Rendezvous: a search engine for binary code (WMK, AM, RJA), pp. 329–338.
MSRMSR-2013-MukadamBR #android #code review #overview
Gerrit software code review data from Android (MM, CB, PCR), pp. 45–48.
MSRMSR-2013-SismanK #automation #code search #debugging #locality #query
Assisting code search with automatic query reformulation for bug localization (BS, ACK), pp. 309–318.
MSRMSR-2013-SubramanianH #online
Making sense of online code snippets (SS, RH), pp. 85–88.
MSRMSR-2013-WangDZCXZ #api #mining #source code
Mining succinct and high-coverage API usage patterns from source code (JW, YD, HZ, KC, TX, DZ), pp. 319–328.
PASTEPASTE-2013-YasugiMU #evaluation #performance
A proper performance evaluation system that summarizes code placement effects (MY, YM, TU), pp. 41–48.
SCAMSCAM-2013-AnnervazKMSTM #clustering
Code clustering workbench (KMA, VSK, JM, SS, GT, AM), pp. 31–36.
SCAMSCAM-2013-Balachandran #component #named #overview
Fix-it: An extensible code auto-fix component in Review Bot (VB), pp. 167–172.
SCAMSCAM-2013-BaloghB #named #visualisation
CodeMetropolis — code visualisation in MineCraft (GB, ÁB), pp. 136–141.
SCAMSCAM-2013-CeruloCPC #detection #markov
A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
SCAMSCAM-2013-FabryRJ #analysis #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-FardM #detection #javascript #named #smell
JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
WCREWCRE-2013-BandiWA #empirical
Empirical evidence of code decay: A systematic mapping study (AB, BJW, EBA), pp. 341–350.
WCREWCRE-2013-BaysalKHG #code review #overview #perspective
The influence of non-technical factors on code review (OB, OK, RH, MWG), pp. 122–131.
WCREWCRE-2013-ChatterjiCKH #case study #developer #maintenance
Effects of cloned code on software maintainability: A replicated developer study (DC, JCC, NAK, JH), pp. 112–121.
WCREWCRE-2013-IshiharaHHK #reuse
Reusing reused code (TI, KH, YH, SK), pp. 457–461.
WCREWCRE-2013-JiangZL #comprehension #social
Understanding project dissemination on a social coding site (JJ, LZ, LL), pp. 132–141.
WCREWCRE-2013-KomondoorBDK #domain model #modelling #using
Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCREWCRE-2013-KrutzS #clone detection #detection #named
CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
WCREWCRE-2013-YamashitaM #developer #overview #smell
Do developers care about code smells? An exploratory survey (AFY, LM), pp. 242–251.
DLTDLT-J-2012-GeffertP13
Unary Coded NP-Complete Languages in Aspace(log log n) (VG, DP), p. 1167–?.
CIAACIAA-2013-Jurgensen #automaton
Automata for Codes (HJ), pp. 2–15.
DLTDLT-2013-AnselmoGM #2d
Two Dimensional Prefix Codes of Pictures (MA, DG, MM), pp. 46–57.
ICALPICALP-v1-2013-HemenwayOW
Local Correctability of Expander Codes (BH, RO, MW), pp. 540–551.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis #using
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
IFLIFL-2013-GrelckW #adaptation #array #functional #generative #performance
Next Generation Asynchronous Adaptive Specialization for Data-Parallel Functional Array Processing in SAC: Accelerating the Availability of Specialized High Performance Code (CG, HW), p. 117.
CHICHI-2013-KatoSI #named #representation #source code
Picode: inline photos representing posture data in source code (JK, DS, TI), pp. 3097–3100.
CHICHI-2013-MeeseATBQMKPB #design #interactive
From codes to patterns: designing interactive decoration for tableware (RM, SA, ECT, SB, AQ, RM, BK, TPP, SB), pp. 931–940.
CSCWCSCW-2013-HillM #collaboration #community #cost analysis
The cost of collaboration for code and art: evidence from a remixing community (BMH, AMH), pp. 1035–1046.
HCIDUXU-PMT-2013-Flanagan #feedback #how #interface
Haptic Interface Aesthetics — “Feedback Loops, Live Coding and How to Harness the Potential of Embodied Estrangement in Artistic Practices and Aesthetic Theories within Interface Culture” (PJF), pp. 58–67.
HCIHCI-III-2013-BockLSWW #automation #classification
Audio-Based Pre-classification for Semi-automatic Facial Expression Coding (RB, KLE, IS, SW, AW), pp. 301–309.
HCIHIMI-D-2013-HiranoNN #development #evaluation #tool support
Evaluation of System Engineers’ Intellectual Productivity — Focusing on Coding Procedures in Application Development Tools (RH, YN, MN), pp. 305–315.
VISSOFTVISSOFT-2013-AbuthawabehBZD #matrix #multi #visualisation
Finding structures in multi-type code couplings with node-link and matrix visualizations (AA, FB, DZ, SD), pp. 1–10.
VISSOFTVISSOFT-2013-BaloghB #collaboration #developer #named
CodeMetrpolis — A minecraft based collaboration tool for developers (GB, ÁB), pp. 1–4.
VISSOFTVISSOFT-2013-BeckHDW #embedded #monitoring #source code #visual notation
Visual monitoring of numeric variables embedded in source code (FB, FH, SD, DW), pp. 1–4.
VISSOFTVISSOFT-2013-Hanjalic #evolution #named #visualisation
ClonEvol: Visualizing software evolution with code clones (AH), pp. 1–4.
VISSOFTVISSOFT-2013-ReissT13a #tool support #visualisation
Tool demonstration: The visualizations of code bubbles (SPR, AT), pp. 1–4.
VISSOFTVISSOFT-2013-ServantJ #named #slicing #source code #visualisation
Chronos: Visualizing slices of source-code history (FS, JAJ), pp. 1–4.
CAiSECAiSE-2013-PapottiPSCP #analysis #code generation #modelling
A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
ICEISICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICMLICML-c1-2013-MehtaG #bound #predict
Sparsity-Based Generalization Bounds for Predictive Sparse Coding (NAM, AGG), pp. 36–44.
ICMLICML-c2-2013-MaurerPR #learning #multi
Sparse coding for multitask and transfer learning (AM, MP, BRP), pp. 343–351.
ICMLICML-c3-2013-BalasubramanianYL #learning
Smooth Sparse Coding via Marginal Regression for Learning Sparse Representations (KB, KY, GL), pp. 289–297.
ICMLICML-c3-2013-HoXV #learning #on the #taxonomy
On A Nonlinear Generalization of Sparse Coding and Dictionary Learning (JH, YX, BCV), pp. 1480–1488.
ICMLICML-c3-2013-JiaVD #on the
On Compact Codes for Spatially Pooled Features (YJ, OV, TD), pp. 549–557.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-TerraBMVSCB #similarity #source code
Measuring the Structural Similarity between Source Code Entities (RT, JB, LFM, MTV, DS, DC, RdSB), pp. 753–758.
SEKESEKE-2013-YuanYL #debugging #fine-grained #predict #source code
Bug Prediction for Fine-Grained Source Code Changes (ZY, LY, CL), pp. 381–387.
SKYSKY-2013-YagelLE #generative #named
KoDEgen: A Knowledge Driven Engineering Code Generating Tool (RY, AL, IE), pp. 24–33.
MODELSMoDELS-2013-PiresPWD #behaviour #embedded #source code #verification
Behavioural Verification in Embedded Software, from Model to Source Code (AFP, TP, VW, SD), pp. 320–335.
SPLCSPLC-2013-KandaII #evolution #source code
Extraction of product evolution tree from source code of product variants (TK, TI, KI), pp. 141–150.
SPLCSPLC-2013-LinsbauerLE #traceability
Recovering traceability between features and code in product variants (LL, RELH, AE), pp. 131–140.
SPLCSPLC-2013-TsuchiyaKWKFY #requirements #source code #traceability
Recovering traceability links between requirements and source code in the same series of software products (RT, TK, HW, MK, YF, KY), pp. 121–130.
OOPSLAOOPSLA-2013-NollG #java #online #optimisation #parallel
Online feedback-directed optimizations for parallel Java code (AN, TRG), pp. 713–728.
OOPSLAOOPSLA-2013-ShiBH #optimisation #using
Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
OOPSLAOOPSLA-2013-UrecheTO #morphism #named #parametricity #polymorphism #trade-off
Miniboxing: improving the speed to code size tradeoff in parametric polymorphism translations (VU, CT, MO), pp. 73–92.
HILTHILT-2013-Logozzo #contract #specification #verification
Practical specification and verification with code contracts (FL), pp. 7–8.
HILTHILT-2013-Logozzo13a #contract
Technology for inferring contracts from code (FL), pp. 13–14.
PLDIPLDI-2013-KongVSFPS #code generation
When polyhedral transformations meet SIMD code generation (MK, RV, KS, FF, LNP, PS), pp. 127–138.
POPLPOPL-2013-JensenBK #logic #low level
High-level separation logic for low-level code (JBJ, NB, AK), pp. 301–314.
REFSQREFSQ-2013-DelaterP #development #perspective #requirements #research #source code
Analyzing the Tracing of Requirements and Source Code during Software Development — A Research Preview (AD, BP), pp. 308–314.
ASEASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
ASEASE-2013-NguyenNNNR #case study #evolution
A study of repetitiveness of code changes in software evolution (HAN, ATN, TTN, TNN, HR), pp. 180–190.
ASEASE-2013-PalombaBPOLP #detection #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-PilgrimUTS #approach #co-evolution
Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
ASEASE-2013-RayKPR #consistency #detection #nondeterminism #semantics
Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
ASEASE-2013-ZhangPXJWZ #monitoring #on-demand #towards
Towards contextual and on-demand code clone management by continuous monitoring (GZ, XP, ZX, SJ, HW, WZ), pp. 497–507.
ESEC-FSEESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability
Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSEESEC-FSE-2013-NguyenNNN #semantics #source code #statistics
A statistical semantic language model for source code (TTN, ATN, HAN, TNN), pp. 532–542.
ESEC-FSEESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical
An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSEESEC-FSE-2013-SchafSW #consistency
Explaining inconsistent code (MS, DSN, TW), pp. 521–531.
ESEC-FSEESEC-FSE-2013-YingR #summary
Code fragment summarization (ATTY, MPR), pp. 655–658.
ICSEICSE-2013-BacchelliB #challenge #code review #overview #perspective
Expectations, outcomes, and challenges of modern code review (AB, CB), pp. 712–721.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-Ciccozzi #modelling #uml
From models to code and back: correct-by-construction code from UML and ALF (FC), pp. 1459–1461.
ICSEICSE-2013-Guana #code generation #maintenance
Supporting maintenance tasks on transformational code generation environments (VG), pp. 1369–1372.
ICSEICSE-2013-Guerrouj #comprehension #normalisation #quality #source code
Normalizing source code vocabulary to support program comprehension and software quality (LG), pp. 1385–1388.
ICSEICSE-2013-HaiducRBOLM #code search #predict #quality #query #source code
Query quality prediction and reformulation for source code search: the refoqus tool (SH, GDR, GB, RO, ADL, AM), pp. 1307–1310.
ICSEICSE-2013-LeeHKM #code completion #navigation
Temporal code completion and navigation (YYL, SH, SK, DM), pp. 1181–1184.
ICSEICSE-2013-LeeKS #named #recommendation #visual notation
NavClus: a graphical recommender for assisting code exploration (SL, SK, MS), pp. 1315–1318.
ICSEICSE-2013-PhamSLFS #comprehension #social #testing
Creating a shared understanding of testing culture on a social coding site (RP, LS, OL, FMFF, KS), pp. 112–121.
ICSEICSE-2013-PhamSS #commit #social #testing
Building test suites in social coding sites by leveraging drive-by commits (RP, LS, KS), pp. 1209–1212.
ICSEICSE-2013-RahmanARP #case study #on the
On the relationships between domain-based coupling and code clones: an exploratory study (MSR, AA, CKR, FP), pp. 1265–1268.
ICSEICSE-2013-RastkarM #question #why
Why did this code change? (SR, GCM), pp. 1193–1196.
ICSEICSE-2013-RigbyR #documentation
Discovering essential code elements in informal documentation (PCR, MPR), pp. 832–841.
ICSEICSE-2013-Sanchez04a #code search #named
SNIPR: complementing code search with code retargeting capabilities (HS), pp. 1423–1426.
ICSEICSE-2013-SawadskyMJ #named #recommendation #web
Reverb: recommending code-related web pages (NS, GCM, RJ), pp. 812–821.
ICSEICSE-2013-StaplesKKLAMJB #specification
Formal specifications better than function points for code sizing (MS, RK, GK, CL, JA, TCM, DRJ, LB), pp. 1257–1260.
ICSEICSE-2013-SukkerdBWZB #comprehension
Understanding regression failures through test-passing and test-failing code changes (RS, IB, JW, SZ, YB), pp. 1177–1180.
ICSEICSE-2013-ZhengZ #detection #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
SACSAC-2013-BhattacharjeeJ #algorithm #named #repository #scalability #similarity
CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositories (AB, HMJ), pp. 846–852.
SACSAC-2013-CiraciV #code generation #points-to
Exploiting points-to maps for de-/serialization code generation (SC, OV), pp. 1712–1719.
SACSAC-2013-HoffmannUHS #slicing
Slicing droids: program slicing for smali code (JH, MU, TH, MS), pp. 1844–1851.
SACSAC-2013-JancewiczKMRS #execution
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (RJJ, AK, LDM, AR, AAS), pp. 1816–1823.
LDTALDTA-J-2009-ChilowiczDR #sequence #source code
Viewing functions as token sequences to highlight similarities in source code (MC, ÉD, GR), pp. 1871–1891.
GPCEGPCE-2013-0001RN #abstract syntax tree #declarative #fine-grained #mining #source code
Declarative visitors to ease fine-grained source code mining with full history on billions of AST nodes (RD, HR, TNN), pp. 23–32.
CCCC-2013-BaranyK #heuristic
Optimal and Heuristic Global Code Motion for Minimal Spilling (GB, AK), pp. 21–40.
CCCC-2013-KempfVP #identification #parallel
Compiler-Guided Identification of Critical Sections in Parallel Code (SK, RV, MP), pp. 204–223.
CGOCGO-2013-KruijfS #analysis #code generation #evaluation #implementation
Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
DACDAC-2013-BombieriLFC #c++ #synthesis
A method to abstract RTL IP blocks into C++ code and enable high-level synthesis (NB, HYL, FF, LPC), p. 9.
DACDAC-2013-NajjarV #compilation #perspective
FPGA code accelerators — the compiler perspective (WAN, JRV), p. 6.
DACDAC-2013-Wang #fault #reliability
Hierarchical decoding of double error correcting codes for high speed reliable memories (ZW), p. 7.
DATEDATE-2013-DoganBCABA #analysis #embedded #execution #multi #platform #power management
Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATEDATE-2013-KumarK #3d
Crosstalk avoidance codes for 3D VLSI (RK, SPK), pp. 1673–1678.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability #using
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-SampaioZSABH #energy #estimation #memory management #multi #video
Energy-efficient memory hierarchy for motion and disparity estimation in multiview video coding (FS, BZ, MS, LVA, SB, JH), pp. 665–670.
HPCAHPCA-2013-JacobvitzCS #memory management
Coset coding to extend the lifetime of memory (ANJ, ARC, DJS), pp. 222–233.
HPCAHPCA-2013-KayaalpSNPA #architecture #named #reuse
SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
PDPPDP-2013-RenesseJNJ #abstraction
Secure Abstraction with Code Capabilities (RvR, HDJ, NN, DJ), pp. 542–546.
PDPPDP-2013-SuboticSLV #data flow #identification #modelling #programming
Identifying Critical Code Sections in Dataflow Programming Models (VS, JCS, JL, MV), pp. 29–37.
FASEFASE-2013-SakamotoTHWF #code generation #integration #named #testing #web
POGen: A Test Code Generator Based on Template Variable Coverage in Gray-Box Integration Testing for Web Applications (KS, KT, DH, HW, YF), pp. 343–358.
STOCSTOC-2013-Ben-SassonGKKS #algebra #geometry #product line
A new family of locally correctable codes based on degree-lifted algebraic geometry codes (EBS, AG, YK, SK, SS), pp. 833–842.
STOCSTOC-2013-Wootters #fault #linear #on the #random #scalability
On the list decodability of random linear codes with large error rates (MW), pp. 853–860.
CAVCAV-2013-BiondiLTW #imperative #named #security
QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
ICTSSICTSS-2013-MauserKH #programming #towards #user interface #using
Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ISSTAISSTA-2013-GligoricZPP #concurrent #mutation testing #testing
Selective mutation testing for concurrent code (MG, LZ, CP, GP), pp. 224–234.
ISSTAISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
QoSAQoSA-2012-Abi-AntounAH #case study #experience #graph #object-oriented
Extraction of ownership object graphs from object-oriented code: an experience report (MAA, NA, ZH), pp. 133–142.
WICSA-ECSAWICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling
Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSAWICSA-ECSA-2012-GhabiE #architecture #modelling #nondeterminism #traceability
Exploiting Traceability Uncertainty between Architectural Models and Code (AG, AE), pp. 171–180.
WICSA-ECSAWICSA-ECSA-2012-KebirSCC #approach #component #identification #object-oriented
Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2012-SimantaLMHS #architecture #mobile
A Reference Architecture for Mobile Code Offload in Hostile Environments (SS, GAL, EJM, KH, MS), pp. 282–286.
DocEngDocEng-2012-OliveiraGL #automation #towards
Toward automated schema-directed code revision (RO, PG, NL), pp. 103–106.
CSEETCSEET-2012-RongLXZ #bibliography #code review #empirical #student
The Effect of Checklist in Code Review for Inexperienced Students: An Empirical Study (GR, JL, MX, TZ), pp. 120–124.
ITiCSEITiCSE-2012-Law #interactive #student #using
Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSEITiCSE-2012-PoonSTK #corpus #detection #source code
Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
ITiCSEITiCSE-2012-Sudol-DeLyserSC #comprehension #learning #problem
Code comprehension problems as learning events (LASD, MS, SC), pp. 81–86.
WCREWCRE-J-2009-BettenburgSIAZH12 #consistency #empirical
An empirical study on inconsistent changes to code clones at the release level (NB, WS, WMI, BA, YZ, AEH), pp. 760–776.
CSMRCSMR-2012-BertranAGCS #architecture #identification #on the
On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms (IMB, RA, AG, CC, AvS), pp. 277–286.
CSMRCSMR-2012-BettenburgTH #code search #fuzzy #source code #using
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMRCSMR-2012-DeissenboeckHHW #challenge #detection
Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
CSMRCSMR-2012-KarusD #predict #xml
Predicting Coding Effort in Projects Containing XML (SK, MD), pp. 203–212.
CSMRCSMR-2012-PetersZ #mining #repository #smell #using
Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
CSMRCSMR-2012-YoshidaKI #approach #functional #maintenance #metric #source code
A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
CSMRCSMR-2012-ZiadiFSZ #identification #source code
Feature Identification from the Source Code of Product Variants (TZ, LF, MAAdS, MZ), pp. 417–422.
ICPCICPC-2012-CorleyKK #modelling #source code #topic
Modeling the ownership of source code topics (CSC, EAK, NAK), pp. 173–182.
ICPCICPC-2012-IshioEI #data flow #interprocedural #lightweight #source code #visualisation
A lightweight visualization of interprocedural data-flow paths for source code reading (TI, SE, KI), pp. 37–46.
ICPCICPC-2012-Keivanloo #clone detection #code search #detection #source code
Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code #using
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPCICPC-2012-NogueraRKJ #query #uml
Code querying by UML (CN, CDR, AK, VJ), pp. 229–238.
ICPCICPC-2012-PanichellaAPMC #developer #mining #source code
Mining source code descriptions from developer communications (SP, JA, MDP, AM, GC), pp. 63–72.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICPCICPC-2012-SharafiSGA #identifier #source code #women
Women and men — Different but equal: On the impact of identifier style on source code reading (ZS, ZS, YGG, GA), pp. 27–36.
ICPCICPC-2012-Zhang #product line
Extraction and improvement of conditionally compiled product line code (BZ), pp. 257–258.
ICSMEICSM-2012-Al-KofahiNNNN #detection #semantics
Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
ICSMEICSM-2012-AlalfiCDSS #clone detection #detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
ICSMEICSM-2012-BertranACGS #architecture #identification
Supporting the identification of architecturally-relevant code anomalies (IMB, RA, EC, AG, AvS), pp. 662–665.
ICSMEICSM-2012-BeszedesGSJLG #test coverage #testing
Code coverage-based regression test selection and prioritization in WebKit (ÁB, TG, LS, JJ, LL, TG), pp. 46–55.
ICSMEICSM-2012-BoomsmaHG #industrial #lessons learnt #php #web
Dead code elimination for web systems written in PHP: Lessons learned from an industry case (HB, BVH, HGG), pp. 511–515.
ICSMEICSM-2012-DhaliwalKZH #commit #dependence #integration #product line
Recovering commit dependencies for selective code integration in software product lines (TD, FK, YZ, AEH), pp. 202–211.
ICSMEICSM-2012-HamiltonD #community #dependence #source code
Dependence communities in source code (JH, SD), pp. 579–582.
ICSMEICSM-2012-HayashiOZMS #refactoring #source code
Refactoring edit history of source code (SH, TO, TZ, KM, MS), pp. 617–620.
ICSMEICSM-2012-HermansPD #detection #smell #spreadsheet
Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
ICSMEICSM-2012-HigoK #consistency #detection #how #nondeterminism
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
ICSMEICSM-2012-KimuraHIK #dynamic analysis #refactoring
Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
ICSMEICSM-2012-KuangMHGHJE #comprehension #dependence #question #requirements #source code #traceability
Do data dependencies in source code complement call dependencies for understanding requirements traceability? (HK, PM, HH, AG, LH, JL, AE), pp. 181–190.
ICSMEICSM-2012-Linares-VasquezHDKGP #commit #debugging #question
Triaging incoming change requests: Bug or commit history, or code authorship? (MLV, KH, HD, HHK, MG, DP), pp. 451–460.
ICSMEICSM-2012-NasehiSMB #case study #programming #stack overflow #what
What makes a good code example?: A study of programming Q&A in StackOverflow (SMN, JS, FM, CB), pp. 25–34.
ICSMEICSM-2012-OmoriKM #case study #code completion
A study on repetitiveness of code completion operations (TO, HK, KM), pp. 584–587.
ICSMEICSM-2012-QuAR #impact analysis #testing #using
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RamaKVP #detection #source code #version control
Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
ICSMEICSM-2012-YamashitaM #aspect-oriented #maintenance #question #smell
Do code smells reflect important maintainability aspects? (AFY, LM), pp. 306–315.
MSRMSR-2012-Breckel #comparison #database #debugging #detection #fault #mining #scalability
Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
MSRMSR-2012-GigerPG #analysis #empirical #predict
Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
SCAMSCAM-2012-GethersAP #concept #database #dependence #detection
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
SCAMSCAM-2012-MayerS #analysis #refactoring
Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAMSCAM-2012-MurakamiHHIK #clone detection #detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCREWCRE-2012-AmmarA #diagrams #empirical #evaluation #runtime
Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks (NA, MAA), pp. 367–376.
WCREWCRE-2012-CapiluppiFB #effectiveness #java #obfuscation
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations (AC, PF, CB), pp. 71–80.
WCREWCRE-2012-FavreLLSV #documentation #source code
Linking Documentation and Source Code in a Software Chrestomathy (JMF, RL, ML, TS, AV), pp. 335–344.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-IchiiMNCO #approach #automation #modelling #rule-based #source code
A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
WCREWCRE-2012-RomanoRPK #fine-grained #source code #using
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
DLTDLT-2012-GeffertP
Unary Coded NP-Complete Languages in ASPACE (log log n) (VG, DP), pp. 166–177.
DLTDLT-2012-GiambrunoMNS #bidirectional #finite
A Generalization of Girod’s Bidirectional Decoding Method to Codes with a Finite Deciphering Delay (LG, SM, JN, CS), pp. 471–476.
SEFMSEFM-2012-PaulSS #assembly #automation #verification
Completing the Automated Verification of a Small Hypervisor — Assembler Code Verification (WJP, SS, AS), pp. 188–202.
CHICHI-2012-OneyB #documentation #editing #interactive #named
Codelets: linking interactive documentation and example code in the editor (SO, JB), pp. 2697–2706.
CSCWCSCW-2012-DabbishSTH #collaboration #git #repository #social
Social coding in GitHub: transparency and collaboration in an open software repository (LAD, HCS, JT, JDH), pp. 1277–1286.
CAiSECAiSE-2012-PastorE #code generation #modelling #requirements
Full Model-Driven Practice: From Requirements to Code Generation (OP, SE), pp. 701–702.
ICEISICEIS-J-2012-YiasemisA12a #execution #fault #mutation testing #slicing #testing
Locating and Correcting Software Faults in Executable Code Slices via Evolutionary Mutation Testing (PSY, ASA), pp. 207–227.
ICMLICML-2012-GoodfellowCB #learning #scalability
Large-Scale Feature Learning With Spike-and-Slab Sparse Coding (IJG, ACC, YB), p. 180.
ICMLICML-2012-McAfeeO #code generation #network #static analysis
Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
ICMLICML-2012-XuL #multi
Conditional Sparse Coding and Grouped Multivariate Regression (MX, JDL), p. 116.
ICMLICML-2012-ZhangS
Maximum Margin Output Coding (YZ, JGS), p. 53.
ICPRICPR-2012-ArpitSF #rank #recognition
Locality-constrained Low Rank Coding for face recognition (DA, GS, YF), pp. 1687–1690.
ICPRICPR-2012-DingLHXW #recognition #video
Context-aware horror video scene recognition via cost-sensitive sparse coding (XD, BL, WH, WX, ZW), pp. 1904–1907.
ICPRICPR-2012-DuanWLDC #learning #named
K-CPD: Learning of overcomplete dictionaries for tensor sparse coding (GD, HW, ZL, JD, YWC), pp. 493–496.
ICPRICPR-2012-HoritaMMKOKT #3d #metric #robust
Coded aperture for projector and camera for robust 3D measurement (YH, YM, HM, HK, SO, MK, YT), pp. 1487–1491.
ICPRICPR-2012-HouHWH #synthesis #video
Improvements of dynamic texture synthesis for video coding (ZH, RH, ZW, ZH), pp. 3148–3151.
ICPRICPR-2012-LinSCLH #recognition #using
Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPRICPR-2012-LiuW12b #performance #recognition #robust
Accelerated robust sparse coding for fast face recognition (GL, YY, HW), pp. 3394–3397.
ICPRICPR-2012-LiuWXZS #classification
Soft-signed sparse coding for ground-based cloud classification (SL, CW, BX, ZZ, YS), pp. 2214–2217.
ICPRICPR-2012-LuHLC #recognition #using
Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPRICPR-2012-NaitoKSS #using
Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPRICPR-2012-OuYCPGJ #image #representation
Structured sparse coding for image representation based on L1-graph (WO, XY, YmC, QP, MG, XJ), pp. 3220–3223.
ICPRICPR-2012-ParisHG #analysis #categorisation #image #towards
Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
ICPRICPR-2012-RenLWG #image
Image super-resolution by structural sparse coding (JR, JL, MW, ZG), pp. 1936–1939.
ICPRICPR-2012-TaniguchiHISC #image #linear
Image super-resolution based on locality-constrained linear coding (KT, XHH, YI, SS, YWC), pp. 1948–1951.
ICPRICPR-2012-WangWZBL #classification #image
Adjacent coding for image classification (YW, XW, SZ, XB, WL), pp. 1459–1462.
ICPRICPR-2012-ZhangZC #recognition
Action recognition based on spatial-temporal pyramid sparse coding (XZ, HZ, XC), pp. 1455–1458.
ICPRICPR-2012-ZhengQ #categorisation #semantics
Non-negative Sparse Semantic Coding for text categorization (WZ, YQ), pp. 409–412.
KDDKDD-2012-HiraiY #clustering #detection #normalisation #using
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-SindhwaniG #distributed #learning #scalability #taxonomy
Large-scale distributed non-negative sparse coding and sparse dictionary learning (VS, AG), pp. 489–497.
KDDKDD-2012-ZhouZ #collaboration #learning
Learning binary codes for collaborative filtering (KZ, HZ), pp. 498–506.
SEKESEKE-2012-HumairaSOWF #framework #metric #multi #programming language #source code #towards
Towards a Unified Source Code Measurement Framework Supporting Multiple Programming Languages (RH, KS, AO, HW, YF), pp. 480–485.
SEKESEKE-2012-XuT #automation #concurrent #generative
Automated Generation of Concurrent Test Code from Function Nets (DX, JT), pp. 346–351.
SIGIRSIGIR-2012-ZhangWDH #detection #learning #performance #reuse
Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
ECMFAECMFA-2012-SmolikV #code generation
Code Generation Nirvana (PCS, PV), pp. 319–327.
MODELSMoDELS-2012-GravinoRST #comprehension #design pattern #developer #documentation #replication #source code
Do Professional Developers Benefit from Design Pattern Documentation? A Replication in the Context of Source Code Comprehension (CG, MR, GS, GT), pp. 185–201.
PLEASEPLEASE-2012-Duszynski0 #source code #variability
Recovering variability information from the source code of similar software products (SD, MB), pp. 37–40.
SPLCSPLC-2012-NunesGLL #evolution #heuristic #product line
History-sensitive heuristics for recovery of features in code of evolving program families (CN, AG, CJPdL, JL), pp. 136–145.
ECOOPECOOP-2012-NegaraVCJD #evolution #question #source code #version control
Is It Dangerous to Use Version Control Histories to Study Source Code Evolution? (SN, MV, NC, REJ, DD), pp. 79–103.
OOPSLAOOPSLA-2012-MishneSY #code search #semantics #source code
Typestate-based semantic code search over partial programs (AM, SS, EY), pp. 997–1016.
OOPSLAOOPSLA-2012-Zhang0LZMY #android #java #on-demand #refactoring
Refactoring android Java code for on-demand computation offloading (YZ, GH, XL, WZ, HM, SY), pp. 233–248.
PLATEAUPLATEAU-2012-BosuC #code review #open source #overview
Peer code review in open source communitiesusing reviewboard (AB, JCC), pp. 17–24.
PLATEAUPLATEAU-2012-UrmaM #evolution #programming language #query #source code
Programming language evolution via source code query languages (RGU, AM), pp. 35–38.
AdaEuropeAdaEurope-2012-PanunzioV #ada #component #development
Ada Ravenscar Code Archetypes for Component-Based Development (MP, TV), pp. 1–17.
AdaEuropeAdaEurope-2012-RuizCM #ada #development #source code
Source Code as the Key Artifact in Requirement-Based Development: The Case of Ada 2012 (JFR, CC, YM), pp. 49–59.
LOPSTRLOPSTR-2012-DandoisV #logic programming #semantics #source code
Semantic Code Clones in Logic Programs (CD, WV), pp. 35–50.
LOPSTRLOPSTR-2012-SeghirB #array #program transformation #quantifier #verification
Simplifying the Verification of Quantified Array Assertions via Code Transformation (MNS, MB), pp. 194–212.
PEPMPEPM-2012-Puschel #compilation #performance
Compiling math to fast code (MP), pp. 1–2.
POPLPOPL-2012-RayL #injection
Defining code-injection attacks (DR, JL), pp. 179–190.
PPDPPPDP-2012-Emden #matrix
Matrix code (MvE), pp. 13–24.
RERE-2012-CharradaKG #identification #requirements #source code
Identifying outdated requirements based on source code changes (EBC, AK, MG), pp. 61–70.
RERE-2012-SmialekS #requirements
Facilitating transition from requirements to code with the ReDSeeDS tool (MS, TS), pp. 321–322.
ASEASE-2012-AbadiF #automation
Automatic recovery of statecharts from procedural code (MA, YAF), pp. 238–241.
ASEASE-2012-GhabiE #automation #validation
Code patterns for automatically validating requirements-to-code traces (AG, AE), pp. 200–209.
ASEASE-2012-MaruyamaKOH #game studies #slicing
Slicing and replaying code change history (KM, EK, TO, SH), pp. 246–249.
ASEASE-2012-MorenoM #automation #identification #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
ASEASE-2012-NguyenNNNN #detection #embedded #smell #web
Detection of embedded code smells in dynamic web applications (HVN, HAN, TTN, ATN, TNN), pp. 282–285.
ASEASE-2012-SharT #predict #validation #web
Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
ASEASE-2012-TamrawiNNN #analysis #named #refactoring
SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASEASE-2012-WangD0ZLM #question
Can I clone this piece of code here? (XW, YD, LZ, DZ, EL, HM), pp. 170–179.
ASEASE-2012-YuanG #approach #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
FSEFSE-2012-ServantJ #slicing
History slicing: assisting code-evolution tasks (FS, JAJ), p. 43.
FSEFSE-2012-ShepherdDRF #code search #framework #named
Sando: an extensible local code search framework (DS, KD, BR, TF), p. 15.
FSEFSE-2012-TaoDXZK #case study #how #industrial
How do software engineers understand code changes?: an exploratory study in industry (YT, YD, TX, DZ, SK), p. 51.
ICSEICSE-2012-AlvesSF #named #smell
ConcernReCS: Finding code smells in software aspectization (PA, DS, EF), pp. 1463–1464.
ICSEICSE-2012-DeLineBRJR #debugging #experience #industrial #paradigm
Debugger Canvas: Industrial experience with the code bubbles paradigm (RD, AB, KR, JJ, SPR), pp. 1064–1073.
ICSEICSE-2012-EderJJHVP #how #maintenance #matter #question
How much does unused code matter for maintenance? (SE, MJ, EJ, BH, RV, KHP), pp. 1102–1111.
ICSEICSE-2012-Guzzi #information management
Documenting and sharing knowledge about code (AG), pp. 1535–1538.
ICSEICSE-2012-InoueSXM #open source
Where does this code come from and where does it go? — Integrated code history tracker for open source systems (KI, YS, PX, YM), pp. 331–341.
ICSEICSE-2012-KuhnS #named #version control
CodeTimeline: Storytelling with versioning data (AK, MS), pp. 1333–1336.
ICSEICSE-2012-LiE #detection #named
CBCD: Cloned buggy code detector (JL, MDE), pp. 310–320.
ICSEICSE-2012-McMillanHPCM #agile #prototype #recommendation #source code
Recommending source code for use in rapid software prototypes (CM, NH, DP, JCH, BM), pp. 848–858.
ICSEICSE-2012-NguyenNNN12a #code completion #graph #named
GraPacc: A graph-based pattern-oriented, context-sensitive code completion tool (ATN, HAN, TTN, TNN), pp. 1407–1410.
ICSEICSE-2012-NguyenNNTNAN #code completion #graph #source code
Graph-based pattern-oriented, context-sensitive source code completion (ATN, TTN, HAN, AT, HVN, JMAK, TNN), pp. 69–79.
ICSEICSE-2012-NistorLPGM #automation #clustering #generative #named #parallel #performance #random #testing #thread
Ballerina: Automatic generation and clustering of efficient random unit tests for multithreaded code (AN, QL, MP, TRG, DM), pp. 727–737.
ICSEICSE-2012-OmarYLM #code completion
Active code completion (CO, YY, TDL, BAM), pp. 859–869.
ICSEICSE-2012-ReissBL #programming
Code Bubbles: A practical working-set programming environment (SPR, JNB, JJLJ), pp. 1411–1414.
ICSEICSE-2012-Schulte #analysis #automation
Ten years of automated code analysis at Microsoft (WS), p. 1001.
ICSEICSE-2012-Schwarz #development
Hot clones: Combining search-driven development, clone management, and code provenance (NS), pp. 1628–1629.
ICSEICSE-2012-SchwarzLR #how #on the #repository
On how often code is cloned across repositories (NS, ML, RR), pp. 1289–1292.
ICSEICSE-2012-SongT #invariant #metadata
Metadata invariants: Checking and inferring metadata coding conventions (MS, ET), pp. 694–704.
ICSEICSE-2012-SusB #education #integration #re-engineering #using
Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSEICSE-2012-TamrawiNNN #analysis #evaluation #symbolic computation
Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
ICSEICSE-2012-ZhangE #exception #testing #validation
Amplifying tests to validate exception handling code (PZ, SGE), pp. 595–605.
SACSAC-2012-AnconaMP #automation #documentation #java #migration #ontology
Ontology-based documentation extraction for semi-automatic migration of Java code (DA, VM, OP), pp. 1137–1143.
SACSAC-2012-CosciaCMZ #approach #development #web #web service
An approach to improve code-first web services discoverability at development time (JLOC, MC, CM, AZ), pp. 638–643.
SACSAC-2012-ErraS #3d #towards #visualisation
Towards the visualization of software systems as 3D forests: the CodeTrees environment (UE, GS), pp. 981–988.
SACSAC-2012-GiuntaPT #aspect-oriented #composition #design pattern #named #refactoring
AODP: refactoring code to provide advanced aspect-oriented modularization of design patterns (RG, GP, ET), pp. 1243–1250.
SACSAC-2012-JeonC #javascript #jit #reuse #using
Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
SACSAC-2012-KangJC #3d #scalability #using #video
Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SACSAC-2012-MondalRRSKS #comparative #empirical
Comparative stability of cloned and non-cloned code: an empirical study (MM, CKR, MSR, RKS, JK, KAS), pp. 1227–1234.
SACSAC-2012-SardinhaYNR #aspect-oriented #identification #named #traceability
EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
GPCEGPCE-2012-AxelsenK #java #performance #semantics #text-to-text
Package templates: a definition by semantics-preserving source-to-source transformations to efficient Java code (EWA, SK), pp. 50–59.
GPCEGPCE-2012-BagheriS #architecture #framework #named #platform #synthesis
Pol: specification-driven synthesis of architectural code frameworks for platform-based applications (HB, KJS), pp. 93–102.
CGOCGO-2012-JangLSL #automation #memory management #multi
An automatic code overlaying technique for multicores with explicitly-managed memory hierarchies (CJ, JL, SS, JL), pp. 219–229.
CGOCGO-2012-ZhangDS #database #named
Micro-specialization: dynamic code specialization of database management systems (RZ, SD, RTS), pp. 63–73.
CGOCGO-2012-ZhangM #3d #clustering #gpu
Auto-generation and auto-tuning of 3D stencil codes on GPU clusters (YZ, FM), pp. 155–164.
DACDAC-2012-AgostaBP #analysis
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DACDAC-2012-KumarBKV #analysis #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-MirhoseiniPK #energy #memory management
Coding-based energy minimization for phase change memory (AM, MP, FK), pp. 68–76.
DACDAC-2012-ShafiqueZWBH #adaptation #memory management #multi #power management #video
Adaptive power management of on-chip video memory for multiview video coding (MS, BZ, FLW, SB, JH), pp. 866–875.
DATEDATE-2012-ShafiqueZRKH #adaptation #power management
Power-efficient error-resiliency for H.264/AVC Context-Adaptive Variable Length Coding (MS, BZ, SR, FK, JH), pp. 697–702.
OSDIOSDI-2012-GordonJMMC #execution #migration #named
COMET: Code Offload by Migrating Execution Transparently (MSG, DAJ, SAM, ZMM, XC), pp. 93–106.
OSDIOSDI-2012-GuoFCZZMLLZZ #optimisation #pipes and filters
Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE (ZG, XF, RC, JZ, HZ, SM, CL, WL, JZ, LZ), pp. 121–133.
PDPPDP-2012-EittenbergerMK #streaming
Raptor Codes for P2P Streaming (PME, TM, URK), pp. 327–332.
PPoPPPPoPP-2012-KimH #code generation #kernel #performance
Efficient SIMD code generation for irregular kernels (SK, HH), pp. 55–64.
STOCSTOC-2012-Efremenko
From irreducible representations to locally decodable codes (KE), pp. 327–338.
STOCSTOC-2012-GalHKPV #bound
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates (AG, KAH, MK, PP, EV), pp. 479–494.
STOCSTOC-2012-GuruswamiX
Folded codes from function field towers and improved optimal rate list decoding (VG, CX), pp. 339–350.
STOCSTOC-2012-KaufmanL #graph #symmetry #transitive
Edge transitive ramanujan graphs and symmetric LDPC good codes (TK, AL), pp. 359–366.
CAVCAV-2012-ArltS #detection #java #named
Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
ICSTICST-2012-BeyeneA #generative #string #test coverage #testing
Generating String Test Data for Code Coverage (MB, JHA), pp. 270–279.
ICSTICST-2012-ChittimalliS #framework #modelling #named #source code
GEMS: A Generic Model Based Source Code Instrumentation Framework (PKC, VS), pp. 909–914.
ICSTICST-2012-JuzgadoVSAR #abstraction #branch #clustering #effectiveness #equivalence #testing
Comparing the Effectiveness of Equivalence Partitioning, Branch Testing and Code Reading by Stepwise Abstraction Applied by Subjects (NJJ, SV, MS, SA, IR), pp. 330–339.
ICSTICST-2012-Kannavara #source code #static analysis
Securing Opensource Code via Static Analysis (RK), pp. 429–436.
ICSTICST-2012-MateoU #execution #music #reduction
Mutant Execution Cost Reduction: Through MUSIC (Mutant Schema Improved with Extra Code) (PRM, MPU), pp. 664–672.
ICSTICST-2012-TanMTL #consistency #detection #nondeterminism #testing
@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies (SHT, DM, LT, GTL), pp. 260–269.
ICTSSICTSS-2012-GargantiniGM #robust #test coverage
Extending Coverage Criteria by Evaluating Their Robustness to Code Structure Changes (AG, MG, EM), pp. 168–183.
TAPTAP-2012-Kuehlmann #testing
The Technology and Psychology of Testing Your Code as You Develop It (AK), p. 1.
ECSAECSA-2011-AdersbergerP #architecture #consistency #named #traceability #uml
ReflexML: UML-Based Architecture-to-Code Traceability and Consistency Checking (JA, MP), pp. 344–359.
ICDARICDAR-2011-KatoDTIM #recognition #using
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
CSEETCSEET-2011-ChenT #programming #quality #smell
Grading code quality of programming assignments based on bad smells (WKC, PYT), p. 559.
ITiCSEITiCSE-2011-BreukerDB #quality #student
Measuring static quality of student code (DMB, JD, JB), pp. 13–17.
ITiCSEITiCSE-2011-TaylorK #injection #security #student
Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
ITiCSEITiCSE-2011-Velazquez-Iturbide #algorithm #design #revisited
The design and coding of greedy algorithms revisited (JÁVI), pp. 8–12.
ICPCICPC-J-2009-HammadCM11 #automation #evolution #identification #traceability
Automatically identifying changes that impact code-to-design traceability during evolution (MH, MLC, JIM), pp. 35–64.
CSMRCSMR-2011-AbbesKGA #comprehension #empirical
An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension (MA, FK, YGG, GA), pp. 181–190.
CSMRCSMR-2011-HayaseKMI #source code
Building Domain Specific Dictionaries of Verb-Object Relation from Source Code (YH, YK, YM, KI), pp. 93–100.
CSMRCSMR-2011-HigoK #clone detection #dependence #detection #heuristic
Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
CSMRCSMR-2011-Sneed #java #migration #pl-i
Migrating PL/I Code to Java (HMS), pp. 287–296.
ICPCICPC-2011-CordyR #named #open source #performance #source code
DebCheck: Efficient Checking for Open Source Code Clones in Software Systems (JRC, CKR), pp. 217–218.
ICPCICPC-2011-EndrikatH #aspect-oriented #development #maintenance #programming
Is Aspect-Oriented Programming a Rewarding Investment into Future Code Changes? A Socio-technical Study on Development and Maintenance Time (SE, SH), pp. 51–60.
ICPCICPC-2011-GuzziHLPD #comprehension
Collective Code Bookmarks for Program Comprehension (AG, LH, ML, MP, AvD), pp. 101–110.
ICPCICPC-2011-KeivanlooRC #approach #clone detection #hybrid #named #realtime
SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
ICPCICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code #using
Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICPCICPC-2011-ScannielloM #clustering #concept #source code
Clustering Support for Static Concept Location in Source Code (GS, AM), pp. 1–10.
ICPCICPC-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach (MFZ, CKR), pp. 266–269.
ICSMEICSM-2011-BiggersEKE #metric #source code #towards
Toward a metrics suite for source code lexicons (LRB, BPE, NAK, LHE), pp. 492–495.
ICSMEICSM-2011-HouP #api #code completion #evaluation #sorting
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
ICSMEICSM-2011-LawrieB #identifier #source code
Expanding identifiers to normalize source code vocabulary (DL, DB), pp. 113–122.
ICSMEICSM-2011-LeeK #clustering #recommendation
Clustering and recommending collections of code relevant to tasks (SL, SK), pp. 536–539.
ICSMEICSM-2011-NishizonoMVM #comprehension #empirical #evolution #industrial #maintenance #metric #predict #source code
Source code comprehension strategies and metrics to predict comprehension effort in software maintenance and evolution tasks — an empirical study with industry practitioners (KN, SM, RV, KiM), pp. 473–481.
ICSMEICSM-2011-QusefBOLB #concept #named #slicing #traceability #using
SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSMEICSM-2011-RastkarMB #generative #natural language #source code #summary
Generating natural language summaries for crosscutting source code concerns (SR, GCM, AWJB), pp. 103–112.
ICSMEICSM-2011-RomanoP #interface #java #metric #predict #source code #using
Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSMEICSM-2011-RomanoSRG #clustering #design pattern #source code
Clustering and lexical information support for the recovery of design pattern in source code (SR, GS, MR, CG), pp. 500–503.
ICSMEICSM-2011-Scanniello #source code
Source code survival with the Kaplan Meier (GS), pp. 524–527.
ICSMEICSM-2011-SmitGHS #evolution
Code convention adherence in evolving software (MS, BG, HJH, ES), pp. 504–507.
ICSMEICSM-2011-SnipesRM #analysis
Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
ICSMEICSM-2011-WieseHH #comparison #identifier #source code
A comparison of stemmers on source code identifiers for software search (AW, VH, EH), pp. 496–499.
MSRMSR-2011-GermanD #challenge #source code
Apples vs. oranges?: an exploration of the challenges of comparing the source code of two software systems (DMG, JD), pp. 246–249.
MSRMSR-2011-GigerPG #debugging #fine-grained #predict #source code
Comparing fine-grained source code changes and code churn for bug prediction (EG, MP, HCG), pp. 83–92.
MSRMSR-2011-HemelKVD #clone detection #detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
MSRMSR-2011-HirataM
Do comments explain codes adequately?: investigation by text filtering (YH, OM), pp. 242–245.
MSRMSR-2011-ThomasAHB #evolution #modelling #source code #topic
Modeling the evolution of topics in source code histories (SWT, BA, AEH, DB), pp. 173–182.
SCAMSCAM-2011-AbebeHTM #concept #smell #source code
The Effect of Lexicon Bad Smells on Concept Location in Source Code (SLA, SH, PT, AM), pp. 125–134.
SCAMSCAM-2011-AlvesHR #case study #comparative #query
A Comparative Study of Code Query Technologies (TLA, JH, PR), pp. 145–154.
SCAMSCAM-2011-CooganD #assembly #equation #reasoning
Equational Reasoning on x86 Assembly Code (KC, SKD), pp. 75–84.
SCAMSCAM-2011-Gold #analysis #music #programming #source code
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
SCAMSCAM-2011-SchulzeJF #preprocessor
Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
SCAMSCAM-2011-SfayhiS #analysis #interactive #visualisation #what
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
SCAMSCAM-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
WCREWCRE-2011-AliGA #clustering #object-oriented #requirements #source code #traceability
Requirements Traceability for Object Oriented Systems by Partitioning Source Code (NA, YGG, GA), pp. 45–54.
WCREWCRE-2011-BazrafshanKG #approximate #code search
Approximate Code Search in Program Histories (SB, RK, NG), pp. 109–118.
WCREWCRE-2011-Beard #debugging #information retrieval #locality #using
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-DuszynskiKB #multi #reuse #source code
Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-GravinoRST #comprehension #design pattern #documentation #source code
Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments (CG, MR, GS, GT), pp. 67–76.
WCREWCRE-2011-HigoUNK #approach #clone detection #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-KeivanlooRC #clone detection #multi #realtime
Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
WCREWCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code #using
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCREWCRE-2011-NonnenSI #research #source code
Locating the Meaning of Terms in Source Code Research on “Term Introduction” (JN, DS, PI), pp. 99–108.
WCREWCRE-2011-Panchenko #code search #database #in memory #source code
In-Memory Database Support for Source Code Search and Analytics (OP), pp. 421–424.
WCREWCRE-2011-PosnettHD #fault #question
Got Issues? Do New Features and Code Improvements Affect Defects? (DP, AH, PTD), pp. 211–215.
WCREWCRE-2011-Qusef #concept #slicing #traceability
Recovering Test-to-Code Traceability Via Slicing and Conceptual Coupling (AQ), pp. 417–420.
WCREWCRE-2011-QusefBOLB #named #slicing
SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter (AQ, GB, RO, ADL, DB), pp. 443–444.
WCREWCRE-2011-SajnaniNL #architecture #towards
Application Architecture Discovery — Towards Domain-driven, Easily-Extensible Code Structure (HS, RN, CVL), pp. 401–405.
WCREWCRE-2011-WangLJ #code search #dependence #graph #topic
Code Search via Topic-Enriched Dependence Graph Matching (SW, DL, LJ), pp. 119–123.
WCREWCRE-2011-WangPV #automation #readability #segmentation
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
DLTDLT-J-2010-PribavkinaR11 #complexity
State Complexity of Code Operators (EVP, ER), pp. 1669–1681.
ICALPICALP-v1-2011-AustrinK #distance #problem #reduction
A Simple Deterministic Reduction for the Gap Minimum Distance of Code Problem (PA, SK), pp. 474–485.
LATALATA-2011-NielsenH #parsing #regular expression
Bit-coded Regular Expression Parsing (LN, FH), pp. 402–413.
SEFMSEFM-2011-Metayer #formal method
Formal Methods as a Link between Software Code and Legal Rules (DLM), pp. 3–18.
CHICHI-2011-GrossYK #interface #named #visual notation
Dinah: an interface to assist non-programmers with selecting program code causing graphical output (PAG, JY, CK), pp. 3397–3400.
CHICHI-2011-HartmannDC #named #web
HyperSource: bridging the gap between source and code-related web sites (BH, MD, MKC), pp. 2207–2210.
HCIDUXU-v2-2011-KaptanG11a #comprehension #scalability
Improving Code Reading and Comprehension on Large Displays (SNK, MG), pp. 128–134.
HCIHCI-DDA-2011-ParkSCH #image #in memory #memory management #named
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts (JP, JS, JHC, TDH), pp. 637–642.
HCIHCI-DDA-2011-SeoCH #comparison #mobile #performance
Imaged Based Codes Performance Comparison for Mobile Environments (JS, JHC, TDH), pp. 653–659.
VISSOFTVISSOFT-2011-BeckPD #multi #visual notation
Visually exploring multi-dimensional code couplings (FB, RP, SD), pp. 1–8.
VISSOFTVISSOFT-2011-BroeksemaT #migration #scalability #visual notation
Visual support for porting large code bases (BB, ACT), pp. 1–8.
VISSOFTVISSOFT-2011-MaleticMNCSR #named #scalability #tool support #visualisation
MosaiCode: Visualizing large scale software: A tool demonstration (JIM, DJM, CDN, MLC, AS, BPR), pp. 1–4.
ICEISICEIS-v1-2011-MarinAV #automation #java #named #ontology #semantics
Jar2Ontology — A Tool for Automatic Extraction of Semantic Information from Java Object Code (NM, CSÁ, MAV), pp. 267–276.
ICEISICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
ICMLICML-2011-CoatesN #encoding
The Importance of Encoding Versus Training with Sparse Coding and Vector Quantization (AC, AYN), pp. 921–928.
ICMLICML-2011-GaoK #multi
Multiclass Boosting with Hinge Loss based on Output Coding (TG, DK), pp. 569–576.
ICMLICML-2011-NorouziF
Minimal Loss Hashing for Compact Binary Codes (MN, DJF), pp. 353–360.
KDDKDD-2011-ZhuLCX #performance #topic
Conditional topical coding: an efficient topic model conditioned on rich features (JZ, NL, NC, EPX), pp. 475–483.
MLDMMLDM-2011-XuM #learning #taxonomy
Dictionary Learning Based on Laplacian Score in Sparse Coding (JX, HM), pp. 253–264.
SEKESEKE-2011-SeriaiC #approach #architecture #object-oriented #search-based
A Genetic Approach for Software Architecture Recovery from Object-Oriented Code (ADS, SC), pp. 515–520.
ECMFAECMFA-2011-GessenharterR #approach #code generation #development #diagrams #modelling #process #towards #uml
Code Generation for UML 2 Activity Diagrams — Towards a Comprehensive Model-Driven Development Approach (DG, MR), pp. 205–220.
ICMTICMT-2011-BauerK #model transformation
Combining Specification-Based and Code-Based Coverage for Model Transformation Chains (EB, JMK), pp. 78–92.
MODELSMoDELS-2011-StenzelMR #code generation #qvt #verification
Formal Verification of QVT Transformations for Code Generation (KS, NM, WR), pp. 533–547.
OnwardOnward-2011-McDirmid
Coding at the speed of touch (SM), pp. 61–76.
OOPSLAOOPSLA-2011-WurthingerABWM #aspect-oriented #evolution #java #runtime
Safe and atomic run-time code evolution for Java and its application to dynamic AOP (TW, DA, WB, CW, HM), pp. 825–844.
PLATEAUPLATEAU-2011-YoonM #editing #low level
Capturing and analyzing low-level events from the code editor (YY, BAM), pp. 25–30.
TOOLSTOOLS-EUROPE-2011-Nierstrasz #modelling
Synchronizing Models and Code (ON), p. 1.
TOOLSTOOLS-EUROPE-2011-TrudelOFN #automation #eiffel #java #source code
Automated Translation of Java Source Code to Eiffel (MT, MO, CAF, MN), pp. 20–35.
AdaEuropeAdaEurope-2011-CoqR #ada #analysis #modelling #quality #source code
The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
PEPMPEPM-2011-JonssonN #explosion #supercompilation
Taming code explosion in supercompilation (PAJ, JN), pp. 33–42.
PLDIPLDI-2011-AnselMETCSSBY #compilation #independence #self
Language-independent sandboxing of just-in-time compilation and self-modifying code (JA, PM, ÚE, ET, BC, DLS, DS, CB, BY), pp. 355–366.
PLDIPLDI-2011-ZhouCC #algorithm #execution
An SSA-based algorithm for optimal speculative code motion under an execution profile (HZ, WC, FCC), pp. 98–108.
POPLPOPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread #using
A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
POPLPOPL-2011-RamseyD #composition #dependent type #independence #low level #type system #using
Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
SASSAS-2011-FlexederPS #analysis #assembly
Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
AdaSIGAda-2011-Rosen #ada #design #standard
Designing and checking coding standards for ada (JPR), pp. 13–14.
ASEASE-2011-ChenG #automation #documentation #retrieval #traceability
Improving automated documentation to code traceability by combining retrieval techniques (XC, JCG), pp. 223–232.
ASEASE-2011-GethersKDP #adaptation #approach #impact analysis #source code
An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
ASEASE-2011-GhabiE #validation
Observations on the connectedness between requirements-to-code traces and calling relationships for trace validation (AG, AE), pp. 416–419.
ASEASE-2011-HillPV #code search #natural language #source code
Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
ASEASE-2011-KimmigMM #natural language #query #source code
Querying source code with natural language (MK, MM, MM), pp. 376–379.
ASEASE-2011-LozanoKM #named #recommendation #search-based #source code
Mendel: Source code recommendation based on a genetic metaphor (AL, AK, KM), pp. 384–387.
ASEASE-2011-LumpeMG #java #named
jCT: A Java Code Tomograph (ML, SM, OG), pp. 616–619.
ASEASE-2011-MaderE #empirical #navigation #source code #traceability
Do software engineers benefit from source code navigation with traceability? — An experiment in software change management (PM, AE), pp. 444–447.
ASEASE-2011-NguyenNNN #fault #html #php #validation
Auto-locating and fix-propagating for HTML validation errors to PHP server-side code (HVN, HAN, TTN, TNN), pp. 13–22.
ASEASE-2011-PeiWFNM #automation
Code-based automated program fixing (YP, YW, CAF, MN, BM), pp. 392–395.
ASEASE-2011-WeiRFPHSNM #contract #fault #testing
Stateful testing: Finding more errors in code and contracts (YW, HR, CAF, YP, AH, MJS, MN, BM), pp. 440–443.
ESEC-FSEESEC-FSE-2011-BeckD #composition #congruence #on the
On the congruence of modularity and code coupling (FB, SD), pp. 354–364.
ESEC-FSEESEC-FSE-2011-BirdNMGD #exclamation #quality
Don’t touch my code!: examining the effects of ownership on software quality (CB, NN, BM, HG, PTD), pp. 4–14.
ESEC-FSEESEC-FSE-2011-HackettA #morphism #polymorphism
Inferring data polymorphism in systems code (BH, AA), pp. 332–342.
ICSEICSE-2011-AdlerBRSSUZ #analysis #scalability #test coverage
Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
ICSEICSE-2011-Bertran #architecture #detection #evolution #smell
Detecting architecturally-relevant code smells in evolving software systems (IMB), pp. 1090–1093.
ICSEICSE-2011-Dantas #composition #maintenance #reuse
Reuse vs. maintainability: revealing the impact of composition code properties (FD), pp. 1082–1085.
ICSEICSE-2011-GethersSPOPL #named #question #topic
CodeTopics: which topic am I coding now? (MG, TS, MDP, RO, DP, ADL), pp. 1034–1036.
ICSEICSE-2011-Kidwell #classification #fault #research
A decision support system for the classification of software coding faults: a research abstract (BK), pp. 1158–1160.
ICSEICSE-2011-LopezH
The code orb: supporting contextualized coding via at-a-glance views (NL, AvdH), pp. 824–827.
ICSEICSE-2011-McMillan #source code
Searching, selecting, and synthesizing source code (CM), pp. 1124–1125.
ICSEICSE-2011-McMillan11a
Finding relevant functions in millions of lines of code (CM), pp. 1170–1172.
ICSEICSE-2011-MilicevicRYJ #declarative #execution #imperative
Unifying execution of imperative and declarative code (AM, DR, KY, DJ), pp. 511–520.
ICSEICSE-2011-NearMKJ #analysis #dependence #evaluation #lightweight
A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
ICSEICSE-2011-NiuMB #information management #navigation
Information foraging as a foundation for code navigation (NN, AM, GB), pp. 816–819.
ICSEICSE-2011-TanZP #concurrent #debugging #detection #mining #named
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs (LT, YZ, YP), pp. 11–20.
SACSAC-2011-LimJLW #c #education #visualisation
Style Avatar: a visualization system for teaching C coding style (JSL, JHJ, YJL, GW), pp. 1210–1211.
GPCEGPCE-J-2005-CaretteK11 #abstraction #monad #multi #programming
Multi-stage programming with functors and monads: Eliminating abstraction overhead from generic code (JC, OK), pp. 349–375.
GPCEGPCE-2011-EsmaeilsabzaliFA #aspect-oriented #automation #modelling #monitoring
Monitoring aspects for the customization of automatically generated code for big-step models (SE, BF, JMA), pp. 117–126.
GPCEGPCE-2011-Shubert #code generation #development #flexibility #modelling
Application of model based development to flexible code generation (GJS), pp. 95–96.
CGOCGO-2011-HardekopfL #analysis #pointer
Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
DACDAC-2011-StattelmannBR #optimisation #performance #simulation
Fast and accurate source-level simulation of software timing considering complex code optimizations (SS, OB, WR), pp. 486–491.
DACDAC-2011-ZattSSABH #adaptation #energy #estimation #multi #runtime #video
Run-time adaptive energy-aware motion and disparity estimation in multiview video coding (BZ, MS, FS, LVA, SB, JH), pp. 1026–1031.
DATEDATE-2011-AgyekumN #communication #hardware #robust
A delay-insensitive bus-invert code and hardware support for robust asynchronous global communication (MYA, SMN), pp. 1370–1375.
DATEDATE-2011-AnjamNW #multi #runtime
Targeting code diversity with run-time adjustable issue-slots in a chip multiprocessor (FA, MN, SW), pp. 1358–1363.
DATEDATE-2011-BaiDDC #network #program transformation #programming #runtime
Simplified programming of faulty sensor networks via code transformation and run-time interval computation (LSB, RPD, PAD, PHC), pp. 88–93.
DATEDATE-2011-BaiocchiC #embedded
Demand code paging for NAND flash in MMU-less embedded systems (JB, BRC), pp. 517–532.
DATEDATE-2011-LiuV #analysis #generative #performance #source code #validation
Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
DATEDATE-2011-RossiTSM #analysis #fault #memory management #performance #reliability
Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
DATEDATE-2011-ZattSBH #architecture #estimation #hardware #parallel #pipes and filters #throughput #video
Multi-level pipelined parallel hardware architecture for high throughput motion and disparity estimation in Multiview Video Coding (BZ, MS, SB, JH), pp. 1448–1453.
HPCAHPCA-2011-SampsonVGGST #performance
Efficient complex operators for irregular codes (JS, GV, NGH, SG, SS, MBT), pp. 491–502.
LCTESLCTES-2011-BhagatGSG #effectiveness #optimisation
Global productiveness propagation: a code optimization technique to speculatively prune useless narrow computations (IB, EG, FJS, AG), pp. 161–170.
LCTESLCTES-2011-SahaLM #approach #kernel #linux
An approach to improving the structure of error-handling code in the linux kernel (SS, JLL, GM), pp. 41–50.
PDPPDP-2011-JacksonRBHWACS #optimisation #parallel
Parallel Optimisation Strategies for Fusion Codes (AJ, FR, SB, JH, JW, MA, MC, AS), pp. 357–364.
PDPPDP-2011-PascualRMBCL #case study #monte carlo #performance
More Efficient Executions of Monte Carlo Fusion Codes by Means of Montera: The ISDEP Use Case (MARP, AJRM, RM, AB, FC, IML), pp. 380–384.
PDPPDP-2011-Peter #distributed #reliability
Reliability Study of Coding Schemes for Wide-Area Distributed Storage Systems (KP), pp. 19–23.
FASEFASE-2011-CaiK #empirical
An Empirical Study of Long-Lived Code Clones (DC, MK), pp. 432–446.
FASEFASE-2011-HolzerJKLSTV #modelling #testing
Seamless Testing for Models and Code (AH, VJ, SK, BL, CS, MT, HV), pp. 278–293.
STOCSTOC-2011-BarakDYW #bound #design #geometry #matrix #rank
Rank bounds for design matrices with applications toc ombinatorial geometry and locally correctable codes (BB, ZD, AY, AW), pp. 519–528.
STOCSTOC-2011-BravermanR #communication #fault #interactive #towards
Towards coding for maximum errors in interactive communication (MB, AR), pp. 159–166.
STOCSTOC-2011-Haeupler #network
Analyzing network coding gossip made easy (BH), pp. 293–302.
STOCSTOC-2011-KoppartySY
High-rate codes with sublinear-time decoding (SK, SS, SY), pp. 167–176.
CAVCAV-2011-BardinHLLTV #analysis #framework
The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
CAVCAV-2011-BerdineCI #memory management #named #safety
SLAyer: Memory Safety for Systems-Level Code (JB, BC, SI), pp. 178–183.
CAVCAV-2011-GveroKP #interactive #synthesis
Interactive Synthesis of Code Snippets (TG, VK, RP), pp. 418–423.
CAVCAV-2011-Lahiri #analysis #composition #smt
SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
CAVCAV-2011-RamosE #equivalence #verification
Practical, Low-Effort Equivalence Verification of Real Code (DAR, DRE), pp. 669–685.
ICSTICST-2011-NandaMSHO #testing
Regression testing in the presence of non-code changes (AN, SM, SS, MJH, AO), pp. 21–30.
ISSTAISSTA-2011-GligoricMK #code generation #named #performance
CoDeSe: fast deserialization via code generation (MG, DM, SK), pp. 298–308.
ISSTAISSTA-2011-RosenblumMZ
Recovering the toolchain provenance of binary code (NER, BPM, XZ), pp. 100–110.
TAPTAP-2011-DrossFM
Correct Code Containing Containers (CD, JCF, YM), pp. 102–118.
VMCAIVMCAI-2011-Logozzo #abstract interpretation #verification
Practical Verification for the Working Programmer with CodeContracts and Abstract Interpretation — (FL), pp. 19–22.
CBSECBSE-2010-GamaD #component #execution #self
A Self-healing Component Sandbox for Untrustworthy Third Party Code Execution (KG, DD), pp. 130–149.
ECSAECSA-2010-ChardignyS #architecture #documentation #object-oriented #process #source code
Software Architecture Recovery Process Based on Object-Oriented Source Code and Documentation (SC, AS), pp. 409–416.
QoSAQoSA-2010-KapovaGBH #maintenance #metric #model transformation
Evaluating Maintainability with Code Metrics for Model-to-Model Transformations (LK, TG, SB, JH), pp. 151–166.
DocEngDocEng-2010-Bagley #compilation #lessons learnt
Lessons from the dragon: compiling PDF to machine code (SRB), pp. 65–68.
DRRDRR-2010-SankarasubramaniamNVK #approach #detection #documentation
Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
TPDLECDL-2010-Richardson #ambiguity #automation #set
Automated Country Name Disambiguation for Code Set Alignment (GR), pp. 498–501.
HTHT-2010-BaeJW #web
Show my code in the web (MJB, JHJ, GW), pp. 309–310.
EDMEDM-2010-CadeO #modelling #topic #using
Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
SIGITESIGITE-2010-KayamaFKTS #exclamation #learning
Let’s go! magical spoons: a high school learning program for information coding fundamentals (MK, TF, AK, TT, CS), pp. 95–104.
SIGITESIGITE-2010-WaldmannL #collaboration #eclipse #framework #platform #realtime
Integrating the google wave platform with eclipse for collaborative, real-time code creation (BAW, DJL), pp. 69–72.
CSMRCSMR-2010-ButlerWYS #empirical #identifier #quality
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 156–165.
CSMRCSMR-2010-JurgensDH
Code Similarities Beyond Copy & Paste (EJ, FD, BH), pp. 78–87.
CSMRCSMR-2010-KellensNSRD #co-evolution #source code
Co-evolving Annotations and Source Code through Smart Annotations (AK, CN, KDS, CDR, TD), pp. 117–126.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-MarinescuGV #assessment #named #quality
InCode: Continuous Quality Assessment and Improvement (RM, GG, IV), pp. 274–275.
ICPCICPC-2010-BacchelliDL #source code
Extracting Source Code from E-Mails (AB, MD, ML), pp. 24–33.
ICPCICPC-2010-JablonskiH #identifier
Renaming Parts of Identifiers Consistently within Code Clones (PJ, DH), pp. 38–39.
ICSMEICSM-2010-HummelJHC #clone detection #detection #distributed #incremental #scalability
Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
ICSMEICSM-2010-KeivanlooRSR #code search #framework #named #scalability #semantics #source code
SE-CodeSearch: A scalable Semantic Web-based source code search infrastructure (IK, LR, PS, JR), pp. 1–5.
ICSMEICSM-2010-Mantyla #empirical #smell
Empirical software evolvability — code smells and human evaluations (MM), pp. 1–6.
ICSMEICSM-2010-OlbrichCS #case study #evolution #open source #smell
Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems (SMO, DC, DIKS), pp. 1–10.
ICSMEICSM-2010-SavageDGP #named #source code #topic #using
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
MSRMSR-2010-PentaGA #approach #identification #using
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
PASTEPASTE-2010-Rubio-GonzalezL #documentation #fault
Expect the unexpected: error code mismatches between documentation and the real world (CRG, BL), pp. 73–80.
SCAMSCAM-2010-GrantC #analysis #concept #source code
Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
SCAMSCAM-2010-Harman #analysis #source code #why
Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
SCAMSCAM-2010-SahaAZRS #empirical
Evaluating Code Clone Genealogies at Release Level: An Empirical Study (RKS, MA, MFZ, CKR, KAS), pp. 87–96.
WCREWCRE-2010-Arnaoudova #quality #source code
Improving Source Code Quality through the Definition of Linguistic Antipatterns (VA), pp. 285–288.
WCREWCRE-2010-BiegelD #clone detection #configuration management #detection
Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
WCREWCRE-2010-ChenWZZHNQCG #c #decompiler #readability
A Refined Decompiler to Generate C Code with High Readability (GC, ZW, RZ, KZ, SH, KN, ZQ, KC, HG), pp. 150–154.
WCREWCRE-2010-DavisG #assembly #detection #source code
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
WCREWCRE-2010-DebrayP #reverse engineering #self
Reverse Engineering Self-Modifying Code: Unpacker Extraction (SKD, JP), pp. 131–140.
WCREWCRE-2010-Eshkevari #identifier #refactoring #source code
Linguistic Driven Refactoring of Source Code Identifiers (LME), pp. 297–300.
WCREWCRE-2010-GomezDD #integration #source code #visual notation
Visually Supporting Source Code Changes Integration: The Torch Dashboard (VUG, SD, TD), pp. 55–64.
WCREWCRE-2010-Guerrouj #analysis #automation #concept #identifier #source code
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary #using
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCREWCRE-2010-KagdiGPC #concept #impact analysis #source code
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code (HHK, MG, DP, MLC), pp. 119–128.
WCREWCRE-2010-LawrieBM #normalisation #source code
Normalizing Source Code Vocabulary (DJL, DB, CM), pp. 3–12.
WCREWCRE-2010-LozanoKMA #mining #source code
Mining Source Code for Structural Regularities (AL, AK, KM, GA), pp. 22–31.
ICALPICALP-v2-2010-BlasiakK #network
The Serializability of Network Codes (AB, RDK), pp. 100–114.
FLOPSFLOPS-2010-HaftmannN #code generation #higher-order #term rewriting
Code Generation via Higher-Order Rewrite Systems (FH, TN), pp. 103–117.
ICFPICFP-2010-ArnoldHKBS #matrix #specification #verification
Specifying and verifying sparse matrix codes (GA, JH, ASK, RB, MS), pp. 249–260.
CHICHI-2010-BragdonZRKCKCAL #comprehension #interface #maintenance
Code bubbles: a working set-based interface for code understanding and maintenance (AB, RCZ, SPR, SK, WC, JK, CC, FA, JJLJ), pp. 2503–2512.
SOFTVISSOFTVIS-2010-Murphy-HillB #interactive #smell #visualisation
An interactive ambient visualization for code smells (ERMH, APB), pp. 5–14.
SOFTVISSOFTVIS-2010-ParninGR #interactive #maintenance #named #programming
CodePad: interactive spaces for maintaining concentration in programming environments (CP, CG, SR), pp. 15–24.
ICEISICEIS-J-2010-ArtignanH10a #automation #generative #visual notation
From Coding to Automatic Generation of Legends in Visual Analytics (GA, MH), pp. 404–417.
CIKMCIKM-2010-SilvestriV #encoding #integer #named #performance #programming
VSEncoding: efficient coding and fast decoding of integer lists via dynamic programming (FS, RV), pp. 1219–1228.
ICMLICML-2010-GregorL #approximate #learning #performance
Learning Fast Approximations of Sparse Coding (KG, YL), pp. 399–406.
ICMLICML-2010-WangKC #learning
Sequential Projection Learning for Hashing with Compact Codes (JW, SK, SFC), pp. 1127–1134.
ICMLICML-2010-YuZ #coordination #using
Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPRICPR-2010-ArvanitopoulosBT #fault #linear #subclass #using
Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPRICPR-2010-BalujaC #learning #performance #retrieval
Beyond “Near Duplicates”: Learning Hash Codes for Efficient Similar-Image Retrieval (SB, MC), pp. 543–547.
ICPRICPR-2010-BattiatoFGMR
Boosting Gray Codes for Red Eyes Removal (SB, GMF, MG, GM, DR), pp. 4214–4217.
ICPRICPR-2010-BenvenisteU #invariant
A Color Invariant Based Binary Coded Structured Light Range Scanner for Shiny Objects (RB, ), pp. 798–801.
ICPRICPR-2010-CiompiPR #approach #random #using
A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPRICPR-2010-DaiYW #classification #image
Three-layer Spatial Sparse Coding for Image Classification (DD, WY, TW), pp. 613–616.
ICPRICPR-2010-DengSS #detection #network #pattern matching #pattern recognition #recognition
Applying Error-Correcting Output Coding to Enhance Convolutional Neural Network for Target Detection and Pattern Recognition (HD, GS, CYS), pp. 4291–4294.
ICPRICPR-2010-EscaleraMPRP #fault #framework #online
Adding Classes Online in Error Correcting Output Codes Framework (SE, DM, EP, PR, OP), pp. 2945–2948.
ICPRICPR-2010-GhanemA #linear #recognition
Sparse Coding of Linear Dynamical Systems with an Application to Dynamic Texture Recognition (BG, NA), pp. 987–990.
ICPRICPR-2010-LawalAM #abduction #classification #network #recognition #using
Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPRICPR-2010-LuoN #classification #fault #learning #multi #problem
Employing Decoding of Specific Error Correcting Codes as a New Classification Criterion in Multiclass Learning Problems (YL, KN), pp. 4238–4241.
ICPRICPR-2010-OGorman #analysis #latency #speech
Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
ICPRICPR-2010-OudaTN
Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
ICPRICPR-2010-SmithW #analysis
A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
ICPRICPR-2010-TarafdarMPPK #documentation #multi #retrieval
Shape Code Based Word-Image Matching for Retrieval of Indian Multi-lingual Documents (AT, RM, SP, UP, FK), pp. 1989–1992.
ICPRICPR-2010-WangYLZLCT #distance #novel
A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding (RW, XY, XL, SZ, PL, KC, JT), pp. 886–889.
ICPRICPR-2010-WuLSZ #modelling #word
Integrating ILSR to Bag-of-Visual Words Model Based on Sparse Codes of SIFT Features Representations (LW, SL, WS, XZ), pp. 4283–4286.
KDDKDD-2010-YanFDR #classification
Medical coding classification by leveraging inter-code relationships (YY, GF, JGD, RR), pp. 193–202.
SEKESEKE-2010-AlhassanCB #analysis #fault #network #people #social
Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
SEKESEKE-2010-ArrudaCD #detection #framework #using
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-BaratK #approach #code generation #configuration management #development #modelling
Developing configurable extensible code generators for model-driven development approach (SB, VK), pp. 577–582.
SEKESEKE-2010-WangWLX #developer
Assisting Developers to Read Code Help-Documents Efficiently through Discovering Document-section Relationships (LW, LW, GL, BX), pp. 367–373.
ECMFAECMFA-2010-EichbergMKM #execution #modelling
Model-Driven Engineering of Machine Executable Code (ME, MM, SK, MM), pp. 104–115.
MODELSMoDELS-v1-2010-RahimW #code generation #consistency #semantics #state machine #verification
Verifying Semantic Conformance of State Machine-to-Java Code Generators (LAR, JW), pp. 166–180.
SPLCSPLC-2010-BergerSLCW #product line #scalability
Feature-to-Code Mapping in Two Large Product Lines (TB, SS, RL, KC, AW), pp. 498–499.
SPLCSPLC-2010-GhanamM #execution #feature model #modelling #testing #using
Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
ECOOPECOOP-2010-Lea
Code Roots (DL), p. 1.
ECOOPECOOP-2010-SchaferDSTT #concurrent #java #refactoring
Correct Refactoring of Concurrent Java Code (MS, JD, MS, ET, FT), pp. 225–249.
OOPSLAOOPSLA-2010-GabelYYGS #consistency #detection #nondeterminism #scalability #source code
Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
OOPSLAOOPSLA-2010-HerzeelC #control flow #interactive #parallel #recursion
Dynamic parallelization of recursive code: part 1: managing control flow interactions with the continuator (CH, PC), pp. 377–396.
OOPSLAOOPSLA-2010-LernerVG #aspect-oriented #javascript #using
Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
TOOLSTOOLS-EUROPE-2010-HeideggerT #javascript #testing
Contract-Driven Testing of JavaScript Code (PH, PT), pp. 154–172.
PADLPADL-2010-LiT #detection #erlang #source code
Similar Code Detection and Elimination for Erlang Programs (HL, SJT), pp. 104–118.
POPLPOPL-2010-BhargavanFG #composition #protocol #security #type system #verification
Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
POPLPOPL-2010-WrigstadNLOV #scripting language
Integrating typed and untyped code in a scripting language (TW, FZN, SL, , JV), pp. 377–388.
SASSAS-2010-Fahndrich #contract #verification
Static Verification for Code Contracts (MF), pp. 2–5.
RERE-2010-EgyedGG #quality
Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments (AE, FG, PG), pp. 221–230.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface #using
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
ASEASE-2010-BalzSG #maintenance #modelling #state machine #tool support
Tool support for continuous maintenance of state machine models in program code (MB, MS, MG), pp. 175–176.
ASEASE-2010-BiegelD #api #clone detection #detection #flexibility #implementation #named
JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
ASEASE-2010-Chen #documentation #source code #traceability #visualisation
Extraction and visualization of traceability relationships between documents and source code (XC), pp. 505–510.
ASEASE-2010-GermanMI #automation #identification #source code
A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
ASEASE-2010-KessentiniVS #identification #risk management
Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
ASEASE-2010-MontrieuxJHYST #code generation #tool support
Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
ASEASE-2010-RajeevSSR #code generation #named #testing
CoGenTe: a tool for code generator testing (ACR, PS, KCS, SR), pp. 349–350.
ASEASE-2010-SchulteFW #assembly #automation #evolution #program repair
Automated program repair through the evolution of assembly code (ES, SF, WW), pp. 313–316.
ASEASE-2010-TaleghaniA
Search-carrying code (AT, JMA), pp. 367–376.
FSEFSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity
Leveraging usage similarity for effective retrieval of examples in code repositories (SKB, JO, CVL), pp. 157–166.
FSEFSE-2010-GabelS #case study #source code
A study of the uniqueness of source code (MG, ZS), pp. 147–156.
FSEFSE-2010-LeeRHK #clone detection
Instant code clone search (MWL, JWR, SwH, SK), pp. 167–176.
ICSEICSE-2010-AdamsJH #identification #using
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-BacchelliLR #source code
Linking e-mails and source code artifacts (AB, ML, RR), pp. 375–384.
ICSEICSE-2010-Bragdon
Developing and evaluating the code bubbles metaphor (AB), pp. 525–526.
ICSEICSE-2010-BragdonRZKCKCAL #development #ide #paradigm #user interface
Code bubbles: rethinking the user interface paradigm of integrated development environments (AB, SPR, RCZ, SK, WC, JK, CC, FA, JJLJ), pp. 455–464.
ICSEICSE-2010-BragdonRZKCKCAL10a #research
A research demonstration of code bubbles (AB, SPR, RCZ, SK, WC, JK, CC, FA, JJLJ), pp. 293–296.
ICSEICSE-2010-Cleland-HuangCGE #approach #machine learning #requirements
A machine learning approach for tracing regulatory codes to product specific requirements (JCH, AC, MG, JE), pp. 155–164.
ICSEICSE-2010-DeissenboeckHJ #clone detection #detection
Code clone detection in practice (FD, BH, EJ), pp. 499–500.
ICSEICSE-2010-DeLineR #development #towards
Code canvas: zooming towards better development environments (RD, KR), pp. 207–210.
ICSEICSE-2010-FritzOMM #source code
A degree-of-knowledge model to capture source code familiarity (TF, JO, GCM, ERMH), pp. 385–394.
ICSEICSE-2010-GenevesL #source code #xquery
Eliminating dead-code from XQuery programs (PG, NL), pp. 305–306.
ICSEICSE-2010-GuoSZS #empirical #smell
Domain-specific tailoring of code smells: an empirical study (YG, CBS, NZ, FS), pp. 167–170.
ICSEICSE-2010-Gysin #code search #social
Improved social trustability of code search results (FSG), pp. 513–514.
ICSEICSE-2010-HaiducAM #comprehension #source code #summary
Supporting program comprehension with source code summarization (SH, JA, AM), pp. 223–226.
ICSEICSE-2010-UbayashiNT #architecture #contract #design #named
Archface: a contract place where architectural design and code meet together (NU, JN, TT), pp. 75–84.
SACSAC-2010-DaroncoRL #assessment #quality #scalability #video
Subjective video quality assessment applied to scalable video coding and transmission instability (LCD, VR, JVdL), pp. 1898–1904.
SACSAC-2010-GiuntaPT #aspect-oriented #design pattern #using
Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SACSAC-2010-GravinoTS #analysis #comprehension #empirical #modelling #source code
An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
SACSAC-2010-HonoratoB #named #towards
NCL-inspector: towards improving NCL code (GdSCH, SDJB), pp. 1946–1947.
SACSAC-2010-LeeJL #detection #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LesnerBBB #detection #exclamation #framework #novel #source code #student
A novel framework to detect source code plagiarism: now, students have to work for real! (BL, RB, CB, GB), pp. 57–58.
SACSAC-2010-MilettoPSB #music #social #web
Social music making on the web with CODES (EMM, MSP, JPS, FB), pp. 876–877.
SACSAC-2010-SamiF #estimation #metric
Design-level metrics estimation based on code metrics (AS, SMF), pp. 2531–2535.
GPCEGPCE-2010-RompfO #approach #code generation #composition #domain-specific language #lightweight #runtime #staging
Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs (TR, MO), pp. 127–136.
GPCEGPCE-2010-SchulzeAK #feature model #product line
Code clones in feature-oriented software product lines (SS, SA, CK), pp. 103–112.
GPCEGPCE-2010-WurthingerBAMM #aspect-oriented #development #evolution #java #programming #user interface
Applications of enhanced dynamic code evolution for Java in GUI development and dynamic aspect-oriented programming (TW, WB, DA, PM, HM), pp. 123–126.
CCCC-2010-BaskaranRS #automation #code generation #source code
Automatic C-to-CUDA Code Generation for Affine Programs (MMB, JR, PS), pp. 244–263.
CCCC-2010-DingO #algorithm #representation #strict
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values (SD, ), pp. 26–45.
CCCC-2010-JockschMSGA #compilation #mining
Mining Opportunities for Code Improvement in a Just-In-Time Compiler (AJ, MM, JS, NG, JNA), pp. 10–25.
CGOCGO-2010-KochBF #code generation
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bit instructions (TJKEvK, IB, BF), pp. 180–189.
CGOCGO-2010-Srisa-anCSS #memory management #self
A self-adjusting code cache manager to balance start-up time and memory usage (WSa, MBC, YS, MS), pp. 82–91.
CGOCGO-2010-YuXHFZ #analysis #pointer #scalability
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
DATEDATE-2010-AgyekumN #communication #hardware #robust
An error-correcting unordered code and hardware support for robust asynchronous global communication (MYA, SMN), pp. 765–770.
DATEDATE-2010-BaudischBS #independence #parallel #source code #thread
Multithreaded code from synchronous programs: Extracting independent threads for OpenMP (DB, JB, KS), pp. 949–952.
DATEDATE-2010-CharfiMGTB #code generation #modelling #optimisation #towards
Toward optimized code generation through model-based optimization (AC, CM, SG, FT, PB), pp. 1313–1316.
DATEDATE-2010-ChenW #adaptation #memory management #random
An adaptive code rate EDAC scheme for random access memory (CYC, CWW), pp. 735–740.
DATEDATE-2010-CollinsVC #code generation #manycore #parallel #recursion
Recursion-driven parallel code generation for multi-core platforms (RLC, BV, LPC), pp. 190–195.
DATEDATE-2010-HuangCLH #robust
A robust ADC code hit counting technique (JLH, KYC, MHL, XLH), pp. 1749–1754.
DATEDATE-2010-MayIWR
A 150Mbit/s 3GPP LTE Turbo code decoder (MM, TI, NW, WR), pp. 1420–1425.
DATEDATE-2010-ZhangDYMZKCPS #code generation #compilation #evaluation
A special-purpose compiler for look-up table and code generation for function evaluation (YZ, LD, PY, SPM, HZ, MTK, CC, NP, XS), pp. 1130–1135.
LCTESLCTES-2010-LiZ #embedded #mobile #performance
An efficient code update scheme for DSP applications in mobile embedded systems (WL, YZ), pp. 105–114.
PDPPDP-2010-LorenzoPLRS #lessons learnt #migration #parallel
Lessons Learnt Porting Parallelisation Techniques for Irregular Codes to NUMA Systems (JAL, JCP, DLL, FFR, DES), pp. 213–217.
PDPPDP-2010-Rodriguez-PascualGCRLM #grid
A Grid Version of the Fusion Code FAFNER (MARP, JG, FC, AJRM, IML, RM), pp. 449–453.
PDPPDP-2010-TskhakayaSSBYW #simulation
PIC/MC Code BIT1 for Plasma Simulations on HPC (DT, AS, RS, MB, EY, JW), pp. 476–481.
FASEFASE-2010-HashimotoM #evolution
A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
STOCSTOC-2010-GuruswamiHK #linear #on the #random
On the list-decodability of random linear codes (VG, JH, SK), pp. 409–416.
STOCSTOC-2010-KoppartyS #fault #linear #random #testing
Local list-decoding and testing of random linear codes from high error (SK, SS), pp. 417–426.
TACASTACAS-2010-DonaldsonKR #analysis #automation #manycore #memory management
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
TACASTACAS-2010-KatzP #automation #verification
Code Mutation in Verification and Automatic Code Correction (GK, DP), pp. 435–450.
CAVCAV-2010-Jha #legacy #security
Retrofitting Legacy Code for Security (SJ), p. 19.
CAVCAV-2010-RepsLTBL #verification
There’s Plenty of Room at the Bottom: Analyzing and Verifying Machine Code (TWR, JL, AVT, GB, AL), pp. 41–56.
CAVCAV-2010-ThakurLLBDEAR #generative #proving
Directed Proof Generation for Machine Code (AVT, JL, AL, AB, ED, ME, TA, TWR), pp. 288–305.
CSLCSL-2010-BiancoMM #logic
Graded Computation Tree Logic with Binary Coding (AB, FM, AM), pp. 125–139.
ICLPICLP-2010-Dandois10 #logic programming #program analysis #source code
Program analysis for code duplication in logic programs (CD), pp. 241–247.
ICSTICST-2010-GligoricJM #mutation testing #named #parallel #performance #testing #thread
MuTMuT: Efficient Exploration for Mutation Testing of Multithreaded Code (MG, VJ, DM), pp. 55–64.
ISSTAISSTA-2010-CarbinR #automation #identification
Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
WICSA-ECSAWICSA-ECSA-2009-BontaB #algebra #architecture #code generation #java #named #process
PADL2Java: A Java code generator for process algebraic architectural descriptions (EB, MB), pp. 161–170.
ICDARICDAR-2009-BaiLT #documentation #image #keyword #word
Keyword Spotting in Document Images through Word Shape Coding (SB, LL, CLT), pp. 331–335.
ICDARICDAR-2009-DengSS #network #recognition
Error-Correcting Output Coding for the Convolutional Neural Network for Optical Character Recognition (HD, GS, CYS), pp. 581–585.
ICDARICDAR-2009-LiT #identification #independence #online #sequence
Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes (BL, TT), pp. 931–935.
ICDARICDAR-2009-PalRRK #automation #multi #recognition #string
Indian Multi-Script Full Pin-code String Recognition for Postal Automation (UP, RKR, KR, FK), pp. 456–460.
ICDARICDAR-2009-SiddiqiV #recognition #set
A Set of Chain Code Based Features for Writer Recognition (IS, NV), pp. 981–985.
JCDLJCDL-2009-EdvardsenSAT #automation #documentation #generative #metadata #quality
Automatically generating high quality metadata by analyzing the document code of common file types (LFHE, IS, TA, HT), pp. 29–38.
ITiCSEITiCSE-2009-Gibson #reuse
Software reuse and plagiarism: a code of practice (JPG), pp. 55–59.
ITiCSEITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming #using
Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ICPCICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-AbebeHMTA #evolution #source code
Analyzing the Evolution of the Source Code Vocabulary (SLA, SH, AM, PT, GA), pp. 189–198.
CSMRCSMR-2009-Ghazarian #case study #evolution #source code
A Case Study of Source Code Evolution (AG), pp. 159–168.
CSMRCSMR-2009-LuciaDGR #behaviour #identification #parsing #visual notation
Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation (ADL, VD, CG, MR), pp. 99–108.
ICPCICPC-2009-AuprasertL #representation #source code
Representing source code with Granular hierarchical structures (BA, YL), pp. 319–320.
ICPCICPC-2009-CeccatoPNFRTT #assessment #effectiveness #obfuscation #source code
The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
ICPCICPC-2009-ChilowiczDR #detection #similarity #source code #syntax
Syntax tree fingerprinting for source code similarity detection (MC, ÉD, GR), pp. 243–247.
ICPCICPC-2009-HammadCM #automation #identification #traceability
Automatically identifying changes that impact code-to-design traceability (MH, MLC, JIM), pp. 20–29.
ICPCICPC-2009-HanWYCZL #clustering #comprehension #design pattern #open source #source code
Design pattern directed clustering for understanding open source code (ZH, LW, LY, XC, JZ, XL), pp. 295–296.
ICPCICPC-2009-NilssonLHN #fact extraction #natural language #parsing #source code
Natural language parsing for fact extraction from source code (JN, WL, JH, JN), pp. 223–227.
ICPCICPC-2009-PortoMF #comprehension #named #visualisation
CRISTA: A tool to support code comprehension based on visualization and reading technique (DP, MGM, SCPFF), pp. 285–286.
ICSMEICSM-2009-Adams #co-evolution #source code
Co-evolution of source code and the build system (BA), pp. 461–464.
ICSMEICSM-2009-AlamAH #dependence #using
Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSMEICSM-2009-HolmesCWD #case study #source code #using
The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSMEICSM-2009-HouJJ
Proactively managing copy-and-paste induced code clones (DH, FJ, PJ), pp. 391–392.
ICSMEICSM-2009-NigulM #maintenance
Software maintainability benefits from annotation-driven code (LN, EM), pp. 417–421.
ICSMEICSM-2009-PletcherH #api #code completion #named #usability
BCC: Enhancing code completion for better API usability (DMP, DH), pp. 393–394.
ICSMEICSM-2009-Reiss #code search #semantics
Semantics-based code search demonstration proposal (SPR), pp. 385–386.
ICSMEICSM-2009-Wang #developer #motivation #source code #what
What motivate software engineers to refactor source code? evidences from professional developers (YW), pp. 413–416.
ICSMEICSM-2009-WitZD #clone tracking #using
Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSMEICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability #using
Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
ICSMEICSM-2009-Zhang #fault
An investigation of the relationships between lines of code and defects (HZ), pp. 274–283.
MSRMSR-2009-BajracharyaL #code search #mining #topic
Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
MSRMSR-2009-BoogerdM #standard
Evaluating the relation between coding standard violations and faultswithin and across software versions (CB, LM), pp. 41–50.
MSRMSR-2009-EnslenHPV #analysis #automation #identifier #mining #source code
Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
MSRMSR-2009-GermanPGA
Code siblings: Technical and legal implications of copying code between applications (DMG, MDP, YGG, GA), pp. 81–90.
MSRMSR-2009-HattoriL #mining
Mining the history of synchronous changes to refine code ownership (LH, ML), pp. 141–150.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #using #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSRMSR-2009-LubsenZP #co-evolution #using
Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSRMSR-2009-Mockus #scalability #source code #towards #version control
Amassing and indexing a large sample of version control systems: Towards the census of public source code history (AM), pp. 11–20.
SCAMSCAM-2009-GutzmannS #java
Backporting Java 5 Code (TG, TS), pp. 121–122.
SCAMSCAM-2009-KlintSV #analysis #domain-specific language #named #rascal #source code
RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
SCAMSCAM-2009-Prause #fine-grained #maintenance #metadata
Maintaining Fine-Grained Code Metadata Regardless of Moving, Copying and Merging (CP), pp. 109–118.
WCREWCRE-1999-AlamAH99a #case study #dependence
A Study of the Time Dependence of Code Changes (OA, BA, AEH), pp. 21–30.
WCREWCRE-1999-AnquetilRAAHPPP99a #architecture #java #named #source code
JavaCompExt: Extracting Architectural Elements from Java Source Code (NA, JCR, PA, GA, PH, TP, DP, VP), pp. 317–318.
WCREWCRE-1999-BacchelliDLR99a #benchmark #lightweight #metric #source code
Benchmarking Lightweight Techniques to Link E-Mails and Source Code (AB, MD, ML, RR), pp. 205–214.
WCREWCRE-1999-BettenburgSIAZH99a #consistency #empirical
An Empirical Study on Inconsistent Changes to Code Clones at Release Level (NB, WS, WMI, BA, YZ, AEH), pp. 85–94.
WCREWCRE-1999-ButlerWYS99a #empirical #identifier #quality
Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
WCREWCRE-1999-HigoK99a #clone detection #dependence #detection #graph #quality
Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
WCREWCRE-1999-KawaguchiYUFKNI99a #automation #clone detection #detection #ide #named
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
WCREWCRE-1999-KhomhPG99a #case study #smell
An Exploratory Study of the Impact of Code Smells on Software Change-proneness (FK, MDP, YGG), pp. 75–84.
WCREWCRE-1999-LetarteM99a #interprocedural #modelling #php
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code (DL, EM), pp. 187–191.
WCREWCRE-1999-PentaG99a #how #question #source code
Who are Source Code Contributors and How do they Change? (MDP, DMG), pp. 11–20.
WCREWCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code #using
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
ICALPICALP-v1-2009-KobayashiGNR #communication #network #quantum
General Scheme for Perfect Quantum Network Coding with Free Classical Communication (HK, FLG, HN, MR), pp. 622–633.
ICFPICFP-2009-Steele #execution #functional #parallel
Organizing functional code for parallel execution or, foldl and foldr considered slightly harmful (GLSJ), pp. 1–2.
CHICHI-2009-BrandtGLDK #learning #programming #web
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code (JB, PJG, JL, MD, SRK), pp. 1589–1598.
CHICHI-2009-JakobsenH #source code #using #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
VISSOFTVISSOFT-2009-CottrellGHWD #source code #visual notation
Compare and contrast: Visual exploration of source code examples (RC, BG, RH, RJW, JD), pp. 29–32.
VISSOFTVISSOFT-2009-ParkJ #open source #visualisation
Beyond pretty pictures: Examining the benefits of code visualization for Open Source newcomers (YP, CJ), pp. 3–10.
VISSOFTVISSOFT-2009-TeleaHER #c #c++ #case study #comparative #dependence #scalability #visualisation
Extraction and visualization of call dependencies for large C/C++ code bases: A comparative study (ACT, HH, OE, DR), pp. 81–88.
CIKMCIKM-2009-GedikAW #approach #code generation #data type #distributed #optimisation
A code generation approach to optimizing high-performance distributed data stream processing (BG, HA, KLW), pp. 847–856.
ICMLICML-2009-MairalBPS #learning #online #taxonomy
Online dictionary learning for sparse coding (JM, FRB, JP, GS), pp. 689–696.
KDDKDD-2009-BohmHMP #detection #named
CoCo: coding cost for parameter-free outlier detection (CB, KH, NSM, CP), pp. 149–158.
RecSysRecSys-2009-WeimerKB #matrix #recommendation
Maximum margin matrix factorization for code recommendation (MW, AK, MB), pp. 309–312.
SEKESEKE-2009-AxelssonBFSK #code review #detection #fault #interactive #machine learning #overview #visualisation
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning (SA, DB, RF, DS, DK), pp. 412–417.
SEKESEKE-2009-HauboldBG #code generation #metamodelling #object-oriented #uml
A Pragmatic UML-based Meta Model for Object-oriented Code Generation (TH, GB, WG), pp. 733–738.
SIGIRSIGIR-2009-LinYCWW #approach #modelling #semantics #thread
Simultaneously modeling semantics and structure of threaded discussions: a sparse coding approach and its applications (CL, JMY, RC, XJW, WW, LZ), pp. 131–138.
MODELSMoDELS-2009-MoiseevHS #approach #generative #implementation #ocl
Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
MODELSMoDELS-2009-MoiseevHS #approach #generative #implementation #ocl
Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
OOPSLAOOPSLA-2009-LeeHGM #debugging
Debug all your code: portable mixed-environment debugging (BL, MH, RG, KSM), pp. 207–226.
OOPSLAOOPSLA-2009-Mullen #design #people
Writing code for other people: cognitive psychology and the fundamentals of good software design principles (TM), pp. 481–492.
OOPSLAOOPSLA-2009-PluquetLW #graph #in memory #performance #version control
Executing code in the past: efficient in-memory object graph versioning (FP, SL, RW), pp. 391–408.
TOOLSTOOLS-EUROPE-2009-CaronCMV #adaptation #component #framework #functional
A Coding Framework for Functional Adaptation of Coarse-Grained Components in Extensible EJB Servers (OC, BC, AM, GV), pp. 215–230.
AdaEuropeAdaEurope-2009-LasnierZPH #analysis #automation #code generation #modelling
Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
PLDIPLDI-2009-TristanL #lazy evaluation #validation
Verified validation of lazy code motion (JBT, XL), pp. 316–326.
POPLPOPL-2009-BartheGB #certification #encryption #proving
Formal certification of code-based cryptographic proofs (GB, BG, SZB), pp. 90–101.
POPLPOPL-2009-ConditHLQ #low level #type checking
Unifying type checking and property checking for low-level code (JC, BH, SKL, SQ), pp. 302–314.
POPLPOPL-2009-LublinermanST #code generation #composition #diagrams
Modular code generation from synchronous block diagrams: modularity vs. code size (RL, CS, ST), pp. 78–89.
POPLPOPL-2009-SarkarSNORBMA #multi #semantics
The semantics of x86-CC multiprocessor machine code (SS, PS, FZN, SO, TR, TB, MOM, JA), pp. 379–391.
RERE-2009-OmoronyiaSRFW #case study #developer #navigation #source code #traceability
Use Case to Source Code Traceability: The Developer Navigation View Point (IO, GS, MR, JDF, MW), pp. 237–242.
ASEASE-2009-HanWM #code completion
Code Completion from Abbreviated Input (SH, DRW, RCM), pp. 332–343.
ASEASE-2009-KawrykowR #api #automation #detection
Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
ESEC-FSEESEC-FSE-2009-BruchMM #code completion #learning
Learning from examples to improve code completion systems (MB, MM, MM), pp. 213–222.
ESEC-FSEESEC-FSE-2009-ThummalapentaXTHS #generative #mining #named #object-oriented #source code #testing
MSeqGen: object-oriented unit-test generation via mining source code (ST, TX, NT, JdH, WS), pp. 193–202.
GTTSEGTTSE-2009-DinizC #architecture #configuration management #embedded #program transformation
Code Transformations for Embedded Reconfigurable Computing Architectures (PCD, JMPC), pp. 322–344.
GTTSEGTTSE-2009-JorgesSM #code generation #tutorial
Building Code Generators with Genesys: A Tutorial Introduction (SJ, BS, TMS), pp. 364–385.
ICSEICSE-2009-DigME #concurrent #java #library #refactoring
Refactoring sequential Java code for concurrency via concurrent libraries (DD, JM, MDE), pp. 397–407.
ICSEICSE-2009-Hassan #complexity #fault #predict #using
Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSEICSE-2009-HillPV #automation #maintenance #reuse #source code
Automatically capturing source code context of NL-queries for software maintenance and reuse (EH, LLP, KVS), pp. 232–242.
ICSEICSE-2009-JurgensDHW #matter #question
Do code clones matter? (EJ, FD, BH, SW), pp. 485–495.
ICSEICSE-2009-KimN #representation
Discovering and representing systematic code changes (MK, DN), pp. 309–319.
ICSEICSE-2009-Mockus #developer #named
Succession: Measuring transfer of code and developer productivity (AM), pp. 67–77.
ICSEICSE-2009-PadioleauTZ #operating system #taxonomy
Listening to programmers — Taxonomies and characteristics of comments in operating system code (YP, LT, YZ), pp. 331–341.
ICSEICSE-2009-Reiss #code search #semantics
Semantics-based code search (SPR), pp. 243–253.
SACSAC-2009-BohnetVD #debugging #execution #locality
Projecting code changes onto execution traces to support localization of recently introduced bugs (JB, SV, JD), pp. 438–442.
SACSAC-2009-GohKCC #analysis #performance #scalability #video
Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
SACSAC-2009-KiyoharaMMNK #embedded #performance
Method for fast compression of program codes for remote updates in embedded systems (RK, SM, MM, MN, SK), pp. 1683–1684.
SACSAC-2009-LemosBOML #code search #reuse #testing #using
Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
SACSAC-2009-MathuriyaBHH #manycore #named #predict #scalability
GTfold: a scalable multicore code for RNA secondary structure prediction (AM, DAB, CEH, SCH), pp. 981–988.
SACSAC-2009-WangT #algorithm #morphism
An algorithm for optimal comma free codes with isomorphism rejection (HW, VDT), pp. 1007–1008.
LDTALDTA-2008-ChilowiczDR09 #source code
Finding Similarities in Source Code Through Factorization (MC, ÉD, GR), pp. 47–62.
LDTALDTA-2008-Nilsson-NymanHME09 #analysis #declarative #java #source code
Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
CCCC-2009-Grosslinger #array #precise
Precise Management of Scratchpad Memories for Localising Array Accesses in Scientific Codes (AG), pp. 236–250.
CCCC-2009-Padioleau #c #c++ #parsing #preprocessor
Parsing C/C++ Code without Pre-processing (YP), pp. 109–125.
CCCC-2009-Sarkar #challenge #optimisation #parallel #source code
Challenges in Code Optimization of Parallel Programs (VS), p. 1.
CGOCGO-2009-BoissinotDRDG #correctness #performance #quality
Revisiting Out-of-SSA Translation for Correctness, Code Quality and Efficiency (BB, AD, FR, BDdD, CG), pp. 114–125.
CGOCGO-2009-CollinB #embedded #taxonomy
Two-Level Dictionary Code Compression: A New Scheme to Improve Instruction Code Density of Embedded Applications (MC, MB), pp. 231–242.
CGOCGO-2009-KumarCS #debugging
Transparent Debugging of Dynamically Optimized Code (NK, BRC, MLS), pp. 275–286.
DACDAC-2009-BaiocchiC #in memory #memory management #using
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DACDAC-2009-FalkK
Optimal static WCET-aware scratchpad allocation of program code (HF, JCK), pp. 732–737.
DACDAC-2009-PapirlaC #energy #fault
Energy-aware error control coding for Flash memories (VP, CC), pp. 658–663.
DATEDATE-2009-ChenKLA
Accelerating FPGA-based emulation of quasi-cyclic LDPC codes with vector processing (XC, JK, SL, VA), pp. 1530–1535.
DATEDATE-2009-VidalLGSD #approach #co-evolution #code generation #design #embedded #modelling #uml
A co-design approach for embedded system modeling and code generation with UML and MARTE (JV, FdL, GG, PS, JPD), pp. 226–231.
LCTESLCTES-2009-HeinzW #code generation #towards
Towards device emulation code generation (TH, RW), pp. 109–118.
FASEFASE-2009-AcharyaX #api #mining #source code #specification
Mining API Error-Handling Specifications from Source Code (MA, TX), pp. 370–384.
FASEFASE-2009-Wachsmuth
A Formal Way from Text to Code Templates (GW), pp. 109–123.
STOCSTOC-2009-Efremenko
3-query locally decodable codes of subexponential length (KE), pp. 39–44.
STOCSTOC-2009-GopalanGR
List decoding tensor products and interleaved codes (PG, VG, PR), pp. 13–22.
STOCSTOC-2009-Guruswami #morphism
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes (VG), pp. 23–32.
CAVCAV-2009-LahiriQR #concurrent #detection #fault #precise #smt #using
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
ICLPICLP-2009-Moura #effectiveness #encapsulation #prolog #reuse
From Plain Prolog to Logtalk Objects: Effective Code Encapsulation and Reuse (PM), p. 23.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage #using
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-JiangS #automation #mining #random testing #testing
Automatic mining of functionally equivalent code fragments via random testing (LJ, ZS), pp. 81–92.
ISSTAISSTA-2009-SaebjornsenWPQS #bytecode #detection
Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
VMCAIVMCAI-2009-RakamaricH #low level #memory management #scalability
A Scalable Memory Model for Low-Level Code (ZR, AJH), pp. 290–304.
CSEETCSEET-2008-GotterbarnM #re-engineering #using
Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
ITiCSEITiCSE-2008-JiWC #contest #detection #experience #programming #source code
An experience of detecting plagiarized source codes in competitive programming contests (JHJ, GW, HGC), p. 369.
CSMRCSMR-2008-Bruntink #c #exception #legacy #re-engineering
Reengineering Idiomatic Exception Handling in Legacy C Code (MB), pp. 133–142.
CSMRCSMR-2008-CeccatoTM #goto #java #legacy #migration
Goto Elimination Strategies in the Migration of Legacy Code to Java (MC, PT, CM), pp. 53–62.
CSMRCSMR-2008-KanellopoulosTHV #clustering #maintenance #source code
Interpretation of Source Code Clusters in Terms of the ISO/IEC-9126 Maintainability Characteristics (YK, CT, IH, JV), pp. 63–72.
CSMRCSMR-2008-PantosBGG #adaptation #assessment #case study #experience #quality #source code
Experiences in Adapting a Source Code-Based Quality Assessment Technology (JP, ÁB, PG, TG), pp. 311–313.
CSMRCSMR-2008-TeleaV08a #optimisation #performance #scalability
A Tool for Optimizing the Build Performance of Large Software Code Bases (ACT, LV), pp. 323–325.
ICPCICPC-2008-BhattiDR #mining #object-oriented
Aspect Mining in Procedural Object Oriented Code (MUB, SD, AR), pp. 230–235.
ICPCICPC-2008-BohnetVD #comprehension #execution
Locating and Understanding Features of Complex Software Systems by Synchronizing Time-, Collaboration- and Code-Focused Views on Execution Traces (JB, SV, JD), pp. 268–271.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code #using
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-HaiducM #on the #source code #using
On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPCICPC-2008-PinzgerGKG #comprehension #dependence #source code #visual notation
A Tool for Visual Understanding of Source Code Dependencies (MP, KG, PK, HCG), pp. 254–259.
ICPCICPC-2008-RobillardM #comprehension #reuse
Reusing Program Investigation Knowledge for Code Understanding (MPR, PM), pp. 202–211.
ICPCICPC-2008-RohatgiHR #approach #dynamic analysis
An Approach for Mapping Features to Code Based on Static and Dynamic Analysis (AR, AHL, JR), pp. 236–241.
ICPCICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing #using
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-AnvikS #issue tracking #maintenance #source code
Task articulation in software maintenance: Integrating source code annotations with an issue tracking system (JA, MADS), pp. 460–461.
ICSMEICSM-2008-BoogerdM #empirical #standard
Assessing the value of coding standards: An empirical study (CB, LM), pp. 277–286.
ICSMEICSM-2008-KagdiHM #question #source code
Who can help me with this source code change? (HHK, MH, JIM), pp. 157–166.
ICSMEICSM-2008-Kamiya #analysis #identifier
Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
ICSMEICSM-2008-Lozano #source code
A methodology to assess the impact of source code flaws in changeability, and its application to clones (AL), pp. 424–427.
MSRMSR-2008-ChangM #detection #evaluation #source code
Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
MSRMSR-2008-OmoriM #development #editing #source code
A change-aware development environment by recording editing operations of source code (TO, KM), pp. 31–34.
SCAMSCAM-2008-Cifuentes #c #debugging #named #scalability
Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
SCAMSCAM-2008-FehnkerHRS #assembly #embedded #program analysis
Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
SCAMSCAM-2008-GermanRH #graph #impact analysis
Change Impact Graphs: Determining the Impact of Prior Code Changes (DMG, GR, AEH), pp. 184–193.
SCAMSCAM-2008-Gomez-ZamalloaAP #composition #decompiler #low level #partial evaluation
Modular Decompilation of Low-Level Code by Partial Evaluation (MGZ, EA, GP), pp. 239–248.
SCAMSCAM-2008-HindleGH
From Indentation Shapes to Code Structures (AH, MWG, RCH), pp. 111–120.
SCAMSCAM-2008-Krinke #question
Is Cloned Code More Stable than Non-cloned Code? (JK), pp. 57–66.
SCAMSCAM-2008-PentaCA #detection #evolution #source code
The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
SCAMSCAM-2008-RodriguesB #coordination #legacy #named
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code (NFR, LSB), pp. 265–266.
SCAMSCAM-2008-WangZZ #automation #detection #model checking #program analysis
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
WCREWCRE-2008-BhattiDH #object-oriented
Reconsidering Classes in Procedural Object-Oriented Code (MUB, SD, MH), pp. 257–266.
WCREWCRE-2008-IshioDMI #detection #java #mining #source code
Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs (TI, HD, TM, KI), pp. 123–132.
WCREWCRE-2008-LukinsKE #debugging #locality #retrieval #source code #using
Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCREWCRE-2008-RompaeyD #estimation #using
Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
WCREWCRE-2008-Zhang #source code
Exploring Regularity in Source Code: Software Science and Zipf’s Law (HZ), pp. 101–110.
AFLAFL-2008-Cruz-ReyesK #automaton
Non-Linear Subband Coding with Cellular Automata (CCR, JK), pp. 146–157.
CIAACIAA-2008-LahodaMZ #pattern matching
Pattern Matching in DCA Coded Text (JL, BM, JZ), pp. 151–160.
ICALPICALP-A-2008-ChengW #complexity
Complexity of Decoding Positive-Rate Reed-Solomon Codes (QC, DW), pp. 283–293.
ICALPICALP-A-2008-IwamaNPRY #linear #network #polynomial
Polynomial-Time Construction of Linear Network Coding (KI, HN, MP, RR, SY), pp. 271–282.
LATALATA-2008-MoczuradM #how #question #set
How Many Figure Sets Are Codes? (MM, WM), pp. 385–396.
LATALATA-2008-SalomaaSY
Length Codes, Products of Languages and Primality (AS, KS, SY), pp. 476–486.
FMFM-2008-GrandyBSSR #protocol #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
SEFMSEFM-2008-Giacobazzi #abstract interpretation #security
Abstract Interpretation in Code Security (RG), p. 3.
SEFMSEFM-2008-Giacobazzi08a #obfuscation
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
SEFMSEFM-2008-SampathRRS #behaviour #code generation #testing
Behaviour Directed Testing of Auto-code Generators (PS, ACR, SR, KCS), pp. 191–200.
CHICHI-2008-SubrahmaniyanBGBWNBDF #debugging #testing #what
Testing vs. code inspection vs. what else?: male and female end users’ debugging strategies (NS, LB, VG, MMB, SW, VN, KB, RD, XZF), pp. 617–626.
SOFTVISSOFTVIS-2008-ParninGN #lightweight #smell #visualisation
A catalogue of lightweight visualizations to support code smell inspection (CP, CG, ON), pp. 77–86.
SOFTVISSOFTVIS-2008-TeleaV #c++ #interactive #reverse engineering #scalability
An interactive reverse engineering environment for large-scale C++ code (ACT, LV), pp. 67–76.
ICPRICPR-2008-EscaleraPR
Separability of ternary Error-Correcting Output Codes (SE, OP, PR), pp. 1–4.
ICPRICPR-2008-EscaleraPR08a
Error-Correcting output coding for chagasic patients characterization (SE, OP, PR), pp. 1–4.
ICPRICPR-2008-Rokui #using
Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
KDDKDD-2008-Sindhgatta #developer #identification #source code
Identifying domain expertise of developers from source code (RS), pp. 981–989.
SEKESEKE-2008-BaiL #named #source code #testing
SyncTest: a Tool to Synchronize Source Code, Model and Testing (XB, TL), pp. 723–728.
SEKESEKE-2008-DuffyHM #c++ #comprehension #evolution #interface #library #protocol #reverse engineering #scalability
Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks (EBD, JOH, BAM), pp. 303–308.
SEKESEKE-2008-Fuad #architecture #distributed #program transformation #self
Code Transformation Techniques and Management Architecture for Self-manageable Distributed Applications (MMF), pp. 315–320.
SEKESEKE-2008-SandersZ #contract #design #execution #java
Object-Z to Java/OO-Perl: A Conversion from Object-Z to Executable Skeletal Code with Dynamically Checkable Design Contracts (SMS, CZ), pp. 824–829.
SEKESEKE-2008-TurhanB #fault #predict
Weighted Static Code Attributes for Software Defect Prediction (BT, ABB), pp. 143–148.
SIGIRSIGIR-2008-LiT #documentation #image #word
A word shape coding method for camera-based document images (LL, CLT), pp. 771–772.
ICMTICMT-2008-HemelKV #code generation #model transformation
Code Generation by Model Transformation (ZH, LCLK, EV), pp. 183–198.
MODELSMoDELS-2008-Gessenharter #code generation #java #semantics #uml
Mapping the UML2 Semantics of Associations to a Java Code Generation Model (DG), pp. 813–827.
MODELSMoDELS-2008-ProutADS #code generation #configuration management #semantics
Semantically Configurable Code Generation (AP, JMA, NAD, PS), pp. 705–720.
SPLCSPLC-2008-WeissLSDS #code generation
Decision-Model-Based Code Generation for SPLE (DMW, JJL, JHS, TTDT, HS), pp. 129–138.
MODELSMoDELS-2008-Gessenharter #code generation #java #semantics #uml
Mapping the UML2 Semantics of Associations to a Java Code Generation Model (DG), pp. 813–827.
MODELSMoDELS-2008-ProutADS #code generation #configuration management #semantics
Semantically Configurable Code Generation (AP, JMA, NAD, PS), pp. 705–720.
ECOOPECOOP-2008-HessellundS #analysis
Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
OOPSLAOOPSLA-2008-FerraraLF #dot-net
Safer unsafe code for .NET (PF, FL, MF), pp. 329–346.
OOPSLAOOPSLA-2008-ProkopskiV #performance #virtual machine
Analyzing the performance of code-copying virtual machines (GBP, CV), pp. 403–422.
TOOLSTOOLS-EUROPE-2008-DiskinED #modelling #semantics
Engineering Associations: From Models to Code and Back through Semantics (ZD, SME, JD), pp. 336–355.
AdaEuropeAdaEurope-2008-AlonsoVPA #ada #modelling #state machine #thread #visual notation
StateML+s: From Graphical State Machine Models to Thread-Safe Ada Code (DA, CVC, JAP, ), pp. 158–170.
LOPSTRLOPSTR-2008-CalcagnoDOY
Space Invading Systems Code (CC, DD, PWO, HY), pp. 1–3.
PADLPADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming #using
Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
PEPMPEPM-2008-KameyamaKS #staged
Closing the stage: from staged code to typed closures (YK, OK, CcS), pp. 147–157.
ASEASE-2008-BrichauKM #source code #using
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASEASE-2008-LiHG #code generation #interface #modelling #multi #named #process
MaramaEML: An Integrated Multi-View Business Process Modelling Environment with Tree-Overlays, Zoomable Interfaces and Code Generation (RLL, JGH, JCG), pp. 477–478.
ASEASE-2008-RobbesL #code completion #how #repository
How Program History Can Improve Code Completion (RR, ML), pp. 317–326.
ASEASE-2008-ThummalapentaX #detection #framework #mining #named #open source #source code #web
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web (ST, TX), pp. 327–336.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
FSEFSE-2008-CottrellWD #reuse #source code
Semi-automating small-scale source code reuse via structural correspondence (RC, RJW, JD), pp. 214–225.
FSEFSE-2008-DragertDR #concurrent #generative #using
Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSEFSE-2008-LivshitsK #bound #named #web
Doloto: code splitting for network-bound web 2.0 applications (VBL, EK), pp. 350–360.
ICSEICSE-2008-Duala-EkokoR #named #tool support
Clonetracker: tool support for code clone management (EDE, MPR), pp. 843–846.
ICSEICSE-2008-MoserPS #analysis #comparative #fault #metric #performance #predict
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
ICSEICSE-2008-SchaferJM #framework #mining
Mining framework usage changes from instantiation code (TS, JJ, MM), pp. 471–480.
SACSAC-2008-DuraoVAM #code search #semantics #source code
Applying a semantic layer in a source code search tool (FAD, TAV, ESdA, SRdLM), pp. 1151–1157.
SACSAC-2008-KhanCB #optimisation
Optimizing code through iterative specialization (MAK, HPC, DB), pp. 206–210.
SACSAC-2008-VargunM
Code-carrying theory (AV, DRM), pp. 376–383.
GPCEGPCE-2008-DenneyF #automation #generative #verification
Generating customized verifiers for automatically generated code (ED, BF), pp. 77–88.
GPCEGPCE-2008-KulkarniR #abstraction #code generation #component #generative #modelling #reuse
An abstraction for reusable MDD components: model-based generation of model-based code generators (VK, SR), pp. 181–184.
GPCEGPCE-2008-RosenmullerSSA #code generation #composition #product line
Code generation to support static and dynamic composition of software product lines (MR, NS, GS, SA), pp. 3–12.
SLESLE-2008-BastenK #fact extraction #named #parametricity #source code
DeFacto: Language-Parametric Fact Extraction from Source Code (BB, PK), pp. 265–284.
ASPLOSASPLOS-2008-ErtveldeE #benchmark #metric
Dispersing proprietary applications as benchmarks through code mutation (LVE, LE), pp. 201–210.
ASPLOSASPLOS-2008-McCunePPRS #execution #how #recommendation
How low can you go?: recommendations for hardware-supported minimal TCB code execution (JMM, BP, AP, MKR, AS), pp. 14–25.
ASPLOSASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CASECASE-2008-NagleW #named #using
GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CCCC-2008-LogozzoF #analysis #bytecode #on the #source code
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
CCCC-2008-NitaG #automation #c #multi
Automatic Transformation of Bit-Level C Code to Support Multiple Equivalent Data Layouts (MN, DG), pp. 85–99.
CCCC-2008-ProkopskiV #safety #virtual machine
Compiler-Guaranteed Safety in Code-Copying Virtual Machines (GBP, CV), pp. 163–177.
CCCC-2008-WangYW #compilation #legacy #optimisation #transaction
Supporting Legacy Binary Code in a Software Transaction Compiler with Dynamic Binary Translation and Optimization (CW, VY, YW), pp. 291–306.
CGOCGO-2008-MurphyMSSA #type safety
Fault-safe code motion for type-safe languages (BRM, VM, FTS, TS, ARAT), pp. 144–154.
CGOCGO-2008-Sarkar #optimisation #parallel #source code
Code optimization of parallel programs: evolutionary vs. revolutionary approaches (VS), p. 1.
DATEDATE-2008-BonnyH #embedded #encoding
Instruction Re-encoding Facilitating Dense Embedded Code (TB, JH), pp. 770–775.
DATEDATE-2008-BrisolaraORLCW #code generation #uml #using
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-HohenauerELAMBS #execution #optimisation
Retargetable Code Optimization for Predicated Execution (MH, FE, RL, GA, HM, GB, BS), pp. 1492–1497.
DATEDATE-2008-LublinermanT #code generation #composition #diagrams #reuse #usability
Modularity vs. Reusability: Code Generation from Synchronous Block Diagrams (RL, ST), pp. 1504–1509.
DATEDATE-2008-MayAW #case study #design
A Case Study in Reliability-Aware Design: A Resilient LDPC Code Decoder (MM, MA, NW), pp. 456–461.
DATEDATE-2008-ZezzaM #implementation
VLSI implementation of SISO arithmetic decoders for joint source channel coding (SZ, GM), pp. 1075–1078.
HPDCHPDC-2008-HeSWF #approximate #automation #performance #recognition #test coverage
Code coverage, performance approximation and automatic recognition of idioms in scientific applications (JH, AS, RFVdW, MAF), pp. 223–224.
LCTESLCTES-2008-BiernackiCHP #code generation #composition #data flow
Clock-directed modular code generation for synchronous data-flow languages (DB, JLC, GH, MP), pp. 121–130.
OSDIOSDI-2008-DouceurEHL #legacy #web
Leveraging Legacy Code to Deploy Desktop Applications on the Web (JRD, JE, JH, JRL), pp. 339–354.
STOCSTOC-2008-GopalanKZ
List-decoding reed-muller codes over small fields (PG, ARK, DZ), pp. 265–274.
STOCSTOC-2008-Meir #combinator
Combinatorial construction of locally testable codes (OM), pp. 285–294.
STOCSTOC-2008-ODonnellW #algorithm #testing
An optimal sdp algorithm for max-cut, and equally optimal long code tests (RO, YW), pp. 335–344.
CAVCAV-2008-YangLBCCDO #analysis #scalability
Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
ICLPICLP-2008-VanhoofD #algorithm #logic programming #source code
An Algorithm for Sophisticated Code Matching in Logic Programs (WV, FD), pp. 785–789.
ICSTICST-2008-PloschGPSS #tool support
Tool Support for Expert-Centred Code Assessments (RP, HG, GP, MS, SS), pp. 258–267.
ICSTICST-2008-ZaidmanRDD #co-evolution #mining #repository
Mining Software Repositories to Study Co-Evolution of Production & Test Code (AZ, BVR, SD, AvD), pp. 220–229.
ECSAECSA-2007-CorreiaMHE #architecture #categorisation #migration
Architecture Migration Driven by Code Categorization (RC, CMPM, RH, MER), pp. 115–122.
DRRDRR-2007-AndraNLZBBHST #effectiveness
Frequency coding: an effective method for combining dichotomizers (SA, GN, CLL, IZ, EB, AB, LH, KMS, MT).
ICDARICDAR-2007-BhattacharyaGP #online #recognition
Direction Code Based Features for Recognition of Online Handwritten Characters of Bangla (UB, BKG, SKP), pp. 58–62.
ICDARICDAR-2007-TerasawaT #documentation #image #locality #pseudo
Locality Sensitive Pseudo-Code for Document Images (KT, YT), pp. 73–77.
SIGMODSIGMOD-2007-GrustMRST #code generation #compilation #sql #xquery
A SQL: 1999 code generator for the pathfinder xquery compiler (TG, MM, JR, SS, JT), pp. 1162–1164.
ITiCSEITiCSE-2007-HayesTSW #assessment #automation #interface
An investigation into the automated assessment of the design-code interface (AH, PGT, NS, KGW), p. 324.
ITiCSEITiCSE-2007-JiWC #detection #source code
A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
ITiCSEITiCSE-2007-JonesB #navigation #source code
Spatial skills and navigation of source code (SJJ, GEB), pp. 231–235.
ITiCSEITiCSE-2007-PatersonH #design #implementation
From classes to code: supporting the transition from design to implementation (JHP, JH), p. 362.
SIGITESIGITE-2007-GasparL #programming
Restoring “coding with intention” in introductory programming courses (AG, SL), pp. 91–98.
WCREWCRE-J-2005-KuhnDG07 #clustering #identification #semantics #source code #topic
Semantic clustering: Identifying topics in source code (AK, SD, TG), pp. 230–243.
CSMRCSMR-2007-Leeten #configuration management #evolution #scalability
Software Configuration Management, Fundament for Evolution of Large Existing Code Bases (BL), pp. 321–322.
ICPCICPC-2007-CareyG #automation #concept #identification #source code
Recovering Concepts from Source Code with Automated Concept Identification (MMC, GCG), pp. 27–36.
ICPCICPC-2007-Kiczales #aspect-oriented #design
Making the Code Look Like the Design — Aspects and Other Recent Work (GK), p. 14.
ICPCICPC-2007-PoshyvanykM #concept analysis #information retrieval #source code
Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code (DP, AM), pp. 37–48.
ICPCICPC-2007-ShearerC #constraints #source code
Enforcing Constraints Between Documentary Comments and Source Code (CDS, MLC), pp. 271–280.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code #using
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-Ceccato #aspect-oriented #migration #object-oriented #programming
Migrating Object Oriented code to Aspect Oriented Programming (MC), pp. 497–498.
ICSMEICSM-2007-Chaabane #analysis #detection
Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
ICSMEICSM-2007-CorboGP #learning #source code
Smart Formatter: Learning Coding Style from Existing Source Code (FC, CDG, MDP), pp. 525–526.
ICSMEICSM-2007-OezbekP #comprehension #documentation #named #source code
JTourBus: Simplifying Program Understanding by Documentation that Provides Tours Through the Source Code (CO, LP), pp. 64–73.
ICSMEICSM-2007-Reiss
Finding Unusual Code (SPR), pp. 34–43.
ICSMEICSM-2007-StoreyCSMMR #how #navigation
How Programmers Can Turn Comments into Waypoints for Code Navigation (MADS, LTC, JS, MJM, DM, JR), pp. 265–274.
MSRMSR-2007-CanforaCP #identification #repository #source code
Identifying Changed Source Code Lines from Version Repositories (GC, LC, MDP), p. 14.
MSRMSR-2007-KagdiCM #mining #source code
Comparing Approaches to Mining Source Code for Call-Usage Patterns (HHK, MLC, JIM), p. 20.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux #using
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
SCAMSCAM-2007-Johannes #composition #framework #reuse #source code
Source Code Composition with the Reuseware Composition Framework (JJ), pp. 159–160.
SCAMSCAM-2007-MoorVHAEOST #analysis #source code
Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
WCREWCRE-2007-FluriWG #source code
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes (BF, MW, HG), pp. 70–79.
WCREWCRE-2007-Krinke #case study #consistency
A Study of Consistent and Inconsistent Changes to Code Clones (JK), pp. 170–178.
WCREWCRE-2007-RaberL07a #approach #automation #identification #named #obfuscation
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
DLTDLT-2007-BealBR #ambiguity
Coding Partitions: Regularity, Maximality and Global Ambiguity (MPB, FB, AR), pp. 48–59.
ICALPICALP-2007-OstrovskyPS
Private Locally Decodable Codes (RO, OP, AS), pp. 387–398.
IFMIFM-2007-BraghinSB #automation #mobile #policy #security #verification
Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
HaskellHaskell-2007-GrabmullerK #code generation #haskell #named #runtime
Harpy: run-time code generation in haskell (MG, DK), p. 94.
IFLIFL-2007-Kleeblatt #dependent type #using
Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
AGTIVEAGTIVE-2007-AnandK #assembly #generative #graph transformation
Code Graph Transformations for Verifiable Generation of SIMD-Parallel Assembly Code (CKA, WK), pp. 217–232.
CHICHI-2007-BoshernitsanGH #development #tool support
Aligning development tools with the way programmers think about code changes (MB, SLG, MAH), pp. 567–576.
HCIHCI-IPT-2007-CheongKH #evaluation #image #interface #mobile #usability
Usability Evaluation of Designed Image Code Interface for Mobile Computing Environment (CC, DCK, TDH), pp. 241–251.
HCIHCI-IPT-2007-YoshidaMS #interactive #mobile #using #visual notation
Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #using #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-BohnetD #2d #graph #source code #visualisation
Facilitating Exploration of Unfamiliar Source Code by Providing 21/2D Visualizations of Dynamic Call Graphs (JB, JD), pp. 63–66.
VISSOFTVISSOFT-2007-BohnetD07a #compilation #comprehension #graph
CGA Call Graph Analyzer — Locating and Understanding Functionality within the Gnu Compiler Collection’s Million Lines of Code (JB, JD), pp. 161–162.
VISSOFTVISSOFT-2007-HolmesW #dependence #source code
Task-specific source code dependency investigation (RH, RJW), pp. 100–107.
VISSOFTVISSOFT-2007-VoineaT #debugging #process #repository #source code #visualisation
Visualizing Debugging Activity in Source Code Repositories (LV, ACT), pp. 156–157.
ICMLICML-2007-Bar-HillelW #distance #learning #similarity
Learning distance function by coding similarity (ABH, DW), pp. 65–72.
ICMLICML-2007-LongZWY #clustering #relational #symmetry
Relational clustering by symmetric convex coding (BL, Z(Z, XW, PSY), pp. 569–576.
SEKESEKE-2007-FilhoZ #design #modelling #traceability
Traceability for Agent-Oriented Design Models and Code (GACF, AZ), pp. 552–558.
SEKESEKE-2007-MonteiroOG #implementation #source code #user interface #using
A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKESEKE-2007-XuXW #automation #code generation #protocol #state machine #uml
Automated Test Code Generation from UML Protocol State Machines (DX, WX, WEW), pp. 99–104.
SIGIRSIGIR-2007-TanW #categorisation
Combining error-correcting output codes and model-refinement for text categorization (ST, YW), pp. 699–700.
TOOLSTOOLS-EUROPE-2007-HundtMPS #feature model #product line
Improving Alignment of Crosscutting Features with Code in Product Line Engineering (CH, KM, CP, DS), pp. 417–436.
AdaEuropeAdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling #using
Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, , FL), pp. 168–179.
PEPMPEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code #using
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-CaiSV #self
Certified self-modifying code (HC, ZS, AV), pp. 66–77.
PLDIPLDI-2007-HardekopfL #analysis #performance #pointer
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
QAPLQAPL-2007-Smith #communication #modelling #probability #protocol #source code
Stochastic Modelling of Communication Protocols from Source Code (MJAS), pp. 129–145.
AdaSIGAda-2007-Maurer #ada #proving #using
Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
ASEASE-2007-AntkiewiczBC #automation #modelling
Automatic extraction of framework-specific models from framework-based application code (MA, TTB, KC), pp. 214–223.
ASEASE-2007-CaiWHW #array #automation #kernel #testing
Test automation for kernel code and disk arrays with virtual devices (LZC, RSW, WTH, FW), pp. 505–508.
ASEASE-2007-JurjensY #modelling #security #tool support
Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
ASEASE-2007-Kagdi #fine-grained #mining #predict #source code
Improving change prediction with fine-grained source code mining (HHK), pp. 559–562.
ASEASE-2007-LemosBOMMBL #named #reuse #source code #using
CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASEASE-2007-LinsteadRBLB #concept #mining #modelling #probability #topic
Mining concepts from code with probabilistic topic models (EL, PR, SKB, CVL, PB), pp. 461–464.
ASEASE-2007-Reiss #automation
Automatic code stylizing (SPR), pp. 74–83.
ASEASE-2007-ThummalapentaX #named #open source #reuse #source code #web
Parseweb: a programmer assistant for reusing open source code on the web (ST, TX), pp. 204–213.
ESEC-FSEESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification
Mining API patterns as partial orders from source code: from usage scenarios to specifications (MA, TX, JP, JX), pp. 25–34.
ESEC-FSEESEC-FSE-2007-FritzMH #process #question
Does a programmer’s activity indicate knowledge of code? (TF, GCM, EH), pp. 341–350.
ESEC-FSEESEC-FSE-2007-GrechanikMP #traceability #using
Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSEESEC-FSE-2007-VoungJL #concurrent #detection #named
RELAY: static race detection on millions of lines of code (JWV, RJ, SL), pp. 205–214.
GTTSEGTTSE-2007-ChellappaFP #how #performance
How to Write Fast Numerical Code: A Small Introduction (SC, FF, MP), pp. 196–259.
ICSEICSE-2007-AdarK #named #visualisation
SoftGUESS: Visualization and Exploration of Code Clones in Context (EA, MK), pp. 762–766.
ICSEICSE-2007-BernerWK #test coverage #testing #using
Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSEICSE-2007-Duala-EkokoR #clone tracking #evolution
Tracking Code Clones in Evolving Software (EDE, MPR), pp. 158–167.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-JiangMSG #detection #named #scalability
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones (LJ, GM, ZS, SG), pp. 96–105.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #using #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
SACSAC-2007-CazzolaPGS #co-evolution #design #metadata #modelling
Co-evolving application code and design models by exploiting meta-data (WC, SP, AG, GS), pp. 1275–1279.
SACSAC-2007-FerreiraLO #approach #java #model checking
A Java code annotation approach for model checking software systems (GF, EL, EASO), pp. 1536–1537.
SACSAC-2007-Hamid #memory management #runtime
Integrating a certified memory management runtime with proof-carrying code (NAH), pp. 1526–1533.
SACSAC-2007-JohnsB #approximate #automation #injection #named #web
SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
SACSAC-2007-LongoG #protocol
A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
SACSAC-2007-XianhuaJX #performance #reduction
Efficient code size reduction without performance loss (LX, ZJ, CX), pp. 666–672.
LDTALDTA-J-2005-WaddingtonY #c #c++ #program transformation
High-fidelity C/C++ code transformation (DGW, BY), pp. 64–78.
CCCC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling #using
Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CGOCGO-2007-HeTPDA #kernel #operating system
Code Compaction of an Operating System Kernel (HH, JT, SP, SKD, GRA), pp. 283–298.
CGOCGO-2007-ReddiCCS #persistent #reuse
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications (VJR, DC, RC, MDS), pp. 74–88.
CGOCGO-2007-WangCWSA #code generation #memory management #optimisation #transaction
Code Generation and Optimization for Transactional Memory Constructs in an Unmanaged Language (CW, WYC, YW, BS, ARAT), pp. 34–48.
COCVCOCV-2007-BlechP #code generation
A Certifying Code Generation Phase (JOB, APH), pp. 65–82.
DACDAC-2007-AmbroseRP #analysis #injection #named #random
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
DACDAC-2007-BonnyH #performance
Instruction Splitting for Efficient Code Compression (TB, JH), pp. 646–651.
DACDAC-2007-XueOK #parallel
A Memory-Conscious Code Parallelization Scheme (LX, ÖÖ, MTK), pp. 230–233.
DATEDATE-2007-BonnyH #performance
Efficient code density through look-up table compression (TB, JH), pp. 809–814.
DATEDATE-2007-BrackALKWLRRF #complexity #generative #standard
Low complexity LDPC code decoders for next generation standards (TB, MA, TLE, FK, NW, NEL, FR, MR, LF), pp. 331–336.
DATEDATE-2007-ChoudhuryRRM #interactive #memory management
Interactive presentation: Single-ended coding techniques for off-chip interconnects to commodity memory (MRC, KR, SR, KM), pp. 1072–1077.
DATEDATE-2007-ErdoganO #analysis #using
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-FeiS #architecture #monitoring #set
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors (YF, ZJS), pp. 815–820.
DATEDATE-2007-KhanA #architecture #configuration management #implementation #pipes and filters #programmable #realtime
Pipelined implementation of a real time programmable encoder for low density parity check code on a reconfigurable instruction cell architecture (ZK, TA), pp. 349–354.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code #using
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-MavroidisP #hardware #performance #synthesis
Efficient testbench code synthesis for a hardware emulator system (IM, IP), pp. 888–893.
DATEDATE-2007-NarayananKB #clustering #performance
Performance aware secure code partitioning (SHKN, MTK, RRB), pp. 1122–1127.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
LCTESLCTES-2007-ChuM #clustering #parallel
Code and data partitioning for fine-grain parallelism (MLC, SAM), pp. 161–164.
LCTESLCTES-2007-Kastner #abstract interpretation #analysis #execution #worst-case
Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
PDPPDP-2007-Sobe #distributed
Distributed Storage with Compressed (1 out-of N) Codes (PS), pp. 179–188.
SOSPSOSP-2007-SeshadriLQP #kernel #named
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes (AS, ML, NQ, AP), pp. 335–350.
STOCSTOC-2007-Yekhanin #towards
Towards 3-query locally decodable codes of subexponential length (SY), pp. 266–274.
TACASTACAS-2007-MyreenG #hoare #logic
Hoare Logic for Realistically Modelled Machine Code (MOM, MJCG), pp. 568–582.
AMOSTA-MOST-2007-KicillofGTB #automation #test coverage #testing
Achieving both model and code coverage with automated gray-box testing (NK, WG, NT, VAB), pp. 1–11.
ISSTAISSTA-2007-EnglerD #automation #execution #scalability
Under-constrained execution: making automatic code destruction easy and scalable (DRE, DD), pp. 1–4.
FATESTestCom-FATES-2007-NeukirchenB #detection #problem #quality #smell #testing
Utilising Code Smells to Detect Quality Problems in TTCN-3 Test Suites (HN, MB), pp. 228–243.
ITiCSEITiCSE-2006-OKellyG #approach #education #learning #problem #programming
RoboCode & problem-based learning: a non-prescriptive approach to teaching programming (JO, JPG), pp. 217–221.
SCAMSCAM-J-2005-AntoniolKT06 #analysis #source code
Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
CSMRCSMR-2006-MensK #source code
IntensiVE, a toolsuite for documenting and checking structural source-code regularities (KM, AK), pp. 239–248.
ICPCICPC-2006-DesmondSE #source code
Fluid Source Code Views (MD, MADS, CE), pp. 260–263.
ICPCICPC-2006-LuciaOZP #empirical #information management #source code #traceability
Improving Comprehensibility of Source Code via Traceability Information: a Controlled Experiment (ADL, RO, FZ, MDP), pp. 317–326.
ICPCICPC-2006-MadouPB #comprehension #obfuscation
Understanding Obfuscated Code (MM, LVP, KDB), pp. 268–274.
ICPCICPC-2006-PoshyvanykMD #eclipse #named #plugin #source code
JIRiSS — an Eclipse plug-in for Source Code Exploration (DP, AM, YD), pp. 252–255.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the #using
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code #using
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSMEICSM-2006-Hou #constraints #design #source code #using
Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSMEICSM-2006-NeginhalK #c #comprehension #graph #reduction
Event Views and Graph Reductions for Understanding System Level C Code (SN, SK), pp. 279–288.
ICSMEICSM-2006-PoshyvanykPMXL #source code
Source Code Exploration with Google (DP, MP, AM, XX, DL), pp. 334–338.
ICSMEICSM-2006-Robillard #empirical #evolution #source code
Tracking Concerns in Evolving Source Code: An Empirical Study (MPR), pp. 479–482.
ICSMEICSM-2006-YaoMKB #automation #c #metaprogramming #program transformation #source code
C Macro Handling in Automated Source Code Transformation Systems (BY, WM, SK, RB), pp. 68–69.
MSRMSR-2006-JiangH #evolution
Examining the evolution of code comments in PostgreSQL (ZMJ, AEH), pp. 179–180.
MSRMSR-2006-KnabPB #fault #predict #source code
Predicting defect densities in source code files with decision tree learners (PK, MP, AB), pp. 119–125.
WCREWCRE-2006-GanesanMKY #aspect-oriented #case study #product line #source code
Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase — A Case Study (DG, DM, JK, KY), pp. 211–220.
WCREWCRE-2006-KorshunovaPBM #c++ #diagrams #named #process #reverse engineering #sequence #source code #uml #xmi
CPP2XMI: Reverse Engineering of UML Class, Sequence, and Activity Diagrams from C++ Source Code (EK, MP, MvdB, MRM), pp. 297–298.
WCREWCRE-2006-MoiseW #fact extraction #perl
Extracting Facts from Perl Code (DLM, KW), pp. 243–252.
WCREWCRE-2006-MoonenM #security
Code Based Software Security Assessments (LM, SM), p. 313.
WCREWCRE-2006-Ribic #concept #decompiler #embedded #equivalence #execution #implementation #programming language
Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code (SR), pp. 307–308.
CIAACIAA-2006-Tischler #automaton #finite #random #refinement #video
Refinement of Near Random Access Video Coding with Weighted Finite Automata (GT), pp. 46–57.
DLTDLT-2006-JonoskaKM
Involution Solid and Join Codes (NJ, LK, KM), pp. 192–202.
ICALPICALP-v1-2006-Reichardt #fault tolerance #quantum
Fault-Tolerance Threshold for a Distance-Three Quantum Code (BR), pp. 50–61.
CHICHI-2006-JakobsenH #source code
Evaluating a fisheye view of source code (MRJ, KH), pp. 377–386.
CHICHI-2006-KoM #editing #framework #implementation #interactive #named #tool support
Barista: An implementation framework for enabling new tools, interaction techniques and views in code editors (AJK, BAM), pp. 387–396.
SOFTVISSOFTVIS-2006-FronkBK #3d #java #visualisation
3D visualisation of code structures in Java software systems (AF, AB, MK), pp. 145–146.
SOFTVISSOFTVIS-2006-ParninG #lightweight #smell #visualisation
Lightweight visualizations for inspecting code smells (CP, CG), pp. 171–172.
ICPRICPR-v3-2006-EscaleraP #named #novel
ECOC-ONE: A Novel Coding and Decoding Strategy (SE, OP), pp. 578–581.
ICPRICPR-v3-2006-Haralick #concept #testing
Basic Concepts For Testing The Torah Code Hypothesis (RMH), pp. 104–109.
ICPRICPR-v3-2006-Haralick06a #protocol #testing
Testing The Torah Code Hypothesis: The Experimental Protocol (RMH), pp. 110–115.
ICPRICPR-v3-2006-Levitt #analysis #component
Component Analysis of Torah Code Phrases (AL), pp. 412–416.
ICPRICPR-v3-2006-RipsL #clustering
The Twin Towers Cluster in Torah Codes (ER, AL), pp. 408–411.
ICPRICPR-v3-2006-ZhangY #image #multi #using
Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPRICPR-v4-2006-EscaleraPR #fault
Forest Extension of Error Correcting Output Codes and Boosted Landmarks (SE, OP, PR), pp. 104–107.
ICPRICPR-v4-2006-KongZK #precise #representation
An Anatomy of IrisCode for Precise Phase Representation (AWKK, DZ, MK), pp. 429–432.
ICPRICPR-v4-2006-QuanZ #using
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
SEKESEKE-2006-SadaouiS #implementation #java #specification
Implementation of CafeOBJ Specifications to Java Code (SS, SS), pp. 446–449.
SPLCSPLC-2006-Tolvanen #code generation #modelling #product line
Domain-Specific Modeling and Code Generation for Product Lines (JPT), p. 229.
ECOOPECOOP-2006-HajiyevVM #datalog #named #query #scalability #source code
codeQuest: Scalable Source Code Queries with Datalog (EH, MV, OdM), pp. 2–27.
OOPSLAOOPSLA-2006-SahavechaphanC #mining #named
XSnippet: mining For sample code (NS, KTC), pp. 413–430.
AdaEuropeAdaEurope-2006-BreuerP #fault #kernel #linux #source code #static analysis
One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code (PTB, SP), pp. 56–70.
AdaEuropeAdaEurope-2006-Maurer #ada #using
Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
PADLPADL-2006-Volder #declarative #named
JQuery: A Generic Code Browser with a Declarative Configuration Language (KDV), pp. 88–102.
PEPMPEPM-2006-GeayYF #assurance #quality
Continuous code-quality assurance with SAFE (EG, EY, SJF), pp. 145–149.
PEPMPEPM-2006-MadouPB #interactive #named #obfuscation
LOCO: an interactive code (De)obfuscation tool (MM, LVP, KDB), pp. 140–144.
PEPMPEPM-2006-RepsBL #low level
Intermediate-representation recovery from low-level code (TWR, GB, JL), pp. 100–111.
PEPMPEPM-2006-SwadiTKP #approach #monad #staging
A monadic approach for avoiding code duplication when staging memoized functions (KNS, WT, OK, EP), pp. 160–169.
PLDIPLDI-2006-CookPR #proving #termination
Termination proofs for systems code (BC, AP, AR), pp. 415–426.
PLDIPLDI-2006-DhurjatiKA #alias #analysis #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
PLDIPLDI-2006-FengSVXN #abstraction #assembly #composition #verification
Modular verification of assembly code with stack-based control abstractions (XF, ZS, AV, SX, ZN), pp. 401–414.
POPLPOPL-2006-NiS #assembly #embedded #pointer #programming
Certified assembly programming with embedded code pointers (ZN, ZS), pp. 320–333.
POPLPOPL-2006-Thielecke #pointer
Frame rules from answer types for code pointers (HT), pp. 309–319.
PPDPPPDP-2006-YuseI #generative #multi #persistent #type system
A modal type system for multi-level generating extensions with persistent code (YY, AI), pp. 201–212.
SASSAS-2006-ChangHN #analysis #low level #using
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
SASSAS-2006-Yang #analysis #low level
Shape Analysis for Low-Level Code (HY), p. 280.
ASEASE-2006-DenneyF #automation #certification #safety
Annotation Inference for Safety Certification of Automatically Generated Code (ED, BF), pp. 265–268.
ASEASE-2006-HanakawaI #ajax #web
A new web browser including a transferable function to Ajax codes (NH, NI), pp. 351–352.
ASEASE-2006-PenseriniPSM #multi #specification
From Capability Specifications to Code for Multi-Agent Software (LP, AP, AS, JM), pp. 253–256.
ASEASE-2006-ShiO #design pattern #java #reverse engineering #source code
Reverse Engineering of Design Patterns from Java Source Code (NS, RAO), pp. 123–134.
ASEASE-2006-WeissgerberD #identification #refactoring #source code
Identifying Refactorings from Source-Code Changes (PW, SD), pp. 231–240.
FSEFSE-2006-MaozH #aspectj #compilation #multi
From multi-modal scenarios to code: compiling LSCs into aspectJ (SM, DH), pp. 219–230.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code #using
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-MoriISI #detection #mobile
A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
ICSEICSE-2006-Sindhgatta #information retrieval #source code #using
Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSEICSE-2006-XiePM #3d #concept #source code #visualisation
3D visualization for concept location in source code (XX, DP, AM), pp. 839–842.
SACSAC-2006-AgostaCPS #analysis #bytecode #compilation #performance
Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
SACSAC-2006-ArastehHS #adaptation #image #segmentation
Adaptive dynamic run-length coding for image segmentation (SA, CCH, ES), pp. 31–36.
SACSAC-2006-CutelloNP #algorithm #hybrid #optimisation #using
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
GPCEGPCE-2006-DenneyF #algorithm #automation #certification #safety
A generic annotation inference algorithm for the safety certification of automatically generated code (ED, BF), pp. 121–130.
GPCEGPCE-2006-TilevichS #program transformation
Transparent program transformations in the presence of opaque code (ET, YS), pp. 89–94.
CCCC-2006-DiasR #assembly #declarative #using
Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
CCCC-2006-VasilacheBC #code generation
Polyhedral Code Generation in the Real World (NV, CB, AC), pp. 185–201.
CGOCGO-2006-BrueningKGB #thread
Thread-Shared Software Code Caches (DB, VK, TG, SB), pp. 28–38.
CGOCGO-2006-HazelwoodC #architecture #interface
A Cross-Architectural Interface for Code Cache Manipulation (KMH, RSC), pp. 17–27.
CGOCGO-2006-LauPC #analysis
Selecting Software Phase Markers with Code Structure Analysis (JL, EP, BC), pp. 135–146.
CGOCGO-2006-LupoW #optimisation
Post Register Allocation Spill Code Optimization (CL, KDW), pp. 245–255.
DACDAC-2006-OzturkCK #approach #constraints #network #optimisation #parallel
Optimizing code parallelization through a constraint network based approach (ÖÖ, GC, MTK), pp. 863–688.
DATEDATE-2006-AlmukhaizimM #concurrent #detection #fault
Berger code-based concurrent error detection in asynchronous burst-mode machines (SA, YM), pp. 71–72.
DATEDATE-2006-BrackKW #design
Disclosing the LDPC code decoder design space (TB, FK, NW), pp. 200–205.
DATEDATE-2006-KavousianosKN #multi #performance #testing #using
Efficient test-data compression for IP cores using multilevel Huffman coding (XK, EK, DN), pp. 1033–1038.
DATEDATE-2006-LahiriBCM #clustering #speech
Battery-aware code partitioning for a text to speech system (AL, AB, MC, SM), pp. 672–677.
DATEDATE-2006-ParkOPSH #embedded #source code
Dynamic code overlay of SDF-modeled programs on low-end embedded systems (HwP, KO, SP, MmS, SH), pp. 945–946.
DATEDATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread #using
An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
DATEDATE-2006-UdayakumaranB
An integrated scratch-pad allocator for affine and non-affine code (SU, RB), pp. 925–930.
DATEDATE-2006-ZmilyK #embedded #energy #performance
Simultaneously improving code size, performance, and energy in embedded processors (AZ, CK), pp. 224–229.
HPDCHPDC-2006-WoitaszekT #fault tolerance
Fault Tolerance of Tornado Codes for Archival Storage (MW, HMT), pp. 83–92.
ISMMISMM-2006-HuangBGM #order #performance
Fast and efficient partial code reordering: taking advantage of dynamic recompilatior (XH, SMB, DG, KSM), pp. 184–192.
LCTESLCTES-2006-EdwardsT #code generation #modelling #performance
Efficient code generation from SHIM models (SAE, OT), pp. 125–134.
LCTESLCTES-2006-PlatenE #feedback #layout #optimisation
Feedback linking: optimizing object code layout for updates (CvP, JE), pp. 2–11.
LCTESLCTES-2006-RothamelLHL #generative #specification
Generating optimized code from SCR specifications (TR, YAL, CLH, EIL), pp. 135–144.
PDPPDP-2006-Barlas #analysis #clustering #taxonomy #video
A Taxonomy and DLT-Based Analysis of Cluster-Based Video Trans/En-Coding (GDB), pp. 388–395.
PPoPPPPoPP-2006-Steele #parallel #programming
Parallel programming and code selection in fortress (GLSJ), p. 1.
FASEFASE-2006-GeigerFGP #clone tracking
Relation of Code Clones and Change Couplings (RG, BF, HCG, MP), pp. 411–425.
STOCSTOC-2006-GuruswamiR
Explicit capacity-achieving list-decodable codes (VG, AR), pp. 1–10.
CAVCAV-2006-Das #specification
Formal Specifications on Industrial-Strength Code-From Myth to Reality (MD), p. 1.
ICLPICLP-2006-AlbertAPH
Reduced Certificates for Abstraction-Carrying Code (EA, PAS, GP, MVH), pp. 163–178.
ISSTAISSTA-2006-DennisCJ #composition #satisfiability #verification
Modular verification of code with SAT (GD, FSHC, DJ), pp. 109–120.
VMCAIVMCAI-2006-ChangCN #framework #program analysis #safety
A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety (BYEC, AC, GCN), pp. 174–189.
TPDLECDL-2005-BrisaboaFNP
Compressing Dynamic Text Collections via Phrase-Based Coding (NRB, AF, GN, JRP), pp. 462–474.
ICDARICDAR-2005-YinLH #documentation #image #using
Financial Document Image Coding with Regions of Interest Using JPEG2000 (XCY, CPL, ZH), pp. 96–100.
ICDARICDAR-2005-ZhouS #approach #fault #recognition #using
Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach (JZ, CYS), pp. 484–488.
SIGITESIGITE-2005-LiP #education #effectiveness #programming #standard
Effectively teaching coding standards in programming (XL, CP), pp. 239–244.
CSMRCSMR-2005-DraheimLW #independence #reverse engineering #source code #web
A Source Code Independent Reverse Engineering Tool for Dynamic Web Sites (DD, CL, GW), pp. 168–177.
CSMRCSMR-2005-GreevyD #analysis #approach #correlation #using
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
CSMRCSMR-2005-RousidisT #case study #clustering #java #maintenance #source code
Clustering Data Retrieved from Java Source Code to Support Software Maintenance: A Case Study (DR, CT), pp. 276–279.
ICSMEICSM-2005-BinkleyCHRT #aspect-oriented #automation #object-oriented #refactoring
Automated Refactoring of Object Oriented Code into Aspects (DB, MC, MH, FR, PT), pp. 27–36.
ICSMEICSM-2005-EisenbergV
Dynamic Feature Traces: Finding Features in Unfamiliar Code (ADE, KDV), pp. 337–346.
ICSMEICSM-2005-MarcusR #concept #identification #source code
Identifications of Concepts, Features, and Concerns in Source Code (AM, VR), p. 718.
ICSMEICSM-2005-MensK #framework #source code #testing #towards
Towards a Framework for Testing Structural Source-Code Regularities (KM, AK), pp. 679–682.
ICSMEICSM-2005-MonteiroF #aspectj #java #refactoring
Refactoring a Java Code Base to AspectJ: An Illustrative Example (MPM, JMF), pp. 17–26.
ICSMEICSM-2005-TilevichSH #java #legacy #named #web
Appletizing: Running Legacy Java Code Remotely from a Web Browser (ET, YS, MH), pp. 91–100.
ICSMEICSM-2005-Zou #design #migration #object-oriented #quality
Quality Driven Software Migration of Procedural Code to Object-Oriented Design (YZ), pp. 709–713.
ICSMEICSM-IT-2005-PoshyvanykMDS #named #source code
IRiSS — A Source Code Exploration Tool (DP, AM, YD, AS), pp. 69–72.
ICSMEICSM-IT-2005-VittekBM #c++ #comprehension #java #plugin #refactoring
A collection of C, C++ and Java code understanding and refactoring plugins (MV, PB, PEM), pp. 61–64.
IWPCIWPC-2005-AndersonZ #comprehension #framework #platform
The CodeSurfer Software Understanding Platform (PA, MZ), pp. 147–148.
IWPCIWPC-2005-CoxC #comprehension #source code
Working Session: Textual Views of Source Code to Support Comprehension (AC, MLC), pp. 109–112.
IWPCIWPC-2005-DuxIDFK #behaviour #visualisation
Visualizing the Behavior of Dynamically Modifiable Code (BD, AI, SKD, DF, SGK), pp. 337–340.
IWPCIWPC-2005-MarcusRBPS #concept #object-oriented
Static Techniques for Concept Location in Object-Oriented Code (AM, VR, JB, MP, AS), pp. 33–42.
IWPCIWPC-2005-WalkinshawRW #behaviour #comprehension #object-oriented #perspective #source code
Understanding Object-Oriented Source Code from the Behavioural Perspective (NW, MR, MW), pp. 215–224.
MSRMSR-2005-AntoniolRV #linear #mining #predict #repository
Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories (GA, VFR, GV), pp. 61–65.
MSRMSR-2005-KagdiCM #mining #repository #source code #taxonomy #towards
Towards a taxonomy of approaches for mining of source code repositories (HHK, MLC, JIM), pp. 26–30.
MSRMSR-2005-KimN #comprehension #evolution #using
Using a clone genealogy extractor for understanding and supporting evolution of code clones (MK, DN), pp. 1–5.
MSRMSR-2005-NeamtiuFH #abstract syntax tree #comprehension #evolution #source code #syntax #using
Understanding source code evolution using abstract syntax tree matching (IN, JSF, MWH), pp. 81–85.
MSRMSR-2005-YingWA #eclipse #mining #repository #source code
Source code that talks: an exploration of Eclipse task comments and their implication to repository mining (ATTY, JLW, SA), pp. 91–95.
PASTEPASTE-2005-PutSMBCSB #editing #named
LANCET: a nifty code editing tool (LVP, BDS, MM, BDB, DC, KS, KDB), pp. 75–81.
SCAMSCAM-2005-Singer #code generation #concept #debugging
Concept Assignment as a Debugging Technique for Code Generators (JS), pp. 75–86.
WCREWCRE-2005-HassanJH #architecture
Source versus Object Code Extraction for Recovering Software Architecture (AEH, ZMJ, RCH), pp. 67–76.
WCREWCRE-2005-SpoonS #higher-order #navigation #scalability #semantics
Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages (SAS, OS), pp. 219–228.
WCREWCRE-2005-UdupaDM #named #obfuscation #reverse engineering
Deobfuscation: Reverse Engineering Obfuscated Code (SKU, SKD, MM), pp. 45–54.
CIAACIAA-J-2004-KariKS05
Operations on trajectories with applications to coding and bioinformatics (LK, SK, PS), pp. 531–546.
ICALPICALP-2005-PredaG #abstract interpretation #obfuscation #semantics
Semantic-Based Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 1325–1336.
ICALPICALP-2005-WehnerW #bound #information retrieval
Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval (SW, RdW), pp. 1424–1436.
FMFM-2005-AndronickCP #embedded #security #smarttech #source code #verification
Formal Verification of Security Properties of Smart Card Embedded Source Code (JA, BC, CPM), pp. 302–317.
IFMIFM-2005-BracherK #security #specification #testing
Enabling Security Testing from Specification to Code (SB, PK), pp. 150–166.
SEFMSEFM-2005-BlechGG #higher-order #verification
Formal Verification of Dead Code Elimination in Isabelle/HOL (JOB, LG, SG), pp. 200–209.
SEFMSEFM-2005-HubertM #algorithm #c #case study #source code #verification
A case study of C source code verification: the Schorr-Waite algorithm (TH, CM), pp. 190–199.
SEFMSEFM-2005-LeinenbachPP #code generation #compilation #implementation #towards #verification
Towards the Formal Verification of a C0 Compiler: Code Generation and Implementation Correctnes (DL, WJP, EP), pp. 2–12.
SEFMSEFM-2005-PredaG #abstract interpretation #obfuscation
Control Code Obfuscation by Abstract Interpretation (MDP, RG), pp. 301–310.
ICFPICFP-2005-FengS #assembly #composition #concurrent #termination #thread #verification
Modular verification of concurrent assembly code with dynamic thread creation and termination (XF, ZS), pp. 254–267.
SOFTVISSOFTVIS-2005-VoineaTW #evolution #named #visualisation
CVSscan: visualization of code evolution (LV, ACT, JJvW), pp. 47–56.
VISSOFTVISSOFT-2005-RillingN #3d #analysis #comprehension #design pattern
Applying Code Analysis and 3D Design Pattern Grouping to Facilitate Program Comprehension (JR, VLN), pp. 123–124.
VISSOFTVISSOFT-2005-TeleaV #evolution #interactive #source code #visual notation
Interactive Visual Mechanisms for Exploring Source Code Evolution (ACT, LV), pp. 52–57.
ICMLICML-2005-IeWNL #adaptation #multi #recognition #using
Multi-class protein fold recognition using adaptive codes (EI, JW, WSN, CSL), pp. 329–336.
ICMLICML-2005-JinZ #algorithm #probability #using
A smoothed boosting algorithm using probabilistic output codes (RJ, JZ), pp. 361–368.
ICMLICML-2005-SunTLW #framework
Unifying the error-correcting and output-code AdaBoost within the margin framework (YS, ST, JL, DW), pp. 872–879.
LSOLSO-2005-NickDW
Experience-based Support for Code Inspections (MN, CD, TW), pp. 67–71.
SEKESEKE-2005-LiuBY #development #formal method
A Formal Foundation of Code Pattern Based Development (JL, FBB, ILY), pp. 274–279.
SEKESEKE-2005-LiWMW #constraints #generative #testing #theorem proving
A Constraint Solver for Code-based Test Data Generation (JJL, WEW, XM, DMW), pp. 300–305.
ECMFAECMDA-FA-2005-BurmesterGS #architecture #framework #independence #modelling #platform #realtime
Model-Driven Architecture for Hard Real-Time Systems: From Platform Independent Models to Code (SB, HG, WS), pp. 25–40.
MODELSMoDELS-2005-ChauvelJ #code generation #modelling #semantics #uml
Code Generation from UML Models with Semantic Variation Points (FC, JMJ), pp. 54–68.
MODELSMoDELS-2005-JurjensH #modelling #uml
Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
MODELSMoDELS-2005-ChauvelJ #code generation #modelling #semantics #uml
Code Generation from UML Models with Semantic Variation Points (FC, JMJ), pp. 54–68.
MODELSMoDELS-2005-JurjensH #modelling #uml
Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
ECOOPECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
OOPSLAOOPSLA-2005-AhernY #formal method #java
Formalising Java RMI with explicit code mobility (AA, NY), pp. 403–422.
OOPSLAOOPSLA-2005-GilM #java
Micro patterns in Java code (JYG, IM), pp. 97–116.
PADLPADL-2005-Debray
Code Compression (SKD), pp. 5–6.
PADLPADL-2005-WangGL #code generation #continuation #logic #semantics #towards
Towards Provably Correct Code Generation via Horn Logical Continuation Semantics (QW, GG, ML), pp. 98–112.
PLDIPLDI-2005-AletaCGK #on the fly
Demystifying on-the-fly spill code (AA, JMC, AG, DRK), pp. 180–189.
PLDIPLDI-2005-Jimenez #branch #predict
Code placement for improving dynamic branch prediction accuracy (DAJ), pp. 107–116.
PPDPPPDP-2005-HermenegildoALP #abstraction
Abstraction carrying code and resource-awareness (MVH, EA, PLG, GP), pp. 1–11.
PPDPPPDP-2005-KirchnerMR #pattern matching #validation
Formal validation of pattern matching code (CK, PEM, AR), pp. 187–197.
SASSAS-2005-HarrenN #assembly #dependent type #safety #using
Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
RERE-2005-YuWMLLL #legacy #modelling #reverse engineering
Reverse Engineering Goal Models from Legacy Code (YY, YW, JM, SL, AL, JCSdPL), pp. 363–372.
ASEASE-2005-GeW #architecture #code generation #configuration management #framework #modelling #named
Bamboo: an architecture modeling and code generation framework for configuration management systems (GG, EJWJ), pp. 427–428.
ASEASE-2005-GuptaHZG #using
Locating faulty code using failure-inducing chops (NG, HH, XZ, RG), pp. 263–272.
ASEASE-2005-JurjensY #analysis #security
Code security analysis with assertions (JJ, MY), pp. 392–395.
ASEASE-2005-SwintPJYKWCSM #code generation #composition #flexibility #named
Clearwater: extensible, flexible, modular code generation (GSS, CP, GJ, WY, YK, QW, CC, AS, KM), pp. 144–153.
ASEASE-2005-Zheng #source code #testing
In regression testing selection when source code is not available (JZ0), pp. 452–455.
ESEC-FSEESEC-FSE-2005-KimSN #empirical
An empirical study of code clone genealogies (MK, VS, DN, GCM), pp. 187–196.
ESEC-FSEESEC-FSE-2005-LiZ #automation #detection #named #programming #scalability
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code (ZL, YZ), pp. 306–315.
ICSEICSE-2005-HolmesM #recommendation #source code #using
Using structural context to recommend source code examples (RH, GCM), pp. 117–125.
ICSEICSE-2005-LanzaDGP #comprehension #named #visualisation
CodeCrawler: an information visualization tool for program comprehension (ML, SD, HG, MP), pp. 672–673.
ICSEICSE-2005-NagappanB #fault #metric #predict #using
Use of relative code churn measures to predict system defect density (NN, TB), pp. 284–292.
ICSEICSE-2005-TilevichS #refactoring
Binary refactoring: improving code behind the scenes (ET, YS), pp. 264–273.
ICSEICSE-2005-Tonella #object-oriented #reverse engineering
Reverse engineering of object oriented code (PT), pp. 724–725.
SACSAC-2005-BellaachiaR #database #performance #string
Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devices (AB, IAR), pp. 993–997.
SACSAC-2005-CabralMS #dot-net #named
RAIL: code instrumentation for .NET (BC, PM, LMS), pp. 1282–1287.
SACSAC-2005-CazzolaCC #c#
[a]C#: C# with a customizable code annotation mechanism (WC, AC, DC), pp. 1264–1268.
SACSAC-2005-GoettlBJ #algorithm #email #search-based
Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm (JSG, AWB, BAJ), pp. 947–951.
SACSAC-2005-HsiehCLT #detection #named #predict #sequence
EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences (SJH, YSC, CYL, CYT), pp. 202–203.
SACSAC-2005-MenonS #embedded
A code compression advisory tool for embedded processors (SKM, PS), pp. 863–867.
SACSAC-2005-Nakayama #communication #mobile
Alternative source coding model for mobile text communication (TN), pp. 1139–1145.
SACSAC-2005-RothPP #distributed #mobile
A distributed content-based search engine based on mobile code (VR, UP, JP), pp. 66–73.
SACSAC-2005-WongQC #risk management #source code
Source code-based software risk assessing (WEW, YQ, KMLC), pp. 1485–1490.
GPCEGPCE-2005-CaretteK #abstraction #monad #multi #programming
Multi-stage Programming with Functors and Monads: Eliminating Abstraction Overhead from Generic Code (JC, OK), pp. 256–274.
GPCEGPCE-2005-MossM #code generation #domain-specific language #performance
Efficient Code Generation for a Domain Specific Language (AM, HLM), pp. 47–62.
LDTALDTA-2005-WaddingtonY #c #c++ #program transformation
High-Fidelity C/C++ Code Transformation (DGW, BY), pp. 35–56.
CCCC-2005-BalakrishnanGRT #bytecode #framework #named #platform
CodeSurfer/x86 — A Platform for Analyzing x86 Executables (GB, RG, TWR, TT), pp. 250–254.
CCCC-2005-ShashidharBCJ #equivalence #program transformation #source code #verification
Verification of Source Code Transformations by Program Equivalence Checking (KCS, MB, FC, GJ), pp. 221–236.
CGOCGO-2005-BrueningA #bound #capacity #consistency #maintenance
Maintaining Consistency and Bounding Capacity of Software Code Caches (DB, SPA), pp. 74–85.
CGOCGO-2005-ChenK #code generation #optimisation
Optimizing Address Code Generation for Array-Intensive DSP Applications (GC, MTK), pp. 141–152.
CGOCGO-2005-DaiZHY #compilation #framework #optimisation #using
A General Compiler Framework for Speculative Optimizations Using Data Speculative Code Motion (XD, AZ, WCH, PCY), pp. 280–290.
CGOCGO-2005-RavindranNDMSMB #compilation #power management
Compiler Managed Dynamic Instruction Placement in a Low-Power Code Cache (RAR, PDN, GSD, EDM, RMS, SAM, RBB), pp. 179–190.
CGOCGO-2005-WuEW #code generation #performance #runtime
Efficient SIMD Code Generation for Runtime Alignment and Length Conversion (PW, AEE, AW), pp. 153–164.
COCVCOCV-J-2005-AmmeRF #mobile
Quantifying the Benefits of SSA-Based Mobile Code (WA, JvR, MF), pp. 103–119.
COCVCOCV-J-2005-BlechGLM #code generation #comparison #correctness #higher-order #optimisation #proving
Optimizing Code Generation from SSA Form: A Comparison Between Two Formal Correctness Proofs in Isabelle/HOL (JOB, SG, JL, SM), pp. 33–51.
DACDAC-2005-Goldfeder #embedded #multi
Frequency-based code placement for embedded multiprocessors (CG), pp. 696–699.
DACDAC-2005-KaruriFKLAM #design #fine-grained #profiling #source code
Fine-grained application source code profiling for ASIP design (KK, MAAF, SK, RL, GA, HM), pp. 329–334.
DACDAC-2005-KimK #array #design #embedded #memory management #optimisation #scheduling
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design (JK, TK), pp. 105–110.
DACDAC-2005-TopalogluO #approach #process
A DFT approach for diagnosis and process variation-aware structural test of thermometer coded current steering DACs (ROT, AO), pp. 851–856.
DACDAC-2005-UrardPGMLYG
A 135Mbps DVB-S2 compliant codec based on 64800-bit LDPC and BCH codes (ISSCC paper 24.3) (PU, LP, PG, TM, VL, EY, BG), pp. 547–548.
DATEDATE-2005-GuoBNV #c #generative
Optimized Generation of Data-Path from C Codes for FPGAs (ZG, BB, WAN, KAV), pp. 112–117.
DATEDATE-2005-KienleBW
A Synthesizable IP Core for DVB-S2 LDPC Code Decoding (FK, TB, NW), pp. 100–105.
DATEDATE-2005-OzturkSKK #embedded
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems (ÖÖ, HS, MTK, IK), pp. 882–887.
DATEDATE-2005-PolianCB #optimisation
Evolutionary Optimization in Code-Based Test Compression (IP, AC, BB), pp. 1124–1129.
DATEDATE-2005-SchianoOLPS #analysis #fault #on the #reliability
On the Analysis of Reed Solomon Coding for Resilience to Transient/Permanent Faults in Highly Reliable Memories (LS, MO, FL, SP, AS), pp. 580–585.
DATEDATE-2005-ShashidharBCJ #algebra #equivalence #functional #source code #verification
Functional Equivalence Checking for Verification of Algebraic Transformations on Array-Intensive Source Code (KCS, MB, FC, GJ), pp. 1310–1315.
LCTESLCTES-2005-BriskMNS #taxonomy
A dictionary construction technique for code compression systems with echo instructions (PB, JM, AN, MS), pp. 105–114.
LCTESLCTES-2005-HenzingerKM #code generation #composition #distributed
Composable code generation for distributed giotto (TAH, CMK, SM), pp. 21–30.
PDPPDP-2005-DortaRSG #repository #source code
The OpenMP Source Code Repository (AJD, CR, FdS, AGE), pp. 244–250.
PDPPDP-2005-TerstyanszkyDGKSWK #legacy #security
Security Mechanisms for Legacy Code Applications in GT3 Environment (GT, TD, AG, TK, KS, SCW, PK), pp. 220–226.
PPoPPPPoPP-2005-ChenFGLABD #approach #fault tolerance #performance
Fault tolerant high performance computing by a coding approach (ZC, GEF, EG, JL, TA, GB, JD), pp. 213–223.
SOSPSOSP-2005-SeshadriLSPDK #execution #legacy #named #verification
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (AS, ML, ES, AP, LvD, PKK), pp. 1–16.
FASEFASE-2005-JakobacEM #analysis #comprehension #interactive #source code
Improving System Understanding via Interactive, Tailorable, Source Code Analysis (VJ, AE, NM), pp. 253–268.
STOCSTOC-2005-DvirS #polynomial #query #testing
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits (ZD, AS), pp. 592–601.
STOCSTOC-2005-GuruswamiR
Limits to list decoding Reed-Solomon codes (VG, AR), pp. 602–609.
STOCSTOC-2005-Regev #encryption #fault #learning #linear #on the #random
On lattices, learning with errors, random linear codes, and cryptography (OR), pp. 84–93.
AMOSTA-MOST-2005-CaiL #detection #fault #test coverage #testing
The effect of code coverage on fault detection under different testing profiles (XC, MRL), pp. 84–90.
CAVCAV-2005-BalakrishnanRKLLMGYCT #bytecode #model checking
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++ (GB, TWR, NK, AL, JL, DM, RG, SHY, CHC, TT), pp. 158–163.
RTARTA-2005-Felty #approach #semantics #tutorial
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code (APF), pp. 394–406.
TLCATLCA-2005-Felty #approach #semantics #tutorial
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code: Abstract (APF), p. 10.
VMCAIVMCAI-2005-Goubault-LarrecqP #analysis #c #encryption #protocol
Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
VMCAIVMCAI-2005-Hymans #abstract interpretation #fault #verification
Verification of an Error Correcting Code by Abstract Interpretation (CH), pp. 330–345.
PODSPODS-2004-GuptaKR #query
Roads, Codes and Spatiotemporal Queries (SG, SK, CVR), pp. 115–124.
ITiCSEITiCSE-2004-Garner #learning #programming #using
The use of a code restructuring tool in the learning of programming (SG), p. 277.
CSMRCSMR-2004-Al-EkramK #composition #concept #slicing #source code #using
Source Code Modularization Using Lattice of Concept Slices (RAE, KK), pp. 195–203.
CSMRCSMR-2004-Martin #automation #generative #program transformation #source code
Automated Source Code Transformations on Fourth Generation Languages (JM), pp. 214–222.
ICSMEICSM-2004-Anderson
CodeSurfer/Path Inspector (PA), p. 508.
ICSMEICSM-2004-FerencBG #fact extraction
Fact Extraction and Code Auditing with Columbus and SourceAudit (RF, ÁB, TG), p. 513.
ICSMEICSM-2004-MaleticC #analysis #difference #source code
Supporting Source Code Difference Analysis (JIM, MLC), pp. 210–219.
ICSMEICSM-2004-MantylaVL #smell
Bad Smells — Humans as Code Critics (MM, JV, CL), pp. 399–408.
ICSMEICSM-2004-PinzgerFJG #source code
Abstracting Module Views from Source Code (MP, MF, MJ, HG), p. 533.
ICSMEICSM-2004-RaghavanRLPA #difference #named #scalability #semantics
Dex: A Semantic-Graph Differencing Tool for Studying Changes in Large Code Bases (SR, RR, DL, AP, VA), pp. 188–197.
ICSMEICSM-2004-TahvildariK #approach #multi #source code
Developing a Multi-Objective Decision Approach to Select Source-Code Improving Transformations (LT, KK), pp. 427–431.
IWPCIWPC-2004-KanellopoulosT #c++ #clustering #comprehension #data mining #mining #source code
Data Mining Source Code to Facilitate Program Comprehension: Experiments on Clustering Data Retrieved from C++ Programs (YK, CT), pp. 214–225.
IWPCIWPC-2004-MohanG #evolution #programming #source code
Programming Style Changes in Evolving Source Code (AM, NG), pp. 236–240.
SCAMSCAM-2004-MaruyamaY #automation #framework #java #platform #representation #source code #using #xml
A CASE Tool Platform Using an XML Representation of Java Source Code (KM, SY), pp. 158–167.
SCAMSCAM-2004-NaumannULF #code generation #control flow
Control Flow Reversal for Adjoint Code Generation (UN, JU, AL, MWF), pp. 55–64.
SCAMSCAM-2004-RoblesG #analysis #execution #source code
Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
SCAMSCAM-2004-Rothermel #analysis #source code #using
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
SCAMSCAM-2004-WahlerSGF #clone detection #detection #source code
Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
WCREWCRE-2004-BoisDV #named #refactoring
Refactoring — Improving Coupling and Cohesion of Existing Code (BDB, SD, JV), pp. 144–151.
WCREWCRE-2004-DraheimLW #generative #modelling #web
Generator Code Opaque Recovery of Form-Oriented Web Site Models (DD, CL, GW), pp. 302–303.
WCREWCRE-2004-GschwindPG #c++ #named
TUAnalyzer — Analyzing Templates in C++ Code (TG, MP, HG), pp. 48–57.
WCREWCRE-2004-MarcusSRM #approach #concept #information retrieval #source code
An Information Retrieval Approach to Concept Location in Source Code (AM, AS, VR, JIM), pp. 214–223.
WCREWCRE-2004-RiegerDL
Insights into System-Wide Code Duplication (MR, SD, ML), pp. 100–109.
CIAACIAA-2004-Borchardt #transducer
Code Selection by Tree Series Transducers (BB), pp. 57–67.
DLTDLT-2004-DaleyD #on the
On Codes Defined by Bio-Operations (MD, MD), pp. 127–138.
HaskellHaskell-2004-BaarsS #type safety
Type-safe, self inspecting code (AIB, SDS), pp. 69–79.
ICFPICFP-2004-YuS #assembly #concurrent #safety #verification
Verification of safety properties for concurrent assembly code (DY, ZS), pp. 175–188.
IFLIFL-2004-Cristobal-SalasCRG #message passing #program transformation #source code
Exploiting Single-Assignment Properties to Optimize Message-Passing Programs by Code Transformations (ACS, AC, ERA, JLG), pp. 1–16.
IFLIFL-2004-StefanovS #effectiveness #functional #reduction #source code
Simple, Effective Code-Size Reduction for Functional Programs (ES, AMS), pp. 211–225.
ICGTICGT-2004-BaldanKS #code generation #generative #graph transformation #testing
Generating Test Cases for Code Generators by Unfolding Graph Transformation Systems (PB, BK, IS), pp. 194–209.
ICGTICGT-2004-CorradiniDFR #graph transformation #java
Translating Java Code to Graph Transformation Systems (AC, FLD, LF, LR), pp. 383–398.
EDOCEDOC-2004-ZhaoBBROA #automation #code generation #component #distributed #integration
Automated Glue/Wrapper Code Generation in Integration of Distributed and Heterogeneous Software Components (WZ, BRB, CCB, RRR, AMO, MA), pp. 275–285.
ICPRICPR-v1-2004-Ben-ArtziHH #kernel
Filtering with Gray-Code Kernels (GBA, HHO, YHO), pp. 556–559.
ICPRICPR-v1-2004-BrahimiS #embedded #image
Color Image Coding based on Embedded Wavelet Zerotree and Scalar Quantization (ZB, KAS), pp. 504–507.
ICPRICPR-v1-2004-KongZ #verification
Competitive Coding Scheme for Palmprint Verification (AWKK, DZ), pp. 520–523.
ICPRICPR-v1-2004-Zou #adaptation #image
Reducing Artifacts in BDCT-Coded Images by Adaptive Pixel-Adjustment (JJZ), pp. 508–511.
ICPRICPR-v2-2004-KovacsS #performance
Efficient Coding of Stroke-Rendered Paintings (LK, TS), pp. 835–838.
ICPRICPR-v2-2004-MozaffarifK #classification #comparison #recognition #using
Feature Comparison between Fractal Codes and Wavelet Transform in Handwritten Alphanumeric Recognition Using SVM Classifier (SM, KF, HRK), pp. 331–334.
ICPRICPR-v2-2004-SanchezBM
Prioritized Region of Interest Coding in JPEG2000 (VFS, AB, MKM), pp. 799–802.
ICPRICPR-v3-2004-KoKB04a #learning #multi #problem
Improved N-Division Output Coding for Multiclass Learning Problems (JK, EK, HB), pp. 470–473.
ICPRICPR-v3-2004-LiewWY #classification #sequence #statistics
Selection of Statistical Features Based on Mutual Information for Classification of Human Coding and Non-coding DNA Sequences (AWCL, YW, HY), pp. 766–769.
ICPRICPR-v3-2004-NishiF #analysis #using #video
Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
ICPRICPR-v3-2004-WestphalW #performance #recognition
Fast Object and Pose Recognition Through Minimum Entropy Coding (GW, RPW), pp. 53–56.
ICPRICPR-v4-2004-PagesSF
A New Optimised De Bruijn Coding Strategy for Structured Light Patterns (JP, JS, JF), pp. 284–287.
TOOLSTOOLS-USA-2003-ArdourelH04 #eiffel #graph
Class-based Visibility from an MDA Perspective: From Access Graphs to Eiffel Code (GA, MH), pp. 177–195.
AdaEuropeAdaEurope-2004-GiriMJK #ada #approach #random #safety #testing
A Randomised Test Approach to Testing Safety Critical Ada Code (SKG, AM, YVJ, KK), pp. 190–199.
LOPSTRLOPSTR-2004-Vanhoof #logic programming #semantics #source code
Searching Semantically Equivalent Code Fragments in Logic Programs (WV), pp. 1–18.
PEPMPEPM-2004-Morrisett #question #what
Invited talk: what’s the future for proof-carrying code? (JGM), p. 203.
PPDPPPDP-2004-Morrisett #question #what
Invited talk: what’s the future for proof-carrying code? (JGM), p. 5.
ASEASE-2004-Eusterbrock #certification
Context-Aware Code Certification (JE), pp. 358–361.
ASEASE-2004-Lanza #named
CodeCrawler — Polymetric Views in Action (ML), pp. 394–395.
ASEASE-2004-McNaughtonCSSRP04a #game studies #generative #named
ScriptEase: Generating Scripting Code for Computer Role-Playing Games (MM, MC, DS, JS, JR, DP), pp. 386–387.
ASEASE-2004-Taghdiri #detection #fault #specification
Inferring Specifications to Detect Errors in Code (MT), pp. 144–153.
FSEFSE-2004-ZhangYF #analysis
Refining code-design mapping with flow analysis (XZ, MY, JHEFL), pp. 231–240.
FSEFSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
ICSEICSE-2004-BrunE #fault #machine learning
Finding Latent Code Errors via Machine Learning over Program Executions (YB, MDE), pp. 480–490.
ICSEICSE-2004-GiannakopoulouPC #source code #verification
Assume-Guarantee Verification of Source Code with Design-Level Assumptions (DG, CSP, JMC), pp. 211–220.
SACSAC-2004-AgostaPS #architecture #design #embedded #multi #power management #program transformation #source code
Multi-objective co-exploration of source code transformations and design space architectures for low-power embedded systems (GA, GP, CS), pp. 891–896.
SACSAC-2004-AlbaC #fault #heuristic #hybrid #parallel #problem
Solving the error correcting code problem with parallel hybrid heuristics (EA, JFC), pp. 985–989.
SACSAC-2004-Engelen #code generation #embedded #web #web service #xml
Code generation techniques for developing light-weight XML Web services for embedded devices (RvE), pp. 854–861.
SACSAC-2004-GoumasDAK #automation #code generation #parallel
Automatic parallel code generation for tiled nested loops (GIG, ND, MA, NK), pp. 1412–1419.
SACSAC-2004-MarkWC #automation #code generation #modelling #using
Using semi-lagrangian formulations with automatic code generation for environmental modeling (PvdM, LW, GC), pp. 229–234.
SACSAC-2004-NehabP
Schemata Theory for the real coding and arithmetical operators (DFN, MACP), pp. 1006–1012.
ATEMATEM-2003-CoxC04 #modelling #source code
Three-Layered Source-Code Modelling (AC, CLAC), pp. 71–79.
ATEMATEM-2003-KnodelC04 #delphi #fact extraction #metamodelling #source code
A Meta-Model for Fact Extraction from Delphi Source Code (JK, GCM), pp. 19–28.
GPCEGPCE-2004-HauserK #compilation #execution #graph #process
Compiling Process Graphs into Executable Code (RH, JK), pp. 317–336.
CCCC-2004-CaiGX
Region-Based Partial Dead Code Elimination on Predicated Code (QC, LG, JX), pp. 150–166.
CCCC-2004-JohnsonM #memory management #multi #using
Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
CCCC-2004-Soffa #optimisation
Developing a Foundation for Code Optimization (MLS), pp. 1–4.
CGOCGO-2004-HazelwoodS #optimisation
Exploring Code Cache Eviction Granularities in Dynamic Optimization Systems (KMH, JES), pp. 89–99.
CGOCGO-2004-RongDGG #code generation #multi #pipes and filters
Code Generation for Single-Dimension Software Pipelining of Multi-Dimensional Loops (HR, AD, RG, GRG), pp. 175–188.
DACDAC-2004-KapoorJ #concurrent #logic #specification #synthesis
Decomposing specifications with concurrent outputs to resolve state coding conflicts in asynchronous logic synthesis (HKK, MBJ), pp. 830–833.
DACDAC-2004-MohiyuddinPAW
Synthesizing interconnect-efficient low density parity check codes (MM, AP, AA, WW), pp. 488–491.
DACDAC-2004-NettoACA #multi
Multi-profile based code compression (EWN, RA, PC, GA), pp. 244–249.
DACDAC-2004-SridharaS #framework #network
Coding for system-on-chip networks: a unified framework (SRS, NRS), pp. 103–106.
DACDAC-2004-SunKV #taxonomy #testing
Combining dictionary coding and LFSR reseeding for test data compression (XS, LLK, BV), pp. 944–947.
DATEDATE-DF-2004-BrandoleseFSS #analysis #energy #modelling #program transformation #source code
Analysis and Modeling of Energy Reducing Source Code Transformations (CB, WF, FS, DS), pp. 306–311.
DATEDATE-DF-2004-LinXW #embedded
LZW-Based Code Compression for VLIW Embedded Systems (CHL, YX, WW), pp. 76–81.
DATEDATE-v1-2004-KretzschmarNM #power management #why
Why Transition Coding for Power Minimization of On-Chip Buses Does Not Work (CK, AKN, DM), pp. 512–517.
DATEDATE-v2-2004-LeiningerGM #configuration management
Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
DATEDATE-v2-2004-LorenzM #algorithm #code generation #search-based #using
Phase Coupled Code Generation for DSPs Using a Genetic Algorithm (ML, PM), pp. 1270–1275.
DATEDATE-v2-2004-ShoganC
Compact Binaries with Code Compression in a Software Dynamic Translator (SS, BRC), pp. 1052–1059.
DATEDATE-v2-2004-TehranipourNC #flexibility #testing
Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression (MHT, MN, KC), pp. 1284–1289.
DATEDATE-v2-2004-ZhouCK #embedded
Profile Guided Management of Code Partitions for Embedded Systems (SZ, BRC, NK), pp. 1396–1399.
LCTESLCTES-2004-SaputraCBVKI #embedded
Code protection for resource-constrained embedded devices (HS, GC, RRB, NV, MTK, MJI), pp. 240–248.
LCTESLCTES-2004-ZengSE #concurrent #dependence #generative #graph #performance
Generating fast code from concurrent program dependence graphs (JZ, CS, SAE), pp. 175–181.
LCTESLCTES-2004-ZhangK #adaptation
Adaptive code unloading for resource-constrained JVMs (LZ, CK), pp. 155–164.
OSDIOSDI-2004-LiLMZ #debugging #named #operating system
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code (ZL, SL, SM, YZ), pp. 289–302.
FoSSaCSFoSSaCS-2004-HennessyRY #mobile #named
safeDpi: A Language for Controlling Mobile Code (MH, JR, NY), pp. 241–256.
STOCSTOC-2004-Ben-SassonGHSV #proximity #robust
Robust pcps of proximity, shorter pcps and applications to coding (EBS, OG, PH, MS, SPV), pp. 1–10.
STOCSTOC-2004-Guruswami #question
Better extractors for better codes? (VG), pp. 436–444.
STOCSTOC-2004-IshaiKOS
Batch codes and their applications (YI, EK, RO, AS), pp. 262–271.
ICLPICLP-2004-AlbertPH #abstract interpretation #certification #mobile
Abstract Interpretation-Based Mobile Code Certification (EA, GP, MVH), pp. 446–447.
ICDARICDAR-2003-GocciaBSD #classification #feature model #optimisation #recognition
Recognition of Container Code Characters through Gray-Level Feature Extraction and Gradient-Based Classifier Optimization (MG, MB, CS, SGD), p. 973–?.
ICDARICDAR-2003-HoqueSF #approach #classification #multi #performance #recognition
A New Chain-code Quantization Approach Enabling High Performance Handwriting Recognition based on Multi-Classifier Schemes (SH, KS, MCF), pp. 834–838.
ICDARICDAR-2003-Verma #recognition #segmentation
A Contour Code Feature Based Segmentation For Handwriting Recognition (BV), pp. 1203–1207.
CSMRCSMR-2003-Lanza #lessons learnt #named #visualisation
CodeCrawler — Lessons Learned in Building a Software Visualization Tool (ML), pp. 409–418.
ICSMEICSM-2003-BalanyiF #c++ #design pattern #mining #source code
Mining Design Patterns from C++ Source Code (ZB, RF), pp. 305–314.
ICSMEICSM-2003-GoldM #comprehension #concept #evolution #framework #source code
A Framework for Understanding Conceptual Changes in Evolving Source Code (NG, AM), pp. 431–439.
ICSMEICSM-2003-Klusener #analysis #source code
Source Code Based Function Point Analysis for Enhancement Projects (SK), pp. 373–376.
ICSMEICSM-2003-KojuTD #testing #virtual machine
Regression Test Selection based on Intermediate Code for Virtual Machines (TK, ST, ND), p. 420–?.
ICSMEICSM-2003-MantylaVL #empirical #smell #taxonomy
A Taxonomy and an Initial Empirical Study of Bad Smells in Code (MM, JV, CL), pp. 381–384.
ICSMEICSM-2003-MensPG #maintenance #source code #using
Using Intentional Source-Code Views to Aid Software Maintenance (KM, BP, SG), pp. 169–178.
ICSMEICSM-2003-Mul #internet #legacy #using
Making maximum use of legacy code: Transavia internet booking engine (CM), p. 466.
ICSMEICSM-2003-TonellaP #c++ #diagrams #interactive #reverse engineering
Reverse Engineering of the Interaction Diagrams from C++ Code (PT, AP), pp. 159–168.
IWPCIWPC-2003-Cordy #agile #semiparsing #source code #using #xml
Generalized Selective XML Markup of Source Code Using Agile Parsing (JRC), pp. 144–153.
IWPCIWPC-2003-TjortjisSL #comprehension #mining #source code
Facilitating Program Comprehension by Mining Association Rules from Source Code (CT, LS, PJL), pp. 125–133.
SCAMSCAM-2003-BaggeKHV #c++ #design #optimisation #source code
Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs (OSB, KTK, MH, EV), p. 65–?.
SCAMSCAM-2003-BinkleyH #algorithm #analysis #graph #optimisation #performance #reachability #scalability #source code
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
SCAMSCAM-2003-Leitao #2d #detection #using
Detection of Redundant Code using R2D2 (AML), pp. 183–192.
SCAMSCAM-2003-Verhoef #analysis #multi #source code #using
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
WCREWCRE-2003-HassanH #development
Studying the Chaos of Code Development (AEH, RCH), pp. 123–133.
ICALPICALP-2003-BleichenbacherKY #semistructured data
Decoding of Interleaved Reed Solomon Codes over Noisy Data (DB, AK, MY), pp. 97–108.
ICALPICALP-2003-PoulalhonS
Optimal Coding and Sampling of Triangulations (DP, GS), pp. 1080–1094.
FMFME-2003-Glesner
Program Checking with Certificates: Separating Correctness-Critical Code (SG), pp. 758–777.
SEFMSEFM-2003-DeharbeR #debugging #proving #theorem proving #verification
Light-Weight Theorem Proving for Debugging and Verifying Units of Code (DD, SR), pp. 220–228.
ICFPICFP-2003-ChenX #metaprogramming #representation
Meta-programming through typeful code representation (CC, HX), pp. 275–286.
IFLIFL-2003-WeeldenP #functional
A Functional Shell That Dynamically Combines Compiled Code (AvW, RP), pp. 36–52.
VISSOFTVISSOFT-2003-Lanza #lightweight #visualisation
CodeCrawler – A Lightweight Software Visualization Tool (ML), pp. 54–55.
VISSOFTVISSOFT-2003-WheeldonCK #comprehension #named #using
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 48–52.
VISSOFTVISSOFT-2003-WheeldonCK1 #comprehension #named #using
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 56–57.
ICEISICEIS-v3-2003-AleksyG #code generation #distributed
Code Generation for Distributed Systems (MA, RG), pp. 313–318.
ECIRECIR-2003-BrisaboaINP #database #performance
An Efficient Compression Code for Text Databases (NRB, ELI, GN, JRP), pp. 468–481.
SIGIRSIGIR-2003-KrovetzUG #classification #source code
Classification of source code archives (RK, SU, CLG), pp. 425–426.
AdaEuropeAdaEurope-2003-JeppuKS #ada #realtime #safety #testing #using
Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
PEPMPEPM-2003-AttardiCK #named
CodeBricks: code fragments as building blocks (GA, AC, AK), pp. 66–74.
SASSAS-2003-ChenLG #multi
Code Compaction of Matching Single-Entry Multiple-Exit Regions (WKC, BL, RG), pp. 401–417.
RERE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
ASEASE-2003-Collard #difference #framework #refactoring #source code
An Infrastructure to Support Meta-Differencing and Refactoring of Source Code (MLC), pp. 377–380.
ASEASE-2003-RobillardM #automation #process
Automatically Inferring Concern Code from Program Investigation Activities (MPR, GCM), pp. 225–235.
ASEASE-2003-SmithS #automation #design pattern #flexibility #named #source code
SPQR: Flexible Automated Design Pattern Extraction From Source Code (JMS, PDS), pp. 215–224.
ASEASE-2003-SturmerC #code generation #design #testing #tool support
Test Suite Design for Code Generation Tools (IS, MC), pp. 286–290.
ICSEICSE-2003-MarcusM #semantics #traceability #using
Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing (AM, JIM), pp. 125–137.
ICSEICSE-2003-RobillardM #source code
FEAT. A Tool for Locating, Describing, and Analyzing Concerns in Source Code (MPR, GCM), pp. 822–823.
ICSEICSE-2003-WhittleSK #case study
From Scenarios to Code: An Air Traffic Control Case Study (JW, JS, RK), pp. 490–497.
SACSAC-2003-EngelenWY #embedded #validation
Validation of Code-Improving Transformations for Embedded Systems (RvE, DBW, XY), pp. 684–691.
SACSAC-2003-GiorgettiS #automation #categorisation #multi #overview
Multiclass Text Categorization for Automated Survey Coding (DG, FS), pp. 798–802.
SACSAC-2003-MarkWC #automation #code generation
Automatic Code Generation for a Convection Scheme (PvdM, LW, GC), pp. 1003–1008.
SACSAC-2003-PannalaDSO #hybrid #modelling #parallel
Hybrid (OpenMP and MPI) Parallelization of MFIX: A Multiphase CFD Code for Modeling Fluidized Beds (SP, EFD, MS, TO), pp. 199–206.
SACSAC-2003-ShinjoKP #code generation #empirical #performance
Efficient Mediators through Dynamic Code Generation: a Method and an Experiment (YS, TK, CP), pp. 1147–1154.
GPCEGPCE-2003-RutherfordW #code generation #modelling
A Case for Test-Code Generation in Model-Driven Systems (MJR, ALW), pp. 377–396.
CCCC-2003-JohnsonM #dependence #graph #using
Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
CCCC-2003-KandemirICR
Address Register Assignment for Reducing Code Size (MTK, MJI, GC, JR), pp. 273–289.
CCCC-2003-Leupers #algorithm #evaluation #optimisation
Offset Assignment Showdown: Evaluation of DSP Address Code Optimization Algorithms (RL), pp. 290–302.
CGOCGO-2003-DehnertGBJKKM #adaptation #challenge #using
The Transmeta Code Morphing — Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges (JCD, BG, JPB, RJ, TK, AK, JM), pp. 15–24.
CGOCGO-2003-DrinicKV #optimisation
Code Optimization for Code Compression (MD, DK, HV), pp. 315–324.
CGOCGO-2003-KaminCJ #code generation #java #named #runtime
Jumbo: Run-Time Code Generation for Java and Its Applications (SK, LC, AJ), pp. 48–58.
DACDAC-2003-LekatsasHCJS #agile #framework #hardware #named #platform #prototype
CoCo: a hardware/software platform for rapid prototyping of code compression technologies (HL, JH, STC, VJ, MS), pp. 306–311.
DATEDATE-2003-BesanaB #automation #case study #code generation #design #framework #hardware #platform
Application Mapping to a Hardware Platform through Automated Code Generation Targeting a RTOS: A Design Case Study (MB, MB), pp. 20041–20044.
DATEDATE-2003-FalkM #control flow #source code
Control Flow Driven Splitting of Loop Nests at the Source Code Level (HF, PM), pp. 10410–10415.
DATEDATE-2003-KandemirZK #parallel #runtime
Runtime Code Parallelization for On-Chip Multiprocessors (MTK, WZ, MK), pp. 10510–10515.
DATEDATE-2003-LangeK #configuration management #design #embedded #framework #hardware #platform
Virtual Hardware Byte Code as a Design Platform for Reconfigurable Embedded Systems (SL, UK), pp. 10302–10309.
DATEDATE-2003-MadalinskiBKY #design #visualisation
Visualization and Resolution of Coding Conflicts in Asynchronous Circuit Design (AM, AVB, VK, AY), pp. 10926–10931.
DATEDATE-2003-OmanaRM #parallel
High Speed and Highly Testable Parallel Two-Rail Code Checker (MO, DR, CM), pp. 10608–10615.
DATEDATE-2003-Tarnick #embedded #self
Self-Testing Embedded Checkers for Bose-Lin, Bose, and a Class of Borden Codes (ST), pp. 11162–11163.
DATEDATE-2003-XieWL
Profile-Driven Selective Code Compression (YX, WW, HL), pp. 10462–10467.
LCTESLCTES-2003-CorlissLR #implementation
A DISE implementation of dynamic code decompression (MLC, ECL, AR), pp. 232–243.
LCTESLCTES-2003-Krishnaswamy #performance #using
Enhancing the performance of 16-bit code using augmenting instructions (AK, RG), pp. 254–264.
LCTESLCTES-2003-SutterVBB #abstraction #on the
On the side-effects of code abstraction (BDS, HV, BDB, KDB), pp. 244–253.
PPoPPPPoPP-2003-TanSSAM #design pattern #distributed #generative #memory management #parallel #using
Using generative design patterns to generate parallel code for a distributed memory environment (KT, DS, JS, JA, SM), pp. 203–215.
SOSPSOSP-2003-PatelWWLS #mobile #protocol #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
SOSPSOSP-2003-SekarVBBD #approach #execution
Model-carrying code: a practical approach for safe execution of untrusted applications (RS, VNV, SB, SB, DCD), pp. 15–28.
FASEFASE-2003-ReichmannKM #approach #design #embedded #modelling #object-oriented
An Overall System Design Approach Doing Object-Oriented Modeling to Code-Generation for Embedded Electronic Systems (CR, MK, KDMG), pp. 52–66.
STOCSTOC-2003-GuruswamiI #linear
Linear time encodable and list decodable codes (VG, PI), pp. 126–135.
STOCSTOC-2003-KerenidisW #bound #exponential #quantum
Exponential lower bound for 2-query locally decodable codes via a quantum argument (IK, RdW), pp. 106–115.
STOCSTOC-2003-Tardo #probability
Optimal probabilistic fingerprint codes (GT), pp. 116–125.
TACASTACAS-2003-BarayCDM #functional #generative #testing #validation
Code-Based Test Generation for Validation of Functional Processor Descriptions (FB, PC, DD, HM), pp. 569–584.
TACASTACAS-2003-Lee #case study #experience #what
What Are We Trying to Prove? Reflections on Experiences with Proof-Carrying Code (PL0), p. 1.
CADECADE-2003-CraryS #framework #logic
Foundational Certified Code in a Metalogical Framework (KC, SS), pp. 106–120.
ICLPICLP-2003-Morrisett #low level #type safety
Achieving Type Safety for Low-Level Code (JGM), pp. 1–2.
VMCAIVMCAI-2003-Rival #abstract interpretation #assembly #certification
Abstract Interpretation-Based Certification of Assembly Code (XR), pp. 41–55.
DocEngDocEng-2002-CollardMM #documentation #source code
Supporting document and data views of source code (MLC, JIM, AM), pp. 34–41.
SCAMSCAM-J-2001-Vanter02 #source code
The documentary structure of source code (MvdV), pp. 767–782.
CSMRCSMR-2002-MolnarBS #aspectj #java #xml
Function Call Trap of Java Codes with the Help of AspectJ and XML (BM, IB, BS), pp. 207–210.
ICSMEICSM-2002-TonellaP #analysis #c++ #diagrams
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram (PT, AP), pp. 54–63.
ICSMEICSM-2002-TvedtCL #architecture #design #evaluation #process
Does the Code Match the Design? A Process for Architecture Evaluation (RTT, PC, ML), pp. 393–401.
IWPCIWPC-2002-CoxC #xml
Relocating XML Elements from Preprocessed to Unprocessed Code (AC, CLAC), pp. 229–238.
IWPCIWPC-2002-MaleticCM #documentation #source code
Source Code Files as Structured Documents (JIM, MLC, AM), pp. 289–292.
PASTEPASTE-2002-Eng #visualisation
Combining static and dynamic data in code visualization (DE), pp. 43–50.
PASTEPASTE-2002-SutherlandGS #thread
The code of many colors: relating threads to code and shared state (DFS, AG, WLS), pp. 77–83.
SCAMSCAM-2002-Baxter #analysis #parallel #source code
Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
WCREWCRE-2002-EmdenM #assurance #detection #java #quality #smell
Java Quality Assurance by Detecting Code Smells (EVE, LM), p. 97–?.
WCREWCRE-2002-HarmanGHB #algorithm #concept #slicing
Code Extraction Algorithms which Unify Slicing and Concept Assignment (MH, NG, RMH, DB), pp. 11–21.
WCREWCRE-2002-McArthurMN #representation #source code #using #xml
An Extensible Tool for Source Code Representation Using XML (GM, JM, SKKN), p. 199–?.
WCREWCRE-2002-RillingM #3d #analysis #on the #source code #using #visual notation
On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
WCREWCRE-2002-SchwarzDA #execution #revisited
Disassembly of Executable Code Revisited (BS, SKD, GRA), pp. 45–54.
CIAACIAA-2002-CzyzowiczFPR
Prime Decompositions of Regular Prefix Codes (JC, WF, AP, WR), pp. 85–94.
DLTDLT-2002-DoL #bound #on the #product line
On a Family of Codes with Bounded Deciphering Delay (DLV, IL), pp. 369–380.
DLTDLT-2002-Lam #finite
Finite Completion of Comma-Free Codes. Part I (NHL), pp. 357–368.
ICALPICALP-2002-BermanKN #approximate #parallel
Approximating Huffman Codes in Parallel (PB, MK, YN), pp. 845–855.
ICALPICALP-2002-KiayiasY #encryption
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes (AK, MY), pp. 232–243.
FMFME-2002-ArtsED #case study #erlang #verification
Verifying Erlang Code: A Resource Locker Case-Study (TA, CBE, JD), pp. 184–203.
FMFME-2002-Casset #development #embedded #formal method #java #using #verification
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
FMFME-2002-Fidge #analysis #assembly #control flow
Timing Analysis of Assembler Code Control-Flow Paths (CJF), pp. 370–389.
FMFME-2002-WhalenSF
Synthesizing Certified Code (MWW, JS, BF), pp. 431–450.
AFPAFP-2002-BirdG02
Arithmetic Coding with Folds and Unfolds (RSB, JG), pp. 1–26.
ICFPICFP-2002-CraryV #scalability #type system
An expressive, scalable type theory for certified code (KC, JV), pp. 191–205.
VISSOFTVISSOFT-2002-RillingSB #analysis #complexity #concept #source code #visualisation
The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
EDOCEDOC-2002-OldevikSEB #code generation #framework #model transformation
Framework for Model Transformation and Code Generation (JO, AS, BE, AJB), pp. 181–189.
ICEISICEIS-2002-PelechanoACP #automation #code generation #concept #object-oriented
Automating the Code Generation of Role Classes in OO Conceptual Schemas (VP, MA, EC, OP), pp. 658–666.
ICPRICPR-v2-2002-HsiehT #adaptation #fuzzy #image #using
Wavelet-based Image Coding Using Fuzzy Inference and Adaptive Quantization (MSH, DCT), pp. 265–268.
ICPRICPR-v2-2002-WindeattA
Tree Pruning for Output Coded Ensembles (TW, GA), pp. 92–95.
ICPRICPR-v3-2002-GarciaFRF02a #embedded
Optimized Rate Control in Embedded Wavelet Coding (JAG, JFV, RRS, XRFV), pp. 849–854.
ICPRICPR-v3-2002-IgualGJ #preprocessor #recognition
Preprocessing and Recognition of Characters in Container Codes (ISI, GAG, AJPJ), pp. 143–146.
ICPRICPR-v3-2002-TanakaKFI #modelling #speech
Constructing Speech Processing Systems on Universal Phonetic Codes Accompanied with Reference Acoustic Models (KT, HK, NF, YI), pp. 728–731.
KDDKDD-2002-UgurelKG #automation #classification #source code #what
What’s the code?: automatic classification of source code archives (SU, RK, CLG), pp. 639–644.
SEKESEKE-2002-ChartersKTM #component #visualisation
Visualisation for informed decision making; from code to components (SMC, CK, NT, MM), pp. 765–772.
SEKESEKE-2002-MensMW #maintenance #source code
Maintaining software through intentional source-code views (KM, TM, MW), pp. 289–296.
UMLUML-2002-SturmVB #generative #uml
Generating Code from UML with Velocity Templates (TS, JvV, MB), pp. 150–161.
ECOOPECOOP-2002-CzajkowskiDN #virtual machine
Code Sharing among Virtual Machines (GC, LD, NN), pp. 155–177.
OOPSLAOOPSLA-2002-SutterBB #c++ #low level #reuse
Sifting out the mud: low level C++ code reuse (BDS, BDB, KDB), pp. 275–291.
AdaEuropeAdaEurope-2002-Amey #analysis #design
Closing the Loop: The Influence of Code Analysis on Design (PA), pp. 151–162.
PADLPADL-2002-Rhiger #compilation #embedded #source code
Compiling Embedded Programs to Byte Code (MR), pp. 120–136.
PLDIPLDI-2002-DebrayE
Profile-Guided Code Compression (SKD, WSE), pp. 95–105.
PLDIPLDI-2002-HenzingerK #embedded #predict #realtime
The Embedded Machine: Predictable, Portable Real-Time Code (TAH, CMK), pp. 315–326.
POPLPOPL-2002-NeculaMW #legacy #named #type safety
CCured: type-safe retrofitting of legacy code (GCN, SM, WW), pp. 128–139.
ASEASE-2002-RosuW #towards
Towards Certifying Domain-Specific Properties of Synthesized Code (GR, JW), pp. 289–294.
ICSEICSE-2002-DunsmoreRW #development #evaluation #object-oriented
Further investigations into the development and evaluation of reading techniques for object-oriented code inspection (AD, MR, MW), pp. 47–57.
ICSEICSE-2002-Michail #source code #using
Browsing and searching source code of applications written using a GUIframework (AM), pp. 327–337.
ICSEICSE-2002-Robillard #representation #source code
A representation for describing and analyzing concerns in source code (MPR), pp. 721–722.
SACSAC-2002-Abu-GhazalehP #execution #mobile #performance #towards #verification
Verification caching: towards efficient and secure mobile code execution environments (NBAG, DSP), pp. 964–968.
SACSAC-2002-ButenkoPSSS #graph #independence #set
Finding maximum independent sets in graphs arising from coding theory (SB, PMP, IS, VS, PS), pp. 542–546.
SACSAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #usability #using
A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
SACSAC-2002-GoumasAK #architecture #automation #code generation #parallel
Automatic code generation for executing tiled nested loops onto parallel architectures (GIG, MA, NK), pp. 876–881.
SACSAC-2002-Leopold #locality #on the
On optimal temporal locality of stencil codes (CL), pp. 948–952.
SACSAC-2002-NunnD #assembly #automation #component
Automated assembly of software components based on XML-coded instructions (IN, DD), pp. 937–942.
SACSAC-2002-TanM #mobile #security
Certificates for mobile code security (HKT, LM), pp. 76–81.
SACSAC-2002-WhittakerV #mobile
Neutralizing windows-based malicious mobile code (JAW, ADV), pp. 242–246.
CCCC-2002-HendersonS #c #compilation
Compiling Mercury to High-Level C Code (FH, ZS), pp. 197–212.
CCCC-2002-WuSKLF
Value-Profile Guided Stride Prefetching for Irregular Code (YW, MJS, RK, WL, JF), pp. 307–324.
DACDAC-2002-ChakrabortyEKT #embedded #realtime #scheduling
Schedulability of event-driven code blocks in real-time embedded systems (SC, TE, SK, LT), pp. 616–621.
DACDAC-2002-ChandraC #reduction #testing #using
Reduction of SOC test data volume, scan power and testing time using alternating run-length codes (AC, KC), pp. 673–678.
DACDAC-2002-ChoiK #code generation #scheduling
Address assignment combined with scheduling in DSP code generation (YC, TK), pp. 225–230.
DACDAC-2002-LeeP #analysis #design #embedded #performance #simulation
Timed compiled-code simulation of embedded software for performance analysis of SOC design (JYL, ICP), pp. 293–298.
DACDAC-2002-OhH #data flow #graph #multi #performance #synthesis
Efficient code synthesis from extended dataflow graphs for multimedia applications (HO, SH), pp. 275–280.
DATEDATE-2002-AghaghiriPF #encoding #multi #power management
EZ Encoding: A Class of Irredundant Low Power Codes for Data Address and Multiplexed Address Buses (YA, MP, FF), p. 1102.
DATEDATE-2002-HalambiSBDN #compilation #performance #reduction #using
An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
DATEDATE-2002-KhomenkoKY #detection #integer #programming #using
Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
DATEDATE-2002-LiverisZSG #performance #program transformation
A Code Transformation-Based Methodology for Improving I-Cache Performance of DSP Applications (NDL, NDZ, DS, CEG), pp. 977–983.
DATEDATE-2002-MichelWWM #hardware #trade-off
Hardware/Software Trade-Offs for Advanced 3G Channel Coding (HM, AW, NW, MM), pp. 396–401.
LCTESLCTES-SCOPES-2002-FengH #automation #verification
Automatic formal verification for scheduled VLIW code (XF, AJH), pp. 85–92.
LCTESLCTES-SCOPES-2002-KastnerW #assembly #control flow #re-engineering
Generic control flow reconstruction from assembly code (DK, SW), pp. 46–55.
LCTESLCTES-SCOPES-2002-KesslerB #architecture #clustering #code generation
Optimal integrated code generation for clustered VLIW architectures (CWK, AB), pp. 102–111.
LCTESLCTES-SCOPES-2002-NaikP #compilation #constraints
Compiling with code-size constraints (MN, JP), pp. 120–129.
LCTESLCTES-SCOPES-2002-OhH #data flow #multi #performance #synthesis
Fractional rate dataflow model and efficient code synthesis for multimedia applications (HO, SH), pp. 12–17.
LCTESLCTES-SCOPES-2002-ZhaoCWBEYHDGJ #interactive #named
VISTA: a system for interactive code improvement (WZ, BC, DBW, MWB, RvE, XY, JH, JWD, KG, DLJ), pp. 155–164.
OSDIOSDI-2002-MusuvathiPCED #approach #model checking #named
CMC: A Pragmatic Approach to Model Checking Real Code (MM, DYWP, AC, DRE, DLD), pp. 75–88.
PDPPDP-2002-FeilU #image #multi
Wavelet Packet Zerotree Image Coding on Multicomputers (MF, AU), pp. 353–359.
ESOPESOP-2002-Morrisett #type checking
Type Checking Systems Code (JGM), pp. 1–5.
STOCSTOC-2002-GolinKY
Huffman coding with unequal letter costs (MJG, CK, NEY), pp. 785–791.
STOCSTOC-2002-Guruswami #linear
Limits to list decodability of linear codes (VG), pp. 802–811.
STOCSTOC-2002-GuruswamiI #linear
Near-optimal linear-time codes for unique decoding and new list-decodable codes over smaller alphabets (VG, PI), pp. 812–821.
STOCSTOC-2002-MeshulamW #symmetry
Expanders from symmetric codes (RM, AW), pp. 669–677.
CADECADE-2002-BernardL #logic
Temporal Logic for Proof-Carrying Code (AB, PL), pp. 31–46.
CADECADE-2002-SchneckN #approach #scalability
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code (RRS, GCN), pp. 47–62.
CADECADE-2002-WhalenSF #automation #certification #named #synthesis
AutoBayes/CC — Combining Program Synthesis with Automatic Code Certification — System Description (MWW, JS, BF), pp. 290–294.
CAVCAV-2002-HenzingerJMNSW #proving
Temporal-Safety Proofs for Systems Code (TAH, RJ, RM, GCN, GS, WW), pp. 526–538.
ISSTAISSTA-2002-BriandLS #analysis #contract #fault #object-oriented #using
Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
ISSTAISSTA-2002-TikirH #performance #test coverage #testing
Efficient instrumentation for code coverage testing (MMT, JKH), pp. 86–96.
LICSLICS-2002-HamidSTMN #approach
A Syntactic Approach to Foundational Proof-Carrying Code (NAH, ZS, VT, SM, ZN), pp. 89–100.
TPDLECDL-2001-Spencer #multi #recognition #set
Digitization, Coded Character Sets, and Optical Character Recognition for Multi-script Information Resources: The Case of the Letopis’ Zhurnal’nykh Statei (GAS), pp. 429–437.
HTHT-2001-CoulstonV #hypermedia #metric
A hypertext metric based on huffman coding (CC, TMV), pp. 243–244.
CSEETCSEET-2001-GotterbarnM #industrial #re-engineering
Software Engineering Ethics Training in Industry and Academe: Professionalism and the Software Engineering Code of Ethics (DG, KWM), p. 243–?.
IWPCIWPC-J-1999-AntoniolCPT01 #traceability
Design-code traceability recovery: selecting the basic linkage properties (GA, BC, AP, PT), pp. 213–234.
IWPCIWPC-J-1999-CifuentesE01
Recovery of jump table case statements from binary code (CC, MVE), pp. 171–188.
CSMRCSMR-2001-WildeBPR #case study #feature model #fortran #legacy
A Case Study of Feature Location in Unstructured Legacy Fortran Code (NW, MB, HP, VR), pp. 68–76.
ICSMEICSM-2001-ChenCWYZZM #cvs #named #source code #using
CVSSearch: Searching through Source Code Using CVS Comments (AC, EC, JW, AYY, QZ, SZ, AM), p. 364–?.
ICSMEICSM-2001-ElbaumGR #evolution #test coverage
The Impact of Software Evolution on Code Coverage Information (SGE, DG, GR), pp. 170–179.
ICSMEICSM-2001-EveraarsAK #concurrent #coordination #source code #using
Using Coordination to Restructure Sequential Source Code into a Concurrent Program (CTHE, FA, BK), p. 342–?.
ICSMEICSM-2001-PoloPR #case study #legacy #maintenance #metric #predict #source code #using
Using Code Metrics to Predict Maintenance of Legacy Programs: A Case Study (MP, MP, FR), pp. 202–208.
ICSMEICSM-2001-SiyV #question
Does the Modern Code Inspection Have Value? (HPS, LGV), p. 281–?.
ICSMEICSM-2001-TonellaP #c++ #diagrams #reverse engineering #uml
Reverse Engineering of the UML Class Diagram from C++ Code in Presence of Weakly Typed Containers (PT, AP), pp. 376–385.
IWPCIWPC-2001-CordySDM #design #named #source code
HSML: Design Directed Source Code Hot Spots (JRC, KAS, TRD, AJM), pp. 145–154.
PASTEPASTE-2001-AncourtN #array #debugging #maintenance #reuse
Array resizing for scientific code debugging, maintenance and reuse (CA, TVNN), pp. 32–37.
SCAMSCAM-2001-BiemanM #web
Finding Code on the World Wibe Web: A Preliminary Investigation (JMB, VM), pp. 75–80.
SCAMSCAM-2001-BurdR #analysis #automation #evolution #source code #using
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAMSCAM-2001-DeruelleMBB #analysis #distributed #multi
Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
SCAMSCAM-2001-Vanter #source code #tool support
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools (MvdV), pp. 133–143.
SCAMSCAM-2001-Ward #analysis #approach #source code
The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
WCREWCRE-2001-Krinke #dependence #graph #identification
Identifying Similar Code with Program Dependence Graphs (JK), pp. 301–309.
WCREWCRE-2001-VillavicencioO #slicing
Reverse Program Calculation Supported by Code Slicing (GV, JNO), p. 35–?.
DLTDLT-2001-ItoK #petri net
Some Petri Net Languages and Codes (MI, YK), pp. 69–80.
ICALPICALP-2001-Kunc #decidability #problem
The Trace Coding Problem Is Undecidable (MK), pp. 603–614.
ICALPICALP-2001-ShankarKSR
Minimal Tail-Biting Trellises for Certain Cyclic Block Codes Are Easy to Construct (PS, PNAK, HS, BSR), pp. 627–638.
FLOPSFLOPS-2001-Necula #architecture #scalability
A Scalable Architecture for Proof-Carrying Code (GCN), pp. 21–39.
GT-VMTGT-VMT-2001-CorradiniDR #graph transformation #mobile #specification #using
A Graph Transformation View on the Specification of Applications using Mobile Code (AC, FLD, LR0), pp. 238–246.
ICEISICEIS-v1-2001-Maamar
Moving Code (Servlet Strategy) vs. Inviting Code (Applet Strategy) (ZM), pp. 295–303.
ICEISICEIS-v2-2001-FairchildV #e-commerce #standard
Coding Standards Benefiting Product and Service Information in E-Commerce (AMF, BdV), pp. 991–995.
TOOLSTOOLS-USA-2001-Breuel #code generation #implementation #java #using
Implementing Dynamic Language Features in Java Using Dynamic Code Generation (TMB), pp. 143–152.
AdaEuropeAdaEurope-2001-KuchumovRS #ada #library #named #object-oriented
OASIS — An ASIS Secondary Library for Analyzing Object-Oriented Ada Code (AK, SR, AS), pp. 113–122.
PLDIPLDI-2001-AmmeDFR #named #representation #type safety
SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form (WA, ND, MF, JvR), pp. 137–147.
PLDIPLDI-2001-ArnoldR #cost analysis #framework
A Framework for Reducing the Cost of Instrumented Code (MA, BGR), pp. 168–179.
PLDIPLDI-2001-HeintzeT01a #alias #analysis #c #using
Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
POPLPOPL-2001-GordonS #multi #type system
Typing a multi-language intermediate code (ADG, DS), pp. 248–260.
SASSAS-2001-KomondoorH #identification #slicing #source code #using
Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
AdaSIGAda-2001-WhiteW #ada #dynamic analysis
Dynamic analysis for locating product features in Ada code (LJW, NW), pp. 99–106.
ASEASE-2001-FredlundGN #automation #erlang #verification
Semi-Automated Verification of Erlang Code (LÅF, DG, TN), pp. 319–323.
ASEASE-2001-MarcusM #concept #identification #source code
Identification of High-Level Concept Clones in Source Code (AM, JIM), pp. 107–114.
ASEASE-2001-Xia #mobile #verification
Verify Properties of Mobile Code (SX), p. 440.
FSEESEC-FSE-2001-CoadyKFS #composition #operating system #using
Using aspectC to improve the modularity of path-specific customization in operating system code (YC, GK, MJF, GS), pp. 88–98.
FSEESEC-FSE-2001-Zundorf #case study #development #uml
From use cases to code---rigorous software development with UML (AZ), pp. 324–325.
ICSEICSE-2001-BertolinoIM #architecture #execution #testing
An Explorative Journey from Architectural Tests Definition downto Code Tests Execution (AB, PI, HM), pp. 211–220.
ICSEICSE-2001-Michail #data mining #library #mining #named #reuse
CodeWeb: Data Mining Library Reuse Patterns (AM), pp. 827–828.
ICSEICSE-2001-MurphyLWR #case study #source code
Separating Features in Source Code: An Exploratory Study (GCM, AL, RJW, MPR), pp. 275–284.
ICSEICSE-2001-Zundorf #case study #development #uml
From Use Cases to Code — Rigorous Software Development with UML (AZ), pp. 711–712.
SACSAC-2001-Kandemir #algebra #algorithm #linear #locality #optimisation
A dynamic locality optimization algorithm for linear algebra codes (MTK), pp. 632–635.
CCCC-2001-Gregg #scheduling
Comparing Tail Duplication with Compensation Code in Single Path Global Instruction Scheduling (DG), pp. 200–212.
CCCC-2001-Touati
Register Saturation in Superscalar and VLIW Codes (SAAT), pp. 213–228.
DACDAC-2001-HenkelL #adaptation #design #named #power management
A2BC: Adaptive Address Bus Coding for Low Power Deep Sub-Micron Designs (JH, HL), pp. 744–749.
DACDAC-2001-UdayanarayananC #code generation
Address Code Generation for Digital Signal Processors (SU, CC), pp. 353–358.
DATEDATE-2001-ChandraC #performance #testing #using
Efficient test data compression and decompression for system-on-a-chip using internal scan chains and Golomb coding (AC, KC), pp. 145–149.
DATEDATE-2001-CheynetNVRRV #automation #evaluation #program transformation #safety
System safety through automatic high-level code transformations: an experimental evaluation (PC, BN, RV, MR, MSR, MV), pp. 297–301.
DATEDATE-2001-FavalliM #detection #fault #optimisation
Optimization of error detecting codes for the detection of crosstalk originated errors (MF, CM), pp. 290–296.
DATEDATE-2001-Parameswaran #hardware #performance
Code placement in hardware/software co-synthesis to improve performance and reduce cost (SP), pp. 626–632.
DATEDATE-2001-PasseroneWL #generative #graph #scheduling
Generation of minimal size code for scheduling graphs (CP, YW, LL), pp. 668–673.
HPCAHPCA-2001-KailasEA #clustering #code generation #framework #named
CARS: A New Code Generation Framework for Clustered ILP Processors (KK, KE, AKA), pp. 133–143.
HPCAHPCA-2001-LeeST #architecture #automation #memory management
Automatically Mapping Code on an Intelligent Memory Architecture (JL, YS, JT), pp. 121–132.
HPCAHPCA-2001-WangWKRS #execution #scheduling
Register Renaming and Scheduling for Dynamic Execution of Predicated Code (PHW, HW, RMK, KR, JPS), pp. 15–25.
HPDCHPDC-2001-FollenKLTS #corba #development #legacy
A CORBA-Based Development Environment for Wrapping and Coupling Legacy Scientific Codes (GJF, CMK, IL, ST, JS), p. 22–?.
LCTESLCTES-OM-2001-KesslerB #approach #code generation #programming
A Dynamic Programming Approach to Optimal Integrated Code Generation (CWK, AB), pp. 165–174.
LCTESLCTES-OM-2001-SutterBBD
Combining Global Code and Data Compaction (BDS, BDB, KDB, SKD), pp. 29–38.
PDPPDP-2001-SageMB #java #multi
Dynamic Code Management on a Java Multicomputer (PS, PM, AB), p. 97–?.
SOSPSOSP-2001-EnglerCC #approach #behaviour #consistency #debugging #fault
Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code (DRE, DYC, AC), pp. 57–72.
ESOPESOP-2001-KatsumataO #decompiler #low level
Proof-Directed De-compilation of Low-Level Code (SyK, AO), pp. 352–366.
ESOPESOP-2001-KomondoorH #dependence #tool support #using
Tool Demonstration: Finding Duplicated Code Using Program Dependences (RK, SH), pp. 383–386.
ESOPESOP-2001-XuRM #type system
Typestate Checking of Machine Code (ZX, TWR, BPM), pp. 335–351.
STOCSTOC-2001-Elkies #composition
Excellent codes from modular curves (NDE), pp. 200–208.
STOCSTOC-2001-Ta-ShmaZ
Extractor codes (ATS, DZ), pp. 193–199.
LICSLICS-2001-Appel
Foundational Proof-Carrying Code (AWA), pp. 247–256.
SIGMODSIGMOD-2000-LitwinS #data type #distributed #scalability #using
LH*RS: A High-Availability Scalable Distributed Data Structure using Reed Solomon Codes (WL, TJES), pp. 237–248.
ITiCSEITiCSE-2000-Weber-Wulff #programming
Combating the code warrior: a different sort of programming instruction (DWW), pp. 85–88.
ITiCSEITiCSE-2000-Zeller #bibliography #student
Making students read and review code (AZ), pp. 89–92.
CSMRCSMR-2000-CifuentesS #abstraction
Procedure Abstraction Recovery from Binary Code (CC, DS), pp. 55–64.
ICSMEICSM-2000-AntoniolCCL #documentation #information retrieval #modelling #traceability
Information Retrieval Models for Recovering Traceability Links between Code and Documentation (GA, GC, GC, ADL), p. 40–?.
ICSMEICSM-2000-KimbleW #analysis #source code
An Alternative Source Code Analysis (JEKJ, LJW), pp. 64–75.
IWPCIWPC-2000-AntoniolCLCM #functional #object-oriented #requirements
Tracing Object-Oriented Code into Functional Requirements (GA, GC, ADL, GC, EM), pp. 79–86.
IWPCIWPC-2000-DeprezL
A Formalism to Automate Mapping from Program Features to Code (JCD, AL), pp. 69–78.
WCREWCRE-2000-LuccaFC #approach #case study #modelling #object-oriented #thread
Recovering Use Case Models from Object-Oriented Code: A Thread-based Approach (GADL, ARF, UdC), pp. 108–117.
WCREWCRE-2000-MamasK #source code #towards #using #xml
Towards Portable Source Code Representations using XML (EM, KK), p. 172–?.
WCREWCRE-2000-UngC #re-engineering #runtime
Dynamic Re-engineering of Binary Code with Run-time Feedbacks (DU, CC), pp. 2–10.
CIAACIAA-2000-ShankarSAR #automaton #finite #implementation
A Package for the Implementation of Block Codes as Finite Automata (PS, KS, VA, BSR), pp. 279–292.
ICALPICALP-2000-DantsinGHS #algorithm #satisfiability
Deterministic Algorithms for k-SAT Based on Covering Codes and Local Search (ED, AG, EAH, US), pp. 236–247.
CAiSECAiSE-2000-BehrensR #behaviour #code generation #model transformation #named
StateLator — Behavioral Code Generation as an Instance of a Model Transformation (TB, SR), pp. 401–416.
ICEISICEIS-2000-LiY #comprehension #enterprise #information management #nondeterminism #re-engineering #reasoning
Code Understanding Through Context-Oriented Uncertainty Reasoning for Enterprise Information System Reengineering (YL, HY), pp. 163–170.
ICEISICEIS-2000-WatkinsC #network
Decoding BCM Codes With a New Competitive Neural Network (FJW, RAC), pp. 227–234.
CIKMCIKM-2000-OrlandicY #multi #query #reuse
Object and Query Transformation: Supporting Multi-Dimensional Queries through Code Reuse (RO, BY), pp. 141–149.
CIKMCIKM-2000-SakuraiYUK
The Subspace Coding Method: A New Indexing Scheme for High-Dimensional Data (YS, MY, SU, HK), pp. 210–218.
ICMLICML-2000-Ghani #classification #using
Using Error-Correcting Codes for Text Classification (RG), pp. 303–310.
ICPRICPR-v1-2000-BerensF
Log-Opponent Chromaticity Coding of Color Space (JB, GDF), pp. 1206–1211.
ICPRICPR-v1-2000-LasfarMAC #database #image #retrieval
Content-Based Retrieval in Fractal Coded Image Databases (AL, SM, DA, HC), pp. 5031–5034.
ICPRICPR-v1-2000-LudtkeWH #estimation
Population Codes for Orientation Estimation (NL, RCW, ERH), pp. 1238–1241.
ICPRICPR-v2-2000-ChenC #recursion
Recursive Conversion of Chain Code into Quadtree with Table Lookup (ZC, IPC), pp. 6054–6057.
ICPRICPR-v2-2000-FanW #approach
A Run-Length Coding Based Approach to Stroke Extraction of Chinese Characters (KCF, WHW), pp. 2565–2568.
ICPRICPR-v2-2000-WilsonL
Decoding Population Codes (RCW, NL), pp. 2137–2140.
ICPRICPR-v3-2000-ChenCL #segmentation #video
Object Segmentation for Video Coding (LHC, JRC, HYML), pp. 3387–3390.
ICPRICPR-v3-2000-DufauxK #estimation #video
Combined Spline- and Block-Based Motion Estimation for Video Coding (FD, SBK), pp. 3071–3074.
ICPRICPR-v3-2000-HaoS #case study #comparative #image #integer
Comparative Study of Color Transforms for Image Coding and Derivation of Integer Reversible Color Transform (PH, QYS), pp. 3228–3231.
ICPRICPR-v3-2000-LiuL #clustering #image #using
Wavelet Image Coding Using Cluster Growing Embedding (YL, YDL), pp. 3250–3253.
ICPRICPR-v3-2000-MadeiroVMNA #design #image #multi
Multiresolution Codebook Design for Wavelet/VQ Image Coding (FM, MSV, MRM, BGAN, MSdA), pp. 3079–3082.
ICPRICPR-v3-2000-MaloFNV #image #representation #statistics
Perceptually and Statistically Decorrelated Features for Image Representation: Application to Transform Coding (JM, FJF, RN, RV), pp. 3242–3245.
ICPRICPR-v3-2000-Perez-CordobaRST #matrix
Channel Optimized Matrix Quantizer (COMQ) in CELP Coding (JLPC, AJR, VES, ÁdlT), pp. 3270–3273.
ICPRICPR-v3-2000-RuizMMRL #algorithm #multi
New Algorithm for Searching Minimum Bit Rate Wavelet Representations with Application to Multiresolution-Based Perceptual Audio Coding (NR, DM, RM, MR, FL), pp. 3290–3293.
ICPRICPR-v3-2000-VassZ #analysis #component #fault #image #performance
Enhanced Significance-Linked Connected Component Analysis for High Performance Error Resilient Wavelet Image Coding (JV, XZ), pp. 3075–3078.
ICPRICPR-v4-2000-YamanyF #3d #recognition #using
3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
OOPSLAOOPSLA-2000-RubyL #subclass
Safely creating correct subclasses without seeing superclass code (CR, GTL), pp. 208–228.
TOOLSTOOLS-PACIFIC-2000-FavreMP #modelling #object-oriented #uml
Transforming UML Static Models into Object-Oriented Code (LF, LM, CP), pp. 170–181.
TOOLSTOOLS-USA-2000-Kotula00a #documentation #source code
Source Code Documentation: An Engineering Deliverable (JK), p. 505–?.
PADLPADL-2000-Lee
Production-Quality Proof-Carrying Code (PL0), p. 325.
PLDIPLDI-2000-XuMR #safety
Safety checking of machine code (ZX, BPM, TWR), pp. 70–82.
PLDIPLDI-2000-ZalameaLAV #code generation #pipes and filters
Improved spill code generation for software pipelined loops (JZ, JL, EA, MV), pp. 134–144.
POPLPOPL-2000-AppelF #semantics
A Semantic Model of Types and Machine Instuctions for Proof-Carrying Code (AWA, APF), pp. 243–253.
POPLPOPL-2000-RuthingKS
Sparse Code Motion (OR, JK, BS), pp. 170–183.
PPDPPPDP-2000-Necula #design #implementation
Proof-carrying code: design, implementation and applications (GCN), pp. 175–177.
GPCESAIG-2000-BerardiCDG #functional #source code #type system
Type-Based Useless-Code Elimination for Functional Programs (SB, MC, FD, PG), pp. 172–189.
GPCESAIG-2000-VuducD #automation #case study #code generation #experience #kernel
Code Generators for Automatic Tuning of Numerical Kernels: Experiences with FFTW (RV, JD), pp. 190–211.
SASSAS-2000-ChinKHT #invariant #parallel
Deriving Parallel Codes via Invariants (WNC, SCK, ZH, MT), pp. 75–94.
SASSAS-2000-JaramilloGS #debugging #named
FULLDOC: A Full Reporting Debugger for Optimized Code (CJ, RG, MLS), pp. 240–259.
SASSAS-2000-KnoopCJ
Partial Redundancy Elimination on Predicated Code (JK, JFC, RDCJ), pp. 260–279.
SASSAS-2000-MuthWD
Code Specialization Based on Value Profiles (RM, SAW, SKD), pp. 340–359.
ASEASE-2000-HillL #analysis
Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
ICSEICSE-2000-CorbettDHLPRZ #finite #java #modelling #named #source code
Bandera: extracting finite-state models from Java source code (JCC, MBD, JH, SL, CSP, R, HZ), pp. 439–448.
ICSEICSE-2000-EmmerichMF #implementation #incremental #migration #xml
Implementing incremental code migration with XML (WE, CM, AF), pp. 397–406.
ICSEICSE-2000-LopesK #aspectj #composition #design #source code #using
Improving design and source code modularity using AspectJ (CVL, GK), p. 825.
ICSEICSE-2000-Picco #comprehension
Understanding code mobility (GPP), p. 834.
ICSEICSE-2000-Whalen #code generation
High-integrity code generation for state-based formalisms (MWW), pp. 725–727.
SACSAC-2000-RaidlJ #algorithm #problem #search-based
A Weighted Coding in a Genetic Algorithm for the Degree-Constrained Minimum Spanning Tree Problem (GRR, BAJ), pp. 440–445.
ASPLOSASPLOS-2000-ChouCEH #compilation #protocol #using
Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
DACDAC-2000-Edwards #compilation
Compiling Esterel into sequential code (SAE), pp. 322–327.
DACDAC-2000-HorstmannshoffM #code generation #data flow #graph #performance
Efficient building block based RTL code generation from synchronous data flow graphs (JH, HM), pp. 552–555.
DACDAC-2000-LekatsasHW #design #embedded #power management
Code compression for low power embedded system design (HL, JH, WW), pp. 294–299.
DATEDATE-2000-GuptaGMC #analysis #program transformation #programmable
Analysis of High-Level Address Code Transformations for Programmable Processors (SG, RKG, MM, FC), pp. 9–13.
DATEDATE-2000-IshiharaY #embedded #reduction
A Power Reduction Technique with Object Code Merging for Application Specific Embedded Processors (TI, HY), pp. 617–623.
DATEDATE-2000-Leupers
Code Selection for Media Processors with SIMD Instructions (RL), pp. 4–8.
HPCAHPCA-2000-JimenezLF #automation #on the #performance
On the Performance of Hand vs. Automatically Optimized Numerical Codes (MJ, JML, AF), pp. 183–194.
HPCAHPCA-2000-LefurgyPM #runtime
Reducing Code Size with Run-Time Decompression (CL, EP, TNM), pp. 218–228.
HPDCHPDC-2000-AllenBGHLMRSS #grid #problem
The Cactus Code: A Problem Solving Environment for the Grid (GA, WB, TG, HCH, GL, AM, TR, ES, JS), pp. 253–260.
HPDCHPDC-2000-GouacheP #corba #industrial #simulation #using
Coupling of Industrial Simulation Codes using CORBA (SG, TP), pp. 312–314.
LCTESLCTES-2000-BairagiPA #embedded #framework #quality #set
A Framework for Enhancing Code Quality in Limited Register Set Embedded Processors (DB, SP, DPA), pp. 81–95.
LCTESLCTES-2000-EngelenWY #automation #validation
Automatic Validation of Code-Improving Transformations (RvE, DBW, XY), pp. 206–210.
LCTESLCTES-2000-RunesonNS #abstraction #optimisation
Optimizing Code Size through Procedural Abstraction (JR, SON, JS), pp. 204–205.
FASEFASE-2000-Harel
From Play-In Scenarios to Code: An Achievable Dream (DH), pp. 22–34.
STOCSTOC-2000-GuruswamiS #algorithm
List decoding algorithms for certain concatenated codes (VG, MS), pp. 181–190.
STOCSTOC-2000-KatzT #on the #performance
On the efficiency of local decoding procedures for error-correcting codes (JK, LT), pp. 80–86.
CAVCAV-2000-ColbyLN #architecture #java
A Proof-Carrying Code Architecture for Java (CC, PL, GCN), pp. 557–560.
ICLPCL-2000-Benini #representation
Representing Object Code (MB), pp. 538–552.
WICSAWICSA-1999-AndradeGXC #architecture #automation #code generation
Architectural Concerns in Automating Code Generation (LFA, JG, PJX, JAC), pp. 495–510.
ICDARICDAR-1999-MahadevanS #parsing #recognition
Parsing and Recognition of City, State, and ZIP Codes in Handwritten Addresses (UM, SNS), pp. 325–328.
CSMRCSMR-1999-PenteadoMC #empirical #legacy #maintenance #segmentation
An Experiment of Legacy Code Segmentation to Improve Maintainability (RP, PCM, MIC), pp. 111–121.
CSMRCSMR-1999-TaschwerRM #c #generative
Generating Objects from C Code — Features of the CORET Tool-Set (MT, DRR, RM), pp. 91–101.
ICSMEICSM-1999-DucasseRD #approach #detection #independence
A Language Independent Approach for Detecting Duplicated Code (SD, MR, SD), pp. 109–118.
ICSMEICSM-1999-FantaR #c #c++ #legacy
Restructuring Legacy C Code into C++ (RF, VR), pp. 77–85.
ICSMEICSM-1999-ZhouZC #framework #legacy
A Framework for Analysing the Effect of “Change” in Legacy Code (SZ, HZ, AC), pp. 411–420.
IWPCIWPC-1999-AntoniolPTF #design #evolution #object-oriented #traceability
Evolving Object Oriented Design to Improve Code Traceability (GA, AP, PT, RF), pp. 151–160.
IWPCIWPC-1999-CanforaCLL #approach #case study #identification
A Case Study of Applying an Eclectic Approach to Identify Objects in Code (GC, AC, ADL, GADL), pp. 136–143.
IWPCIWPC-1999-CifuentesE
Recovery of Jump Table Case Statements from Binary Code (CC, MVE), pp. 192–199.
WCREWCRE-1999-AntoniolCLM #documentation #object-oriented
Recovering Code to Documentation Links in OO Systems (GA, GC, ADL, EM), pp. 136–144.
DLTDLT-1999-FernauR #decidability
Decidability of code properties (HF, KR, LS), pp. 153–163.
FMFM-v1-1999-ConquetM #automation #design #testing
Formal Design for Automatic Coding and Testing: The ESSI/SPACES Project (EC, JLM), pp. 57–75.
FMFM-v2-1999-GarbettPSA #empirical #process #synthesis
Secure Synthesis of Code: A Process Improvement Experiment (PG, JPP, MS, SA), pp. 1816–1835.
FLOPSFLOPS-1999-Ohori #automaton #logic #morphism
The Logical Abstract Machine: A Curry-Howard Isomorphism for Machine Code (AO), pp. 300–318.
IFLIFL-1999-GrelckKS #code generation #multi #on the
On Code Generation for Multi-generator WITH-Loops in SAC (CG, DK, SBS), pp. 77–94.
HCIHCI-EI-1999-Davies99b #comprehension #generative #process #programming
Expertise in computer programming: Exploring commonalities between code comprehension and generation activities (SPD), pp. 1273–1277.
UMLUML-1999-BunseA #modelling
The Normal Object Form: Bridging the Gap from Models to Code (CB, CA), pp. 691–705.
OOPSLAOOPSLA-1999-ClarkeHOT #design #requirements #towards
Subject-Oriented Design: Towards Improved Alignment of Requirements, Design, and Code (SC, WHH, HO, PLT), pp. 325–339.
OOPSLAOOPSLA-1999-Duggan #composition #java #reverse engineering #type system
Modular Type-Based Reverse Engineering of Parameterized Types in Java Code (DD), pp. 97–113.
TOOLSTOOLS-USA-1999-SangalFLL #compilation #interactive
Interaction Schemata: Compiling Interactions to Code (NS, EF, KJL, DHL), p. 268–?.
AdaEuropeAdaEurope-1999-Tuosto #ada #coordination #implementation #network
An Ada95 Implementation of a Network Coordination Language with Code Mobility (ET), pp. 199–210.
PADLPADL-1999-FerreiraD #multi
Multiple Specialization of WAM Code (MF, LD), pp. 243–258.
PADLPADL-1999-Xi #dependent type
Dead Code Elimination through Dependent Types (HX), pp. 228–242.
PEPMPEPM-1999-HornofJ #code generation #compilation #runtime
Certifying Compilation and Run-Time Code Generation (LH, TJ), pp. 60–74.
PLDIPLDI-1999-CooperM #embedded
Enhanced Code Compression for Embedded RISC Processors (KDC, NM), pp. 139–149.
PLDIPLDI-1999-Fraser #automation #modelling #statistics
Automatic Inference of Models for Statistical Code Compression (CWF), pp. 242–246.
PLDIPLDI-1999-FraserP #code generation
Finite-Static Code Generation (CWF, TAP), pp. 270–280.
PLDIPLDI-1999-LeungG
Static Single Assignment Form for machine Code (AL, LG), pp. 204–214.
PLDIPLDI-1999-RaoP #embedded #optimisation #performance
Storage Assignment Optimizations to Generate Compact and Efficient Code on Embedded DSPs (AR, SP), pp. 128–138.
PLDIPLDI-1999-WuMPOH #debugging #framework
A New Framework for Debugging Globally Optimized Code (LCW, RM, HP, BO, WmWH), pp. 181–191.
POPLPOPL-1999-Ertl #graph
Optimal Code Selection in DAGs (MAE), pp. 242–249.
SASSAS-1999-LiuS #recursion
Eliminating Dead Code on Recursive Data (YAL, SDS), pp. 211–231.
SASSAS-1999-TakimotoH #graph #using
Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
AdaSIGAda-1999-Colket #analysis #realtime #using
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
ASEASE-1999-OHalloranS #verification
Verification of Picture Generated Code (CO, AS), pp. 127–136.
ASEASE-1999-WhalenH #approach #automation #code generation #safety
An Approach to Automatic Code Generation for Safety-Critical Systems (MWW, MPEH), pp. 315–318.
ESECESEC-FSE-1999-JaramilloGS #approach #comparison #debugging
Comparison Checking: An Approach to Avoid Debugging of Optimized Code (CJ, RG, MLS), pp. 268–284.
ESECESEC-FSE-1999-MascoloPR #fine-grained
A Fine-Grained Model for Code Mobility (CM, GPP, GCR), pp. 39–56.
ICSEICSE-1999-HerbslebG #revisited
Splitting the Organization and Integrating the Code: Conway’s Law Revisited (JDH, REG), pp. 85–95.
SACSAC-1999-JacobsenJ #distributed #mobile #ubiquitous
Ubiquitous Devices United: Enabling Distributed Computing Through Mobile Code (KJ, DJ), pp. 399–404.
SACSAC-1999-Julstrom #heuristic #permutation
Coding TSP Tours as Permutations via an Insertion Heuristic (BAJ), pp. 297–301.
SACSAC-1999-Raidl #algorithm #multi #problem #search-based
A Weight-Coded Genetic Algorithm for the Multiple Container Packing Problem (GRR), pp. 291–296.
CCCC-1999-CilioC #c #fixpoint #float
Floating Point to Fixed Point Conversion of C Code (AGMC, HC), pp. 229–243.
CCCC-1999-KastnerL #integer #linear #optimisation #programming
Code Optimization by Integer Linear Programming (DK, ML), pp. 122–136.
DACDAC-1999-BashfordL #constraints #fixpoint
Constraint Driven Code Selection for Fixed-Point DSPs (SB, RL), pp. 817–822.
DACDAC-1999-PegatoquetGAB #agile #development
Rapid Development of Optimized DSP Code from a High Level Description Through Software Estimations (AP, EG, MA, LB), pp. 823–826.
DACDAC-1999-SantosJ #order #performance
A Reordering Technique for Efficient Code Motion (LCVdS, JAGJ), pp. 296–299.
DATEDATE-1999-Leupers #code generation #embedded
Exploiting Conditional Instructions in Code Generation for Embedded VLIW Processors (RL), p. 105–?.
DATEDATE-1999-MartinezAQH #algorithm #encoding #using
An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length (MM, MJA, JMQ, JLH), pp. 521–525.
DATEDATE-1999-NoufalN #framework #generative #multi #self
A CAD Framework for Generating Self-Checking 1 Multipliers Based on Residue Codes (IAN, MN), p. 122–?.
DATEDATE-1999-SantosJ #equivalence #on the fly
Exploiting State Equivalence on the Fly while Applying Code Motion and Speculation (LCVdS, JAGJ), p. 609–?.
HPDCHPDC-1999-ReneP #corba #encapsulation #parallel #using
MPI Code Encapsulating using Parallel CORBA Object (CR, TP), pp. 3–10.
LCTESLCTES-1999-CooperSS #algorithm #optimisation #search-based #using
Optimizing for Reduced Code Space using Genetic Algorithms (KDC, PJS, DS), pp. 1–9.
PPoPPPPoPP-1999-KnoopS #parallel #source code
Code Motion for Explicitly Parallel Programs (JK, BS), pp. 13–24.
ESOPESOP-1999-Thiemann #higher-order
Higher-Order Code Splicing (PT), pp. 243–257.
STOCSTOC-1999-AmbainisNTV #automaton #bound #quantum
Dense Quantum Coding and a Lower Bound for 1-Way Quantum Automata (AA, AN, ATS, UVV), pp. 376–383.
STOCSTOC-1999-OlshevskyS #algebra #approach #geometry #performance
A Displacement Approach to Efficient Decoding of Algebraic-Geometric Codes (VO, MAS), pp. 235–244.
TLCATLCA-1999-Damiani #algebra #data type #detection
Useless-Code Detection and Elimination for PCF with Algebraic Data types (FD), pp. 83–97.
ICSMEICSM-1998-FantaR #object-oriented #re-engineering
Reengineering Object-Oriented Code (RF, VR), pp. 238–246.
ICSMEICSM-1998-FiutemA #case study #consistency #identification #nondeterminism #object-oriented
Identifying Design-Code Inconsistencies in Object-Oriented Software: A Case Study (RF, GA), p. 94–?.
ICSMEICSM-1998-MunsonE #impact analysis
Code Churn: A Measure for Estimating the Impact of Code Change (JCM, SGE), p. 24–?.
IWPCIWPC-1998-MancoridisMRCG #automation #clustering #source code #using
Using Automatic Clustering to Produce High-Level System Organizations of Source Code (SM, BSM, CR, YFC, ERG), pp. 45–52.
IWPCIWPC-1998-SimCH #code search #developer #maintenance #overview #source code
Archetypal Source Code Searches: A Survey of Software Developers and Maintainers (SES, CLAC, RCH), pp. 180–187.
IWPCIWPC-1998-SomeL #compilation #parsing
Parsing Minimization when Extracting Information from Code in the Presence of Conditional Compilation (SSS, TCL), pp. 118–125.
PASTEPASTE-1998-ChaseCHY #analysis #architecture #multi #source code
Recovering Software Architecture from Multiple Source Code Analyses (MPC, SMC, DRH, ASY), pp. 43–50.
PASTEPASTE-1998-TiceG #approach #named
OPTVIEW: A New Approach for Examining Optimized Code (CT, SLG), pp. 19–26.
WCREWCRE-1998-TheodorosEBW #design #named #object-oriented #reverse engineering #source code
ROMEO: Reverse Engineering from OO Source Code to OMT Design (TL, HME, AB, NW), pp. 191–200.
ICGTTAGT-1998-Drewes #generative #power of
Some Remarks on the Generative Power of Collage Grammars and Chain-Code Grammars (FD), pp. 1–14.
ICPRICPR-1998-BernoggerYBP #animation #eye tracking
Eye tracking and animation for MPEG-4 coding (SB, LY, AB, AP), pp. 1281–1284.
ICPRICPR-1998-FalzonM #image
Low bit rate image coding over bases (FF, SM), pp. 1260–1263.
ICPRICPR-1998-Haralick
The Torah code controversy (RMH), pp. 1779–1783.
ICPRICPR-1998-HouHPUK
Improved JPEG coding for remote sensing (PH, AH, MP, CIU, JK), pp. 1637–1639.
ICPRICPR-1998-HyvarinenOHH #analysis #component #feature model #image #independence
Image feature extraction by sparse coding and independent component analysis (AH, EO, POH, JH), pp. 1268–1273.
ICPRICPR-1998-MahlmeisterSS #image
Sample-guided progressive image coding (UM, MS, GS), pp. 1257–1259.
TOOLSTOOLS-ASIA-1998-WangZZ #ada #automation #concurrent #generative
Automatically Generating Ada95 Codes for Concurrent Objects (ZW, HZ, LZ), p. 222–?.
TOOLSTOOLS-ASIA-1998-ZengSS #migration #mobile
The Code Migration of Mobile Agents System (XZ, YS, RS), p. 181–?.
AdaEuropeAdaEurope-1998-Wong #safety
Looking at Code With Your Safety Goggles On (KW), pp. 251–262.
PLDIPLDI-1998-Adl-TabatabaiCLPS #code generation #compilation #effectiveness #java #performance
Fast, Effective Code Generation in a Just-In-Time Java Compiler (ARAT, MC, GYL, VMP, JMS), pp. 280–290.
PLDIPLDI-1998-PiumartaR #optimisation #thread
Optimizing Direct-threaded Code by Selective Inlining (IP, FR), pp. 291–300.
PLDIPLDI-1998-WicklineLP #code generation #runtime
Run-time Code Generation and Modal-ML (PW, PL, FP), pp. 224–235.
POPLPOPL-1998-DebrayMW #alias #analysis #execution
Alias Analysis of Executable Code (SKD, RM, MW), pp. 12–24.
SASSAS-1998-Ruthing #analysis #bidirectional #data flow
Bidirectional Data Flow Analysis in Code Motion: Myth and Reality (OR), pp. 1–16.
AdaSIGAda-1998-MillsP #ada #analysis #co-evolution #design #hardware #migration
Hardware/Software Co-Design: VHDL and Ada 95 Code Migration and Integrated Analysis (MM, GP), pp. 18–27.
AdaSIGAda-1998-PlintaDS #code generation #specification #validation
A Specification and Code Generation Tool for Message Translation and Validation (CP, RD, RVS), pp. 276–286.
FSEFSE-1998-FongC #architecture #composition #mobile #proving #verification
Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code (PWLF, RDC), pp. 222–230.
ICSEICSE-1998-BaldiP #design #mobile #network #paradigm #trade-off
Evaluating the Tradeoffs of Mobile Code Design Paradigms in Network Management Applications (MB, GPP), pp. 146–155.
SACSAC-1998-BeschP #approach #clustering
A group theoretic approach to data and code partitioning (MB, HWP), pp. 575–583.
SACSAC-1998-CappJ #algorithm #problem #search-based
A weight-coded genetic algorithm for the minimum weight triangulation problem (KC, BAJ), pp. 327–331.
SACSAC-1998-Julstrom #algorithm
Comparing decoding algorithms in a weight-coded GA for TSP (BAJ), pp. 313–317.
SACSAC-1998-McGuireS #algorithm #linear #search-based #using
Using a genetic algorithm to find good linear error-correcting codes (KMM, RES), pp. 332–337.
SACSAC-1998-MortonZHO #distributed #parallel
The parallelization of a physically based, spatially distributed hydrologic code for arctic regions (DJM, ZZ, LDH, SO), pp. 684–689.
SACSAC-1998-Reitzner
Virtual synchronization: uncoupling synchronization annotations from synchronization code (SR), pp. 655–659.
SACSAC-1998-WangA #approach #retrieval
A vertex-based shape coding approach for similar shape retrieval (JW, RA), pp. 520–522.
CCCC-1998-Gupta #framework #scheduling
A Code Motion Framework for Global Instruction Scheduling (RG), pp. 219–233.
DACDAC-1998-FallahDK98a #functional #metric #named #performance #test coverage #verification
OCCOM: Efficient Computation of Observability-Based Code Coverage Metrics for Functional Verification (FF, SD, KK), pp. 152–157.
DACDAC-1998-HanonoD #code generation #resource management #scheduling
Instruction Selection, Resource Allocation, and Scheduling in the AVIV Retargetable Code Generator (SH, SD), pp. 510–515.
DACDAC-1998-LekatsasW #embedded
Code Compression for Embedded Systems (HL, WW), pp. 516–521.
DATEDATE-1998-MetraFR
Highly Testable and Compact 1-out-of-n Code Checker with Single Output (CM, MF, BR), pp. 981–982.
LCTESLCTES-1998-CooperS #scheduling
Non-local Instruction Scheduling with Limited Code Growth (KDC, PJS), pp. 193–207.
ESOPESOP-1998-KnoopRS #question
Code Motion and Code Placement: Just Synonyms? (JK, OR, BS), pp. 154–169.
STOCSTOC-1998-LubyMSS #analysis #design #graph #using
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
STOCSTOC-1998-ShokrollahiW #algebra #bound #geometry
Decoding Algebraic-Geometric Codes Beyond the Error-Correction Bound (MAS, HW), pp. 241–248.
ICDARICDAR-1997-DzubaFV #recognition
Handwritten ZIP Code Recognition (GID, AF, AV), pp. 766–770.
ICDARICDAR-1997-HarukiH #approximate #image #scalability
Scalable Image Coding by Spline Approximation for a Gray-scale Image (RH, TH), pp. 407–411.
ICDARICDAR-1997-SmeatonS #information retrieval #using
Using Character Shape Coding for Information Retrieval (AFS, ALS), p. 974–?.
PODSPODS-1997-HoBA #query #using
Partial-Sum Queries in Data Cubes Using Covering Codes (CTH, JB, RA), pp. 228–237.
WCREWCRE-1997-BurdM #legacy #non-functional #re-engineering #requirements
The Implications of Non-Functional Requirements for the Reengineering of Legacy Code (EB, MM), p. 215–?.
WPCWPC-1997-MarkovicHRB #automation #generative #source code
Semi-automatic Generation of Parallelizable Patterns from Source Code Examples (DM, JRH, CSR, SB), pp. 50–59.
WPCWPC-1997-YangLC #component #comprehension #identification #program transformation #reuse
Code Understanding through Program Transformation for Reusable Component Identification (HY, PL, WCC), pp. 148–157.
ICSMEICSM-2000-BurdM #maintenance #replication
Investigating the Maintenance Implications of the Replication of Code (EB, MM), p. 322–?.
DLTDLT-1997-CastelliGM
Indecomposable prefix codes and prime trees (MGC, DG, SM), pp. 135–145.
DLTDLT-1997-MantaciR #equation
Tree Codes and Equations (SM, AR), pp. 119–133.
DLTDLT-1997-Zhiltsova #context-free grammar #probability
An Optimal Coding for Stochastic Context-Free Languages with Unique Derivation (LPZ), pp. 539–550.
ICALPICALP-1997-Bruyere #algorithm #bound
A Completion Algorithm for Codes with Bounded Synchronization Delay (VB), pp. 87–97.
ICFPICFP-1997-Lassila #code generation #confluence #context-sensitive grammar #functional #metaprogramming #optimisation
A Functional Macro Expansion System for Optimizing Code Generation: Gaining Context-Sensitivity without Losing Confluence (EL), p. 315.
IFLIFL-1997-Wakeling #compilation #haskell #java #virtual machine
A Haskell to Java Virtual Machine Code Compiler (DW), pp. 39–52.
EDOCEDOC-1997-LoftusOIV #code generation #corba #internet
A Code Generation Strategy for CORBA-Based Internet Applications (CWL, AO, EI, PV), pp. 160–169.
ICMLICML-1997-Schapire #learning #multi #problem #using
Using output codes to boost multiclass learning problems (RES), pp. 313–321.
ECOOPECOOP-1997-OnoderaN #optimisation #smalltalk
Optimizing Smalltalk by Selector Code INdexing Can Be Practical (TO, HN), pp. 302–323.
TOOLSTOOLS-PACIFIC-1997-NayaNYHOA #development #execution #morphism #object-oriented #optimisation #polymorphism
Object-Oriented Development Based on Polymorphism Patterns and Optimization to Reduce Executable Code Size (HN, FN, TY, LH, KO, MA), pp. 68–79.
TOOLSTOOLS-PACIFIC-1997-Schade #automation #c++ #generative #java
Automatic Generation of Bridging Code for Accessing C++ from Java (AS), pp. 165–180.
TOOLSTOOLS-USA-1997-DingleH #c++
New Coding Patterns for Object Management in C++ (AD, THH), pp. 38–47.
TOOLSTOOLS-USA-1997-GilH #debugging #generative #source code #testing #using
T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
TOOLSTOOLS-USA-1997-Mossenbock #source code #visual notation
Films as Graphical Comments in the Source Code of Programs (HM), pp. 89–98.
AdaEuropeAdaEurope-1997-CelierST #ada #consistency
Code-Data Consistency in Ada (VC, DMS, CJT), pp. 209–217.
PLDIPLDI-1997-BergnerDEO
Spill Code Minimization via Interference Region Spilling (PB, PD, DE, MTO), pp. 287–295.
PLDIPLDI-1997-BodikG #slicing #using
Partial Dead Code Elimination using Slicing Transformations (RB, RG), pp. 159–170.
PLDIPLDI-1997-ErnstEFLP
Code Compression (JE, WSE, CWF, SL, TAP), pp. 358–365.
PLDIPLDI-1997-PolettoEK #code generation #flexibility #named #performance
tcc: A System for Fast, Flexible, and High-level Dynamic Code Generation (MP, DRE, MFK), pp. 109–121.
PPDPPLILP-1997-Fujinami #automation #code generation #object-oriented #runtime
Automatic Run-Time Code Generation in Object-Oriented Languages (NF), pp. 423–424.
POPLPOPL-1997-Necula
Proof-Carrying Code (GCN), pp. 106–119.
SASSAS-1997-BaldanF #abstract interpretation
Abstract Interpretation from Improving WAM Code (DB, GF), p. 364.
AdaTRI-Ada-1997-Balfour #ada #distributed #java
Combining Ada 95, Java Byte Code, and the Distributed Systems Annex (BB), pp. 247–260.
AdaTRI-Ada-1997-BattagliaBB #ada #named #reuse
ReUSE/Ada: A Tool to Promote Code Reuse (DB, AB, JB), pp. 113–116.
AdaTRI-Ada-1997-Conn #analysis #source code
The Source Code Analysis Tool Construction Project (RLC), pp. 141–148.
AdaTRI-Ada-1997-Tucker #ada #debugging
Debugging Highly-Optimized Ada with Code Motion (DHACM) (KT), pp. 197–203.
RERE-1997-HeimdahlK #generative #requirements
Generating Code from Hierarchical State-Based Requirements (MPEH, DJK), p. 210–?.
ASEASE-1997-SahraouiMLD #concept #identification
Applying Concept Formation Methods to Object Identification in Procedural Code (HAS, WLM, HL, FD), pp. 210–218.
ASEASE-1997-SwardH #imperative #legacy
Extracting Objects from Legacy Imperative Code (RRS, TCH), p. 98–?.
ESECESEC-FSE-1997-ChenGK #analysis #c++ #detection #reachability
A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
ESECESEC-FSE-1997-LandSJ #design #detection #empirical #fault #performance #using #validation
Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
ESECESEC-FSE-1997-PiccoRM #mobile
Expressing Code Mobility in Mobile UNITY (GPP, GCR, PJM), pp. 500–518.
ICSEICSE-1997-Baker #code review #quality
Code Reviews Enhance Software Quality (RABJ), pp. 570–571.
ICSEICSE-1997-CarzanigaPV #design #distributed #mobile #paradigm
Designing Distributed Applications with Mobile Code Paradigms (AC, GPP, GV), pp. 22–32.
ICSEICSE-1997-LindigS #composition #concept analysis #legacy
Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis (CL, GS), pp. 349–359.
ICSEICSE-1997-PerpichPPVW #development #scalability #using #web
Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development (JP, DEP, AAP, LGV, MWW), pp. 14–21.
ICSEICSE-1997-SeamanB #communication #empirical
An Empirical Study of Communication in Code Inspections (CBS, VRB), pp. 96–106.
ASF+SDFASF+SDF-1997-BrandSV #cobol #legacy #re-engineering
Obtaining a COBOL grammar from legacy code for reengineering purposes (MvdB, MPAS, CV), p. 6.
DACDAC-1997-Marwedel #code generation
Code Generation for Core Processors (PM), pp. 232–237.
DATEEDTC-1997-BolchiniSS #design #network #novel
A novel methodology for designing TSC networks based on the parity bit code (CB, FS, DS), pp. 440–444.
DATEEDTC-1997-LeupersM #generative #modelling
Retargetable generation of code selectors from HDL processor models (RL, PM), pp. 140–144.
DATEEDTC-1997-LiemPJ #design #embedded #named
ReCode: the design and re-design of the instruction codes for embedded instruction-set processors (CL, PGP, AAJ), p. 612.
DATEEDTC-1997-PaschalisGGK #fault #self
A totally self-checking 1-out-of-3 code error indicator (AMP, NG, DG, PK), pp. 450–454.
HPDCHPDC-1997-EvenskyGCA #distributed #execution #named #scalability
Lilith: Scalable Execution of User Code for Distributed Computing (DAE, ACG, LJC, RCA), pp. 305–314.
PDPPDP-1997-BouletD #code generation
Code generation in bouclettes (PB, MD), pp. 273–280.
PPoPPPPoPP-1997-FrensW #multi #performance #source code
Auto-blocking Matrix-Multiplication or Tracking BLAS3 Performance with Source Code (JDF, DSW), pp. 206–216.
STOCSTOC-1997-LaffertyR
Spectral Techniques for Expander Codes (JDL, DNR), pp. 160–167.
STOCSTOC-1997-LubyMSSS
Practical Loss-Resilient Codes (ML, MM, MAS, DAS, VS), pp. 150–159.
STOCSTOC-1997-Pan #equation #performance
Faster Solution of the Key Equation for Decoding BCH Error-Correcting Codes (VYP), pp. 168–175.
STOCSTOC-1997-Vardy #algorithm #complexity #distance #problem
Algorithmic Complexity in Coding Theory and the Minimum Distance Problem (AV), pp. 92–109.
CADECADE-1997-FuchsF #named #problem #proving
CODE: A Powerful Prover for Problems of Condensed Detachment (DF, MF), pp. 260–263.
TLCATLCA-1997-BerardiB #data type #functional
Minimum Information Code in a Pure Functional Language with Data Types (SB, LB), pp. 30–45.
ICSMEICSM-1996-CanforaCL #analysis #specification #tool support
Specifying code analysis tools (GC, AC, ADL), pp. 95–103.
ICSMEICSM-1996-EveraarsAB #distributed #fortran #parallel
Restructuring sequential Fortran code into a parallel/distributed application (CTHE, FA, FJB), pp. 13–22.
ICSMEICSM-1996-SubramaniamB #fortran #legacy
Deriving an Object Model from Legacy Fortran Code (GVS, EJB), pp. 3–12.
WCREWCRE-1996-BurdMW #legacy #reuse
Extracting Reusable Modules from Legacy Code: Considering the Issues of Module Granularity (EB, MM, CDW), p. 189–?.
WCREWCRE-1996-Cifuentes #automation #reverse engineering
Partial Automation of an Integrated Reverse Engineering Environment of Binary Code (CC), pp. 50–56.
WCREWCRE-1996-MorrisF #assembly #named
Mandrake: A Tool for Reverse-Engineering IBM Assembly Code (PHM, REF), pp. 57–66.
WCREWCRE-1996-PenteadoGM #legacy #process
An Overall Process Based on Fusion to Reverse Engineer Legacy Code (RP, FSRG, PCM), pp. 179–188.
WPCWPC-1996-MayrhauserV #comprehension #migration #on the #scalability
On the Role of Hypotheses during Opportunistic Understanding While Porting Large Scale Code (AvM, AMV), pp. 68–77.
WPCWPC-1996-SneedE #source code
Extracting Business Rules from Source Code (HMS, KE), p. 240–?.
ICALPICALP-1996-BruyereL
Variable-Length Maximal Codes (VB, ML), pp. 24–47.
ICALPICALP-1996-Julia #on the
On ω-Generators and Codes (SJ), pp. 393–402.
FMFME-1996-FrohlichL #c++ #specification
Combining VDM-SL Specifications with C++ Code (BF, PGL), pp. 179–194.
ICFPICFP-1996-QueinnecR
Sharing Code through First-class Environments (CQ, DDR), pp. 251–261.
ICPRICPR-1996-Benois-PineauKB #graph #optimisation #problem
Coding of structure in the region-based coder as a problem of optimization on graphs (JBP, AK, DB), pp. 651–655.
ICPRICPR-1996-DistasiNV #image #recursion
A B-tree based recursive technique for image coding (RD, MN, SV), pp. 670–674.
ICPRICPR-1996-FredL #clustering
A minimum code length technique for clustering of syntactic patterns (ALNF, JMNL), pp. 680–684.
ICPRICPR-1996-GhorbelDMAS #estimation #object-oriented
Global planar rigid motion estimation applied to object-oriented coding (FG, MD, AM, OA, HS), pp. 641–645.
ICPRICPR-1996-HuangHH #adaptation #estimation #performance #video
Adaptive early jump-out technique for fast motion estimation in video coding (HCH, YPH, WLH), pp. 864–868.
ICPRICPR-1996-OlivierMRL #segmentation #word
Segmentation and coding of Arabic handwritten words (CO, HM, KRP, YL), pp. 264–268.
ICPRICPR-1996-SanchizQP #algorithm #detection
A neural network-based algorithm to detect dominant points from the chain-code of a contour (JMS, JMIQ, FP), pp. 325–329.
ICPRICPR-1996-TeixeiraA #algorithm #video
Block matching algorithms in MPEG video coding (LMLT, APA), pp. 934–938.
SEKESEKE-1996-CanforaCL #cobol #concept
Recovering a Conceptual Data Model from COBOL Code (GC, AC, GADL), pp. 277–284.
SEKESEKE-1996-CanforaLM #c #ide #re-engineering #reuse
An Integrated Environment for Reuse Reengineering C Code (GC, ADL, MM), pp. 214–221.
SEKESEKE-1996-Carver #reverse engineering
Reverse Engineering Procedural Code for Object Recovery (DLC), pp. 442–449.
SEKESEKE-1996-KarallB #case study #independence #re-engineering #visualisation
Case Study: EasyCODE — A Language Independent Visualization Tool for Reengineering (OK, SB), pp. 353–360.
ECOOPECOOP-1996-RinatM #morphism #polymorphism #reuse
Metaphoric Polymorphism: Taking Code Reuse One Step Further (RR, MM), pp. 449–471.
OOPSLAOOPSLA-1996-Adl-TabatabaiGL #compilation #optimisation #reuse
Code Reuse in an Optimizing Compiler (ARAT, TRG, GYL), pp. 51–68.
OOPSLAOOPSLA-1996-DutoitLCP #object-oriented #prototype
The Basic Object System: Supporting a Spectrum From Prototypes To Hardened Code (AHD, SL, DC, RP), pp. 104–121.
PLDIPLDI-1996-Adl-TabatabaiG #debugging
Source-Level Debugging of Scalar Optimized Code (ARAT, TRG), pp. 33–43.
PLDIPLDI-1996-Engler #code generation #named #performance
VCODE: a Retargetable, Extensible, Very Fast Dynamic Code Generation System (DRE), pp. 160–170.
PLDIPLDI-1996-LeeL #code generation #ml #optimisation #runtime
Optimizing ML with Run-Time Code Generation (PL, ML), pp. 137–148.
POPLPOPL-1996-EnglerHK #code generation #independence #performance
‘C: A Language for High-Level, Efficient, and Machine-Independent Dynamic Code Generation (DRE, WCH, MFK), pp. 131–144.
PLDIBest-of-PLDI-1996-LeeL96a #code generation #ml #optimisation #runtime
Optimizing ML with run-time code generation (with retrospective) (PL, ML), pp. 540–553.
CCCC-1996-NymeyerKWA #code generation
Code Generation = A* + BURS (AN, JPK, YW, HA), pp. 160–176.
DACDAC-1996-AraujoML #architecture #code generation #using
Using Register-Transfer Paths in Code Generation for Heterogeneous Memory-Register Architectures (GA, SM, MTCL), pp. 591–596.
DACDAC-1996-HosseiniMK #analysis #code generation #functional #verification
Code Generation and Analysis for the Functional Verification of Microprocessors (AH, DM, PK), pp. 305–310.
DACDAC-1996-MehendaleVS #code generation #linear #multi
Optimized Code Generation of Multiplication-free Linear Transforms (MM, GV, SDS), pp. 41–46.
DACDAC-1996-SahmMPSS #development #standard
VDHL Development System and Coding Standard (HS, CM, JP, JS, SS), pp. 777–782.
PDPPDP-1996-LuisCD #parallel
Parallelism Extraction in Acyclic Code (JPL, CGC, JCD), pp. 437–447.
STOCSTOC-1996-Hastad #clique #testing
Testing of the Long Code and Hardness for Clique (JH), pp. 11–19.
ICDARICDAR-v1-1995-FerayBRP #evaluation #recognition
Evaluation of codes and primitives: recognition of unconstrained handwritten numerals (NF, DdB, KRP, TP), pp. 104–107.
ICDARICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification
An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
ICDARICDAR-v2-1995-KimuraMS #algorithm #recognition #using #word
Handwritten ZIP code recognition using lexicon free word recognition algorithm (FK, YM, MS), pp. 906–910.
ICDARICDAR-v2-1995-Spitz
An OCR based on character shape codes and lexical information (ALS), pp. 723–728.
ICSMEICSM-1995-PearseO #industrial #maintenance #metric #process #source code
Maintainability measurements on industrial source code maintenance activities (TTP, PWO), pp. 295–303.
ICSMEICSM-1995-YangB #data-driven #modelling
Acquisition of ERA models from data intensive code (HY, KHB), pp. 116–123.
WCREWCRE-1995-HarrisYR #architecture #source code
Recognizers for Extracting Architectural Features from Source Code (DRH, ASY, HBR).
DLTDLT-1995-KariN
Colored Gauss and Tangent Codes on the Torus (JK, VN), pp. 54–63.
ICALPICALP-1995-GolinR #algorithm #programming
A Dynamic Programming Algorithm for Constructing Optimal Refix-Free Codes for Unequal Letter Costs (MJG, GR), pp. 256–267.
ICALPICALP-1995-JurgensenK #fault
Variable-Length Codes for Error Correction (HJ, SK), pp. 581–592.
FPCAFPCA-1995-QuintonRW #functional #imperative #source code
Deriving Imperative Code from Functional Programs (PQ, SVR, DW), pp. 36–44.
CHICHI-1995-LiebermanF #behaviour #programming
Bridging the Gulf Between Code and Behavior in Programming (HL, CF), pp. 480–486.
ICMLICML-1995-KongD #bias
Error-Correcting Output Coding Corrects Bias and Variance (EBK, TGD), pp. 313–321.
AdaEuropeAdaEurope-1995-Heitz #ada #automation #c++ #code generation #reliability #reuse #using
Achieving Reusable and Reliable Client-Server Code using HOODTM Automated Code Generation for ADA95 and C++ Targets (MH), pp. 419–438.
AdaEuropeAdaEurope-1995-RognesS #ada #performance
Performance Tuning of a Check-Out System Coded in Ada (BR, PIS), pp. 99–110.
PEPMPEPM-1995-Debray #abstract interpretation #low level #optimisation
Abstract Interpretation and Low-Level Code Optimization (SKD), pp. 111–121.
PLDIPLDI-1995-Click
Global Code Motion / Global Value Mumbering (CC), pp. 246–257.
PLDIPLDI-1995-LiaoDKTW
Storage Assignment to Decrease Code Size (SYL, SD, KK, SWKT, AW), pp. 186–195.
PLDIPLDI-1995-MuellerW #branch #replication
Avoiding Conditional Branches by Code Replication (FM, DBW), pp. 56–66.
POPLPOPL-1995-Reynolds #category theory #using
Using Functor Categories to Generate Intermediate Code (JCR), pp. 25–36.
SASSAS-1995-Coorg #clustering #code generation #concurrent #functional #multi #strict #thread
Partitioning Non-strict Functional Languages for Multi-threaded Code Generation (SRC), pp. 82–99.
FSEFSE-1995-PorterSTV #development #empirical #scalability
An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development (AAP, HPS, CAT, LGV), pp. 92–103.
ICSEICSE-1995-Floch #automation #code generation #evolution #flexibility #maintenance #using
Supporting Evolution and Maintenance by Using a Flexible Automatic Code Generator (JF), pp. 211–219.
ICSEICSE-1995-WeideHH #legacy #reverse engineering
Reverse Engineering of Legacy Code Exposed (BWW, WDH, JEH), pp. 327–331.
SACSAC-1995-Bothe #fuzzy #modelling #speech #visual notation
Fuzzy input coding for an artificial neural--network modelling visual speech movements (HHB), pp. 450–454.
SACSAC-1995-Sabin #generative #linear #parallel #using
The use of parallelization in the generation of binary linear codes (RES), pp. 215–220.
DACDAC-1995-AltmeyerSS #framework #generative #modelling
Generating ECAD Framework Code from Abstract Models (JA, BS, MS), pp. 88–93.
DACDAC-1995-ChouB #embedded #fine-grained #scheduling
Interval Scheduling: Fine-Grained Code Scheduling for Embedded Systems (PHC, GB), pp. 462–467.
DACDAC-1995-LiaoDKTW #embedded #optimisation
Code Optimization Techniques for Embedded DSP Microprocessors (SYL, SD, KK, SWKT, ARW), pp. 599–604.
DACDAC-1995-TimmerSMJ #code generation #modelling #scheduling
Conflict Modelling and Instruction Scheduling in Code Generation for In-House DSP Cores (AHT, MTJS, JLvM, JAGJ), pp. 593–598.
LCTESLCT-RTS-1995-BakkersSP #automation #communication #generative #parallel #realtime #scheduling #source code
Automatic Generation of Scheduling and Communication Code in Real-Time Parallel Programs (AB, JS, EP), pp. 134–145.
PDPPDP-1995-EspasaVPJA #analysis
Quantitative analysis of vector code (RE, MV, DAP, MJ, EA), pp. 452–463.
PDPPDP-1995-LatrousM #parallel #using
Distributing code in a parallel fine grain machine using the actor model (YL, GM), pp. 122–129.
PPoPPPPoPP-1995-AnderssonF #generative #modelling #object-oriented #parallel
Generating Parallel Code from Object Oriented Mathematical Models (NA, PF), pp. 48–57.
SOSPSOSP-1995-SteensgaardJ #concurrent #thread
Object and Native Code Thread Mobility Among Heterogeneous Computers (BS, EJ), pp. 68–78.
STOCSTOC-1995-Spielman #linear
Linear-time encodable and decodable error-correcting codes (DAS), pp. 388–397.
TAPSOFTTAPSOFT-1995-BertO #model inference #specification
A Model Inference System for Generic Specification with Application to Code Sharing (DB, CO), pp. 741–755.
TAPSOFTTAPSOFT-1995-Geser #induction #proving
Mechanized Inductive Proof of Properties of a Simple Code Optimizer (AG), pp. 605–619.
ICLPILPS-1995-ConwayHS #code generation
Code Generation for Mercury (TCC, FH, ZS), pp. 242–256.
ICSMEICSM-1994-AshAOL #health #maintenance #modelling #using
Using Software Maintainability Models to Track Code Health (DA, JA, PWO, BL), pp. 154–160.
ICSMEICSM-1994-CanforaCTM #data type #identification #precise #reuse
A Precise Method for Identifying Reusable Abstract Data Types in Code (GC, AC, MT, MM), pp. 404–413.
ICSMEICSM-1994-CowanGLS #comprehension #readability #using
Enhancing Code for Readability and Comprehension Using SGML (DDC, DMG, CJPdL, AvS), pp. 181–190.
ICSMEICSM-1994-HeinemanK #incremental #process #re-engineering
Incremental Process Support for Code Reengineering (GTH, GEK), pp. 282–290.
ICSMEICSM-1994-KhoshgoftaarS #maintenance #predict
Improving Code Churn Predictions During the System Test and Maintenance Phases (TMK, RMS), pp. 58–67.
ICSMEICSM-1994-PaulP #algebra #query #source code #using
Querying Source Code Using an Algebraic Query Language (SP, AP), pp. 127–136.
ICALPICALP-1994-GolinY #word
Prefix Codes: Equiprobable Words, Unequal Letter Costs (MJG, NEY), pp. 605–617.
FMFME-1994-StoreyH #using
A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
ICGTTAGT-1994-DassowHT
Chain-Code Pictures and Collages Generated by Hyperedge Replacement (JD, AH, ST), pp. 412–427.
CAiSECAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience #using
From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
SEKESEKE-1994-CanforaLT #inheritance
Recovering object classes and inheritance relationships from existing code (GC, GADL, MT), pp. 233–240.
TOOLSTOOLS-EUROPE-1994-Hopkins94a #multi #smalltalk #testing
Testing Smalltalk Code in Multi-person Projects (TPH), pp. 467–478.
TOOLSTOOLS-EUROPE-1994-KarakostasP #automation #c++ #hybrid #logic #specification
Automatic Transformation of Hybrid Object and Logic Specification to C++ Code (VK, LP), pp. 363–373.
AdaEuropeAdaEurope-1994-Doeuff #ada #automation #generative #source code
Automatic Generation of Ada Source Code for the Rafale Mission Computer (HLD), pp. 333–348.
AdaEuropeAdaEurope-1994-ObermayerSSKKL #ada #analysis #realtime
Portability Effort Estimates for Real Time Applications Written in Ada Through Static Code Analysis (PEO, JS, GS, AK, PK, RL), pp. 483–488.
PEPMPEPM-1994-LeoneL #code generation #lightweight #runtime
Lightweight Run-Time Code Generation (ML, PL), pp. 97–106.
PLDIPLDI-1994-HanxledenK #framework #named
GIVE-N-TAKE — A Balanced Code Placement Framework (RvH, KK), pp. 107–120.
PLDIPLDI-1994-KnoopRS
Partial Dead Code Elimination (JK, OR, BS), pp. 147–158.
PLDIPLDI-1994-Krall #branch #predict #replication
Improving Semi-static Branch Prediction by Code Replication (AK), pp. 97–106.
AdaTRI-Ada-1994-BarbaschE #ada #debugging
Always One More Bug: Applying AdaWise to Improve Ada Code (CB, DE), pp. 228–235.
AdaTRI-Ada-1994-GuemhiouiDPE #ada #code generation #design #object-oriented #profiling
Profiling in an Object-Oriented Design Environment That Supports Ada 9X and Ada 83 Code Generation (KEG, SAD, TJP, HJCE), pp. 180–190.
FSEFSE-1994-EvansGHT #named #specification #using
LCLint: A Tool for Using Specifications to Check Code (DE, JVG, JJH, YMT), pp. 87–96.
ICSEICSE-1994-KroneS #on the #source code
On the Inference of Configuration Structures from Source Code (MK, GS), pp. 49–57.
ASEKBSE-1994-SelfridgeH #comprehension #visual notation
Graphical Support for Code-Level Software Understanding (PGS, GTH), pp. 117–124.
ASPLOSASPLOS-1994-EnglerP #code generation #definite clause grammar #named #performance
DCG: An Efficient, Retargetable Dynamic Code Generation System (DRE, TAP), pp. 263–272.
CCCC-1994-FauthHKM #graph
Global Code Selection of Directed Acyclic Graphs (AF, GH, AK, CM), pp. 128–142.
CCCC-1994-FranzleM #code generation #programming language #realtime #towards
Towards Provably Correct Code Generation for a Hard Real-Time Programming Language (MF, MMO), pp. 294–308.
CCCC-1994-PineoS #approach #debugging
A Practical Approach to the Symbolic Debugging of Parallelized Code (PPP, MLS), pp. 339–356.
DATEEDAC-1994-LiemMP #code generation
Instruction-Set Matching and Selection for DSP and ASIP Code Generation (CL, TCM, PGP), pp. 31–37.
STOCSTOC-1994-AlonYZ #graph #named #scalability
Color-coding: a new method for finding simple paths, cycles and other small subgraphs within large graphs (NA, RY, UZ), pp. 326–335.
STOCSTOC-1994-RajagopalanS #distributed #theorem
A coding theorem for distributed computation (SR, LJS), pp. 790–799.
ICLPICLP-1994-Haygood #compilation #prolog
Native Code Compilation in SICStus Prolog (RCH), pp. 190–204.
ISSTAISSTA-1994-PollockBS #debugging
Debugging Optimized Code Via Tailoring (LLP, MPB, MLS), p. 201.
ICDARICDAR-1993-JainC #analysis #locality #using
Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
ICDARICDAR-1993-SabourinCG #approach #verification
An extended-shadow-code based approach for off-line signature verification (RS, MC, GG), pp. 1–5.
ICDARICDAR-1993-Viard-GaudinNB #2d #algorithm #approach #using
A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
ICDARICDAR-1993-YoshimuraSY #locality #recognition #using
A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
DLTDLT-1993-CaludeS
Algorithmically Coding the Universe (CC, AS), pp. 472–492.
DLTDLT-1993-DerencourtT #composition
Compositions of Codings (DD, AT), pp. 30–43.
DLTDLT-1993-KariN #image
Morphic Images of Gauss Codes (JK, VN), pp. 144–156.
HCIHCI-ACS-1993-KishinoH #estimation #student
A Code Key-in Time Estimation Method for College Students (SK, YH), pp. 624–629.
SEKESEKE-1993-Bhansali #architecture #reuse #using
Architecture-driven Reuse of Code in KASE (SB), pp. 483–490.
SEKESEKE-1993-MassariCCC #database #source code
Programs as Databases: Treating Code and Comments as First Class Objects (AM, GC, PKC, SKC), pp. 78–85.
SEKESEKE-1993-McFallSH #object-oriented #representation #reverse engineering
Reverse Engineering Structured Code to an Object-Oriented Representation (DM, GS, JH), pp. 86–93.
SIGIRSIGIR-1993-BooksteinKR #question
Is Huffman Coding Dead? (AB, STK, TR), pp. 80–87.
OOPSLAOOPSLA-1993-MatsuokaTY #concurrent #encapsulation #object-oriented #performance #using
Highly Efficient and Encapsulated Re-use of Synchronization Code in Concurrent Object-Oriented Languages (SM, KT, AY), pp. 109–126.
PEPMPEPM-1993-Lange #code generation #correctness
The Correctness of an Optimized Code Generation (TPL), pp. 167–178.
PLDIPLDI-1993-AmarasingheL #code generation #communication #distributed #memory management #optimisation
Communication Optimization and Code Generation for Distributed Memory Machines (SPA, MSL), pp. 126–138.
PLDIPLDI-1993-HongG #compilation #realtime #source code
Compiling Real-Time Programs into Schedulable Code (SH, RG), pp. 166–176.
PPDPPLILP-1993-AltSW #compilation #generative #parallel
Generation of Synchronization Code for Parallel Compilers (MA, GS, RW), pp. 420–421.
AdaTRI-Ada-1993-GuemhiouiDP #ada #automation #code generation #design #education #object-oriented
Object-Oriented Design and Automatic Ada Code Generation in the Education of Software Engineers (KEG, SAD, TJP), pp. 126–136.
DACDAC-1993-Leveugle #fault tolerance
Optimized State Assignment of single fault Tolerant FSMs Based on SEC Codes (RL), pp. 14–18.
SOSPSOSP-1993-Jones #interface
Interposition Agents: Transparently Interposing User Code at the System Interface (MBJ), pp. 80–93.
STOCSTOC-1993-Schulman #communication #interactive
Deterministic coding for interactive communication (LJS), pp. 747–756.
CSEETSEI-1992-Christel #case study #experience #interactive #video
Experiences with an Interactive Video Code Inspection Laboratory (MGC), pp. 395–412.
CAiSECAiSE-1992-FouqueV #analysis #approach #machine learning
Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
SEKESEKE-1992-HuangSM #modelling #reverse engineering #rule-based #source code #visual notation
A Rule-Based Tool for Reverse Engineering from Source Code to Graphical Models (HH, KS, IM), pp. 178–185.
AdaEuropeAdaEurope-1992-DuellSW #ada #code generation #scalability #source code #using
Using Ada Source Code Generators in a Large Project (RD, HJS, FCAdW), pp. 47–59.
AdaEuropeAdaEurope-1992-ThomasDB #ada #evaluation #reuse #source code
An Evaluation of Ada Source Code Reuse (WMT, AD, VRB), pp. 80–91.
AdaEuropeAdaEurope-1992-ZageZBG #design #metric
Design and Code Metrics Through a DIANA-Based Tool (WMZ, DMZ, MB, DJG), pp. 60–71.
PLDIPLDI-1992-BrooksHS #approach #debugging
A New Approach to Debugging Optimized Code (GB, GJH, SS), pp. 1–11.
PLDIPLDI-1992-HolzleCU #debugging
Debugging Optimized Code with Dynamic Deoptimization (UH, CC, DU), pp. 32–43.
PLDIPLDI-1992-KnoopRS #lazy evaluation
Lazy Code Motion (JK, OR, BS), pp. 224–234.
PLDIPLDI-1992-MuellerW #replication
Avoiding Unconditional Jumps by Code Replication (FM, DBW), pp. 322–330.
PLDIBest-of-PLDI-1992-KnoopRS92a #lazy evaluation
Lazy code motion (with retrospective) (JK, OR, BS), pp. 460–472.
ICSEICSE-1992-Devanbu #independence #named
GENOA: A Customizable Language- and Front-End Independent Code Analyzer (PTD), pp. 307–317.
ICSEICSE-1992-EickLLVW #fault
Estimating Software Fault Content Cefore Coding (SGE, CRL, MDL, LGV, SAVW), pp. 59–65.
ASEKBSE-1992-GravesLM #empirical #synthesis
A Code Synthesis Experiment (HG, JL, TM), p. 4.
SOSPSOSP-WIP-1991-Jones92 #interface #tool support
A Toolkit for Interposing User Code at the System Interface (MBJ), p. 21.
ASPLOSASPLOS-1992-AndrewsS #migration #product line
Migrating a CISC Computer Family onto RISC via Object Code Translation (KA, DS), pp. 213–222.
CCCC-1992-Emmelmann #specification #testing
Testing Completeness of Code Selector Specifications (HE), pp. 163–175.
CCCC-1992-LangendoenH #code generation #functional #lazy evaluation #named
FCG: A Code Generator for Lazy Functional Languages (KL, PHH), pp. 278–296.
CADECADE-1992-BoyerY #automation #correctness #proving #source code
Automated Correctness Proofs of Machine Code Programs for a Commercial Microprocessor (RSB, YY), pp. 416–430.
ICALPICALP-1991-BruyereF
Degree and Decomposability of Variable-Length Codes (VB, CdF), pp. 575–587.
FPCAFPCA-1991-SmetsersNGP #functional #generative #lazy evaluation #performance
Generating Efficient Code for Lazy Functional Languages (SS, EN, JHGvG, MJP), pp. 592–617.
FPCAFPCA-1991-Traub #architecture #code generation #data flow #multi #source code #strict #thread
Multi-thread Code Generation for Dataflow Architectures from Non-Strict Programs (KRT), pp. 73–101.
ECOOPECOOP-1991-PalsbergS #question #reuse #type safety #what
What is Type-Safe Code Reuse? (JP, MIS), pp. 325–341.
AdaEuropeAdaEurope-1991-BadaroM #ada #named #reuse #using
ROSE-Ada: a Method and a Tool to Help Reuse of Ada Codes (NB, TM), pp. 304–325.
PLDIPLDI-1991-Morris #code generation #named #prototype
CCG: A Prototype Coagulating Code Generator (WGM), pp. 45–58.
PLDIPLDI-1991-ProebstingF #architecture #linear #scheduling
Linear-Time, Optimal Code Scheduling for Delayed-Load Architectures (TAP, CNF), pp. 256–267.
PPDPPLILP-1991-HalbwachsRR #data flow #generative #performance #source code
Generating Efficient Code From Data-Flow Programs (NH, PR, CR), pp. 207–218.
ESECESEC-1991-RozmanGD #analysis #metric #source code
Relation Between Source Code Metrics and Structure Analysis Metrics (IR, JG, TD), pp. 332–342.
ASPLOSASPLOS-1991-BenitezD #code generation #streaming
Code Generation for Streaming: An Access/Execute Mechanism (MEB, JWD), pp. 132–141.
TAPSOFTCCPSD-1991-SteffenKR #adaptation #performance #reduction
Efficient Code Motion and an Adaption to Strength Reduction (BS, JK, OR), pp. 394–415.
LISPLFP-1990-NielsonN #code generation #information management #lazy evaluation
Context Information for Lazy Code Generation (HRN, FN), pp. 251–263.
ICGTGG-1990-Chytil
Cycle Chain Code Picture Languages (FJB, MC), pp. 157–173.
CSCWCSCW-1990-BrothersSM #named
ICICLE: Groupware for Code Inspection (LB, VS, MM), pp. 169–181.
PLDIPLDI-1990-Giegerich #code generation #on the #specification
On the Structure of Verifiable Code Generator Specifications (RG), pp. 1–8.
PLDIPLDI-1990-PettisH
Profile Guided Code Positioning (KP, RCH), pp. 16–27.
PLDIPLDI-1990-Wendt #code generation #performance #using
Fast Code Generation Using Automatically-Generated Decision Trees (ALW), pp. 9–15.
PLDIBest-of-PLDI-1990-PettisHD
Profile guided code positioning (with retrospective) (KP, RCH, JWD), pp. 398–411.
CCCC-1990-Pettersson #continuation #generative #performance #semantics
Generating Efficient Code from Continuation Semantics (MP), pp. 165–178.
DACDAC-1990-IshiuraDY #diagrams #simulation #using
Coded Time-Symbolic Simulation Using Shared Binary Decision Diagram (NI, YD, SY), pp. 130–135.
CSLCSL-1990-Mundici #adaptation #complexity
The Complexity of Adaptive Error-Correcting Codes (DM), pp. 300–307.
PODSPODS-1989-FaloutsosM #clustering #fault #using
Declustering Using Error Correcting Codes (CF, DNM), pp. 253–258.
ICALPICALP-1989-Bruyere #finite
Completion of Finite Codes with Finite Deciphering Delay (VB), pp. 151–163.
ICMLML-1989-CaruanaSE #algorithm #bias #induction #multi #search-based #using
Using Multiple Representations to Improve Inductive Bias: Gray and Binary Coding for Genetic Algorithms (RC, JDS, LJE), pp. 375–378.
PLDIPLDI-1989-BernsteinGGKMNP #compilation #optimisation
Spill Code Minimization Techniques for Optimizing Compilers (DB, DQG, MCG, HK, YM, IN, RYP), pp. 258–263.
PLDIPLDI-1989-Fraser #code generation
A Language for Writing Code Generators (CWF), pp. 238–245.
DACDAC-1989-NowakM #code generation #hardware #verification
Verification of Hardware Descriptions by Retargetable Code Generation (LN, PM), pp. 441–447.
TAPSOFTCCIPL-1989-FradetM #compilation #functional #λ-calculus
Compilation of Lambda-Calculus into Functional Machine Code (PF, DLM), pp. 155–166.
RTARTA-1989-Strandh #equation #performance #source code
Classes of Equational Programs that Compile into Efficient Machine Code (RS), pp. 449–461.
SIGMODSIGMOD-1988-Bell #data transformation #execution #parallel #physics
A Specialized Data Management System For Parallel Execution of Particle Physics Codes (JLB), pp. 277–285.
VLDBVLDB-1988-KentSR #database #multi #scalability
A Superimposed Coding Scheme Based on Multiple Block Descriptor Files for Indexing Very Large Data Bases (AJK, RSD, KR), pp. 351–359.
FMVDME-1988-ButhB #code generation #correctness #proving #specification #term rewriting #using
Correctness Proofs for Meta IV Written Code Generator Specification using Term Rewriting (BB, KHB), pp. 406–433.
ICMLML-1988-CaruanaS #algorithm #bias #representation #search-based
Representation and Hidden Bias: Gray vs. Binary Coding for Genetic Algorithms (RC, JDS), pp. 153–161.
PLDIPLDI-1988-CoutantMR #approach #debugging #named
DOC: A Practical Approach to Source-Level Debugging of Globally Optimized Code (DSC, SM, MR), pp. 125–134.
PLDIPLDI-1988-FraserW #automation #code generation #generative #optimisation #performance
Automatic Generation of Fast Optimizing Code Generators (CWF, ALW), pp. 79–84.
PPDPPLILP-1988-DesplandMR #code generation #implementation #prolog
An Implementation of Retargetable Code Generators in Prolog (AD, MM, RR), pp. 83–104.
PPDPPLILP-1988-KluzniakM #code generation #towards
Towards a “Middle Road” Methodology for Writing Code Generators (FK, MM), pp. 105–118.
POPLPOPL-1988-Pelegri-LlopartG #code generation
Optimal Code Generation for Expression Trees: An Application of BURS Theory (EPL, SLG), pp. 294–308.
CCCCHSC-1988-Kroha #code generation
Code Generation for a RISC Machine (PK), pp. 204–214.
CCCCHSC-1988-Mughal #generative #incremental #programming #thread
Generation of Incremental Indirect Threaded Code for Language-Based Programming Environments (KAM), pp. 230–242.
CCCCHSC-1988-WeisgerberW #pattern matching
Two Tree Pattern Matchers for Code Selection (BW, RW), pp. 215–229.
ESOPESOP-1988-GiegerichS #parsing #pattern matching
Code Selection Techniques: Pattern Matching, Tree Parsing, and Inversion of Derivors (RG, KS), pp. 247–268.
HTHT-1987-BigelowR #source code
Manipulating Source Code in DynamicDesign (JB, VAR), pp. 397–408.
HCIHCI-CE-1987-Soloway #specification #what
I Can’t Tell What in the Code Implements What in the Specs (ES), pp. 317–328.
PLDIPLDI-1987-Pittman #execution #hybrid #interpreter #performance
Two-level hybrid interpreter/native code execution for combined space-time program efficiency (TP), pp. 150–152.
DACDAC-1987-WangHPZ #named
SSIM: A Software Levelized Compiled-Code Simulator (LTW, NEH, EHP, JJZ), pp. 2–8.
SOSPSOSP-1987-MogulRA #network #performance
The Packet Filter: An Efficient Mechanism for User-level Network Code (JCM, RFR, MJA), pp. 39–51.
TAPSOFTCFLP-1987-LindstromGY #generative #performance #strict
Generating Efficient Code from Strictness Annotations (GL, LG, DY), pp. 140–154.
ICLPICLP-1987-LindholmO87 #implementation #performance #prolog #semantics
Efficient Implementation of a Defensible Semantics for Dynamic PROLOG Code (TGL, RAO), pp. 21–39.
RTARTA-1987-DesplandMR #code generation #generative #term rewriting
Code Generator Generation Based on Template-Driven Target Term Rewriting (AD, MM, RR), pp. 105–120.
ICLPSLP-1987-ChenxiYLY87 #database #implementation #prolog
Implementation of a Prolog Code Database and Source Database in Compiler-Based Systems (CZ, TY, LL, HY), pp. 398–405.
SIGMODSIGMOD-1986-Faloutsos #multi #using
Multiattribute Hashing Using Gray Codes (CF), pp. 227–238.
LISPLFP-1986-FairbairnW #code generation #functional
Code Generation Techniques for Functional Languages (JF, SW), pp. 94–104.
AdaCRAI-1986-WestfoldMB #development #knowledge-based #requirements
Knowledge-Based Software Development from Requirements to Code (SJW, LM, WAB), pp. 62–80.
POPLPOPL-1986-CytronLZ
Code Motion of Control Structures in High-Level Languages (RC, AL, FKZ), pp. 70–85.
POPLPOPL-1986-HatcherC #bottom-up #code generation #pattern matching
High-Quality Code Generation Via Bottom-Up Tree Pattern Matching (PJH, TWC), pp. 119–130.
ESOPESOP-1986-Nielson #code generation #correctness #metalanguage
Correctness of Code Generation from a Two-Level Meta-Language (FN), pp. 30–40.
SIGIRSIGIR-1985-ChouekaKP #performance
Efficient Variants of Huffman Codes in High Level Languages (YC, STK, YP), pp. 122–130.
POPLPOPL-1985-AhoG #code generation #pattern matching #performance
Efficient Tree Pattern Matching: An Aid to Code Generation (AVA, MG), pp. 334–340.
POPLPOPL-1985-Appel #code generation #semantics
Semantics-Directed Code Generation (AWA), pp. 315–324.
POPLPOPL-1985-FerranteM #on the #parallel
On Linearizing Parallel Code (JF, MM), pp. 179–189.
POPLPOPL-1985-FordS #approach #code generation #incremental
A Greedy Approach to Incremental Code Generation (RF, DS), pp. 165–178.
POPLPOPL-1985-PollockS #compilation #incremental
Incremental Compilation of Locally Optimized Code (LLP, MLS), pp. 152–164.
ICSEICSE-1985-Fukunaga #comprehension #knowledge base #named
PROMPTER: A Knowledge Based Support Tool for Code Understanding (KF), pp. 358–363.
ICALPICALP-1984-Karhumaki #on the
On Three-Element Codes (JK), pp. 292–302.
LISPLFP-1984-Brooks #garbage collection #hardware #realtime
Trading Data Space for Reduced Time and Code Space in Real-Time Garbage Collection on Stock Hardware (RAB), pp. 256–262.
POPLPOPL-1984-MilosPL #compilation #implementation #pascal #revisited #specification
Direct Implementation of Compiler Specifications or the Pascal P-code Compiler Revisited (DM, UFP, GL), pp. 196–207.
POPLPOPL-1984-SchwarzR #code generation #named
Treat — An Applicative Code Generator (JSS, DR), pp. 133–139.
PLDISCC-1984-AigrainGHMP #code generation #experience
Experience with a Graham-Glanville style code generator (PA, SLG, RRH, MKM, EPL), pp. 13–24.
PLDISCC-1984-Bray #ada
Sharing code among instances of Ada generics (GB), pp. 276–284.
PLDISCC-1984-ChristopherHK #code generation #programming #using
Using dynamic programming to generate optimized code in a Graham-Glanville style code generator (TWC, PJH, RCK), pp. 25–36.
PLDISCC-1984-FraserMW #assembly
Analyzing and compressing assembly code (CWF, EWM, ALW), pp. 117–121.
PLDISCC-1984-Karr #code generation
Code generation by coagulation (MK), pp. 1–12.
ICLPSLP-1984-WiseP84 #prolog #word
Indexing Prolog Clauses via Superimposed Code Words and Filed Encoded Words (MJW, DMWP), pp. 203–210.
POPLPOPL-1983-Johnson #code generation
Code Generation for Silicon (SCJ), pp. 14–19.
DACDAC-1983-Heilweil
Technology rules- the other side of technology dependent code (MFH), p. 389.
ICALPICALP-1982-Perrin
Completing Biprefix Codes (DP), pp. 397–406.
ICALPICALP-1982-Reutenauer #algebra
Biprefix Codes and Semisimple Algebras (CR), pp. 451–457.
ICGTGG-1982-MaurerRW
Chain code picture languages (HAM, GR, EW), pp. 232–244.
POPLPOPL-1982-DavidsonF
Eliminating Redundant Object Code (JWD, CWF), pp. 128–132.
POPLPOPL-1982-GanapathiF #attribute grammar #code generation #using
Description-Driven Code Generation using Attribute Grammars (MG, CNF), pp. 108–119.
POPLPOPL-1982-Giegerich #automation #generative
Automatic Generation of Machine Specific Code Optimizers (RG), pp. 75–81.
POPLPOPL-1982-HennessyG #code generation #constraints #pipes and filters
Code Generation and Reorganization in the Presence of Pipeline Constraints (JLH, TRG), pp. 120–127.
POPLPOPL-1982-RamanathS
Optimal Code for Control Structures (MVSR, MHS), pp. 82–94.
PLDISCC-1982-Bird #code generation #generative #implementation #specification
An Implementation of a Code Generator Specification Language for Table Driven Code Generators (PLB), pp. 44–55.
PLDISCC-1982-Crawford #code generation
Engineering a Production Code Generator (JC), pp. 205–215.
PLDISCC-1982-GrahamHS #code generation #empirical
An Experiment in Table Driven Code Generation (SLG, RRH, RAS), pp. 32–43.
PLDISCC-1982-KrummeA #code generation
A Practical Method for Code Generation Based on Exhaustive Search (DWK, DHA), pp. 185–196.
PLDISCC-1982-LandwehrJG #automation #code generation #experience
Experience with an Automatic Code Generator Generator (RL, HSJ, GG), pp. 56–66.
PLDISCC-1982-MorganR #code generation
Analyzing Exotic Instructions for a Retargetable Code Generator (TMM, LAR), pp. 197–204.
PLDISCC-1982-Raskovsky #code generation #semantics #specification
Denotational Semantics as a Specification of Code Generators (MRR), pp. 230–244.
ICSEICSE-1982-Bauer #reasoning #specification
From Specifications to Machine Code: Program Construction through Formal Reasoning (FLB), pp. 84–93.
ASPLOSASPLOS-1982-Middleburg #architecture #code generation
The Effect of the PDP-11 Architecture on Code Generation for Chill (CAM), pp. 149–157.
ASPLOSASPLOS-1982-RauGG #architecture #generative #performance
Architectural Support for the Efficient Generation of Code for Horizontal Architectures (BRR, CDG, EMG), pp. 96–99.
ASPLOSASPLOS-1982-Rymarczyk #guidelines #pipes and filters
Coding Guidelines for Pipelined Processors (JWR), pp. 12–19.
DACDAC-1982-MuellerV #automation #semantics
Formal semantics for the automated derivation of micro-code (RAM, JV), pp. 815–824.
ICSEICSE-1981-PenedoBE #algorithm #concurrent #generative
An Algorithm to Support Code-Skeleton Generation for Concurrent Systems (MH(P, DMB, GE), pp. 125–135.
DACDAC-1981-Krohn #simulation
Vector coding techniques for high speed digital simulation (HEK), pp. 525–529.
LISPLISP-1980-Rowan #compilation #lisp
A LISP Compiler Producing Compact Code (WR), pp. 216–222.
PLDISCC-1979-CattellNL #code generation #compilation #independence
Code generation in a machine-independent compiler (RGGC, JMN, BWL), pp. 65–75.
PLDISCC-1979-DoneganNF #code generation
A code generator generator language (MKD, REN, SF), pp. 58–64.
PLDISCC-1979-Frailey #independence #optimisation
An intermediate language for source and target independent code optimization (DJF), pp. 188–200.
PLDISCC-1979-PerkinsS #independence #optimisation #pascal
Machine-independent PASCAL code optimization (DRP, RLS), pp. 201–207.
PLDISCC-1979-RudmikL #code generation #compilation #design #optimisation #performance
Compiler design for efficient code generation and program optimization (AR, ESL), pp. 127–138.
PLDIBest-of-PLDI-1979-CattellNL #code generation #compilation #independence
Code generation in a machine-independent compiler (with retrospective) (RGGC, JMN, BWL), pp. 1–13.
ICSEICSE-1979-Laventhal #approach #reliability
A Constructive Approach to Reliable Synchronization Code (MSL), pp. 194–202.
ICALPICALP-1978-AltenkampM #named
Codes: Unequal Probabilities, Unequal Letter Costs (DA, KM), pp. 15–25.
POPLPOPL-1978-GlanvilleG #code generation #compilation
A New Method for Compiler Code Generation (RSG, SLG), pp. 231–240.
DACDAC-1978-LekkosP #how #logic #pseudo #refinement #using
How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
ICALPICALP-1977-AhoS #code generation #compilation #how #question
How Hard is Compiler Code Generation? (AVA, RS), pp. 1–15.
POPLPOPL-1977-AhoJU #code generation #multi
Code Generation for Machines with Multiregister Operations (AVA, SCJ, JDU), pp. 21–28.
POPLPOPL-1977-Harrison #code generation #compilation #optimisation
A New Strategy for Code Generation — The General Purpose Optimizing Compiler (WHH), pp. 29–37.
ICALPICALP-1976-Restivo #on the #product line
On a Family of Codes Related to Factorization of Cyclotomic Polynomials (AR), pp. 38–44.
POPLPOPL-1976-AhoJU #code generation
Code Generation for Expressions with Common Subexpressions (AVA, SCJ, JDU), pp. 19–31.
ICSEICSE-1976-BarstowK #interactive #performance #synthesis
Observations on the Interaction Between Coding and Efficiency Knowledge in the PSI Program Synthesis System (DRB, EK), pp. 19–31.
STOCSTOC-1976-Burkhard #retrieval
Associative Retrieval Trie Hash-Coding (WAB), pp. 211–219.
STOCSTOC-1975-AhoJ #code generation
Optimal Code Generation for Expression Trees (AVA, SCJ), pp. 207–217.
ICALPICALP-1974-EhrenfeuchtR #morphism #term rewriting #trade-off #using
Trade-off between the Use of Nonterminals, Codings and Homomorphisms in Defining Languages for Some Classes of Rewriting Systems (AE, GR), pp. 473–480.
STOCSTOC-1970-Perrot #automaton #finite #monad #on the
On The Relationship between Finite Automata, Finite Monoids, and Prefix Codes (JFP), pp. 217–220.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.