BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
sourc (420)
generat (314)
use (281)
base (240)
analysi (182)

Stem code$ (all stems)

2605 papers:

CCCC-2020-BrauckmannGEC #graph #learning #modelling
Compiler-based graph representations for deep learning models of code (AB, AG, SE, JC), pp. 201–211.
CCCC-2020-Castro-PerezY #compilation #first-order #parallel
Compiling first-order functions to session-typed parallel code (DCP, NY), pp. 143–154.
ASEASE-2019-Boronat #agile #modelling
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling (AB), pp. 874–886.
ASEASE-2019-BuiYJ #named #network
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation (NDQB, YY, LJ), pp. 38–41.
ASEASE-2019-DuCWLSC #graph #named
CocoQa: Question Answering for Coding Conventions Over Knowledge Graphs (TD, JC, QW, WL, BS, YC), pp. 1086–1089.
ASEASE-2019-Gu00 #api #approach #graph #kernel #named
CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples (XG, HZ0, SK0), pp. 590–601.
ASEASE-2019-Jiang #analysis #commit #generative #semantics
Boosting Neural Commit Message Generation with Code Semantic Analysis (SJ), pp. 1280–1282.
ASEASE-2019-JiangRXZ #program transformation
Inferring Program Transformations From Singular Examples via Big Code (JJ, LR, YX, LZ), pp. 255–266.
ASEASE-2019-KangB0
Assessing the Generalizability of Code2vec Token Embeddings (HJK, TFB, DL0), pp. 1–12.
ASEASE-2019-LiuHGN #predict #source code
Predicting Licenses for Changed Source Code (XL, LH, JG, VN), pp. 686–697.
ASEASE-2019-NafiKRRS #api #clone detection #detection #documentation #named #using
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASEASE-2019-Nam #api #design
API Design Implications of Boilerplate Client Code (DN), pp. 1253–1255.
ASEASE-2019-NamHMMV #api #identification #mining #named #problem #usability
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems (DN, AH, AM, BAM, BV), pp. 615–627.
ASEASE-2019-NguyenNLW #program analysis #statistics
Combining Program Analysis and Statistical Language Model for Code Statement Completion (SVN, TNN, YL, SW0), pp. 710–721.
ASEASE-2019-NguyenNTTN #configuration management
Feature-Interaction Aware Configuration Prioritization for Configurable Code (SN, HN, NMT, HT, TNN), pp. 489–501.
ASEASE-2019-PiskachevDJB #automation #detection #named
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods (GP, LNQD, OJ, EB), pp. 1094–1097.
ASEASE-2019-ReicheltKH #identification #named #performance
PeASS: A Tool for Identifying Performance Changes at Code Level (DGR, SK, WH), pp. 1146–1149.
ASEASE-2019-SaifullahAR #api #learning
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets (CMKS, MA, CKR), pp. 243–254.
ASEASE-2019-SondhiP #consistency #named #nondeterminism #semantics #specification #string
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs (DS, RP), pp. 200–212.
ASEASE-2019-TokumotoT #development #metric #named #quality
PHANTA: Diversified Test Code Quality Measurement for Modern Software Development (ST, KT), pp. 1206–1207.
ASEASE-2019-WangLZX #co-evolution #named
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer (MW, ZL, YZ, BX), pp. 1050–1061.
ASEASE-2019-WanSSXZ0Y #learning #multi #network #retrieval #semantics #source code
Multi-modal Attention Network Learning for Semantic Source Code Retrieval (YW, JS, YS, GX, ZZ, JW0, PSY), pp. 13–25.
ASEASE-2019-YangJ0WSLZX #automation #self #test coverage
Automatic Self-Validation for Code Coverage Profilers (YY, YJ0, ZZ0, YW, HS, HL, YZ, BX), pp. 79–90.
ASEASE-2019-ZhouSZ #named #what
Lancer: Your Code Tell Me What You Need (SZ, BS, HZ), pp. 1202–1205.
ESEC-FSEESEC-FSE-2019-CambroneroLKS0 #code search #learning
When deep learning met code search (JC, HL, SK, KS, SC0), pp. 964–974.
ESEC-FSEESEC-FSE-2019-He #comprehension #scalability #source code
Understanding source code comments at large-scale (HH), pp. 1217–1219.
ESEC-FSEESEC-FSE-2019-HiraoMIM #approach #code review #empirical #graph #overview
The review linkage graph for code review analytics: a recovery approach and empirical study (TH, SM, AI, KM), pp. 578–589.
ESEC-FSEESEC-FSE-2019-IvankovicPJF #test coverage
Code coverage at Google (MI, GP, RJ, GF), pp. 955–963.
ESEC-FSEESEC-FSE-2019-Khanve #empirical #game studies #smell #web
Are existing code smells relevant in web games? an empirical study (VK), pp. 1241–1243.
ESEC-FSEESEC-FSE-2019-MostaeenSRRS #machine learning #named #validation
CloneCognition: machine learning based code clone validation tool (GM, JS, BR, CKR, KAS), pp. 1105–1109.
ESEC-FSEESEC-FSE-2019-SafwanS #commit #developer #perspective
Decomposing the rationale of code commits: the software developer's perspective (KAS, FS), pp. 397–408.
ESEC-FSEESEC-FSE-2019-Sonnekalb #detection #source code
Machine-learning supported vulnerability detection in source code (TS), pp. 1180–1183.
ESEC-FSEESEC-FSE-2019-Wang0LXBXW #approach #automation #documentation #source code #taxonomy
A learning-based approach for automatic construction of domain glossary from source code and documentation (CW, XP0, ML, ZX, XB, BX, TW), pp. 97–108.
ESEC-FSEESEC-FSE-2019-ZhouVK #case study #performance #social #what
What the fork: a study of inefficient and efficient forking practices in social coding (SZ, BV, CK), pp. 350–361.
GPCEGPCE-2019-Chiba #interface #migration
Foreign language interfaces by code migration (SC), pp. 1–13.
GPCEGPCE-2019-FeichtingerHLPG #analysis #constraints #dependence #evolution #feature model
Supporting feature model evolution by suggesting constraints from code-level dependency analyses (KF, DH, LL, HP, PG), pp. 129–142.
CCCC-2019-KimHLS0K #automation
Spinal code: automatic code extraction for near-user computation in fogs (BK, SH, GL, SS, JK0, HK), pp. 87–98.
CCCC-2019-LiuHWCL0X #compilation #concurrent #kernel #named #thread
PPOpenCL: a performance-portable OpenCL compiler with host and kernel thread code fusion (YL, LH, MW, HC, FL, XF0, JX), pp. 2–16.
FASEFASE-2019-ParkJR #automation #javascript #modelling #static analysis
Automatic Modeling of Opaque Code for JavaScript Static Analysis (JP, AJ, SR), pp. 43–60.
ECMFAECMFA-2018-Cuadrado #ocl #optimisation
Optimising OCL Synthesized Code (JSC), pp. 28–45.
MoDELSMoDELS-2018-HenriquesLAG #developer #experience #modelling #process
Improving the Developer Experience with a Low-Code Process Modelling Language (HH, HL, VA, MG), pp. 200–210.
ASEASE-2018-ChenSXHJ #approach #automation #execution #metric #test coverage
An automated approach to estimating code coverage measures via execution logs (BC, JS, PX, XH, ZM(J), pp. 305–316.
ASEASE-2018-ChenZ #framework #retrieval #source code #summary
A neural framework for retrieval and summarization of source code (QC, MZ), pp. 826–831.
ASEASE-2018-Cosmo #source code
Software heritage: collecting, preserving, and sharing all our source code (keynote) (RDC), pp. 1–2.
ASEASE-2018-GafurovHM #automation #industrial #testing
Achieving test automation with testers without coding skills: an industrial report (DG, AEH, MM), pp. 749–756.
ASEASE-2018-GharibiTL #automation #generative #graph #named #python #source code
Code2graph: automatic generation of static call graphs for Python source code (GG, RT, YL), pp. 880–883.
ASEASE-2018-HaririS #c #mutation testing #named #representation #source code #testing #tool support
SRCIROR: a toolset for mutation testing of C source code and LLVM intermediate representation (FH, AS), pp. 860–863.
ASEASE-2018-HuangCPZWLZ #difference #generative #named
ClDiff: generating concise linked code differences (KH, BC0, XP0, DZ, YW, YL0, WZ), pp. 679–690.
ASEASE-2018-JanesMR #developer #lens #named
code_call_lens: raising the developer awareness of critical code (AJ, MM, BR), pp. 876–879.
ASEASE-2018-LiuHZLLPZ #detection #named #similarity
αDiff: cross-version binary code similarity detection with DNN (BL, WH, CZ0, WL, FL, AP, WZ), pp. 667–678.
ASEASE-2018-OzdemirTEA #lightweight #monitoring #source code
Lightweight source code monitoring with Triggr (AO, AT, HE, RA), pp. 864–867.
ASEASE-2018-SharifAGZ #named
TRIMMER: application specialization for code debloating (HS, MA, AG, FZ), pp. 329–339.
ASEASE-2018-VassalloPBG #quality #question
Continuous code quality: are we (really) doing that? (CV, FP, AB, HCG), pp. 790–795.
ASEASE-2018-WanZYXY0Y #automation #learning #source code #summary
Improving automatic source code summarization via deep reinforcement learning (YW, ZZ, MY0, GX, HY, JW0, PSY), pp. 397–407.
ESEC-FSEESEC-FSE-2018-0002JCHZ #code review #developer #overview #perspective
Salient-class location: help developers understand code change in code review (YH0, NJ, XC, KH, ZZ), pp. 770–774.
ESEC-FSEESEC-FSE-2018-BianLSH0 #debugging #detection #named
NAR-miner: discovering negative association rules from code for bug detection (PB, BL0, WS, JH0, YC0), pp. 411–422.
ESEC-FSEESEC-FSE-2018-GlonduJS
Ten years of hunting for similar code for fun and profit (keynote) (SG, LJ, ZS), p. 2.
ESEC-FSEESEC-FSE-2018-HashimotoMI #automation #debugging #semantics #source code
Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes (MH, AM, TI), pp. 598–609.
ESEC-FSEESEC-FSE-2018-HenkelLLR #comprehension #embedded #source code
Code vectors: understanding programs through embedded abstracted symbolic traces (JH, SKL, BL, TWR), pp. 163–174.
ESEC-FSEESEC-FSE-2018-Hosseini #android #natural language #policy #privacy #semantics
Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
ESEC-FSEESEC-FSE-2018-Ketkar #migration #scalability
Type migration in large-scale code bases (AK), pp. 965–967.
ESEC-FSEESEC-FSE-2018-McNamaraSM #development #question
Does ACM's code of ethics change ethical decision making in software development? (AM, JS0, ERMH), pp. 729–733.
ESEC-FSEESEC-FSE-2018-RamSCB #empirical #overview #what
What makes a code change easier to review: an empirical investigation on code change reviewability (AR, AAS, MC, AB), pp. 201–212.
ESEC-FSEESEC-FSE-2018-RenYHFK #development #towards
Towards quantifying the development value of code contributions (JR, HY, QH, AF, WK), pp. 775–779.
ESEC-FSEESEC-FSE-2018-ZhaoH #functional #learning #named #similarity
DeepSim: deep learning code functional similarity (GZ, JH0), pp. 141–151.
CCCC-2018-ErtelGAC #compilation #performance
Compiling for concise code and efficient I/O (SE, AG, JA, JC), pp. 104–115.
CAVCAV-2018-CookKKTTT #model checking
Model Checking Boot Code from AWS Data Centers (BC, KK, DK, ST, MT, MRT), pp. 467–486.
HaskellHaskell-2017-Remy #automation #named #parametricity #reuse
Ornaments: exploiting parametricity for safer, more automated code refactorization and code reuse (invited talk) (DR), p. 1.
ECMFAECMFA-2017-KlugeSGSM #c #embedded #generative #modelling #named #network
cMoflon: Model-Driven Generation of Embedded C Code for Wireless Sensor Networks (RK, MS, DG, AS, MM), pp. 109–125.
MoDELSMoDELS-2017-EgeaD #automation #code generation #named #ocl #sql
SQL-PL4OCL: An Automatic Code Generator from OCL to SQL Procedural Language (ME, CD), p. 54.
MoDELSMoDELS-2017-KlareBKLSR #java #metamodelling #named #tool support
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools (HK, EB, MEK, ML, TS, RHR), pp. 221–228.
ASEASE-2017-AhmedBIR #analysis #code review #interactive #named #overview #sentiment
SentiCR: a customized sentiment analysis tool for code review interactions (TA, AB, AI, SR), pp. 106–111.
ASEASE-2017-Holzmann #interactive
Cobra - an interactive static code analyzer (GJH), p. 1.
ASEASE-2017-KargenS #robust #towards
Towards robust instruction-level trace alignment of binary code (UK, NS), pp. 342–352.
ASEASE-2017-LessenichAKSS #performance #precise
Renaming and shifted code in structured merging: looking ahead for precision and performance (OL, SA, CK, GS, JS), pp. 543–553.
ASEASE-2017-LinMXXSPLZD #design #mining #reuse
Mining implicit design templates for actionable code reuse (YL0, GM, YX, ZX, JS0, XP0, YL0, WZ, JSD), pp. 394–404.
ASEASE-2017-LinZZX #concept #retrieval #source code #using
Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
ASEASE-2017-MenariniYG #case study #code review #overview #performance #semantics #user study
Semantics-assisted code review: an efficient toolchain and a user study (MM, YY, WGG), pp. 554–565.
ASEASE-2017-RahmanR #concept #documentation #query #using
Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
ASEASE-2017-ScalabrinoBVVPO #automation #how #question
Automatically assessing code understandability: how far are we? (SS, GB, CV, MLV, DP, RO), pp. 417–427.
ASEASE-2017-Sultana #metric #predict #towards #using
Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
ASEASE-2017-WangW #analysis #fuzzing #in memory #similarity
In-memory fuzzing for binary code similarity analysis (SW0, DW), pp. 319–330.
ASEASE-2017-XinR #automation #program repair
Leveraging syntax-related code for automated program repair (QX, SPR), pp. 660–670.
ASEASE-2017-YangJ0SGL
A language model for statements of software code (YY, YJ0, MG0, JS, JG, HL), pp. 682–687.
ASEASE-2017-ZhongW
Boosting complete-code tool for partial program (HZ, XW), pp. 671–681.
ESEC-FSEESEC-FSE-2017-BunyakiatiP #commit #multi
Cherry-picking of code commits in long-running, multi-release software (PB, CP), pp. 994–998.
ESEC-FSEESEC-FSE-2017-GlanzAERHLM #named #obfuscation
CodeMatch: obfuscation won't conceal your repackaged app (LG, SA, ME, MR, BH, JL, MM), pp. 638–648.
ESEC-FSEESEC-FSE-2017-GopsteinIYDZYC #comprehension #source code
Understanding misunderstandings in source code (DG, JI, YY, LD, YZ, MKCY, JC), pp. 129–139.
ESEC-FSEESEC-FSE-2017-GuoWW #execution #logic #programmable #symbolic computation
Symbolic execution of programmable logic controller code (SG, MW, CW0), pp. 326–336.
ESEC-FSEESEC-FSE-2017-HellendoornD #modelling #network #question #source code
Are deep neural networks the best choice for modeling source code? (VJH, PTD), pp. 763–773.
ESEC-FSEESEC-FSE-2017-Jaffe #approach
Suggesting meaningful variable names for decompiled code: a machine translation approach (AJ), pp. 1050–1052.
ESEC-FSEESEC-FSE-2017-LongAR #automation #generative
Automatic inference of code transforms for patch generation (FL, PA, MR), pp. 727–739.
ESEC-FSEESEC-FSE-2017-MartieHK #code search #comprehension
Understanding the impact of support for iteration on code search (LM, AvdH, TK), pp. 774–785.
ESEC-FSEESEC-FSE-2017-NunezMR #comprehension #named
ARCC: assistant for repetitive code comprehension (WZN, VJM, CRR), pp. 999–1003.
ESEC-FSEESEC-FSE-2017-Sidiroglou-Douskos
CodeCarbonCopy (SSD, EL, AE, FL, MR), pp. 95–105.
GPCEGPCE-2017-Courtes #staging
Code staging in GNU Guix (LC), pp. 41–48.
SLESLE-2017-LuhunuS #code generation #comparison #performance #tool support
Comparison of the expressiveness and performance of template-based code generation tools (LL, ES), pp. 206–216.
CCCC-2017-WimmerJEW #compilation
One compiler: deoptimization to optimized code (CW, VJ, EE, TW), pp. 55–64.
MoDELSMoDELS-2016-Blache #bound #c #development #embedded #modelling #safety #using
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
MoDELSMoDELS-2016-DasGJBHD #animation #code generation #development #embedded #modelling #monitoring #realtime #runtime
Supporting the model-driven development of real-time embedded systems with run-time monitoring and animation via highly customizable code generation (ND, SG, LJ, MB, NH, JD), pp. 36–43.
MoDELSMoDELS-2016-HarrandFMH #code generation #framework #named
ThingML: a language and code generation framework for heterogeneous targets (NH, FF, BM, KEH), pp. 125–135.
ASEASE-2016-DotzlerP #difference #source code
Move-optimized source code tree differencing (GD, MP), pp. 660–671.
ASEASE-2016-HannebauerPSG #automation #code review #comparison #empirical #recommendation
Automatically recommending code reviewers based on their expertise: an empirical comparison (CH, MP, SS, VG), pp. 99–110.
ASEASE-2016-ProkschANM #recommendation
Evaluating the evaluations of code recommender systems: a reality check (SP, SA, SN, MM), pp. 111–121.
ASEASE-2016-RahmanRRC #code review #git #named #recommendation
CORRECT: code reviewer recommendation at GitHub for Vendasta technologies (MMR, CKR, JR, JAC), pp. 792–797.
ASEASE-2016-Rodriguez-Cancio #automation #benchmark #constant #generative
Automatic microbenchmark generation to prevent dead code elimination and constant folding (MRC, BC, BB), pp. 132–143.
ASEASE-2016-WhiteTVP #clone detection #detection #learning
Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
FSEFSE-2016-Alexandru #network #synthesis #using
Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
FSEFSE-2016-BaumLNS #code review #industrial #overview #process
Factors influencing code review processes in industry (TB, OL, KN, KS), pp. 85–96.
FSEFSE-2016-HasabnisS #code generation #execution #semantics #symbolic computation
Extracting instruction semantics via symbolic execution of code generators (NH, RS), pp. 301–313.
FSEFSE-2016-LiWWYXM #code search #framework #javascript
Relationship-aware code search for JavaScript frameworks (XL, ZW, QW, SY, TX0, HM), pp. 690–701.
FSEFSE-2016-Meng #fine-grained #identification
Fine-grained binary code authorship identification (XM), pp. 1097–1099.
FSEFSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics #using
API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
FSEFSE-2016-NguyenRNKN #api #named #statistics
T2API: synthesizing API code usage templates from English texts with statistical translation (TVN, PCR, ATN0, MK, TNN), pp. 1013–1017.
FSEFSE-2016-OosterwaalDCSB #code review #overview #perspective #visualisation
Visualizing code and coverage changes for code review (SO, AvD, RC, AAS, AB), pp. 1038–1041.
FSEFSE-2016-Rolim #automation #using
Automating repetitive code changes using examples (RR), pp. 1063–1065.
FSEFSE-2016-SuBHSKJ #detection
Code relatives: detecting similarly behaving software (FHS, JB0, KH, SS, GEK, TJ), pp. 702–714.
FSEFSE-2016-WangFMKDR #java #named #reuse
Hunter: next-generation code reuse for Java (YW, YF, RM, AK, ID, SPR), pp. 1028–1032.
FSEFSE-2016-ZhangJKKGH #developer #recommendation
Bing developer assistant: improving developer productivity by recommending sample code (HZ0, AJ, GK, CK, SG, WH), pp. 956–961.
FSEFSE-2016-ZhouW #analysis #api #detection #web
API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
FSEFSE-2016-ZhuZM #effectiveness #tool support
Effectiveness of code contribution: from patch-based to pull-request-based tools (JZ, MZ, AM), pp. 871–882.
GPCEGPCE-2016-AdamKS #automation #case study #code generation #embedded #experience
Automatic code generation in practice: experiences with embedded robot controllers (SA, MK, UPS), pp. 104–108.
GPCEGPCE-2016-BoussaaBBS #automation #code generation #non-functional #product line #testing
Automatic non-functional testing of code generators families (MB, OB, BB, GS), pp. 202–212.
SLESLE-2016-AmorimEWV #code completion #using
Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
SLESLE-2016-GoncharenkoZ #design #implementation
Language design and implementation for the domain of coding conventions (BG, VZ), pp. 90–104.
SLESLE-2016-ParrV #machine learning #towards
Towards a universal code formatter through machine learning (TP, JJV), pp. 137–151.
CBSECBSE-2015-KramerLMSB #architecture #component #consistency #contract #modelling
Change-Driven Consistency for Component Code, Architectural Models, and Contracts (MEK, ML, DM, SS, EB), pp. 21–26.
CSEETCSEET-2015-SripadaRS #bibliography #code review #re-engineering
In Support of Peer Code Review and Inspection in an Undergraduate Software Engineering Course (SS, YRR, AS), pp. 3–6.
ITiCSEITiCSE-2015-BergesH #evaluation #source code
Evaluation of Source Code with Item Response Theory (MB, PH), pp. 51–56.
ITiCSEITiCSE-2015-InsaS #assessment #automation #domain-specific language #java #library
Semi-Automatic Assessment of Unrestrained Java Code: A Library, a DSL, and a Workbench to Assess Exams and Exercises (DI, JS), pp. 39–44.
ITiCSEITiCSE-2015-Kumar #problem #semantics
Solving Code-tracing Problems and its Effect on Code-writing Skills Pertaining to Program Semantics (ANK), pp. 314–319.
ITiCSEITiCSE-2015-Pritchard #named #online
Websheets: A Templated Online Coding Exercise System (DAGP), p. 335.
ITiCSEITiCSE-2015-ScottG #assessment #code review #education #quality #reliability
Reliability in the Assessment of Program Quality by Teaching Assistants During Code Reviews (MJS, GG), p. 346.
SCAMSCAM-J-2013-CeruloPBCC15 #detection #markov #named
Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
SCAMSCAM-J-2013-MarcozziVH15 #database #execution #relational #source code #sql #symbolic computation #testing
Relational symbolic execution of SQL code for unit testing of database programs (MM, WV, JLH), pp. 44–72.
ICPCICPC-2015-BusjahnBBCPSST #eye tracking #linear #order
Eye movements in code reading: relaxing the linear order (TB, RB, AB, MEC, JHP, CS, BS, ST), pp. 255–265.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how #using
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-JordanRHBB #feature model #industrial #source code
Manually locating features in industrial source code: the search actions of software nomads (HRJ, JR, SH, GB, JB), pp. 174–177.
ICPCICPC-2015-MacLeodSB #developer #documentation #how #using
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-SabiMHK #code search #keyword #order
Reordering results of keyword-based code search for supporting simultaneous code changes (YS, HM, YH, SK), pp. 289–290.
ICPCICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICPCICPC-2015-SaiedABS #api #library #question #source code #using
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-Balachandran #query #repository #scalability
Query by example in large-scale code repositories (VB), pp. 467–476.
ICSMEICSME-2015-BavotaR #code review #quality
Four eyes are better than two: On the impact of code reviews on software quality (GB, BR), pp. 81–90.
ICSMEICSME-2015-Fenske #configuration management #smell
Code smells in highly configurable software (WF), pp. 602–605.
ICSMEICSME-2015-JansenH #dataset #industrial #smell #spreadsheet
Code smells in spreadsheet formulas revisited on an industrial dataset (BJ, FH), pp. 372–380.
ICSMEICSME-2015-KononenkoBGCG #bibliography #code review #matter #people #quality #question
Investigating code review quality: Do people and participation matter? (OK, OB, LG, YC, MWG), pp. 111–120.
ICSMEICSME-2015-MondalRS #case study #comparative
A comparative study on the bug-proneness of different types of code clones (MM, CKR, KAS), pp. 91–100.
ICSMEICSME-2015-PawelkaJ #case study #identifier #natural language
Is this code written in English? A study of the natural language of comments and identifiers in practice (TP, EJ), pp. 401–410.
ICSMEICSME-2015-SantosAEDV #program transformation #source code
System specific, source code transformations (GS, NA, AE, SD, MTV), pp. 221–230.
ICSMEICSME-2015-VahabzadehF0 #debugging #empirical
An empirical study of bugs in test code (AV, AMF, AM), pp. 101–110.
ICSMEICSME-2015-WangPV #corpus #mining #scalability
Developing a model of loop actions by mining loop characteristics from a large code corpus (XW, LLP, KVS), pp. 51–60.
MSRMSR-2015-BirdCG #code review #framework #lessons learnt #overview #platform
Lessons Learned from Building and Deploying a Code Review Analytics Platform (CB, TC, MG), pp. 191–201.
MSRMSR-2015-BosuGB #code review #empirical
Characteristics of Useful Code Reviews: An Empirical Study at Microsoft (AB, MG, CB), pp. 146–156.
MSRMSR-2015-CoelhoAGD #android #debugging #exception #git
Unveiling Exception Handling Bug Hazards in Android Based on GitHub and Google Code Issues (RC, LA, GG, AvD), pp. 134–145.
MSRMSR-2015-DiamantopoulosS #source code #stack overflow
Employing Source Code Information to Improve Question-Answering in Stack Overflow (TGD, ALS), pp. 454–457.
MSRMSR-2015-DuijnKB #quality #stack overflow
Quality Questions Need Quality Code: Classifying Code Fragments on Stack Overflow (MD, AK, AB), pp. 410–413.
MSRMSR-2015-ErcanSB #automation #predict #stack overflow
Automatic Assessments of Code Explanations: Predicting Answering Times on Stack Overflow (SE, QS, AB), pp. 442–445.
MSRMSR-2015-GreilerHC #quality #replication
Code Ownership and Software Quality: A Replication Study (MG, KH, JC), pp. 2–12.
MSRMSR-2015-HellendoornDB #modelling
Will They Like This? Evaluating Code Contributions with Language Models (VH, PTD, AB), pp. 157–167.
MSRMSR-2015-HigoOHHK #reuse #towards
Toward Reusing Code Changes (YH, AO, SH, HH, SK), pp. 372–376.
MSRMSR-2015-JiangA #co-evolution #empirical #framework #source code
Co-evolution of Infrastructure and Source Code — An Empirical Study (YJ, BA), pp. 45–55.
MSRMSR-2015-LinW #fine-grained #why
Why Power Laws? An Explanation from Fine-Grained Code Changes (ZL, JW), pp. 68–75.
MSRMSR-2015-MartieH #code search #empirical #named
Sameness: An Experiment in Code Search (LM, AvdH), pp. 76–87.
MSRMSR-2015-PalombaNTBOPL #dataset #evaluation #named #open data #smell
Landfill: An Open Dataset of Code Smells with Public Evaluation (FP, DDN, MT, GB, RO, DP, ADL), pp. 482–485.
MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
MSRMSR-2015-TaoK #clustering #code review #overview #perspective
Partitioning Composite Code Changes to Facilitate Code Review (YT, SK), pp. 180–190.
MSRMSR-2015-ThongtanunamMHI #code review #empirical #overview
Investigating Code Review Practices in Defective Files: An Empirical Study of the Qt System (PT, SM, AEH, HI), pp. 168–179.
MSRMSR-2015-Zacchiroli #dataset #metadata #source code
The Debsources Dataset: Two Decades of Debian Source Code Metadata (SZ), pp. 466–469.
SANERSANER-2015-DamevskiSP #code search #developer #evaluation #metric #scalability #tool support
Scaling up evaluation of code search tools through developer usage metrics (KD, DCS, LLP), pp. 181–190.
SANERSANER-2015-DiasBGCD #fine-grained
Untangling fine-grained code changes (MD, AB, GG, DC, SD), pp. 341–350.
SANERSANER-2015-HashimotoMI #fine-grained #scalability #source code
A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
SANERSANER-2015-JiangPWXZ
Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changes (QJ, XP, HW, ZX, WZ), pp. 361–370.
SANERSANER-2015-Keivanloo0Z #clone detection #detection #java #repository #scalability
Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
SANERSANER-2015-KochharTL #debugging #effectiveness #empirical #scalability #test coverage #testing
Code coverage and test suite effectiveness: Empirical study with real bugs in large systems (PSK, FT, DL), pp. 560–564.
SANERSANER-2015-LuSWLD #code search #effectiveness #query
Query expansion via WordNet for effective code search (ML, XS, SW, DL, YD), pp. 545–549.
SANERSANER-2015-MondalRS #mining #named #refactoring
SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking (MM, CKR, KAS), pp. 484–488.
SANERSANER-2015-MoralesMK #case study #code review #design #overview #quality
Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projects (RM, SM, FK), pp. 171–180.
SANERSANER-2015-NairJNH #analysis
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support
Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
SANERSANER-2015-QiuSM #graph #identification #library #morphism #using
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SANERSANER-2015-ThongtanunamTKY #approach #code review #overview #perspective #recommendation
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
SANERSANER-2015-TymchukML #code review #overview
Code review: Veni, ViDI, vici (YT, AM, ML), pp. 151–160.
SANERSANER-2015-WongLT #automation #generative #mining #named #source code
CloCom: Mining existing source code for automatic comment generation (EW, TL, LT), pp. 380–389.
SCAMSCAM-2015-BaloghSB #eclipse #named #source code
CodeMetropolis: Eclipse over the city of source code (GB, AS, ÁB), pp. 271–276.
SCAMSCAM-2015-BrandtnerLG #dependence #integration #source code #testing
Intent, tests, and release dependencies: Pragmatic recipes for source code integration (MB, PL, HCG), pp. 11–20.
SCAMSCAM-2015-FaragoHF #cumulative #maintenance
Cumulative code churn: Impact on maintainability (CF, PH, RF), pp. 141–150.
SCAMSCAM-2015-FenskeSMS #detection #smell #variability
When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAMSCAM-2015-HuckBU #c++
Checking C++ codes for compatibility with operator overloading (AH, CB, JU), pp. 91–100.
SCAMSCAM-2015-LawrieB #navigation #source code #word
Navigating source code with words (DL, DB), pp. 71–80.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-SantosEADV #game studies #program transformation #source code
Recording and replaying system specific, source code transformations (GS, AE, NA, SD, MTV), pp. 221–230.
SCAMSCAM-2015-SzokeNFFG #automation #named #refactoring #smell #tool support
FaultBuster: An automatic code smell refactoring toolset (GS, CN, LJF, RF, TG), pp. 253–258.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
CIAACIAA-2015-Ade-IbijolaES #programming
Introducing Code Adviser: A DFA-driven Electronic Programming Tutor (AAI, SE, IDS), pp. 307–312.
DLTDLT-2015-HanKS #fault
Generalizations of Code Languages with Marginal Errors (YSH, SKK, KS), pp. 264–275.
ICALPICALP-v1-2015-HemenwayW #linear
Linear-Time List Recovery of High-Rate Expander Codes (BH, MW), pp. 701–712.
ICALPICALP-v1-2015-MolinaroWY #complexity
Amplification of One-Way Information Complexity via Codes and Noise Sensitivity (MM, DPW, GY), pp. 960–972.
LATALATA-2015-AnselmoGM #2d #decidability
Structure and Measure of a Decidable Class of Two-dimensional Codes (MA, DG, MM), pp. 315–327.
LATALATA-2015-LopezN
Coding Non-orientable Laminations (LML, PN), pp. 340–352.
FMFM-2015-FernandezAKK #automation #verification
Automated Verification of RPC Stub Code (MF, JA, GK, IK), pp. 273–290.
SEFMSEFM-2015-RockaiSB #c #c++ #model checking
Techniques for Memory-Efficient Model Checking of C and C++ Code (PR, VS, JB), pp. 268–282.
HaskellHaskell-2015-McDonellCGN #code generation #runtime #type safety
Type-safe runtime code generation: accelerate to LLVM (TLM, MMTC, VG, RRN), pp. 201–212.
ICFPICFP-2015-RompfA #c #compilation #functional #sql
Functional pearl: a SQL to C compiler in 500 lines of code (TR, NA), pp. 2–9.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance #using
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
CHICHI-2015-BakerML #named
StructJumper: A Tool to Help Blind Programmers Navigate and Understand the Structure of Code (CMB, LRM, REL), pp. 3043–3052.
CHICHI-2015-LaseckiGLLBD #behaviour #crowdsourcing #privacy #trade-off #video
Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
HCIDUXU-UI-2015-HeidtKBR #difference #gender #human-computer
Incommensurable Writings — Examining the Status of Gender Difference Within HCI Coding Practices (MH, KK, AB, PR), pp. 196–205.
HCIHIMI-IKC-2015-WatanabeTA #abstraction #development #learning #source code
Development of a Learning Support System for Reading Source Code by Stepwise Abstraction (KW, TT, TA), pp. 387–394.
HCILCT-2015-Chu #editing
Dual-Coding Strategy for the Chinese Characters Learners: Chinese PCS Editor (CNC), pp. 43–49.
ICEISICEIS-v3-2015-SantosTF #process
Investigating Completeness of Coding in Business Process Model and Notation (CHdS, LHT, MF), pp. 328–333.
ICMLICML-2015-AllamanisTGW #modelling #natural language #source code
Bimodal Modelling of Source Code and Natural Language (MA, DT, ADG, YW), pp. 2123–2132.
ICMLICML-2015-PiechHNPSG #feedback #learning #student
Learning Program Embeddings to Propagate Feedback on Student Code (CP, JH, AN, MP, MS, LJG), pp. 1093–1102.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank #using
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-YogatamaFDS #learning #word
Learning Word Representations with Hierarchical Sparse Coding (DY, MF, CD, NAS), pp. 87–96.
KDDKDD-2015-SomanchiALEG #predict #using
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
SEKESEKE-2015-HesseKPRB #implementation
Documenting Implementation Decisions with Code Annotations (TMH, AK, BP, TR, BB), pp. 152–157.
SEKESEKE-2015-SchreiberMRM #comprehension #named #object-oriented #source code
TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension (DS, ALAM, SSR, AM), pp. 278–283.
SEKESEKE-2015-XuLZ #overview #visualisation
To Enlighten Hidden Facts in The Code: A Review of Software Visualization Metaphors (YX, YL, JZ), pp. 294–297.
SPLCSPLC-2015-FilhoABAB #empirical #java #product line #source code
Assessing product line derivation operators applied to Java source code: an empirical study (JBFF, SA, OB, MA, BB), pp. 36–45.
OOPSLAOOPSLA-2015-FuBS #analysis #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
OOPSLAOOPSLA-2015-SrinivasanR #partial evaluation
Partial evaluation of machine code (VS, TWR), pp. 860–879.
PADLPADL-2015-DymchenkoM #problem
Declaratively Solving Google Code Jam Problems with Picat (SD, MM), pp. 50–57.
PEPMPEPM-2015-VinayakaraoPN #source code
Structurally Heterogeneous Source Code Examples from Unstructured Knowledge Sources (VV, RP, AVN), pp. 21–26.
PLDIPLDI-2015-MendisBWKRPZA #domain-specific language #kernel #named
Helium: lifting high-performance stencil kernels from stripped x86 binaries to halide DSL code (CM, JB, KW, SK, JRK, SP, QZ, SPA), pp. 391–402.
PLDIPLDI-2015-Sidiroglou-Douskos #automation #fault #multi
Automatic error elimination by horizontal code transfer across multiple applications (SSD, EL, FL, MR), pp. 43–54.
PLDIPLDI-2015-SrinivasanR #semantics #synthesis
Synthesis of machine code from semantics (VS, TWR), pp. 596–607.
PLDIPLDI-2015-VenkatHS #data transformation #matrix
Loop and data transformations for sparse matrix code (AV, MWH, MS), pp. 521–532.
POPLPOPL-2015-Agten0P #c #composition #verification
Sound Modular Verification of C Code Executing in an Unverified Context (PA, BJ, FP), pp. 581–594.
POPLPOPL-2015-Lee
Coding by Everyone, Every Day (PL), p. 485.
POPLPOPL-2015-RaychevVK #predict
Predicting Program Properties from “Big Code” (VR, MTV, AK), pp. 111–124.
ASEASE-2015-FudabaOANHSTN #automation #named #pseudo #source code
Pseudogen: A Tool to Automatically Generate Pseudo-Code from Source Code (HF, YO, KA, GN, HH, SS, TT, SN), pp. 824–829.
ASEASE-2015-GroceAJM #how #verification
How Verified is My Code? Falsification-Driven Verification (T) (AG, IA, CJ, PEM), pp. 737–748.
ASEASE-2015-KeSGB #code search #semantics #source code
Repairing Programs with Semantic Code Search (T) (YK, KTS, CLG, YB), pp. 295–306.
ASEASE-2015-LvZLWZZ #api #code search #comprehension #effectiveness #named
CodeHow: Effective Code Search Based on API Understanding and Extended Boolean Model (E) (FL, HZ, JGL, SW, DZ, JZ), pp. 260–270.
ASEASE-2015-MartieLH #named #query
CodeExchange: Supporting Reformulation of Internet-Scale Code Queries in Context (T) (LM, TDL, AvdH), pp. 24–35.
ASEASE-2015-NguyenNN #approach #divide and conquer #migration #multi #source code #statistics
Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T) (ATN, TTN, TNN), pp. 585–596.
ASEASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics #using
Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
ASEASE-2015-VasquezLVP #database #developer #documentation #how #source code
How do Developers Document Database Usages in Source Code? (N) (MLV, BL, CV, DP), pp. 36–41.
ESEC-FSEESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GongPS #javascript #named
JITProf: pinpointing JIT-unfriendly JavaScript code (LG, MP, KS), pp. 357–368.
ESEC-FSEESEC-FSE-2015-HeuleSC #modelling #named
Mimic: computing models for opaque code (SH, MS, SC), pp. 710–720.
ESEC-FSEESEC-FSE-2015-Janjua
OnSpot system: test impact visibility during code edits in real software (MUJ), pp. 994–997.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code #using
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-Konopka #dependence #eye tracking #identification #navigation
Combining eye tracking with navigation paths for identification of cross-language code dependencies (MK), pp. 1057–1059.
ESEC-FSEESEC-FSE-2015-LinPXZZ #interactive #recommendation
Clone-based and interactive recommendation for modifying pasted code (YL, XP, ZX, DZ, WZ), pp. 520–531.
ESEC-FSEESEC-FSE-2015-NagappanRKTMMH #c #empirical #git #goto #repository
An empirical study of goto in C code from GitHub repositories (MN, RR, YK, ÉT, SM, AM, AEH), pp. 404–414.
ESEC-FSEESEC-FSE-2015-PhamSS #automation #developer #recommendation
Automatically recommending test code examples to inexperienced developers (RP, YS, KS), pp. 890–893.
ESEC-FSEESEC-FSE-2015-PrauseJ #gamification
Gamification for enforcing coding conventions (CRP, MJ), pp. 649–660.
ESEC-FSEESEC-FSE-2015-SadowskiSE #case study #developer #how
How developers search for code: a case study (CS, KTS, SGE), pp. 191–201.
ESEC-FSEESEC-FSE-2015-Vinayakarao #comprehension
Spotting familiar code snippet structures for program comprehension (VV), pp. 1054–1056.
ICSEICSE-v1-2015-BarnettBBL #automation #code review #composition #developer #overview
Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets (MB, CB, JB, SKL), pp. 134–144.
ICSEICSE-v1-2015-LavalleeR #case study #developer #quality #why
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality (ML, PNR), pp. 677–687.
ICSEICSE-v1-2015-NanzF #case study #comparative #programming language
A Comparative Study of Programming Languages in Rosetta Code (SN, CAF), pp. 778–788.
ICSEICSE-v1-2015-NguyenN #graph #statistics
Graph-Based Statistical Language Model for Code (ATN, TNN), pp. 858–868.
ICSEICSE-v1-2015-TufanoPBOPLP #smell #why
When and Why Your Code Starts to Smell Bad (MT, FP, GB, RO, MDP, ADL, DP), pp. 403–414.
ICSEICSE-v1-2015-YoonM #editing #undo
Supporting Selective Undo in a Code Editor (YY, BAM), pp. 223–233.
ICSEICSE-v1-2015-ZhangSPK #code review #interactive #overview
Interactive Code Review for Systematic Changes (TZ, MS, JP, MK), pp. 111–122.
ICSEICSE-v2-2015-AbreuEP #fine-grained #monitoring #named
CodeAware: Sensor-Based Fine-Grained Monitoring and Management of Software Artifacts (RA, HE, AP), pp. 551–554.
ICSEICSE-v2-2015-AlexandruG #agile #analysis #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-BishopHXTH #contest #experience #scalability
Code Hunt: Experience with Coding Contests at Scale (JB, RNH, TX, NT, JdH), pp. 398–407.
ICSEICSE-v2-2015-CzerwonkaGT #code review #debugging #how #overview
Code Reviews Do Not Find Bugs. How the Current Code Review Best Practice Slows Us Down (JC, MG, JT), pp. 27–28.
ICSEICSE-v2-2015-FranksTDH #modelling #named
CACHECA: A Cache Language Model Based Code Suggestion Tool (CF, ZT, PTD, VH), pp. 705–708.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-McBurney #automation #documentation #generative #source code #summary
Automatic Documentation Generation via Source Code Summarization (PWM), pp. 903–906.
ICSEICSE-v2-2015-McCarthyRS #comprehension #consistency #named
Bixie: Finding and Understanding Inconsistent Code (TM, PR, MS), pp. 645–648.
ICSEICSE-v2-2015-NguyenKN #embedded #ide #named #php #web
Varis: IDE Support for Embedded Client Code in PHP Web Applications (HVN, CK, TNN), pp. 693–696.
ICSEICSE-v2-2015-Palomba #analysis #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-Roos #code completion #performance #precise #statistics
Fast and Precise Statistical Code Completion (PR), pp. 757–759.
ICSEICSE-v2-2015-SanchezW #source code #stack overflow
Source Code Curation on StackOverflow: The Vesperin System (HS, JW), pp. 661–664.
ICSEICSE-v2-2015-Sant #assessment
Code Repurposing as an Assessment Tool (JS), pp. 295–298.
ICSEICSE-v2-2015-Szabo #comprehension #maintenance
Novice Code Understanding Strategies during a Software Maintenance Assignment (CS), pp. 276–284.
SACSAC-2015-DAvanzoFGS #estimation #functional #metric #mobile
COSMIC functional measurement of mobile applications and code size estimation (LD, FF, CG, PS), pp. 1631–1636.
SACSAC-2015-DieumegardGKTT #compilation #contract
Compilation of synchronous observers as code contracts (AD, PLG, TK, AT, XT), pp. 1933–1939.
SACSAC-2015-DymchenkoM #eclipse #problem #prolog
Declaratively solving tricky google code jam problems with prolog-based ECLiPSe CLP system (SD, MM), pp. 2122–2124.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-JeremicPM #array #performance #random
Improving random write performance in heterogeneous erasure-coded drive arrays by offloading code block requests (NJ, HP, GM), pp. 2007–2014.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #analysis #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-PalviainenKKLMN #collaboration #design #developer #experience #framework
Design framework enhancing developer experience in collaborative coding environment (JP, TK, JK, JL, TM, AN), pp. 149–156.
SACSAC-2015-RodriguesAFSB #approach #ontology #simulation
An ontological approach for simulating legal action in the Brazilian penal code (CMdOR, RRdA, FLGdF, EPdS, PVdSB), pp. 376–381.
GPCEGPCE-2015-ByalikCT #automation #named #programming #synthesis
Native-2-native: automated cross-platform code synthesis from web-based programming resources (AB, SC, ET), pp. 99–108.
GPCEGPCE-2015-MakarovH #compilation #multi #named
CLOP: a multi-stage compiler to seamlessly embed heterogeneous code (DM, MH), pp. 109–112.
GPCEGPCE-2015-RingertRW #behaviour #code generation
Composing code generators for C&C ADLs with Application-specific behavior languages (JOR, BR, AW), pp. 113–116.
CASECASE-2015-GleesonBBCL #automation #code generation #optimisation
Optimizing robot trajectories for automatic robot code generation (DG, SB, RB, JSC, BL), pp. 495–500.
CASECASE-2015-RacchettiTF #automation #documentation #generative #lifecycle #usability
Generating automatically the documentation from PLC code by D4T3 to improve the usability and life cycle management of software in automation (LR, LT, CF), pp. 168–173.
CASECASE-2015-ZhuCS #energy #linear #process #recognition #using
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CCCC-2015-AllenSK #analysis #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CCCC-2015-BourkeCPPP #code generation #hybrid
A Synchronous-Based Code Generator for Explicit Hybrid Systems Languages (TB, JLC, BP, CP, MP), pp. 69–88.
CCCC-2015-NgCY #code generation #protocol
Protocols by Default — Safe MPI Code Generation Based on Session Types (NN, JGdFC, NY), pp. 212–232.
CGOCGO-2015-HasabnisQS #architecture #code generation #correctness #specification
Checking correctness of code generator architecture specifications (NH, RQ, RS), pp. 167–178.
CGOCGO-2015-HawkinsDBZ #optimisation
Optimizing binary translation of dynamically generated code (BH, BD, DB, QZ), pp. 68–78.
DATEDATE-2015-DamschenRVP
Transparent offloading of computational hotspots from binary code to Xeon Phi (MD, HR, GV, CP), pp. 1078–1083.
DATEDATE-2015-DinizSDBH #architecture #hardware #performance #standard #video
A deblocking filter hardware architecture for the high efficiency video coding standard (CMD, MS, FVD, SB, JH), pp. 1509–1514.
DATEDATE-2015-FuWH #code generation
Improving SIMD code generation in QEMU (SYF, JJW, WCH), pp. 1233–1236.
DATEDATE-2015-KainthKNVT #obfuscation
Hardware-assisted code obfuscation for FPGA soft microprocessors (MK, LK, CN, SGV, RT), pp. 127–132.
DATEDATE-2015-ZhongLLZLZS #mobile #named
nCode: limiting harmful writes to emerging mobile NVRAM through code swapping (KZ, DL, LL, XZ, WL, QZ, EHMS), pp. 1305–1310.
HPCAHPCA-2015-KimSE #flexibility #memory management #reliability
Bamboo ECC: Strong, safe, and flexible codes for reliable computer memory (JK, MS, ME), pp. 101–112.
PDPPDP-2015-EvrardL #automation #code generation #concurrent #distributed #formal method #modelling #process
Automatic Distributed Code Generation from Formal Models of Asynchronous Concurrent Processes (HE, FL), pp. 459–466.
PPoPPPPoPP-2015-RavishankarDEPRRS #code generation #distributed #memory management
Distributed memory code generation for mixed Irregular/Regular computations (MR, RD, VE, LNP, JR, AR, PS), pp. 65–75.
SOSPSOSP-2015-CurtsingerB #named #profiling
Coz: finding code that counts with causal profiling (CC, EDB), pp. 184–197.
STOCSTOC-2015-AbbeSW #fault #random
Reed-Muller Codes for Random Erasures and Errors (EA, AS, AW), pp. 297–306.
STOCSTOC-2015-BaconFHS #quantum
Sparse Quantum Codes from Quantum Circuits (DB, STF, AWH, JS), pp. 327–334.
STOCSTOC-2015-BhowmickL
The List Decoding Radius of Reed-Muller Codes over Small Fields (AB, SL), pp. 277–285.
TACASTACAS-2015-DjoudiB #analysis #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
ICSTICST-2015-MondalHD #multi #test coverage #testing
Exploring Test Suite Diversification and Code Coverage in Multi-Objective Test Case Selection (DM, HH, SD), pp. 1–10.
ICSTICST-2015-Oriol #embedded #legacy #re-engineering #testing
Testing Legacy Embedded Code: Landing on a Software Engineering Desert Island (MO), pp. 1–2.
ICSTICST-2015-PankumhangR #test coverage
Iterative Instrumentation for Code Coverage in Time-Sensitive Systems (TP, MR), pp. 1–10.
ISSTAISSTA-2015-GongPSS #javascript #named
DLint: dynamically checking bad coding practices in JavaScript (LG, MP, MS, KS), pp. 94–105.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
ECSAECSA-2014-CavalcanteOB #architecture #code generation #implementation
Architecture-Based Code Generation: From π-ADL Architecture Descriptions to Implementations in the Go Language (EC, FO, TVB), pp. 130–145.
DocEngDocEng-2014-UlichneyGS
Circular coding with interleaving phase (RU, MG, SJS), pp. 21–24.
SIGMODSIGMOD-2014-TranNST #approach #clustering #named
JECB: a join-extension, code-based approach to OLTP data partitioning (KQT, JFN, BS, DT), pp. 39–50.
VLDBVLDB-2014-NagelBV #code generation #performance #query
Code Generation for Efficient Query Processing in Managed Runtimes (FN, GMB, SDV), pp. 1095–1106.
ITiCSEITiCSE-2014-HakulinenM #assessment #automation #programming
QR code programming tasks with automated assessment (LH, LM), pp. 177–182.
ITiCSEITiCSE-2014-LakanenIL #comprehension #difference #student
Understanding differences among coding club students (AJL, VI, VL), pp. 159–164.
ITiCSEITiCSE-2014-SimonCSCJ #student
Student perceptions of the acceptability of various code-writing practices (S, BC, JS, AC, CJ), pp. 105–110.
ITiCSEITiCSE-2014-StrieweG14a #runtime #using
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WhalleyK
A qualitative think-aloud study of novice programmers’ code writing strategies (JLW, NK), pp. 279–284.
SIGITESIGITE-2014-VihavainenLI #analysis #source code
Analysis of source code snapshot granularity levels (AV, ML, PI), pp. 21–26.
SANERCSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial #risk management
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, , EW, JW, AH, JH), pp. 154–163.
SANERCSMR-WCRE-2014-DamevskiSP #case study #code search
A case study of paired interleaving for evaluating code search techniques (KD, DCS, LLP), pp. 54–63.
SANERCSMR-WCRE-2014-DingZT #branch #detection
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
SANERCSMR-WCRE-2014-EspinhaZG #api #developer #web
Web API growing pains: Stories from client developers and their code (TE, AZ, HGG), pp. 84–93.
SANERCSMR-WCRE-2014-GoeminneDM #co-evolution #data-driven
Co-evolving code-related and database-related changes in a data-intensive software system (MG, AD, TM), pp. 353–357.
SANERCSMR-WCRE-2014-HillRFM #case study #code search #query #refinement #user study
NL-based query refinement and contextualized code search results: A user study (EH, MRV, JAF, GM), pp. 34–43.
SANERCSMR-WCRE-2014-OliveiraVL #metric #source code
Extracting relative thresholds for source code metrics (PO, MTV, FPL), pp. 254–263.
SANERCSMR-WCRE-2014-OsmanLN #debugging #mining
Mining frequent bug-fix code changes (HO, ML, ON), pp. 343–347.
SANERCSMR-WCRE-2014-QuanteTS #c #case study #towards
Towards recovering and exploiting domain knowledge from C code: A case study on automotive software (JQ, MT, JS), pp. 383–386.
ICPCICPC-2014-BinkleyHLO #analysis #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICPCICPC-2014-GhafariGMT #mining #recommendation #testing
Mining unit tests for code recommendation (MG, CG, AM, GT), pp. 142–145.
ICPCICPC-2014-GuptaSVU #assessment #industrial #named #quality #scalability
SCQAM: a scalable structured code quality assessment method for industrial software (SG, HKS, RDV, UU), pp. 244–252.
ICPCICPC-2014-HossenKP #maintenance #source code
Amalgamating source code authors, maintainers, and change proneness to triage change requests (KH, HHK, DP), pp. 130–141.
ICPCICPC-2014-JbaraF #comprehension #on the
On the effect of code regularity on comprehension (AJ, DGF), pp. 189–200.
ICPCICPC-2014-JbaraF14a #comprehension #named #visual notation
JCSD: visual support for understanding code control structure (AJ, DGF), pp. 300–303.
ICPCICPC-2014-KulkarniM #framework #obfuscation #using
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-McBurneyLMW #source code #summary #topic
Improving topic model source code summarization (PWM, CL, CM, TW), pp. 291–294.
ICPCICPC-2014-McBurneyM #automation #documentation #generative #source code #summary
Automatic documentation generation via source code summarization of method context (PWM, CM), pp. 279–290.
ICPCICPC-2014-PanichellaCPO #empirical #evolution #how
How the evolution of emerging collaborations relates to code changes: an empirical study (SP, GC, MDP, RO), pp. 177–188.
ICPCICPC-2014-VassalloPPC #developer #mining #named #source code
CODES: mining source code descriptions from developers discussions (CV, SP, MDP, GC), pp. 106–109.
ICPCICPC-2014-ZapalowskiNN #architecture #source code
Revealing the relationship between architectural elements and source code characteristics (VZ, IN, DJN), pp. 14–25.
ICSMEICSME-2014-AsaduzzamanRSH #code completion #named #performance
CSCC: Simple, Efficient, Context Sensitive Code Completion (MA, CKR, KAS, DH), pp. 71–80.
ICSMEICSME-2014-AsaduzzamanRSH14a #api #code completion #usability
Context-Sensitive Code Completion Tool for Better API Usability (MA, CKR, KAS, DH), pp. 621–624.
ICSMEICSME-2014-ChaparroBMP #metric #on the #quality #refactoring
On the Impact of Refactoring Operations on Code Quality Metrics (OC, GB, AM, MDP), pp. 456–460.
ICSMEICSME-2014-EddyK #code search #query #source code #using
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-Ghafari #testing
Extracting Code Examples from Unit Test Cases (MG), p. 667.
ICSMEICSME-2014-GuanaGS #named #towards
ChainTracker: Towards a Comprehensive Tool for Building Code-Generation Environments (VG, KG, ES), pp. 613–616.
ICSMEICSME-2014-HabringerMP #case study #experience #legacy #reverse engineering #sql
Reverse Engineering PL/SQL Legacy Code: An Experience Report (MH, MM, JP), pp. 553–556.
ICSMEICSME-2014-HallKWM #automation #source code #tool support
Establishing the Source Code Disruption Caused by Automated Remodularisation Tools (MH, MAK, NW, PM), pp. 466–470.
ICSMEICSME-2014-LinsbauerAGLPLE #variability
Recovering Feature-to-Code Mappings in Mixed-Variability Software Systems (LL, FA, PG, DL, HP, RELH, AE), pp. 426–430.
ICSMEICSME-2014-LinXPL0ZD #maintenance #named
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance (YL, ZX, XP, YL, JS, WZ, JSD), pp. 341–350.
ICSMEICSME-2014-MondalRS #analysis #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #analysis #clustering #overview
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-OliveiraLVS #metric #named #source code
RTTool: A Tool for Extracting Relative Thresholds for Source Code Metrics (PO, FPL, MTV, AS), pp. 629–632.
ICSMEICSME-2014-PalombaBPOL #case study #developer #smell
Do They Really Smell Bad? A Study on Developers’ Perception of Bad Code Smells (FP, GB, MDP, RO, ADL), pp. 101–110.
ICSMEICSME-2014-PanichellaBPCA #developer #how
How Developers’ Collaborations Identified from Different Sources Tell Us about Code Changes (SP, GB, MDP, GC, GA), pp. 251–260.
ICSMEICSME-2014-Reiss #code search #testing #towards #using
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-SahinTMPC #energy #how #obfuscation #question
How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
ICSMEICSME-2014-SvajlenkoIKRM #benchmark #big data #metric #towards
Towards a Big Data Curated Benchmark of Inter-project Code Clones (JS, JFI, IK, CKR, MMM), pp. 476–480.
ICSMEICSME-2014-ThongtanunamYYKCFI #code review #dataset #named #overview #visualisation
ReDA: A Web-Based Visualization Tool for Analyzing Modern Code Review Dataset (PT, XY, NY, RGK, AECC, KF, HI), pp. 605–608.
ICSMEICSME-2014-VasilescuSWSB #empirical #git #integration
Continuous Integration in a Social-Coding World: Empirical Evidence from GitHub (BV, SvS, JW, AS, MvdB), pp. 401–405.
ICSMEICSME-2014-ZhuZXJL0 #api #mining
Mining API Usage Examples from Test Code (ZZ, YZ, BX, YJ, ZL, LZ), pp. 301–310.
MSRMSR-2014-BellerBZJ #code review #open source #problem #question
Modern code reviews in open-source projects: which problems do they fix? (MB, AB, AZ, EJ), pp. 202–211.
MSRMSR-2014-GuoLM #exclamation #question
Oops! where did that code snippet come from? (LG, JLL, GM), pp. 52–61.
MSRMSR-2014-KevicF #source code #taxonomy
A dictionary to translate change tasks to source code (KK, TF), pp. 320–323.
MSRMSR-2014-KrutzL #clone detection
A code clone oracle (DEK, WL), pp. 388–391.
MSRMSR-2014-LemosPZL #automation #code search #interface #query
Thesaurus-based automatic query expansion for interface-driven code search (OALL, ACdP, FCZ, CVL), pp. 212–221.
MSRMSR-2014-McIntoshKAH #case study #code review #overview #quality
The impact of code review coverage and code review participation on software quality: a case study of the qt, VTK, and ITK projects (SM, YK, BA, AEH), pp. 192–201.
MSRMSR-2014-SteidlHJ #analysis #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
MSRMSR-2014-VasquezHBP #android #library #obfuscation #reuse
Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
MSRMSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code
Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-Cortes-CoyVAP #automation #commit #generative #on the #source code #summary
On Automatically Generating Commit Messages via Summarization of Source Code Changes (LFCC, MLV, JA, DP), pp. 275–284.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring #using
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-MarsavinaRZ #co-evolution #fine-grained
Studying Fine-Grained Co-evolution Patterns of Production and Test Code (CM, DR, AZ), pp. 195–204.
SCAMSCAM-2014-RahmanR #empirical
A Change-Type Based Empirical Study on the Stability of Cloned Code (MSR, CKR), pp. 31–40.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation #using
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
SCAMSCAM-2014-SajnaniSL #case study #comparative #debugging #java
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code (HS, VS, CVL), pp. 21–30.
SCAMSCAM-2014-SzokeANFG #quality #question #refactoring
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? (GS, GA, CN, RF, TG), pp. 95–104.
SCAMSCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
DLTDLT-J-2013-AnselmoGM14 #2d #decidability
Prefix Picture codes: a Decidable class of Two-Dimensional codes (MA, DG, MM), pp. 1017–1032.
LATALATA-2014-AnselmoGM #finite
Picture Codes with Finite Deciphering Delay (MA, DG, MM), pp. 88–100.
IFMIFM-2014-FurstHBDSM #code generation
Code Generation for Event-B (AF, TSH, DAB, KD, NS, KM), pp. 323–338.
SEFMSEFM-2014-Leroy #code generation #proving #tool support #verification
Formal Proofs of Code Generation and Verification Tools (XL), pp. 1–4.
HaskellHaskell-2014-Chakravarty
Foreign inline code: systems demonstration (MMTC), pp. 119–120.
LISPILC-2014-Nunes-Harwitt14a #approach #code generation #evaluation #semantics
Eager Evaluation Isn’t Eager Enough A Transformation Based Approach to Semantics-Directed Code Generation (ANH), p. 79.
CHICHI-2014-DunwellFPHALS #approach #game studies #learning #safety
A game-based learning approach to road safety: the code of everand (ID, SdF, PP, MH, SA, PL, CDS), pp. 3389–3398.
CHICHI-2014-HenleyF #editing #navigation #performance #towards
The patchworks code editor: toward faster navigation with less code arranging and fewer navigation mistakes (AZH, SDF), pp. 2511–2520.
CHICHI-2014-LieberBM #concept #programming #visualisation
Addressing misconceptions about code with always-on programming visualizations (TL, JRB, RCM), pp. 2481–2490.
CHICHI-2014-SwiftSMG
Coding livecoding (BS, AS, MAM, HJG), pp. 1021–1024.
CSCWCSCW-2014-MatthiesenBP #development #how #quote
“Figure out how to code with the hands of others”: recognizing cultural blind spots in global software development (SM, PB, LMP), pp. 1107–1119.
HCIDUXU-TMT-2014-ZellerGD #design
basil.js — Bridging Mouse and Code Based Design Strategies (LZ, BG, TD), pp. 686–696.
HCIHCI-AIMT-2014-KashimaMY #programming
Proposal of a Method to Measure Difficulty Level of Programming Code with Eye-Tracking (TK, SM, SY), pp. 264–272.
HCIHIMI-AS-2014-AraiKTKA #comprehension #development #learning #source code
Development of a Learning Support System for Source Code Reading Comprehension (TA, HK, TT, YK, TA), pp. 12–19.
HCIHIMI-DE-2014-WinterhollerBCM #adaptation
Information Coding by Means of Adaptive Controlling Torques (JW, JB, KC, TM), pp. 271–280.
VISSOFTVISSOFT-2014-HomerN
Combining Tiled and Textual Views of Code (MH, JN), pp. 1–10.
VISSOFTVISSOFT-2014-TartariTHKRFMBLB #visualisation
Mr. Clean: A Tool for Tracking and Comparing the Lineage of Scientific Visualization Code (GT, LT, EH, KK, IAR, BF, NM, JMB, EL, LAB), pp. 75–78.
CAiSECAiSE-2014-PadilhaPFAGS #detection #effectiveness #empirical #metric #on the #smell
On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
ICEISICEIS-v2-2014-BelgamoHZRF #abstraction #case study #visualisation
Code Inspection Supported by Stepwise Abstraction and Visualization — An Experimental Study (AB, EMH, AZ, RSR, SF), pp. 39–48.
ICMLICML-c2-2014-0001MS #random
Coding for Random Projections (PL, MM, AS), pp. 676–684.
ICMLICML-c2-2014-Cherian #nearest neighbour #using
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-MaddisonT #generative #modelling #source code
Structured Generative Models of Natural Source Code (CJM, DT), pp. 649–657.
ICPRICPR-2014-ChoiCKD #distance #towards
Toward Sparse Coding on Cosine Distance (JC, HC, JK, LSD), pp. 4423–4428.
ICPRICPR-2014-DuZCW #flexibility #learning #linear #random
Learning Flexible Binary Code for Linear Projection Based Hashing with Random Forest (SD, WZ, SC, YW), pp. 2685–2690.
ICPRICPR-2014-FuKGYZ #ranking
Binary Code Reranking Method Based on Bit Importance (HF, XK, YG, XY, LZ), pp. 2679–2684.
ICPRICPR-2014-HouHW #modelling #synthesis #video
Cloud Model-Based Dynamic Texture Synthesis for Video Coding (ZH, RH, ZW), pp. 838–842.
ICPRICPR-2014-KhanWBF #recognition
Scale Coding Bag-of-Words for Action Recognition (FSK, JvdW, ADB, MF), pp. 1514–1519.
ICPRICPR-2014-KimP #recognition
Ancient Coin Recognition Based on Spatial Coding (JK, VP), pp. 321–326.
ICPRICPR-2014-KusumotoHC #hybrid #recognition
Hybrid Aggregation of Sparse Coded Descriptors for Food Recognition (RK, XHH, YWC), pp. 1490–1495.
ICPRICPR-2014-LiWQ #visual notation
Visual Tracking via Saliency Weighted Sparse Coding Appearance Model (WL, PW, HQ), pp. 4092–4097.
ICPRICPR-2014-LuoJ #encoding #image #learning #retrieval #semantics
Learning Semantic Binary Codes by Encoding Attributes for Image Retrieval (JL, ZJ), pp. 279–284.
ICPRICPR-2014-LuoYQY
Nuclear Norm Regularized Sparse Coding (LL, JY, JQ, JY), pp. 1834–1839.
ICPRICPR-2014-MarroccoT #fault
Bit Error Recovery in ECOC Systems through LDPC Codes (CM, FT), pp. 1454–1459.
ICPRICPR-2014-RahmaniMHM #classification #linear
Action Classification with Locality-Constrained Linear Coding (HR, AM, DQH, ASM), pp. 3511–3516.
ICPRICPR-2014-Shirakawa #multi #performance #similarity #using
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-WalhaDLGA #approach #image #learning #taxonomy
Sparse Coding with a Coupled Dictionary Learning Approach for Textual Image Super-resolution (RW, FD, FL, CG, AMA), pp. 4459–4464.
ICPRICPR-2014-WangJ
Attribute Augmentation with Sparse Coding (XW, QJ), pp. 4352–4357.
ICPRICPR-2014-WangWCY #geometry
Fingerprint Geometric Hashing Based on Binary Minutiae Cylinder Codes (YW, LW, YmC, PCY), pp. 690–695.
ICPRICPR-2014-Xiang0L #classification #hybrid #image
Local Hybrid Coding for Image Classification (WX, JW, ML), pp. 3744–3749.
KEODKEOD-2014-TakahashiTTL #automation #industrial #standard #web
An Automatic Coding System with a Three-Grade Confidence Level Corresponding to the National/International Occupation and Industry Standard — Open to the Public on the Web (KT, HT, ST, WL), pp. 369–375.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
SEKESEKE-2014-Al-MsiedeenSHUV #implementation #object-oriented #source code
Documenting the Mined Feature Implementations from the Object-oriented Source Code of a Collection of Software Product Variants (RAM, AS, MH, CU, SV), pp. 138–143.
SEKESEKE-2014-ParkHL #power management #refactoring
Investigation for Software Power Consumption of Code Refactoring Techniques (JJP, JEH, SHL), pp. 717–722.
SEKESEKE-2014-SantosBSC #game studies #learning #programming #semantics #source code
A Semantic Analyzer for Simple Games Source Codes to Programming Learning (ECOdS, GBB, VHVdS, EC), pp. 522–527.
SEKESEKE-2014-ZhuangZL #fine-grained #framework #layout #reuse #runtime
Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization (YZ, TZ, ZL), pp. 609–614.
SIGIRSIGIR-2014-LengCL #image #learning #random #retrieval #scalability
Random subspace for binary codes learning in large scale image retrieval (CL, JC, HL), pp. 1031–1034.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy #using
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-ZhangBBEHKW #code generation #concurrent #java #state machine #towards
Towards Verified Java Code Generation from Concurrent State Machines (DZ, DB, MvdB, LE, CH, RK, AW), pp. 64–69.
ICMTICMT-2014-GuanaS #analysis
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
SPLCSPLC-2014-AngererPLGG #dependence #graph #identification #product line
Identifying inactive code in product lines with configuration-aware system dependence graphs (FA, HP, DL, AG, PG), pp. 52–61.
SPLCSPLC-2014-HellebrandS0ZSS #case study #industrial #modelling #variability
Coevolution of variability models and code: an industrial case study (RH, AS, MB, BZ, KS, JS), pp. 274–283.
ECOOPECOOP-2014-NittaKT #framework #identification
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
ECOOPECOOP-2014-OkurED #abstraction #low level #parallel
Converting Parallel Code from Low-Level Abstractions to Higher-Level Abstractions (SO, CE, DD), pp. 515–540.
OOPSLAOOPSLA-2014-RadoiFRS #imperative #pipes and filters
Translating imperative code to MapReduce (CR, SJF, RMR, MS), pp. 909–927.
PLATEAUPLATEAU-2014-DornerFM #named
EUKLAS: Supporting Copy-and-Paste Strategies for Integrating Example Code (CD, AF, BAM), pp. 13–20.
PPDPPPDP-J-2012-Emden14 #matrix
Matrix Code (MHvE), pp. 3–21.
HILTHILT-2014-HuguesG #ada #modelling
Leveraging Ada 2012 and SPARK 2014 for assessing generated code from AADL models (JH, CG), pp. 39–46.
PADLPADL-2014-Clifton-EverestMCK
Embedding Foreign Code (RCE, TLM, MMTC, GK), pp. 136–151.
PEPMPEPM-2014-KameyamaKS #code generation #combinator
Combinators for impure yet hygienic code generation (YK, OK, CcS), pp. 3–14.
PLDIPLDI-2014-DavidY #bytecode #code search
Tracelet-based code search in executables (YD, EY), p. 37.
PLDIPLDI-2014-GreenawayLAK #c #verification
Don’t sweat the small stuff: formal verification of C code without the pain (DG, JL, JA, GK), p. 45.
PLDIPLDI-2014-RaychevVY #code completion #modelling #statistics
Code completion with statistical language models (VR, MTV, EY), p. 44.
ASEASE-2014-BajajPM #code completion #javascript #named
Dompletion: DOM-aware JavaScript code completion (KB, KP, AM), pp. 43–54.
ASEASE-2014-FalleriMBMM #difference #fine-grained #source code
Fine-grained and accurate source code differencing (JRF, FM, XB, MM, MM), pp. 313–324.
ASEASE-2014-HigoK #consistency #named #nondeterminism #source code
MPAnalyzer: a tool for finding unintended inconsistencies in program source code (YH, SK), pp. 843–846.
ASEASE-2014-NguyenNNN #api #approach #learning #migration #mining #statistics
Statistical learning approach for mining API usage mappings for code migration (ATN, HAN, TTN, TNN), pp. 457–468.
ASEASE-2014-PadhyeMS #modelling #named
NeedFeed: taming change notifications by modeling code relevance (RP, SM, VSS), pp. 665–676.
ASEASE-2014-RamaK #dynamic analysis #refactoring
A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
ASEASE-2014-TillmannHX #automation #generative #testing
Transferring an automated test generation tool to practice: from pex to fakes and code digger (NT, JdH, TX), pp. 385–396.
ASEASE-2014-WangLJ #code search #feedback
Active code search: incorporating user feedback to improve code search relevance (SW, DL, LJ), pp. 677–682.
FSEFSE-2014-AllamanisBBS #learning
Learning natural coding conventions (MA, ETB, CB, CAS), pp. 281–293.
FSEFSE-2014-AllamanisS #mining #source code
Mining idioms from source code (MA, CAS), pp. 472–483.
FSEFSE-2014-AlvesSK #code review #named #overview #refactoring
RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits (ELGA, MS, MK), pp. 751–754.
FSEFSE-2014-BaltesSD #diagrams #sketching #source code
Linking sketches and diagrams to source code artifacts (SB, PS, SD), pp. 743–746.
FSEFSE-2014-BosuCHHJ #empirical #identification
Identifying the characteristics of vulnerable code changes: an empirical study (AB, JCC, MH, PH, DJ), pp. 257–268.
FSEFSE-2014-FritzSKSB #developer #modelling
Developers’ code context models for change tasks (TF, DCS, KK, WS, CB), pp. 7–18.
FSEFSE-2014-HigoK #case study #functional #how #java #source code
How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
FSEFSE-2014-LuoMW0Z #comparison #detection #obfuscation #semantics #similarity
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
FSEFSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
FSEFSE-2014-Nguyen0NR #api #corpus #mining #scalability
Mining preconditions of APIs in large-scale code corpus (HAN, RD, TNN, HR), pp. 166–177.
FSEFSE-2014-NguyenKN #embedded #graph #web
Building call graphs for embedded client-side code in dynamic web applications (HVN, CK, TNN), pp. 518–529.
FSEFSE-2014-RayPFD #case study #git #programming language #quality #scalability
A large scale study of programming languages and code quality in github (BR, DP, VF, PTD), pp. 155–165.
FSEFSE-2014-YingR #summary
Selection and presentation practices for code example summarization (ATTY, MPR), pp. 460–471.
FSEFSE-2014-ZhangSK #code review #interactive #named #overview
Critics: an interactive code review tool for searching and inspecting systematic changes (TZ, MS, MK), pp. 755–758.
ICSEICSE-2014-GalensonRBHS #interactive #named #synthesis
CodeHint: dynamic and interactive synthesis of code snippets (JG, PR, RB, BH, KS), pp. 653–663.
ICSEICSE-2014-GopinathJG #developer #evaluation #test coverage
Code coverage for suite evaluation by developers (RG, CJ, AG), pp. 72–82.
ICSEICSE-2014-KeivanlooRZ
Spotting working code examples (IK, JR, YZ), pp. 664–675.
ICSEICSE-2014-LinXXLPSZ #detection #difference #multi
Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
ICSEICSE-2014-NegaraCDJ #detection #fine-grained #mining
Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
ICSEICSE-2014-RodegheroMMBD #automation #source code #summary
Improving automated source code summarization via an eye-tracking study of programmers (PR, CM, PWM, NB, SKD), pp. 390–401.
ICSEICSE-2014-SiegmundKAPBLSB #comprehension #functional #source code
Understanding understanding source code with functional magnetic resonance imaging (JS, CK, SA, CP, AB, TL, GS, AB), pp. 378–389.
SACSAC-2014-Al-RefaiCF #modelling #runtime #using
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-CaniGSST #automation #code generation #integration #towards
Towards automated malware creation: code generation and code integration (AC, MG, ES, GS, APT), pp. 157–160.
SACSAC-2014-CostaKAC #case study #commit #developer
Unveiling developers contributions behind code commits: an exploratory study (DAdC, UK, EA, RC), pp. 1152–1157.
SACSAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SACSAC-2014-HusemannR #multi #predict #scalability #video
Introduction of a multi-layer predictive search strategy for scalable video coding (RH, VR), pp. 985–986.
SACSAC-2014-KangI #dynamic analysis
Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SACSAC-2014-ParkPJ #artificial reality #education #online
QR-code based online robot augmented reality system for education (JPP, MWP, SKJ), pp. 180–185.
SACSAC-2014-PotocnikCS #debugging #named #problem #scala
Linter: a tool for finding bugs and potential problems in scala code (MP, UC, BS), pp. 1615–1616.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-WijenayakeP #estimation #using #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
GPCEGPCE-2014-SteindorferV #memory management #performance
Code specialization for memory efficient hash tries (MJS, JJV), pp. 11–14.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction #using
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
CCCC-2014-CharlesCLEG #code generation
deGoal a Tool to Embed Dynamic Code Generators into Applications (HPC, DC, VL, FAE, RG), pp. 107–112.
CCCC-2014-Dinechin #code generation #using
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SrinivasanR #composition
Recovery of Class Hierarchies and Composition Relationships from Machine Code (VS, TWR), pp. 61–84.
CCCC-2014-WangPFO #legacy #parallel
Exploitation of GPUs for the Parallelisation of Probably Parallel Legacy Code (ZW, DCP, BF, MFPO), pp. 154–173.
CGOCGO-2014-JimboreanKSBK #approach #compilation #hardware #scalability
Fix the code. Don’t tweak the hardware: A new compiler approach to Voltage-Frequency scaling (AJ, KK, VS, DBS, SK), p. 262.
CGOCGO-2014-JuegaGTC #adaptation #automation #code generation #parametricity
Adaptive Mapping and Parameter Selection Scheme to Improve Automatic Code Generation for GPUs (JCJ, JIG, CT, FC), p. 251.
CGOCGO-2014-VenkatSHS #code generation
Non-affine Extensions to Polyhedral Code Generation (AV, MS, MWH, MMS), p. 185.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-EldibWTS #named #source code
QMS: Evaluating the Side-Channel Resistance of Masked Software from Source Code (HE, CW, MMIT, PS), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RehmanKSSH #adaptation #code generation #dependence #named #process #reliability
dTune: Leveraging Reliable Code Generation for Adaptive Dependability Tuning under Process Variation and Aging-Induced Effects (SR, FK, DS, MS, JH), p. 6.
DATEDATE-2014-BraojosDBAA #approach #hardware #manycore #power management
Hardware/software approach for code synchronization in low-power multi-core sensor nodes (RB, AYD, IB, GA, DA), pp. 1–6.
DATEDATE-2014-GuoWWH #automation #effectiveness #named #test coverage
EATBit: Effective automated test for binary translation with high code coverage (HG, ZW, CW, RH), pp. 1–6.
DATEDATE-2014-HillerS #performance
Increasing the efficiency of syndrome coding for PUFs with helper data compression (MH, GS), pp. 1–6.
DATEDATE-2014-KhanSH #architecture #manycore #performance #power management #video
Software architecture of High Efficiency Video Coding for many-core systems with power-efficient workload balancing (MUKK, MS, JH), pp. 1–6.
DATEDATE-2014-LiM #memory management
Write-once-memory-code phase change memory (JL, KM), pp. 1–6.
DATEDATE-2014-LiuSXL #injection #programmable #thread
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy (ZL, WS, SX, ZL), pp. 1–6.
DATEDATE-2014-MaurichG #configuration management #encryption #lightweight
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices (IvM, TG), pp. 1–6.
DATEDATE-2014-MembarthRHT #android #architecture #code generation #embedded
Code generation for embedded heterogeneous architectures on android (RM, OR, FH, JT), pp. 1–6.
DATEDATE-2014-PalominoSASH #named #performance #video
hevcDTM: Application-driven Dynamic Thermal Management for High Efficiency Video Coding (DP, MS, HA, AAS, JH), pp. 1–4.
DATEDATE-2014-SampaioSZBH #architecture #distributed #energy #memory management #named #performance #video
dSVM: Energy-efficient distributed Scratchpad Video Memory Architecture for the next-generation High Efficiency Video Coding (FS, MS, BZ, SB, JH), pp. 1–6.
HPDCHPDC-2014-MuCWZ #network #replication #state machine
When paxos meets erasure code: reduce network and storage cost in state machine replication (SM, KC, YW, WZ), pp. 61–72.
LCTESLCTES-2014-KochFBD #reduction #similarity
Exploiting function similarity for code size reduction (TJKEvK, BF, PB, AD), pp. 85–94.
LCTESLCTES-2014-LozanoCBS #combinator #optimisation
Combinatorial spill code optimization and ultimate coalescing (RCL, MC, GHB, CS), pp. 23–32.
LCTESLCTES-2014-SpinkWFT #code generation #performance
Efficient code generation in a region-based dynamic binary translator (TS, HW, BF, NPT), pp. 3–12.
OSDIOSDI-2014-KuznetsovSPCSS
Code-Pointer Integrity (VK, LS, MP, GC, RS, DS), pp. 147–163.
PDPPDP-2014-DAmbrosioSPRFSIM #modelling #parallel
Lava Flow Modeling by the Sciara-Fv3 Parallel Numerical Code (DD, WS, RP, RR, GF, DS, GI, DM), pp. 330–338.
PDPPDP-2014-ShalabyRGFK #communication #network
Hierarchical Network Coding for Collective Communication on HPC Interconnects (AS, MESR, VG, IF, MK), pp. 98–102.
PPoPPPPoPP-2014-AgustonBH #parallel
Parallelization hints via code skeletonization (CA, YBA, GH), pp. 373–374.
STOCSTOC-2014-AggarwalDL #combinator
Non-malleable codes from additive combinatorics (DA, YD, SL), pp. 774–783.
STOCSTOC-2014-BravyiH
Homological product codes (SB, MBH), pp. 273–282.
STOCSTOC-2014-BunUV #approximate #difference #privacy
Fingerprinting codes and the price of approximate differential privacy (MB, JU, SPV), pp. 1–10.
STOCSTOC-2014-GhaffariHS #adaptation #fault #interactive
Optimal error rates for interactive coding I: adaptivity and other settings (MG, BH, MS), pp. 794–803.
STOCSTOC-2014-GuruswamiHHSV
Super-polylogarithmic hypergraph coloring hardness via low-degree long codes (VG, PH, JH, SS, GV), pp. 614–623.
STOCSTOC-2014-RudraW
Every list-decodable code for high noise has abundant near-optimal rate puncturings (AR, MW), pp. 764–773.
CAVCAV-2014-FilliatreGP
The Spirit of Ghost Code (JCF, LG, AP), pp. 1–16.
ICSTICST-2014-MiicBT #analysis #automation #multi #platform #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSSICTSS-2014-El-FakihSY #assessment #automaton #on the #test coverage #testing
On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment (KEF, TS, NY), pp. 198–204.
ISSTAISSTA-2014-BaudryAM #program transformation #source code
Tailored source code transformations to synthesize computationally diverse program variants (BB, SA, MM), pp. 149–159.
ISSTAISSTA-2014-MarinescuHC #analysis #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TillmannHXB
Constructing coding duels in Pex4Fun and code hunt (NT, JdH, TX, JB), pp. 445–448.
ISSTAISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
VMCAIVMCAI-2014-Romano #float #integer #testing
Practical Floating-Point Tests with Integer Code (AR), pp. 337–356.
CBSECBSE-2013-GortonLLED #case study #component #experience #platform #using
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
ICDARICDAR-2013-KumarBTMNJ #documentation #image
Sparse Document Image Coding for Restoration (VK, AB, GHT, AM, AMN, CVJ), pp. 713–717.
ICDARICDAR-2013-ShekharJ #documentation #retrieval #word
Document Specific Sparse Coding for Word Retrieval (RS, CVJ), pp. 643–647.
ICDARICDAR-2013-WalhaDLGA #clustering #image #multi
Multiple Learned Dictionaries Based Clustered Sparse Coding for the Super-Resolution of Single Text Image (RW, FD, FL, CG, AMA), pp. 484–488.
VLDBVLDB-2013-SathiamoorthyAPDVCB #big data #novel
XORing Elephants: Novel Erasure Codes for Big Data (MS, MA, DSP, AGD, RV, SC, DB), pp. 325–336.
CSEETCSEET-2013-FritzBD
Explorable Code Slides (MF, BB, SD), pp. 199–208.
ITiCSEITiCSE-2013-EsperFG #named #programming
CodeSpells: embodying the metaphor of wizardry for programming (SE, SRF, WGG), pp. 249–254.
ITiCSEITiCSE-2013-Kumar #case study #problem
A study of the influence of code-tracing problems on code-writing skills (ANK), pp. 183–188.
ITiCSEITiCSE-2013-Law #interactive #using
Interactive lectures using quick response codes (RL), p. 317.
ITiCSEITiCSE-2013-ScottG #learning #programming #question
Implicit theories of programming aptitude as a barrier to learning to code: are they distinct from intelligence? (MJS, GG), p. 347.
ITiCSEITiCSE-2013-VihavainenVLP #learning #student #using
Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
SIGITESIGITE-2013-HeinonenHLV #agile #learning #re-engineering #using
Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
CSMRCSMR-2013-AnicheOG #case study #industrial #open source #quality #testing #what
What Do the Asserts in a Unit Test Tell Us about Code Quality? A Study on Open Source and Industrial Projects (MFA, GAO, MAG), pp. 111–120.
CSMRCSMR-2013-AsgharMSS #metric #requirements #traceability #using
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMRCSMR-2013-BertranGCS #architecture #detection
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMRCSMR-2013-KazatoHKOOMHS #feature model #identification #incremental #source code
Incremental Feature Location and Identification in Source Code (HK, SH, TK, TO, SO, SM, TH, MS), pp. 371–374.
CSMRCSMR-2013-MazzeoTBS #source code
Linking E-Mails and Source Code with LASCO (LM, AT, RB, GS), pp. 421–424.
CSMRCSMR-2013-Molitorisz #process #refactoring #source code
Pattern-Based Refactoring Process of Sequential Source Code (KM), pp. 357–360.
CSMRCSMR-2013-OuniKS #refactoring #search-based #using
Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMRCSMR-2013-Pichler #documentation #experience #fortran #industrial #source code
Extraction of Documentation from Fortran 90 Source Code: An Industrial Experience (JP), pp. 399–402.
CSMRCSMR-2013-ScannielloGT #comprehension #diagrams #sequence chart #source code
An Early Investigation on the Contribution of Class and Sequence Diagrams in Source Code Comprehension (GS, CG, GT), pp. 367–370.
CSMRCSMR-2013-ThungBLJ #git #network #social
Network Structure of Social Coding in GitHub (FT, TFB, DL, LJ), pp. 323–326.
CSMRCSMR-2013-TothNFS #source code #using #version control
Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPCICPC-2013-BeckMDR #comprehension #performance #visual notation
In situ understanding of performance bottlenecks through visually augmented code (FB, OM, SD, GDR), pp. 63–72.
ICPCICPC-2013-BernhartG #code review #comprehension #on the #source code
On the understanding of programs with continuous code reviews (MB, TG), pp. 192–198.
ICPCICPC-2013-DiazBMOTL #traceability #using
Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICPCICPC-2013-EddyRKC #replication #source code #summary
Evaluating source code summarization techniques: Replication and expansion (BPE, JAR, NAK, JCC), pp. 13–22.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-SteidlHJ #analysis #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AlhindawiDCM #feature model #source code
Improving Feature Location by Enhancing Source Code with Stereotypes (NA, ND, MLC, JIM), pp. 300–309.
ICSMEICSM-2013-AsaduzzamanRSP #approach #hybrid #independence #named #source code
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines (MA, CKR, KAS, MDP), pp. 230–239.
ICSMEICSM-2013-AsaduzzamanRSP13a #maintenance #named #process #source code
LHDiff: Tracking Source Code Lines to Support Software Maintenance Activities (MA, CKR, KAS, MDP), pp. 484–487.
ICSMEICSM-2013-Beck #analysis #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-FontanaFMWM #empirical #quality #smell
Investigating the Impact of Code Smells on System’s Quality: An Empirical Study on Systems of Different Application Domains (FAF, VF, AM, BW, PM), pp. 260–269.
ICSMEICSM-2013-FontanaZMM #approach #detection #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-Harder #developer #evolution #how #multi
How Multiple Developers Affect the Evolution of Code Clones (JH), pp. 30–39.
ICSMEICSM-2013-Hegedus #maintenance
Revealing the Effect of Coding Practices on Software Maintainability (PH), pp. 578–581.
ICSMEICSM-2013-LiguCCY #identification #smell
Identification of Refused Bequest Code Smells (EL, AC, TC, NY), pp. 392–395.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #analysis #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-MorenoBHM #debugging #on the #source code
On the Relationship between the Vocabulary of Bug Reports and Source Code (LM, WB, SH, AM), pp. 452–455.
ICSMEICSM-2013-Roldan-VegaMHF #code search #named #query #refinement
CONQUER: A Tool for NL-Based Query Refinement and Contextualizing Code Search Results (MRV, GM, EH, JAF), pp. 512–515.
ICSMEICSM-2013-ScannielloR #fault #identifier #source code
Dealing with Faults in Source Code: Abbreviated vs. Full-Word Identifier Names (GS, MR), pp. 190–199.
ICSMEICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-Yamashita #case study #comparative #how #maintenance #smell
How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case Study (AY), pp. 566–571.
ICSMEICSM-2013-YukselS #analysis #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-AllamanisS #stack overflow #topic #what #why
Why, when, and what: analyzing stack overflow questions by topic, type, and code (MA, CAS), pp. 53–56.
MSRMSR-2013-AllamanisS13a #mining #modelling #repository #source code #using
Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSRMSR-2013-HamasakiKYCFI #code review #dataset #overview #repository #what
Who does what during a code review? datasets of OSS peer review repositories (KH, RGK, NY, AECC, KF, HI), pp. 49–52.
MSRMSR-2013-HerzigZ #co-evolution
The impact of tangled code changes (KH, AZ), pp. 121–130.
MSRMSR-2013-HowardGPV #automation #mining #semantics #word
Automatically mining software-based, semantically-similar words from comment-code mappings (MJH, SG, LLP, KVS), pp. 377–386.
MSRMSR-2013-JanjicHSA #dataset #research #reuse #source code
An unabridged source code dataset for research in software reuse (WJ, OH, MS, CA), pp. 339–342.
MSRMSR-2013-KhooMA #named
Rendezvous: a search engine for binary code (WMK, AM, RJA), pp. 329–338.
MSRMSR-2013-MukadamBR #android #code review #overview
Gerrit software code review data from Android (MM, CB, PCR), pp. 45–48.
MSRMSR-2013-SismanK #automation #code search #debugging #locality #query
Assisting code search with automatic query reformulation for bug localization (BS, ACK), pp. 309–318.
MSRMSR-2013-SubramanianH #online
Making sense of online code snippets (SS, RH), pp. 85–88.
MSRMSR-2013-WangDZCXZ #api #mining #source code
Mining succinct and high-coverage API usage patterns from source code (JW, YD, HZ, KC, TX, DZ), pp. 319–328.
PASTEPASTE-2013-YasugiMU #evaluation #performance
A proper performance evaluation system that summarizes code placement effects (MY, YM, TU), pp. 41–48.
SCAMSCAM-2013-AnnervazKMSTM #clustering
Code clustering workbench (KMA, VSK, JM, SS, GT, AM), pp. 31–36.
SCAMSCAM-2013-Balachandran #component #named #overview
Fix-it: An extensible code auto-fix component in Review Bot (VB), pp. 167–172.
SCAMSCAM-2013-BaloghB #named #visualisation
CodeMetropolis — code visualisation in MineCraft (GB, ÁB), pp. 136–141.
SCAMSCAM-2013-CeruloCPC #detection #markov
A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
SCAMSCAM-2013-FabryRJ #analysis #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-FardM #detection #javascript #named #smell
JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
WCREWCRE-2013-BandiWA #empirical
Empirical evidence of code decay: A systematic mapping study (AB, BJW, EBA), pp. 341–350.
WCREWCRE-2013-BaysalKHG #code review #overview #perspective
The influence of non-technical factors on code review (OB, OK, RH, MWG), pp. 122–131.
WCREWCRE-2013-ChatterjiCKH #case study #developer #maintenance
Effects of cloned code on software maintainability: A replicated developer study (DC, JCC, NAK, JH), pp. 112–121.
WCREWCRE-2013-IshiharaHHK #reuse
Reusing reused code (TI, KH, YH, SK), pp. 457–461.
WCREWCRE-2013-JiangZL #comprehension #social
Understanding project dissemination on a social coding site (JJ, LZ, LL), pp. 132–141.
WCREWCRE-2013-KomondoorBDK #domain model #modelling #using
Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCREWCRE-2013-KrutzS #clone detection #detection #named
CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
WCREWCRE-2013-YamashitaM #developer #overview #smell
Do developers care about code smells? An exploratory survey (AFY, LM), pp. 242–251.
DLTDLT-J-2012-GeffertP13
Unary Coded NP-Complete Languages in Aspace(log log n) (VG, DP), p. 1167–?.
CIAACIAA-2013-Jurgensen #automaton
Automata for Codes (HJ), pp. 2–15.
DLTDLT-2013-AnselmoGM #2d
Two Dimensional Prefix Codes of Pictures (MA, DG, MM), pp. 46–57.
ICALPICALP-v1-2013-HemenwayOW
Local Correctability of Expander Codes (BH, RO, MW), pp. 540–551.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis #using
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
IFLIFL-2013-GrelckW #adaptation #array #functional #generative #performance
Next Generation Asynchronous Adaptive Specialization for Data-Parallel Functional Array Processing in SAC: Accelerating the Availability of Specialized High Performance Code (CG, HW), p. 117.
CHICHI-2013-KatoSI #named #representation #source code
Picode: inline photos representing posture data in source code (JK, DS, TI), pp. 3097–3100.
CHICHI-2013-MeeseATBQMKPB #design #interactive
From codes to patterns: designing interactive decoration for tableware (RM, SA, ECT, SB, AQ, RM, BK, TPP, SB), pp. 931–940.
CSCWCSCW-2013-HillM #collaboration #community #cost analysis
The cost of collaboration for code and art: evidence from a remixing community (BMH, AMH), pp. 1035–1046.
HCIDUXU-PMT-2013-Flanagan #feedback #how #interface
Haptic Interface Aesthetics — “Feedback Loops, Live Coding and How to Harness the Potential of Embodied Estrangement in Artistic Practices and Aesthetic Theories within Interface Culture” (PJF), pp. 58–67.
HCIHCI-III-2013-BockLSWW #automation #classification
Audio-Based Pre-classification for Semi-automatic Facial Expression Coding (RB, KLE, IS, SW, AW), pp. 301–309.
HCIHIMI-D-2013-HiranoNN #development #evaluation #tool support
Evaluation of System Engineers’ Intellectual Productivity — Focusing on Coding Procedures in Application Development Tools (RH, YN, MN), pp. 305–315.
VISSOFTVISSOFT-2013-AbuthawabehBZD #matrix #multi #visualisation
Finding structures in multi-type code couplings with node-link and matrix visualizations (AA, FB, DZ, SD), pp. 1–10.
VISSOFTVISSOFT-2013-BaloghB #collaboration #developer #named
CodeMetrpolis — A minecraft based collaboration tool for developers (GB, ÁB), pp. 1–4.
VISSOFTVISSOFT-2013-BeckHDW #embedded #monitoring #source code #visual notation
Visual monitoring of numeric variables embedded in source code (FB, FH, SD, DW), pp. 1–4.
VISSOFTVISSOFT-2013-Hanjalic #evolution #named #visualisation
ClonEvol: Visualizing software evolution with code clones (AH), pp. 1–4.
VISSOFTVISSOFT-2013-ReissT13a #tool support #visualisation
Tool demonstration: The visualizations of code bubbles (SPR, AT), pp. 1–4.
VISSOFTVISSOFT-2013-ServantJ #named #slicing #source code #visualisation
Chronos: Visualizing slices of source-code history (FS, JAJ), pp. 1–4.
CAiSECAiSE-2013-PapottiPSCP #analysis #code generation #modelling
A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
ICEISICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICMLICML-c1-2013-MehtaG #bound #predict
Sparsity-Based Generalization Bounds for Predictive Sparse Coding (NAM, AGG), pp. 36–44.
ICMLICML-c2-2013-MaurerPR #learning #multi
Sparse coding for multitask and transfer learning (AM, MP, BRP), pp. 343–351.
ICMLICML-c3-2013-BalasubramanianYL #learning
Smooth Sparse Coding via Marginal Regression for Learning Sparse Representations (KB, KY, GL), pp. 289–297.
ICMLICML-c3-2013-HoXV #learning #on the #taxonomy
On A Nonlinear Generalization of Sparse Coding and Dictionary Learning (JH, YX, BCV), pp. 1480–1488.
ICMLICML-c3-2013-JiaVD #on the
On Compact Codes for Spatially Pooled Features (YJ, OV, TD), pp. 549–557.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-TerraBMVSCB #similarity #source code
Measuring the Structural Similarity between Source Code Entities (RT, JB, LFM, MTV, DS, DC, RdSB), pp. 753–758.
SEKESEKE-2013-YuanYL #debugging #fine-grained #predict #source code
Bug Prediction for Fine-Grained Source Code Changes (ZY, LY, CL), pp. 381–387.
SKYSKY-2013-YagelLE #generative #named
KoDEgen: A Knowledge Driven Engineering Code Generating Tool (RY, AL, IE), pp. 24–33.
MODELSMoDELS-2013-PiresPWD #behaviour #embedded #source code #verification
Behavioural Verification in Embedded Software, from Model to Source Code (AFP, TP, VW, SD), pp. 320–335.
SPLCSPLC-2013-KandaII #evolution #source code
Extraction of product evolution tree from source code of product variants (TK, TI, KI), pp. 141–150.
SPLCSPLC-2013-LinsbauerLE #traceability
Recovering traceability between features and code in product variants (LL, RELH, AE), pp. 131–140.
SPLCSPLC-2013-TsuchiyaKWKFY #requirements #source code #traceability
Recovering traceability links between requirements and source code in the same series of software products (RT, TK, HW, MK, YF, KY), pp. 121–130.
OOPSLAOOPSLA-2013-NollG #java #online #optimisation #parallel
Online feedback-directed optimizations for parallel Java code (AN, TRG), pp. 713–728.
OOPSLAOOPSLA-2013-ShiBH #optimisation #using
Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
OOPSLAOOPSLA-2013-UrecheTO #morphism #named #parametricity #polymorphism #trade-off
Miniboxing: improving the speed to code size tradeoff in parametric polymorphism translations (VU, CT, MO), pp. 73–92.
HILTHILT-2013-Logozzo #contract #specification #verification
Practical specification and verification with code contracts (FL), pp. 7–8.
HILTHILT-2013-Logozzo13a #contract
Technology for inferring contracts from code (FL), pp. 13–14.
PLDIPLDI-2013-KongVSFPS #code generation
When polyhedral transformations meet SIMD code generation (MK, RV, KS, FF, LNP, PS), pp. 127–138.
POPLPOPL-2013-JensenBK #logic #low level
High-level separation logic for low-level code (JBJ, NB, AK), pp. 301–314.
REFSQREFSQ-2013-DelaterP #development #perspective #requirements #research #source code
Analyzing the Tracing of Requirements and Source Code during Software Development — A Research Preview (AD, BP), pp. 308–314.
ASEASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
ASEASE-2013-NguyenNNNR #case study #evolution
A study of repetitiveness of code changes in software evolution (HAN, ATN, TTN, TNN, HR), pp. 180–190.
ASEASE-2013-PalombaBPOLP #detection #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-PilgrimUTS #approach #co-evolution
Model/code co-refactoring: An MDE approach (JvP, BU, AT, FS), pp. 682–687.
ASEASE-2013-RayKPR #consistency #detection #nondeterminism #semantics
Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
ASEASE-2013-ZhangPXJWZ #monitoring #on-demand #towards
Towards contextual and on-demand code clone management by continuous monitoring (GZ, XP, ZX, SJ, HW, WZ), pp. 497–507.
ESEC-FSEESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability
Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSEESEC-FSE-2013-NguyenNNN #semantics #source code #statistics
A statistical semantic language model for source code (TTN, ATN, HAN, TNN), pp. 532–542.
ESEC-FSEESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical
An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSEESEC-FSE-2013-SchafSW #consistency
Explaining inconsistent code (MS, DSN, TW), pp. 521–531.
ESEC-FSEESEC-FSE-2013-YingR #summary
Code fragment summarization (ATTY, MPR), pp. 655–658.
ICSEICSE-2013-BacchelliB #challenge #code review #overview #perspective
Expectations, outcomes, and challenges of modern code review (AB, CB), pp. 712–721.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-Ciccozzi #modelling #uml
From models to code and back: correct-by-construction code from UML and ALF (FC), pp. 1459–1461.
ICSEICSE-2013-Guana #code generation #maintenance
Supporting maintenance tasks on transformational code generation environments (VG), pp. 1369–1372.
ICSEICSE-2013-Guerrouj #comprehension #normalisation #quality #source code
Normalizing source code vocabulary to support program comprehension and software quality (LG), pp. 1385–1388.
ICSEICSE-2013-HaiducRBOLM #code search #predict #quality #query #source code
Query quality prediction and reformulation for source code search: the refoqus tool (SH, GDR, GB, RO, ADL, AM), pp. 1307–1310.
ICSEICSE-2013-LeeHKM #code completion #navigation
Temporal code completion and navigation (YYL, SH, SK, DM), pp. 1181–1184.
ICSEICSE-2013-LeeKS #named #recommendation #visual notation
NavClus: a graphical recommender for assisting code exploration (SL, SK, MS), pp. 1315–1318.
ICSEICSE-2013-PhamSLFS #comprehension #social #testing
Creating a shared understanding of testing culture on a social coding site (RP, LS, OL, FMFF, KS), pp. 112–121.
ICSEICSE-2013-PhamSS #commit #social #testing
Building test suites in social coding sites by leveraging drive-by commits (RP, LS, KS), pp. 1209–1212.
ICSEICSE-2013-RahmanARP #case study #on the
On the relationships between domain-based coupling and code clones: an exploratory study (MSR, AA, CKR, FP), pp. 1265–1268.
ICSEICSE-2013-RastkarM #question #why
Why did this code change? (SR, GCM), pp. 1193–1196.
ICSEICSE-2013-RigbyR #documentation
Discovering essential code elements in informal documentation (PCR, MPR), pp. 832–841.
ICSEICSE-2013-Sanchez04a #code search #named
SNIPR: complementing code search with code retargeting capabilities (HS), pp. 1423–1426.
ICSEICSE-2013-SawadskyMJ #named #recommendation #web
Reverb: recommending code-related web pages (NS, GCM, RJ), pp. 812–821.
ICSEICSE-2013-StaplesKKLAMJB #specification
Formal specifications better than function points for code sizing (MS, RK, GK, CL, JA, TCM, DRJ, LB), pp. 1257–1260.
ICSEICSE-2013-SukkerdBWZB #comprehension
Understanding regression failures through test-passing and test-failing code changes (RS, IB, JW, SZ, YB), pp. 1177–1180.
ICSEICSE-2013-ZhengZ #detection #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
SACSAC-2013-BhattacharjeeJ #algorithm #named #repository #scalability #similarity
CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositories (AB, HMJ), pp. 846–852.
SACSAC-2013-CiraciV #code generation #points-to
Exploiting points-to maps for de-/serialization code generation (SC, OV), pp. 1712–1719.
SACSAC-2013-HoffmannUHS #slicing
Slicing droids: program slicing for smali code (JH, MU, TH, MS), pp. 1844–1851.
SACSAC-2013-JancewiczKMRS #execution
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals (RJJ, AK, LDM, AR, AAS), pp. 1816–1823.
LDTALDTA-J-2009-ChilowiczDR #sequence #source code
Viewing functions as token sequences to highlight similarities in source code (MC, ÉD, GR), pp. 1871–1891.
GPCEGPCE-2013-0001RN #abstract syntax tree #declarative #fine-grained #mining #source code
Declarative visitors to ease fine-grained source code mining with full history on billions of AST nodes (RD, HR, TNN), pp. 23–32.
CCCC-2013-BaranyK #heuristic
Optimal and Heuristic Global Code Motion for Minimal Spilling (GB, AK), pp. 21–40.
CCCC-2013-KempfVP #identification #parallel
Compiler-Guided Identification of Critical Sections in Parallel Code (SK, RV, MP), pp. 204–223.
CGOCGO-2013-KruijfS #analysis #code generation #evaluation #implementation
Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
DACDAC-2013-BombieriLFC #c++ #synthesis
A method to abstract RTL IP blocks into C++ code and enable high-level synthesis (NB, HYL, FF, LPC), p. 9.
DACDAC-2013-NajjarV #compilation #perspective
FPGA code accelerators — the compiler perspective (WAN, JRV), p. 6.
DACDAC-2013-Wang #fault #reliability
Hierarchical decoding of double error correcting codes for high speed reliable memories (ZW), p. 7.
DATEDATE-2013-DoganBCABA #analysis #embedded #execution #multi #platform #power management
Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATEDATE-2013-KumarK #3d
Crosstalk avoidance codes for 3D VLSI (RK, SPK), pp. 1673–1678.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability #using
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-SampaioZSABH #energy #estimation #memory management #multi #video
Energy-efficient memory hierarchy for motion and disparity estimation in multiview video coding (FS, BZ, MS, LVA, SB, JH), pp. 665–670.
HPCAHPCA-2013-JacobvitzCS #memory management
Coset coding to extend the lifetime of memory (ANJ, ARC, DJS), pp. 222–233.
HPCAHPCA-2013-KayaalpSNPA #architecture #named #reuse
SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
PDPPDP-2013-RenesseJNJ #abstraction
Secure Abstraction with Code Capabilities (RvR, HDJ, NN, DJ), pp. 542–546.
PDPPDP-2013-SuboticSLV #data flow #identification #modelling #programming
Identifying Critical Code Sections in Dataflow Programming Models (VS, JCS, JL, MV), pp. 29–37.
FASEFASE-2013-SakamotoTHWF #code generation #integration #named #testing #web
POGen: A Test Code Generator Based on Template Variable Coverage in Gray-Box Integration Testing for Web Applications (KS, KT, DH, HW, YF), pp. 343–358.
STOCSTOC-2013-Ben-SassonGKKS #algebra #geometry #product line
A new family of locally correctable codes based on degree-lifted algebraic geometry codes (EBS, AG, YK, SK, SS), pp. 833–842.
STOCSTOC-2013-Wootters #fault #linear #on the #random #scalability
On the list decodability of random linear codes with large error rates (MW), pp. 853–860.
CAVCAV-2013-BiondiLTW #imperative #named #security
QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
ICTSSICTSS-2013-MauserKH #programming #towards #user interface #using
Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ISSTAISSTA-2013-GligoricZPP #concurrent #mutation testing #testing
Selective mutation testing for concurrent code (MG, LZ, CP, GP), pp. 224–234.
ISSTAISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
QoSAQoSA-2012-Abi-AntounAH #case study #experience #graph #object-oriented
Extraction of ownership object graphs from object-oriented code: an experience report (MAA, NA, ZH), pp. 133–142.
WICSA-ECSAWICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling
Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSAWICSA-ECSA-2012-GhabiE #architecture #modelling #nondeterminism #traceability
Exploiting Traceability Uncertainty between Architectural Models and Code (AG, AE), pp. 171–180.
WICSA-ECSAWICSA-ECSA-2012-KebirSCC #approach #component #identification #object-oriented
Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2012-SimantaLMHS #architecture #mobile
A Reference Architecture for Mobile Code Offload in Hostile Environments (SS, GAL, EJM, KH, MS), pp. 282–286.
DocEngDocEng-2012-OliveiraGL #automation #towards
Toward automated schema-directed code revision (RO, PG, NL), pp. 103–106.
CSEETCSEET-2012-RongLXZ #bibliography #code review #empirical #student
The Effect of Checklist in Code Review for Inexperienced Students: An Empirical Study (GR, JL, MX, TZ), pp. 120–124.
ITiCSEITiCSE-2012-Law #interactive #student #using
Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSEITiCSE-2012-PoonSTK #corpus #detection #source code
Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
ITiCSEITiCSE-2012-Sudol-DeLyserSC #comprehension #learning #problem
Code comprehension problems as learning events (LASD, MS, SC), pp. 81–86.
WCREWCRE-J-2009-BettenburgSIAZH12 #consistency #empirical
An empirical study on inconsistent changes to code clones at the release level (NB, WS, WMI, BA, YZ, AEH), pp. 760–776.
CSMRCSMR-2012-BertranAGCS #architecture #identification #on the
On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms (IMB, RA, AG, CC, AvS), pp. 277–286.
CSMRCSMR-2012-BettenburgTH #code search #fuzzy #source code #using
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMRCSMR-2012-DeissenboeckHHW #challenge #detection
Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
CSMRCSMR-2012-KarusD #predict #xml
Predicting Coding Effort in Projects Containing XML (SK, MD), pp. 203–212.
CSMRCSMR-2012-PetersZ #mining #repository #smell #using
Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
CSMRCSMR-2012-YoshidaKI #approach #functional #maintenance #metric #source code
A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability (NY, MK, HI), pp. 365–370.
CSMRCSMR-2012-ZiadiFSZ #identification #source code
Feature Identification from the Source Code of Product Variants (TZ, LF, MAAdS, MZ), pp. 417–422.
ICPCICPC-2012-CorleyKK #modelling #source code #topic
Modeling the ownership of source code topics (CSC, EAK, NAK), pp. 173–182.
ICPCICPC-2012-IshioEI #data flow #interprocedural #lightweight #source code #visualisation
A lightweight visualization of interprocedural data-flow paths for source code reading (TI, SE, KI), pp. 37–46.
ICPCICPC-2012-Keivanloo #clone detection #code search #detection #source code
Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code #using
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPCICPC-2012-NogueraRKJ #query #uml
Code querying by UML (CN, CDR, AK, VJ), pp. 229–238.
ICPCICPC-2012-PanichellaAPMC #developer #mining #source code
Mining source code descriptions from developer communications (SP, JA, MDP, AM, GC), pp. 63–72.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICPCICPC-2012-SharafiSGA #identifier #source code #women
Women and men — Different but equal: On the impact of identifier style on source code reading (ZS, ZS, YGG, GA), pp. 27–36.
ICPCICPC-2012-Zhang #product line
Extraction and improvement of conditionally compiled product line code (BZ), pp. 257–258.
ICSMEICSM-2012-Al-KofahiNNNN #detection #semantics
Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
ICSMEICSM-2012-AlalfiCDSS #clone detection #detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
ICSMEICSM-2012-BertranACGS #architecture #identification
Supporting the identification of architecturally-relevant code anomalies (IMB, RA, EC, AG, AvS), pp. 662–665.
ICSMEICSM-2012-BeszedesGSJLG #test coverage #testing
Code coverage-based regression test selection and prioritization in WebKit (ÁB, TG, LS, JJ, LL, TG), pp. 46–55.
ICSMEICSM-2012-BoomsmaHG #industrial #lessons learnt #php #web
Dead code elimination for web systems written in PHP: Lessons learned from an industry case (HB, BVH, HGG), pp. 511–515.
ICSMEICSM-2012-DhaliwalKZH #commit #dependence #integration #product line
Recovering commit dependencies for selective code integration in software product lines (TD, FK, YZ, AEH), pp. 202–211.
ICSMEICSM-2012-HamiltonD #community #dependence #source code
Dependence communities in source code (JH, SD), pp. 579–582.
ICSMEICSM-2012-HayashiOZMS #refactoring #source code
Refactoring edit history of source code (SH, TO, TZ, KM, MS), pp. 617–620.
ICSMEICSM-2012-HermansPD #detection #smell #spreadsheet
Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
ICSMEICSM-2012-HigoK #consistency #detection #how #nondeterminism
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
ICSMEICSM-2012-KimuraHIK #dynamic analysis #refactoring
Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
ICSMEICSM-2012-KuangMHGHJE #comprehension #dependence #question #requirements #source code #traceability
Do data dependencies in source code complement call dependencies for understanding requirements traceability? (HK, PM, HH, AG, LH, JL, AE), pp. 181–190.
ICSMEICSM-2012-Linares-VasquezHDKGP #commit #debugging #question
Triaging incoming change requests: Bug or commit history, or code authorship? (MLV, KH, HD, HHK, MG, DP), pp. 451–460.
ICSMEICSM-2012-NasehiSMB #case study #programming #stack overflow #what
What makes a good code example?: A study of programming Q&A in StackOverflow (SMN, JS, FM, CB), pp. 25–34.
ICSMEICSM-2012-OmoriKM #case study #code completion
A study on repetitiveness of code completion operations (TO, HK, KM), pp. 584–587.
ICSMEICSM-2012-QuAR #impact analysis #testing #using
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RamaKVP #detection #source code #version control
Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
ICSMEICSM-2012-YamashitaM #aspect-oriented #maintenance #question #smell
Do code smells reflect important maintainability aspects? (AFY, LM), pp. 306–315.
MSRMSR-2012-Breckel #comparison #database #debugging #detection #fault #mining #scalability
Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
MSRMSR-2012-GigerPG #analysis #empirical #predict
Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
SCAMSCAM-2012-GethersAP #concept #database #dependence #detection
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
SCAMSCAM-2012-MayerS #analysis #refactoring
Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAMSCAM-2012-MurakamiHHIK #clone detection #detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCREWCRE-2012-AmmarA #diagrams #empirical #evaluation #runtime
Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks (NA, MAA), pp. 367–376.
WCREWCRE-2012-CapiluppiFB #effectiveness #java #obfuscation
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations (AC, PF, CB), pp. 71–80.
WCREWCRE-2012-FavreLLSV #documentation #source code
Linking Documentation and Source Code in a Software Chrestomathy (JMF, RL, ML, TS, AV), pp. 335–344.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-IchiiMNCO #approach #automation #modelling #rule-based #source code
A Rule-based Automated Approach for Extracting Models from Source Code (MI, TM, YN, MC, HO), pp. 308–317.
WCREWCRE-2012-RomanoRPK #fine-grained #source code #using
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
DLTDLT-2012-GeffertP
Unary Coded NP-Complete Languages in ASPACE (log log n) (VG, DP), pp. 166–177.
DLTDLT-2012-GiambrunoMNS #bidirectional #finite
A Generalization of Girod’s Bidirectional Decoding Method to Codes with a Finite Deciphering Delay (LG, SM, JN, CS), pp. 471–476.
SEFMSEFM-2012-PaulSS #assembly #automation #verification
Completing the Automated Verification of a Small Hypervisor — Assembler Code Verification (WJP, SS, AS), pp. 188–202.
CHICHI-2012-OneyB #documentation #editing #interactive #named
Codelets: linking interactive documentation and example code in the editor (SO, JB), pp. 2697–2706.
CSCWCSCW-2012-DabbishSTH #collaboration #git #repository #social
Social coding in GitHub: transparency and collaboration in an open software repository (LAD, HCS, JT, JDH), pp. 1277–1286.
CAiSECAiSE-2012-PastorE #code generation #modelling #requirements
Full Model-Driven Practice: From Requirements to Code Generation (OP, SE), pp. 701–702.
ICEISICEIS-J-2012-YiasemisA12a #execution #fault #mutation testing #slicing #testing
Locating and Correcting Software Faults in Executable Code Slices via Evolutionary Mutation Testing (PSY, ASA), pp. 207–227.
ICMLICML-2012-GoodfellowCB #learning #scalability
Large-Scale Feature Learning With Spike-and-Slab Sparse Coding (IJG, ACC, YB), p. 180.
ICMLICML-2012-McAfeeO #code generation #network #static analysis
Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
ICMLICML-2012-XuL #multi
Conditional Sparse Coding and Grouped Multivariate Regression (MX, JDL), p. 116.
ICMLICML-2012-ZhangS
Maximum Margin Output Coding (YZ, JGS), p. 53.
ICPRICPR-2012-ArpitSF #rank #recognition
Locality-constrained Low Rank Coding for face recognition (DA, GS, YF), pp. 1687–1690.
ICPRICPR-2012-DingLHXW #recognition #video
Context-aware horror video scene recognition via cost-sensitive sparse coding (XD, BL, WH, WX, ZW), pp. 1904–1907.
ICPRICPR-2012-DuanWLDC #learning #named
K-CPD: Learning of overcomplete dictionaries for tensor sparse coding (GD, HW, ZL, JD, YWC), pp. 493–496.
ICPRICPR-2012-HoritaMMKOKT #3d #metric #robust
Coded aperture for projector and camera for robust 3D measurement (YH, YM, HM, HK, SO, MK, YT), pp. 1487–1491.
ICPRICPR-2012-HouHWH #synthesis #video
Improvements of dynamic texture synthesis for video coding (ZH, RH, ZW, ZH), pp. 3148–3151.
ICPRICPR-2012-LinSCLH #recognition #using
Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPRICPR-2012-LiuW12b #performance #recognition #robust
Accelerated robust sparse coding for fast face recognition (GL, YY, HW), pp. 3394–3397.
ICPRICPR-2012-LiuWXZS #classification
Soft-signed sparse coding for ground-based cloud classification (SL, CW, BX, ZZ, YS), pp. 2214–2217.
ICPRICPR-2012-LuHLC #recognition #using
Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPRICPR-2012-NaitoKSS #using
Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPRICPR-2012-OuYCPGJ #image #representation
Structured sparse coding for image representation based on L1-graph (WO, XY, YmC, QP, MG, XJ), pp. 3220–3223.
ICPRICPR-2012-ParisHG #analysis #categorisation #image #towards
Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
ICPRICPR-2012-RenLWG #image
Image super-resolution by structural sparse coding (JR, JL, MW, ZG), pp. 1936–1939.
ICPRICPR-2012-TaniguchiHISC #image #linear
Image super-resolution based on locality-constrained linear coding (KT, XHH, YI, SS, YWC), pp. 1948–1951.
ICPRICPR-2012-WangWZBL #classification #image
Adjacent coding for image classification (YW, XW, SZ, XB, WL), pp. 1459–1462.
ICPRICPR-2012-ZhangZC #recognition
Action recognition based on spatial-temporal pyramid sparse coding (XZ, HZ, XC), pp. 1455–1458.
ICPRICPR-2012-ZhengQ #categorisation #semantics
Non-negative Sparse Semantic Coding for text categorization (WZ, YQ), pp. 409–412.
KDDKDD-2012-HiraiY #clustering #detection #normalisation #using
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-SindhwaniG #distributed #learning #scalability #taxonomy
Large-scale distributed non-negative sparse coding and sparse dictionary learning (VS, AG), pp. 489–497.
KDDKDD-2012-ZhouZ #collaboration #learning
Learning binary codes for collaborative filtering (KZ, HZ), pp. 498–506.
SEKESEKE-2012-HumairaSOWF #framework #metric #multi #programming language #source code #towards
Towards a Unified Source Code Measurement Framework Supporting Multiple Programming Languages (RH, KS, AO, HW, YF), pp. 480–485.
SEKESEKE-2012-XuT #automation #concurrent #generative
Automated Generation of Concurrent Test Code from Function Nets (DX, JT), pp. 346–351.
SIGIRSIGIR-2012-ZhangWDH #detection #learning #performance #reuse
Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
ECMFAECMFA-2012-SmolikV #code generation
Code Generation Nirvana (PCS, PV), pp. 319–327.
MODELSMoDELS-2012-GravinoRST #comprehension #design pattern #developer #documentation #replication #source code
Do Professional Developers Benefit from Design Pattern Documentation? A Replication in the Context of Source Code Comprehension (CG, MR, GS, GT), pp. 185–201.
PLEASEPLEASE-2012-Duszynski0 #source code #variability
Recovering variability information from the source code of similar software products (SD, MB), pp. 37–40.
SPLCSPLC-2012-NunesGLL #evolution #heuristic #product line
History-sensitive heuristics for recovery of features in code of evolving program families (CN, AG, CJPdL, JL), pp. 136–145.
ECOOPECOOP-2012-NegaraVCJD #evolution #question #source code #version control
Is It Dangerous to Use Version Control Histories to Study Source Code Evolution? (SN, MV, NC, REJ, DD), pp. 79–103.
OOPSLAOOPSLA-2012-MishneSY #code search #semantics #source code
Typestate-based semantic code search over partial programs (AM, SS, EY), pp. 997–1016.
OOPSLAOOPSLA-2012-Zhang0LZMY #android #java #on-demand #refactoring
Refactoring android Java code for on-demand computation offloading (YZ, GH, XL, WZ, HM, SY), pp. 233–248.
PLATEAUPLATEAU-2012-BosuC #code review #open source #overview
Peer code review in open source communitiesusing reviewboard (AB, JCC), pp. 17–24.
PLATEAUPLATEAU-2012-UrmaM #evolution #programming language #query #source code
Programming language evolution via source code query languages (RGU, AM), pp. 35–38.
AdaEuropeAdaEurope-2012-PanunzioV #ada #component #development
Ada Ravenscar Code Archetypes for Component-Based Development (MP, TV), pp. 1–17.
AdaEuropeAdaEurope-2012-RuizCM #ada #development #source code
Source Code as the Key Artifact in Requirement-Based Development: The Case of Ada 2012 (JFR, CC, YM), pp. 49–59.
LOPSTRLOPSTR-2012-DandoisV #logic programming #semantics #source code
Semantic Code Clones in Logic Programs (CD, WV), pp. 35–50.
LOPSTRLOPSTR-2012-SeghirB #array #program transformation #quantifier #verification
Simplifying the Verification of Quantified Array Assertions via Code Transformation (MNS, MB), pp. 194–212.
PEPMPEPM-2012-Puschel #compilation #performance
Compiling math to fast code (MP), pp. 1–2.
POPLPOPL-2012-RayL #injection
Defining code-injection attacks (DR, JL), pp. 179–190.
PPDPPPDP-2012-Emden #matrix
Matrix code (MvE), pp. 13–24.
RERE-2012-CharradaKG #identification #requirements #source code
Identifying outdated requirements based on source code changes (EBC, AK, MG), pp. 61–70.
RERE-2012-SmialekS #requirements
Facilitating transition from requirements to code with the ReDSeeDS tool (MS, TS), pp. 321–322.
ASEASE-2012-AbadiF #automation
Automatic recovery of statecharts from procedural code (MA, YAF), pp. 238–241.
ASEASE-2012-GhabiE #automation #validation
Code patterns for automatically validating requirements-to-code traces (AG, AE), pp. 200–209.
ASEASE-2012-MaruyamaKOH #game studies #slicing
Slicing and replaying code change history (KM, EK, TO, SH), pp. 246–249.
ASEASE-2012-MorenoM #automation #identification #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
ASEASE-2012-NguyenNNNN #detection #embedded #smell #web
Detection of embedded code smells in dynamic web applications (HVN, HAN, TTN, ATN, TNN), pp. 282–285.
ASEASE-2012-SharT #predict #validation #web
Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
ASEASE-2012-TamrawiNNN #analysis #named #refactoring
SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASEASE-2012-WangD0ZLM #question
Can I clone this piece of code here? (XW, YD, LZ, DZ, EL, HM), pp. 170–179.
ASEASE-2012-YuanG #approach #clone detection #detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
FSEFSE-2012-ServantJ #slicing
History slicing: assisting code-evolution tasks (FS, JAJ), p. 43.
FSEFSE-2012-ShepherdDRF #code search #framework #named
Sando: an extensible local code search framework (DS, KD, BR, TF), p. 15.
FSEFSE-2012-TaoDXZK #case study #how #industrial
How do software engineers understand code changes?: an exploratory study in industry (YT, YD, TX, DZ, SK), p. 51.
ICSEICSE-2012-AlvesSF #named #smell
ConcernReCS: Finding code smells in software aspectization (PA, DS, EF), pp. 1463–1464.
ICSEICSE-2012-DeLineBRJR #debugging #experience #industrial #paradigm
Debugger Canvas: Industrial experience with the code bubbles paradigm (RD, AB, KR, JJ, SPR), pp. 1064–1073.
ICSEICSE-2012-EderJJHVP #how #maintenance #matter #question
How much does unused code matter for maintenance? (SE, MJ, EJ, BH, RV, KHP), pp. 1102–1111.
ICSEICSE-2012-Guzzi #information management
Documenting and sharing knowledge about code (AG), pp. 1535–1538.
ICSEICSE-2012-InoueSXM #open source
Where does this code come from and where does it go? — Integrated code history tracker for open source systems (KI, YS, PX, YM), pp. 331–341.
ICSEICSE-2012-KuhnS #named #version control
CodeTimeline: Storytelling with versioning data (AK, MS), pp. 1333–1336.
ICSEICSE-2012-LiE #detection #named
CBCD: Cloned buggy code detector (JL, MDE), pp. 310–320.
ICSEICSE-2012-McMillanHPCM #agile #prototype #recommendation #source code
Recommending source code for use in rapid software prototypes (CM, NH, DP, JCH, BM), pp. 848–858.
ICSEICSE-2012-NguyenNNN12a #code completion #graph #named
GraPacc: A graph-based pattern-oriented, context-sensitive code completion tool (ATN, HAN, TTN, TNN), pp. 1407–1410.
ICSEICSE-2012-NguyenNNTNAN #code completion #graph #source code
Graph-based pattern-oriented, context-sensitive source code completion (ATN, TTN, HAN, AT, HVN, JMAK, TNN), pp. 69–79.
ICSEICSE-2012-NistorLPGM #automation #clustering #generative #named #parallel #performance #random #testing #thread
Ballerina: Automatic generation and clustering of efficient random unit tests for multithreaded code (AN, QL, MP, TRG, DM), pp. 727–737.
ICSEICSE-2012-OmarYLM #code completion
Active code completion (CO, YY, TDL, BAM), pp. 859–869.
ICSEICSE-2012-ReissBL #programming
Code Bubbles: A practical working-set programming environment (SPR, JNB, JJLJ), pp. 1411–1414.
ICSEICSE-2012-Schulte #analysis #automation
Ten years of automated code analysis at Microsoft (WS), p. 1001.
ICSEICSE-2012-Schwarz #development
Hot clones: Combining search-driven development, clone management, and code provenance (NS), pp. 1628–1629.
ICSEICSE-2012-SchwarzLR #how #on the #repository
On how often code is cloned across repositories (NS, ML, RR), pp. 1289–1292.
ICSEICSE-2012-SongT #invariant #metadata
Metadata invariants: Checking and inferring metadata coding conventions (MS, ET), pp. 694–704.
ICSEICSE-2012-SusB #education #integration #re-engineering #using
Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSEICSE-2012-TamrawiNNN #analysis #evaluation #symbolic computation
Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
ICSEICSE-2012-ZhangE #exception #testing #validation
Amplifying tests to validate exception handling code (PZ, SGE), pp. 595–605.
SACSAC-2012-AnconaMP #automation #documentation #java #migration #ontology
Ontology-based documentation extraction for semi-automatic migration of Java code (DA, VM, OP), pp. 1137–1143.
SACSAC-2012-CosciaCMZ #approach #development #web #web service
An approach to improve code-first web services discoverability at development time (JLOC, MC, CM, AZ), pp. 638–643.
SACSAC-2012-ErraS #3d #towards #visualisation
Towards the visualization of software systems as 3D forests: the CodeTrees environment (UE, GS), pp. 981–988.
SACSAC-2012-GiuntaPT #aspect-oriented #composition #design pattern #named #refactoring
AODP: refactoring code to provide advanced aspect-oriented modularization of design patterns (RG, GP, ET), pp. 1243–1250.
SACSAC-2012-JeonC #javascript #jit #reuse #using
Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
SACSAC-2012-KangJC #3d #scalability #using #video
Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SACSAC-2012-MondalRRSKS #comparative #empirical
Comparative stability of cloned and non-cloned code: an empirical study (MM, CKR, MSR, RKS, JK, KAS), pp. 1227–1234.
SACSAC-2012-SardinhaYNR #aspect-oriented #identification #named #traceability
EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
GPCEGPCE-2012-AxelsenK #java #performance #semantics #text-to-text
Package templates: a definition by semantics-preserving source-to-source transformations to efficient Java code (EWA, SK), pp. 50–59.
GPCEGPCE-2012-BagheriS #architecture #framework #named #platform #synthesis
Pol: specification-driven synthesis of architectural code frameworks for platform-based applications (HB, KJS), pp. 93–102.
CGOCGO-2012-JangLSL #automation #memory management #multi
An automatic code overlaying technique for multicores with explicitly-managed memory hierarchies (CJ, JL, SS, JL), pp. 219–229.
CGOCGO-2012-ZhangDS #database #named
Micro-specialization: dynamic code specialization of database management systems (RZ, SD, RTS), pp. 63–73.
CGOCGO-2012-ZhangM #3d #clustering #gpu
Auto-generation and auto-tuning of 3D stencil codes on GPU clusters (YZ, FM), pp. 155–164.
DACDAC-2012-AgostaBP #analysis
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DACDAC-2012-KumarBKV #analysis #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-MirhoseiniPK #energy #memory management
Coding-based energy minimization for phase change memory (AM, MP, FK), pp. 68–76.
DACDAC-2012-ShafiqueZWBH #adaptation #memory management #multi #power management #video
Adaptive power management of on-chip video memory for multiview video coding (MS, BZ, FLW, SB, JH), pp. 866–875.
DATEDATE-2012-ShafiqueZRKH #adaptation #power management
Power-efficient error-resiliency for H.264/AVC Context-Adaptive Variable Length Coding (MS, BZ, SR, FK, JH), pp. 697–702.
OSDIOSDI-2012-GordonJMMC #execution #migration #named
COMET: Code Offload by Migrating Execution Transparently (MSG, DAJ, SAM, ZMM, XC), pp. 93–106.
OSDIOSDI-2012-GuoFCZZMLLZZ #optimisation #pipes and filters
Spotting Code Optimizations in Data-Parallel Pipelines through PeriSCOPE (ZG, XF, RC, JZ, HZ, SM, CL, WL, JZ, LZ), pp. 121–133.
PDPPDP-2012-EittenbergerMK #streaming
Raptor Codes for P2P Streaming (PME, TM, URK), pp. 327–332.
PPoPPPPoPP-2012-KimH #code generation #kernel #performance
Efficient SIMD code generation for irregular kernels (SK, HH), pp. 55–64.
STOCSTOC-2012-Efremenko
From irreducible representations to locally decodable codes (KE), pp. 327–338.
STOCSTOC-2012-GalHKPV #bound
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates (AG, KAH, MK, PP, EV), pp. 479–494.
STOCSTOC-2012-GuruswamiX
Folded codes from function field towers and improved optimal rate list decoding (VG, CX), pp. 339–350.
STOCSTOC-2012-KaufmanL #graph #symmetry #transitive
Edge transitive ramanujan graphs and symmetric LDPC good codes (TK, AL), pp. 359–366.
CAVCAV-2012-ArltS #detection #java #named
Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
ICSTICST-2012-BeyeneA #generative #string #test coverage #testing
Generating String Test Data for Code Coverage (MB, JHA), pp. 270–279.
ICSTICST-2012-ChittimalliS #framework #modelling #named #source code
GEMS: A Generic Model Based Source Code Instrumentation Framework (PKC, VS), pp. 909–914.
ICSTICST-2012-JuzgadoVSAR #abstraction #branch #clustering #effectiveness #equivalence #testing
Comparing the Effectiveness of Equivalence Partitioning, Branch Testing and Code Reading by Stepwise Abstraction Applied by Subjects (NJJ, SV, MS, SA, IR), pp. 330–339.
ICSTICST-2012-Kannavara #source code #static analysis
Securing Opensource Code via Static Analysis (RK), pp. 429–436.
ICSTICST-2012-MateoU #execution #music #reduction
Mutant Execution Cost Reduction: Through MUSIC (Mutant Schema Improved with Extra Code) (PRM, MPU), pp. 664–672.
ICSTICST-2012-TanMTL #consistency #detection #nondeterminism #testing
@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies (SHT, DM, LT, GTL), pp. 260–269.
ICTSSICTSS-2012-GargantiniGM #robust #test coverage
Extending Coverage Criteria by Evaluating Their Robustness to Code Structure Changes (AG, MG, EM), pp. 168–183.
TAPTAP-2012-Kuehlmann #testing
The Technology and Psychology of Testing Your Code as You Develop It (AK), p. 1.
ECSAECSA-2011-AdersbergerP #architecture #consistency #named #traceability #uml
ReflexML: UML-Based Architecture-to-Code Traceability and Consistency Checking (JA, MP), pp. 344–359.
ICDARICDAR-2011-KatoDTIM #recognition #using
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
CSEETCSEET-2011-ChenT #programming #quality #smell
Grading code quality of programming assignments based on bad smells (WKC, PYT), p. 559.
ITiCSEITiCSE-2011-BreukerDB #quality #student
Measuring static quality of student code (DMB, JD, JB), pp. 13–17.
ITiCSEITiCSE-2011-TaylorK #injection #security #student
Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
ITiCSEITiCSE-2011-Velazquez-Iturbide #algorithm #design #revisited
The design and coding of greedy algorithms revisited (JÁVI), pp. 8–12.
ICPCICPC-J-2009-HammadCM11 #automation #evolution #identification #traceability
Automatically identifying changes that impact code-to-design traceability during evolution (MH, MLC, JIM), pp. 35–64.
CSMRCSMR-2011-AbbesKGA #comprehension #empirical
An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension (MA, FK, YGG, GA), pp. 181–190.
CSMRCSMR-2011-HayaseKMI #source code
Building Domain Specific Dictionaries of Verb-Object Relation from Source Code (YH, YK, YM, KI), pp. 93–100.
CSMRCSMR-2011-HigoK #clone detection #dependence #detection #heuristic
Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
CSMRCSMR-2011-Sneed #java #migration #pl-i
Migrating PL/I Code to Java (HMS), pp. 287–296.
ICPCICPC-2011-CordyR #named #open source #performance #source code
DebCheck: Efficient Checking for Open Source Code Clones in Software Systems (JRC, CKR), pp. 217–218.
ICPCICPC-2011-EndrikatH #aspect-oriented #development #maintenance #programming
Is Aspect-Oriented Programming a Rewarding Investment into Future Code Changes? A Socio-technical Study on Development and Maintenance Time (SE, SH), pp. 51–60.
ICPCICPC-2011-GuzziHLPD #comprehension
Collective Code Bookmarks for Program Comprehension (AG, LH, ML, MP, AvD), pp. 101–110.
ICPCICPC-2011-KeivanlooRC #approach #clone detection #hybrid #named #realtime
SeClone — A Hybrid Approach to Internet-Scale Real-Time Code Clone Search (IK, JR, PC), pp. 223–224.
ICPCICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code #using
Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICPCICPC-2011-ScannielloM #clustering #concept #source code
Clustering Support for Static Concept Location in Source Code (GS, AM), pp. 1–10.
ICPCICPC-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach (MFZ, CKR), pp. 266–269.
ICSMEICSM-2011-BiggersEKE #metric #source code #towards
Toward a metrics suite for source code lexicons (LRB, BPE, NAK, LHE), pp. 492–495.
ICSMEICSM-2011-HouP #api #code completion #evaluation #sorting
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
ICSMEICSM-2011-LawrieB #identifier #source code
Expanding identifiers to normalize source code vocabulary (DL, DB), pp. 113–122.
ICSMEICSM-2011-LeeK #clustering #recommendation
Clustering and recommending collections of code relevant to tasks (SL, SK), pp. 536–539.
ICSMEICSM-2011-NishizonoMVM #comprehension #empirical #evolution #industrial #maintenance #metric #predict #source code
Source code comprehension strategies and metrics to predict comprehension effort in software maintenance and evolution tasks — an empirical study with industry practitioners (KN, SM, RV, KiM), pp. 473–481.
ICSMEICSM-2011-QusefBOLB #concept #named #slicing #traceability #using
SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSMEICSM-2011-RastkarMB #generative #natural language #source code #summary
Generating natural language summaries for crosscutting source code concerns (SR, GCM, AWJB), pp. 103–112.
ICSMEICSM-2011-RomanoP #interface #java #metric #predict #source code #using
Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSMEICSM-2011-RomanoSRG #clustering #design pattern #source code
Clustering and lexical information support for the recovery of design pattern in source code (SR, GS, MR, CG), pp. 500–503.
ICSMEICSM-2011-Scanniello #source code
Source code survival with the Kaplan Meier (GS), pp. 524–527.
ICSMEICSM-2011-SmitGHS #evolution
Code convention adherence in evolving software (MS, BG, HJH, ES), pp. 504–507.
ICSMEICSM-2011-SnipesRM #analysis
Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
ICSMEICSM-2011-WieseHH #comparison #identifier #source code
A comparison of stemmers on source code identifiers for software search (AW, VH, EH), pp. 496–499.
MSRMSR-2011-GermanD #challenge #source code
Apples vs. oranges?: an exploration of the challenges of comparing the source code of two software systems (DMG, JD), pp. 246–249.
MSRMSR-2011-GigerPG #debugging #fine-grained #predict #source code
Comparing fine-grained source code changes and code churn for bug prediction (EG, MP, HCG), pp. 83–92.
MSRMSR-2011-HemelKVD #clone detection #detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
MSRMSR-2011-HirataM
Do comments explain codes adequately?: investigation by text filtering (YH, OM), pp. 242–245.
MSRMSR-2011-ThomasAHB #evolution #modelling #source code #topic
Modeling the evolution of topics in source code histories (SWT, BA, AEH, DB), pp. 173–182.
SCAMSCAM-2011-AbebeHTM #concept #smell #source code
The Effect of Lexicon Bad Smells on Concept Location in Source Code (SLA, SH, PT, AM), pp. 125–134.
SCAMSCAM-2011-AlvesHR #case study #comparative #query
A Comparative Study of Code Query Technologies (TLA, JH, PR), pp. 145–154.
SCAMSCAM-2011-CooganD #assembly #equation #reasoning
Equational Reasoning on x86 Assembly Code (KC, SKD), pp. 75–84.
SCAMSCAM-2011-Gold #analysis #music #programming #source code
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
SCAMSCAM-2011-SchulzeJF #preprocessor
Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
SCAMSCAM-2011-SfayhiS #analysis #interactive #visualisation #what
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
SCAMSCAM-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
WCREWCRE-2011-AliGA #clustering #object-oriented #requirements #source code #traceability
Requirements Traceability for Object Oriented Systems by Partitioning Source Code (NA, YGG, GA), pp. 45–54.
WCREWCRE-2011-BazrafshanKG #approximate #code search
Approximate Code Search in Program Histories (SB, RK, NG), pp. 109–118.
WCREWCRE-2011-Beard #debugging #information retrieval #locality #using
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-DuszynskiKB #multi #reuse #source code
Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-GravinoRST #comprehension #design pattern #documentation #source code
Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments (CG, MR, GS, GT), pp. 67–76.
WCREWCRE-2011-HigoUNK #approach #clone detection #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-KeivanlooRC #clone detection #multi #realtime
Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
WCREWCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code #using
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCREWCRE-2011-NonnenSI #research #source code
Locating the Meaning of Terms in Source Code Research on “Term Introduction” (JN, DS, PI), pp. 99–108.
WCREWCRE-2011-Panchenko #code search #database #in memory #source code
In-Memory Database Support for Source Code Search and Analytics (OP), pp. 421–424.
WCREWCRE-2011-PosnettHD #fault #question
Got Issues? Do New Features and Code Improvements Affect Defects? (DP, AH, PTD), pp. 211–215.
WCREWCRE-2011-Qusef #concept #slicing #traceability
Recovering Test-to-Code Traceability Via Slicing and Conceptual Coupling (AQ), pp. 417–420.
WCREWCRE-2011-QusefBOLB #named #slicing
SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter (AQ, GB, RO, ADL, DB), pp. 443–444.
WCREWCRE-2011-SajnaniNL #architecture #towards
Application Architecture Discovery — Towards Domain-driven, Easily-Extensible Code Structure (HS, RN, CVL), pp. 401–405.
WCREWCRE-2011-WangLJ #code search #dependence #graph #topic
Code Search via Topic-Enriched Dependence Graph Matching (SW, DL, LJ), pp. 119–123.
WCREWCRE-2011-WangPV #automation #readability #segmentation
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
DLTDLT-J-2010-PribavkinaR11 #complexity
State Complexity of Code Operators (EVP, ER), pp. 1669–1681.
ICALPICALP-v1-2011-AustrinK #distance #problem #reduction
A Simple Deterministic Reduction for the Gap Minimum Distance of Code Problem (PA, SK), pp. 474–485.
LATALATA-2011-NielsenH #parsing #regular expression
Bit-coded Regular Expression Parsing (LN, FH), pp. 402–413.
SEFMSEFM-2011-Metayer #formal method
Formal Methods as a Link between Software Code and Legal Rules (DLM), pp. 3–18.
CHICHI-2011-GrossYK #interface #named #visual notation
Dinah: an interface to assist non-programmers with selecting program code causing graphical output (PAG, JY, CK), pp. 3397–3400.
CHICHI-2011-HartmannDC #named #web
HyperSource: bridging the gap between source and code-related web sites (BH, MD, MKC), pp. 2207–2210.
HCIDUXU-v2-2011-KaptanG11a #comprehension #scalability
Improving Code Reading and Comprehension on Large Displays (SNK, MG), pp. 128–134.
HCIHCI-DDA-2011-ParkSCH #image #in memory #memory management #named
ColoriT: Color Based Image Code Application to Aid in Memory Restoration of Offline Photo Artifacts (JP, JS, JHC, TDH), pp. 637–642.
HCIHCI-DDA-2011-SeoCH #comparison #mobile #performance
Imaged Based Codes Performance Comparison for Mobile Environments (JS, JHC, TDH), pp. 653–659.
VISSOFTVISSOFT-2011-BeckPD #multi #visual notation
Visually exploring multi-dimensional code couplings (FB, RP, SD), pp. 1–8.
VISSOFTVISSOFT-2011-BroeksemaT #migration #scalability #visual notation
Visual support for porting large code bases (BB, ACT), pp. 1–8.
VISSOFTVISSOFT-2011-MaleticMNCSR #named #scalability #tool support #visualisation
MosaiCode: Visualizing large scale software: A tool demonstration (JIM, DJM, CDN, MLC, AS, BPR), pp. 1–4.
ICEISICEIS-v1-2011-MarinAV #automation #java #named #ontology #semantics
Jar2Ontology — A Tool for Automatic Extraction of Semantic Information from Java Object Code (NM, CSÁ, MAV), pp. 267–276.
ICEISICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
ICMLICML-2011-CoatesN #encoding
The Importance of Encoding Versus Training with Sparse Coding and Vector Quantization (AC, AYN), pp. 921–928.
ICMLICML-2011-GaoK #multi
Multiclass Boosting with Hinge Loss based on Output Coding (TG, DK), pp. 569–576.
ICMLICML-2011-NorouziF
Minimal Loss Hashing for Compact Binary Codes (MN, DJF), pp. 353–360.
KDDKDD-2011-ZhuLCX #performance #topic
Conditional topical coding: an efficient topic model conditioned on rich features (JZ, NL, NC, EPX), pp. 475–483.
MLDMMLDM-2011-XuM #learning #taxonomy
Dictionary Learning Based on Laplacian Score in Sparse Coding (JX, HM), pp. 253–264.
SEKESEKE-2011-SeriaiC #approach #architecture #object-oriented #search-based
A Genetic Approach for Software Architecture Recovery from Object-Oriented Code (ADS, SC), pp. 515–520.
ECMFAECMFA-2011-GessenharterR #approach #code generation #development #diagrams #modelling #process #towards #uml
Code Generation for UML 2 Activity Diagrams — Towards a Comprehensive Model-Driven Development Approach (DG, MR), pp. 205–220.
ICMTICMT-2011-BauerK #model transformation
Combining Specification-Based and Code-Based Coverage for Model Transformation Chains (EB, JMK), pp. 78–92.
MODELSMoDELS-2011-StenzelMR #code generation #qvt #verification
Formal Verification of QVT Transformations for Code Generation (KS, NM, WR), pp. 533–547.
OnwardOnward-2011-McDirmid
Coding at the speed of touch (SM), pp. 61–76.
OOPSLAOOPSLA-2011-WurthingerABWM #aspect-oriented #evolution #java #runtime
Safe and atomic run-time code evolution for Java and its application to dynamic AOP (TW, DA, WB, CW, HM), pp. 825–844.
PLATEAUPLATEAU-2011-YoonM #editing #low level
Capturing and analyzing low-level events from the code editor (YY, BAM), pp. 25–30.
TOOLSTOOLS-EUROPE-2011-Nierstrasz #modelling
Synchronizing Models and Code (ON), p. 1.
TOOLSTOOLS-EUROPE-2011-TrudelOFN #automation #eiffel #java #source code
Automated Translation of Java Source Code to Eiffel (MT, MO, CAF, MN), pp. 20–35.
AdaEuropeAdaEurope-2011-CoqR #ada #analysis #modelling #quality #source code
The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
PEPMPEPM-2011-JonssonN #explosion #supercompilation
Taming code explosion in supercompilation (PAJ, JN), pp. 33–42.
PLDIPLDI-2011-AnselMETCSSBY #compilation #independence #self
Language-independent sandboxing of just-in-time compilation and self-modifying code (JA, PM, ÚE, ET, BC, DLS, DS, CB, BY), pp. 355–366.
PLDIPLDI-2011-ZhouCC #algorithm #execution
An SSA-based algorithm for optimal speculative code motion under an execution profile (HZ, WC, FCC), pp. 98–108.
POPLPOPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread #using
A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
POPLPOPL-2011-RamseyD #composition #dependent type #independence #low level #type system #using
Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
SASSAS-2011-FlexederPS #analysis #assembly
Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
AdaSIGAda-2011-Rosen #ada #design #standard
Designing and checking coding standards for ada (JPR), pp. 13–14.
ASEASE-2011-ChenG #automation #documentation #retrieval #traceability
Improving automated documentation to code traceability by combining retrieval techniques (XC, JCG), pp. 223–232.
ASEASE-2011-GethersKDP #adaptation #approach #impact analysis #source code
An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
ASEASE-2011-GhabiE #validation
Observations on the connectedness between requirements-to-code traces and calling relationships for trace validation (AG, AE), pp. 416–419.
ASEASE-2011-HillPV #code search #natural language #source code
Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
ASEASE-2011-KimmigMM #natural language #query #source code
Querying source code with natural language (MK, MM, MM), pp. 376–379.
ASEASE-2011-LozanoKM #named #recommendation #search-based #source code
Mendel: Source code recommendation based on a genetic metaphor (AL, AK, KM), pp. 384–387.
ASEASE-2011-LumpeMG #java #named
jCT: A Java Code Tomograph (ML, SM, OG), pp. 616–619.
ASEASE-2011-MaderE #empirical #navigation #source code #traceability
Do software engineers benefit from source code navigation with traceability? — An experiment in software change management (PM, AE), pp. 444–447.
ASEASE-2011-NguyenNNN #fault #html #php #validation
Auto-locating and fix-propagating for HTML validation errors to PHP server-side code (HVN, HAN, TTN, TNN), pp. 13–22.
ASEASE-2011-PeiWFNM #automation
Code-based automated program fixing (YP, YW, CAF, MN, BM), pp. 392–395.
ASEASE-2011-WeiRFPHSNM #contract #fault #testing
Stateful testing: Finding more errors in code and contracts (YW, HR, CAF, YP, AH, MJS, MN, BM), pp. 440–443.
ESEC-FSEESEC-FSE-2011-BeckD #composition #congruence #on the
On the congruence of modularity and code coupling (FB, SD), pp. 354–364.
ESEC-FSEESEC-FSE-2011-BirdNMGD #exclamation #quality
Don’t touch my code!: examining the effects of ownership on software quality (CB, NN, BM, HG, PTD), pp. 4–14.
ESEC-FSEESEC-FSE-2011-HackettA #morphism #polymorphism
Inferring data polymorphism in systems code (BH, AA), pp. 332–342.
ICSEICSE-2011-AdlerBRSSUZ #analysis #scalability #test coverage
Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
ICSEICSE-2011-Bertran #architecture #detection #evolution #smell
Detecting architecturally-relevant code smells in evolving software systems (IMB), pp. 1090–1093.
ICSEICSE-2011-Dantas #composition #maintenance #reuse
Reuse vs. maintainability: revealing the impact of composition code properties (FD), pp. 1082–1085.
ICSEICSE-2011-GethersSPOPL #named #question #topic
CodeTopics: which topic am I coding now? (MG, TS, MDP, RO, DP, ADL), pp. 1034–1036.
ICSEICSE-2011-Kidwell #classification #fault #research
A decision support system for the classification of software coding faults: a research abstract (BK), pp. 1158–1160.
ICSEICSE-2011-LopezH
The code orb: supporting contextualized coding via at-a-glance views (NL, AvdH), pp. 824–827.
ICSEICSE-2011-McMillan #source code
Searching, selecting, and synthesizing source code (CM), pp. 1124–1125.
ICSEICSE-2011-McMillan11a
Finding relevant functions in millions of lines of code (CM), pp. 1170–1172.
ICSEICSE-2011-MilicevicRYJ #declarative #execution #imperative
Unifying execution of imperative and declarative code (AM, DR, KY, DJ), pp. 511–520.
ICSEICSE-2011-NearMKJ #analysis #dependence #evaluation #lightweight
A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
ICSEICSE-2011-NiuMB #information management #navigation
Information foraging as a foundation for code navigation (NN, AM, GB), pp. 816–819.
ICSEICSE-2011-TanZP #concurrent #debugging #detection #mining #named
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs (LT, YZ, YP), pp. 11–20.
SACSAC-2011-LimJLW #c #education #visualisation
Style Avatar: a visualization system for teaching C coding style (JSL, JHJ, YJL, GW), pp. 1210–1211.
GPCEGPCE-J-2005-CaretteK11 #abstraction #monad #multi #programming
Multi-stage programming with functors and monads: Eliminating abstraction overhead from generic code (JC, OK), pp. 349–375.
GPCEGPCE-2011-EsmaeilsabzaliFA #aspect-oriented #automation #modelling #monitoring
Monitoring aspects for the customization of automatically generated code for big-step models (SE, BF, JMA), pp. 117–126.
GPCEGPCE-2011-Shubert #code generation #development #flexibility #modelling
Application of model based development to flexible code generation (GJS), pp. 95–96.
CGOCGO-2011-HardekopfL #analysis #pointer
Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
DACDAC-2011-StattelmannBR #optimisation #performance #simulation
Fast and accurate source-level simulation of software timing considering complex code optimizations (SS, OB, WR), pp. 486–491.
DACDAC-2011-ZattSSABH #adaptation #energy #estimation #multi #runtime #video
Run-time adaptive energy-aware motion and disparity estimation in multiview video coding (BZ, MS, FS, LVA, SB, JH), pp. 1026–1031.
DATEDATE-2011-AgyekumN #communication #hardware #robust
A delay-insensitive bus-invert code and hardware support for robust asynchronous global communication (MYA, SMN), pp. 1370–1375.
DATEDATE-2011-AnjamNW #multi #runtime
Targeting code diversity with run-time adjustable issue-slots in a chip multiprocessor (FA, MN, SW), pp. 1358–1363.
DATEDATE-2011-BaiDDC #network #program transformation #programming #runtime
Simplified programming of faulty sensor networks via code transformation and run-time interval computation (LSB, RPD, PAD, PHC), pp. 88–93.
DATEDATE-2011-BaiocchiC #embedded
Demand code paging for NAND flash in MMU-less embedded systems (JB, BRC), pp. 517–532.
DATEDATE-2011-LiuV #analysis #generative #performance #source code #validation
Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
DATEDATE-2011-RossiTSM #analysis #fault #memory management #performance #reliability
Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
DATEDATE-2011-ZattSBH #architecture #estimation #hardware #parallel #pipes and filters #throughput #video
Multi-level pipelined parallel hardware architecture for high throughput motion and disparity estimation in Multiview Video Coding (BZ, MS, SB, JH), pp. 1448–1453.
HPCAHPCA-2011-SampsonVGGST #performance
Efficient complex operators for irregular codes (JS, GV, NGH, SG, SS, MBT), pp. 491–502.
LCTESLCTES-2011-BhagatGSG #effectiveness #optimisation
Global productiveness propagation: a code optimization technique to speculatively prune useless narrow computations (IB, EG, FJS, AG), pp. 161–170.
LCTESLCTES-2011-SahaLM #approach #kernel #linux
An approach to improving the structure of error-handling code in the linux kernel (SS, JLL, GM), pp. 41–50.
PDPPDP-2011-JacksonRBHWACS #optimisation #parallel
Parallel Optimisation Strategies for Fusion Codes (AJ, FR, SB, JH, JW, MA, MC, AS), pp. 357–364.
PDPPDP-2011-PascualRMBCL #case study #monte carlo #performance
More Efficient Executions of Monte Carlo Fusion Codes by Means of Montera: The ISDEP Use Case (MARP, AJRM, RM, AB, FC, IML), pp. 380–384.
PDPPDP-2011-Peter #distributed #reliability
Reliability Study of Coding Schemes for Wide-Area Distributed Storage Systems (KP), pp. 19–23.
FASEFASE-2011-CaiK #empirical
An Empirical Study of Long-Lived Code Clones (DC, MK), pp. 432–446.
FASEFASE-2011-HolzerJKLSTV #modelling #testing
Seamless Testing for Models and Code (AH, VJ, SK, BL, CS, MT, HV), pp. 278–293.
STOCSTOC-2011-BarakDYW #bound #design #geometry #matrix #rank
Rank bounds for design matrices with applications toc ombinatorial geometry and locally correctable codes (BB, ZD, AY, AW), pp. 519–528.
STOCSTOC-2011-BravermanR #communication #fault #interactive #towards
Towards coding for maximum errors in interactive communication (MB, AR), pp. 159–166.
STOCSTOC-2011-Haeupler #network
Analyzing network coding gossip made easy (BH), pp. 293–302.
STOCSTOC-2011-KoppartySY
High-rate codes with sublinear-time decoding (SK, SS, SY), pp. 167–176.
CAVCAV-2011-BardinHLLTV #analysis #framework
The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
CAVCAV-2011-BerdineCI #memory management #named #safety
SLAyer: Memory Safety for Systems-Level Code (JB, BC, SI), pp. 178–183.
CAVCAV-2011-GveroKP #interactive #synthesis
Interactive Synthesis of Code Snippets (TG, VK, RP), pp. 418–423.
CAVCAV-2011-Lahiri #analysis #composition #smt
SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
CAVCAV-2011-RamosE #equivalence #verification
Practical, Low-Effort Equivalence Verification of Real Code (DAR, DRE), pp. 669–685.
ICSTICST-2011-NandaMSHO #testing
Regression testing in the presence of non-code changes (AN, SM, SS, MJH, AO), pp. 21–30.
ISSTAISSTA-2011-GligoricMK #code generation #named #performance
CoDeSe: fast deserialization via code generation (MG, DM, SK), pp. 298–308.
ISSTAISSTA-2011-RosenblumMZ
Recovering the toolchain provenance of binary code (NER, BPM, XZ), pp. 100–110.
TAPTAP-2011-DrossFM
Correct Code Containing Containers (CD, JCF, YM), pp. 102–118.
VMCAIVMCAI-2011-Logozzo #abstract interpretation #verification
Practical Verification for the Working Programmer with CodeContracts and Abstract Interpretation — (FL), pp. 19–22.
CBSECBSE-2010-GamaD #component #execution #self
A Self-healing Component Sandbox for Untrustworthy Third Party Code Execution (KG, DD), pp. 130–149.
ECSAECSA-2010-ChardignyS #architecture #documentation #object-oriented #process #source code
Software Architecture Recovery Process Based on Object-Oriented Source Code and Documentation (SC, AS), pp. 409–416.
QoSAQoSA-2010-KapovaGBH #maintenance #metric #model transformation
Evaluating Maintainability with Code Metrics for Model-to-Model Transformations (LK, TG, SB, JH), pp. 151–166.
DocEngDocEng-2010-Bagley #compilation #lessons learnt
Lessons from the dragon: compiling PDF to machine code (SRB), pp. 65–68.
DRRDRR-2010-SankarasubramaniamNVK #approach #detection #documentation
Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
TPDLECDL-2010-Richardson #ambiguity #automation #set
Automated Country Name Disambiguation for Code Set Alignment (GR), pp. 498–501.
HTHT-2010-BaeJW #web
Show my code in the web (MJB, JHJ, GW), pp. 309–310.
EDMEDM-2010-CadeO #modelling #topic #using
Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
SIGITESIGITE-2010-KayamaFKTS #exclamation #learning
Let’s go! magical spoons: a high school learning program for information coding fundamentals (MK, TF, AK, TT, CS), pp. 95–104.
SIGITESIGITE-2010-WaldmannL #collaboration #eclipse #framework #platform #realtime
Integrating the google wave platform with eclipse for collaborative, real-time code creation (BAW, DJL), pp. 69–72.
CSMRCSMR-2010-ButlerWYS #empirical #identifier #quality
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 156–165.
CSMRCSMR-2010-JurgensDH
Code Similarities Beyond Copy & Paste (EJ, FD, BH), pp. 78–87.
CSMRCSMR-2010-KellensNSRD #co-evolution #source code
Co-evolving Annotations and Source Code through Smart Annotations (AK, CN, KDS, CDR, TD), pp. 117–126.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-MarinescuGV #assessment #named #quality
InCode: Continuous Quality Assessment and Improvement (RM, GG, IV), pp. 274–275.
ICPCICPC-2010-BacchelliDL #source code
Extracting Source Code from E-Mails (AB, MD, ML), pp. 24–33.
ICPCICPC-2010-JablonskiH #identifier
Renaming Parts of Identifiers Consistently within Code Clones (PJ, DH), pp. 38–39.
ICSMEICSM-2010-HummelJHC #clone detection #detection #distributed #incremental #scalability
Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
ICSMEICSM-2010-KeivanlooRSR #code search #framework #named #scalability #semantics #source code
SE-CodeSearch: A scalable Semantic Web-based source code search infrastructure (IK, LR, PS, JR), pp. 1–5.
ICSMEICSM-2010-Mantyla #empirical #smell
Empirical software evolvability — code smells and human evaluations (MM), pp. 1–6.
ICSMEICSM-2010-OlbrichCS #case study #evolution #open source #smell
Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems (SMO, DC, DIKS), pp. 1–10.
ICSMEICSM-2010-SavageDGP #named #source code #topic #using
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
MSRMSR-2010-PentaGA #approach #identification #using
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
PASTEPASTE-2010-Rubio-GonzalezL #documentation #fault
Expect the unexpected: error code mismatches between documentation and the real world (CRG, BL), pp. 73–80.
SCAMSCAM-2010-GrantC #analysis #concept #source code
Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
SCAMSCAM-2010-Harman #analysis #source code #why
Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
SCAMSCAM-2010-SahaAZRS #empirical
Evaluating Code Clone Genealogies at Release Level: An Empirical Study (RKS, MA, MFZ, CKR, KAS), pp. 87–96.
WCREWCRE-2010-Arnaoudova #quality #source code
Improving Source Code Quality through the Definition of Linguistic Antipatterns (VA), pp. 285–288.
WCREWCRE-2010-BiegelD #clone detection #configuration management #detection
Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
WCREWCRE-2010-ChenWZZHNQCG #c #decompiler #readability
A Refined Decompiler to Generate C Code with High Readability (GC, ZW, RZ, KZ, SH, KN, ZQ, KC, HG), pp. 150–154.
WCREWCRE-2010-DavisG #assembly #detection #source code
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
WCREWCRE-2010-DebrayP #reverse engineering #self
Reverse Engineering Self-Modifying Code: Unpacker Extraction (SKD, JP), pp. 131–140.
WCREWCRE-2010-Eshkevari #identifier #refactoring #source code
Linguistic Driven Refactoring of Source Code Identifiers (LME), pp. 297–300.
WCREWCRE-2010-GomezDD #integration #source code #visual notation
Visually Supporting Source Code Changes Integration: The Torch Dashboard (VUG, SD, TD), pp. 55–64.
WCREWCRE-2010-Guerrouj #analysis #automation #concept #identifier #source code
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary #using
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCREWCRE-2010-KagdiGPC #concept #impact analysis #source code
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code (HHK, MG, DP, MLC), pp. 119–128.
WCREWCRE-2010-LawrieBM #normalisation #source code
Normalizing Source Code Vocabulary (DJL, DB, CM), pp. 3–12.
WCREWCRE-2010-LozanoKMA #mining #source code
Mining Source Code for Structural Regularities (AL, AK, KM, GA), pp. 22–31.
ICALPICALP-v2-2010-BlasiakK #network
The Serializability of Network Codes (AB, RDK), pp. 100–114.
FLOPSFLOPS-2010-HaftmannN #code generation #higher-order #term rewriting
Code Generation via Higher-Order Rewrite Systems (FH, TN), pp. 103–117.
ICFPICFP-2010-ArnoldHKBS #matrix #specification #verification
Specifying and verifying sparse matrix codes (GA, JH, ASK, RB, MS), pp. 249–260.
CHICHI-2010-BragdonZRKCKCAL #comprehension #interface #maintenance
Code bubbles: a working set-based interface for code understanding and maintenance (AB, RCZ, SPR, SK, WC, JK, CC, FA, JJLJ), pp. 2503–2512.
SOFTVISSOFTVIS-2010-Murphy-HillB #interactive #smell #visualisation
An interactive ambient visualization for code smells (ERMH, APB), pp. 5–14.
SOFTVISSOFTVIS-2010-ParninGR #interactive #maintenance #named #programming
CodePad: interactive spaces for maintaining concentration in programming environments (CP, CG, SR), pp. 15–24.
ICEISICEIS-J-2010-ArtignanH10a #automation #generative #visual notation
From Coding to Automatic Generation of Legends in Visual Analytics (GA, MH), pp. 404–417.
CIKMCIKM-2010-SilvestriV #encoding #integer #named #performance #programming
VSEncoding: efficient coding and fast decoding of integer lists via dynamic programming (FS, RV), pp. 1219–1228.
ICMLICML-2010-GregorL #approximate #learning #performance
Learning Fast Approximations of Sparse Coding (KG, YL), pp. 399–406.
ICMLICML-2010-WangKC #learning
Sequential Projection Learning for Hashing with Compact Codes (JW, SK, SFC), pp. 1127–1134.
ICMLICML-2010-YuZ #coordination #using
Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPRICPR-2010-ArvanitopoulosBT #fault #linear #subclass #using
Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPRICPR-2010-BalujaC #learning #performance #retrieval
Beyond “Near Duplicates”: Learning Hash Codes for Efficient Similar-Image Retrieval (SB, MC), pp. 543–547.
ICPRICPR-2010-BattiatoFGMR
Boosting Gray Codes for Red Eyes Removal (SB, GMF, MG, GM, DR), pp. 4214–4217.
ICPRICPR-2010-BenvenisteU #invariant
A Color Invariant Based Binary Coded Structured Light Range Scanner for Shiny Objects (RB, ), pp. 798–801.
ICPRICPR-2010-CiompiPR #approach #random #using
A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPRICPR-2010-DaiYW #classification #image
Three-layer Spatial Sparse Coding for Image Classification (DD, WY, TW), pp. 613–616.
ICPRICPR-2010-DengSS #detection #network #pattern matching #pattern recognition #recognition
Applying Error-Correcting Output Coding to Enhance Convolutional Neural Network for Target Detection and Pattern Recognition (HD, GS, CYS), pp. 4291–4294.
ICPRICPR-2010-EscaleraMPRP #fault #framework #online
Adding Classes Online in Error Correcting Output Codes Framework (SE, DM, EP, PR, OP), pp. 2945–2948.
ICPRICPR-2010-GhanemA #linear #recognition
Sparse Coding of Linear Dynamical Systems with an Application to Dynamic Texture Recognition (BG, NA), pp. 987–990.
ICPRICPR-2010-LawalAM #abduction #classification #network #recognition #using
Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPRICPR-2010-LuoN #classification #fault #learning #multi #problem
Employing Decoding of Specific Error Correcting Codes as a New Classification Criterion in Multiclass Learning Problems (YL, KN), pp. 4238–4241.
ICPRICPR-2010-OGorman #analysis #latency #speech
Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
ICPRICPR-2010-OudaTN
Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes (OO, NT, TN), pp. 882–885.
ICPRICPR-2010-SmithW #analysis
A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
ICPRICPR-2010-TarafdarMPPK #documentation #multi #retrieval
Shape Code Based Word-Image Matching for Retrieval of Indian Multi-lingual Documents (AT, RM, SP, UP, FK), pp. 1989–1992.
ICPRICPR-2010-WangYLZLCT #distance #novel
A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding (RW, XY, XL, SZ, PL, KC, JT), pp. 886–889.
ICPRICPR-2010-WuLSZ #modelling #word
Integrating ILSR to Bag-of-Visual Words Model Based on Sparse Codes of SIFT Features Representations (LW, SL, WS, XZ), pp. 4283–4286.
KDDKDD-2010-YanFDR #classification
Medical coding classification by leveraging inter-code relationships (YY, GF, JGD, RR), pp. 193–202.
SEKESEKE-2010-AlhassanCB #analysis #fault #network #people #social
Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
SEKESEKE-2010-ArrudaCD #detection #framework #using
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-BaratK #approach #code generation #configuration management #development #modelling
Developing configurable extensible code generators for model-driven development approach (SB, VK), pp. 577–582.
SEKESEKE-2010-WangWLX #developer
Assisting Developers to Read Code Help-Documents Efficiently through Discovering Document-section Relationships (LW, LW, GL, BX), pp. 367–373.
ECMFAECMFA-2010-EichbergMKM #execution #modelling
Model-Driven Engineering of Machine Executable Code (ME, MM, SK, MM), pp. 104–115.
MODELSMoDELS-v1-2010-RahimW #code generation #consistency #semantics #state machine #verification
Verifying Semantic Conformance of State Machine-to-Java Code Generators (LAR, JW), pp. 166–180.
SPLCSPLC-2010-BergerSLCW #product line #scalability
Feature-to-Code Mapping in Two Large Product Lines (TB, SS, RL, KC, AW), pp. 498–499.
SPLCSPLC-2010-GhanamM #execution #feature model #modelling #testing #using
Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
ECOOPECOOP-2010-Lea
Code Roots (DL), p. 1.
ECOOPECOOP-2010-SchaferDSTT #concurrent #java #refactoring
Correct Refactoring of Concurrent Java Code (MS, JD, MS, ET, FT), pp. 225–249.
OOPSLAOOPSLA-2010-GabelYYGS #consistency #detection #nondeterminism #scalability #source code
Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
OOPSLAOOPSLA-2010-HerzeelC #control flow #interactive #parallel #recursion
Dynamic parallelization of recursive code: part 1: managing control flow interactions with the continuator (CH, PC), pp. 377–396.
OOPSLAOOPSLA-2010-LernerVG #aspect-oriented #javascript #using
Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
TOOLSTOOLS-EUROPE-2010-HeideggerT #javascript #testing
Contract-Driven Testing of JavaScript Code (PH, PT), pp. 154–172.
PADLPADL-2010-LiT #detection #erlang #source code
Similar Code Detection and Elimination for Erlang Programs (HL, SJT), pp. 104–118.
POPLPOPL-2010-BhargavanFG #composition #protocol #security #type system #verification
Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
POPLPOPL-2010-WrigstadNLOV #scripting language
Integrating typed and untyped code in a scripting language (TW, FZN, SL, , JV), pp. 377–388.
SASSAS-2010-Fahndrich #contract #verification
Static Verification for Code Contracts (MF), pp. 2–5.
RERE-2010-EgyedGG #quality
Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments (AE, FG, PG), pp. 221–230.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface #using
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
ASEASE-2010-BalzSG #maintenance #modelling #state machine #tool support
Tool support for continuous maintenance of state machine models in program code (MB, MS, MG), pp. 175–176.
ASEASE-2010-BiegelD #api #clone detection #detection #flexibility #implementation #named
JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
ASEASE-2010-Chen #documentation #source code #traceability #visualisation
Extraction and visualization of traceability relationships between documents and source code (XC), pp. 505–510.
ASEASE-2010-GermanMI #automation #identification #source code
A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
ASEASE-2010-KessentiniVS #identification #risk management
Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
ASEASE-2010-MontrieuxJHYST #code generation #tool support
Tool support for code generation from a UMLsec property (LM, JJ, CBH, YY, PYS, HT), pp. 357–358.
ASEASE-2010-RajeevSSR #code generation #named #testing
CoGenTe: a tool for code generator testing (ACR, PS, KCS, SR), pp. 349–350.
ASEASE-2010-SchulteFW #assembly #automation #evolution #program repair
Automated program repair through the evolution of assembly code (ES, SF, WW), pp. 313–316.
ASEASE-2010-TaleghaniA
Search-carrying code (AT, JMA), pp. 367–376.
FSEFSE-2010-BajracharyaOL #effectiveness #repository #retrieval #similarity
Leveraging usage similarity for effective retrieval of examples in code repositories (SKB, JO, CVL), pp. 157–166.
FSEFSE-2010-GabelS #case study #source code
A study of the uniqueness of source code (MG, ZS), pp. 147–156.
FSEFSE-2010-LeeRHK #clone detection
Instant code clone search (MWL, JWR, SwH, SK), pp. 167–176.
ICSEICSE-2010-AdamsJH #identification #using
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-BacchelliLR #source code
Linking e-mails and source code artifacts (AB, ML, RR), pp. 375–384.
ICSEICSE-2010-Bragdon
Developing and evaluating the code bubbles metaphor (AB), pp. 525–526.
ICSEICSE-2010-BragdonRZKCKCAL #development #ide #paradigm #user interface
Code bubbles: rethinking the user interface paradigm of integrated development environments (AB, SPR, RCZ, SK, WC, JK, CC, FA, JJLJ), pp. 455–464.
ICSEICSE-2010-BragdonRZKCKCAL10a #research
A research demonstration of code bubbles (AB, SPR, RCZ, SK, WC, JK, CC, FA, JJLJ), pp. 293–296.
ICSEICSE-2010-Cleland-HuangCGE #approach #machine learning #requirements
A machine learning approach for tracing regulatory codes to product specific requirements (JCH, AC, MG, JE), pp. 155–164.
ICSEICSE-2010-DeissenboeckHJ #clone detection #detection
Code clone detection in practice (FD, BH, EJ), pp. 499–500.
ICSEICSE-2010-DeLineR #development #towards
Code canvas: zooming towards better development environments (RD, KR), pp. 207–210.
ICSEICSE-2010-FritzOMM #source code
A degree-of-knowledge model to capture source code familiarity (TF, JO, GCM, ERMH), pp. 385–394.
ICSEICSE-2010-GenevesL #source code #xquery
Eliminating dead-code from XQuery programs (PG, NL), pp. 305–306.
ICSEICSE-2010-GuoSZS #empirical #smell
Domain-specific tailoring of code smells: an empirical study (YG, CBS, NZ, FS), pp. 167–170.
ICSEICSE-2010-Gysin #code search #social
Improved social trustability of code search results (FSG), pp. 513–514.
ICSEICSE-2010-HaiducAM #comprehension #source code #summary
Supporting program comprehension with source code summarization (SH, JA, AM), pp. 223–226.
ICSEICSE-2010-UbayashiNT #architecture #contract #design #named
Archface: a contract place where architectural design and code meet together (NU, JN, TT), pp. 75–84.
SACSAC-2010-DaroncoRL #assessment #quality #scalability #video
Subjective video quality assessment applied to scalable video coding and transmission instability (LCD, VR, JVdL), pp. 1898–1904.
SACSAC-2010-GiuntaPT #aspect-oriented #design pattern #using
Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SACSAC-2010-GravinoTS #analysis #comprehension #empirical #modelling #source code
An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
SACSAC-2010-HonoratoB #named #towards
NCL-inspector: towards improving NCL code (GdSCH, SDJB), pp. 1946–1947.
SACSAC-2010-LeeJL #detection #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LesnerBBB #detection #exclamation #framework #novel #source code #student
A novel framework to detect source code plagiarism: now, students have to work for real! (BL, RB, CB, GB), pp. 57–58.
SACSAC-2010-MilettoPSB #music #social #web
Social music making on the web with CODES (EMM, MSP, JPS, FB), pp. 876–877.
SACSAC-2010-SamiF #estimation #metric
Design-level metrics estimation based on code metrics (AS, SMF), pp. 2531–2535.
GPCEGPCE-2010-RompfO #approach #code generation #composition #domain-specific language #lightweight #runtime #staging
Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs (TR, MO), pp. 127–136.
GPCEGPCE-2010-SchulzeAK #feature model #product line
Code clones in feature-oriented software product lines (SS, SA, CK), pp. 103–112.
GPCEGPCE-2010-WurthingerBAMM #aspect-oriented #development #evolution #java #programming #user interface
Applications of enhanced dynamic code evolution for Java in GUI development and dynamic aspect-oriented programming (TW, WB, DA, PM, HM), pp. 123–126.
CCCC-2010-BaskaranRS #automation #code generation #source code
Automatic C-to-CUDA Code Generation for Affine Programs (MMB, JR, PS), pp. 244–263.
CCCC-2010-DingO #algorithm #representation #strict
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values (SD, ), pp. 26–45.
CCCC-2010-JockschMSGA #compilation #mining
Mining Opportunities for Code Improvement in a Just-In-Time Compiler (AJ, MM, JS, NG, JNA), pp. 10–25.
CGOCGO-2010-KochBF #code generation
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bit instructions (TJKEvK, IB, BF), pp. 180–189.
CGOCGO-2010-Srisa-anCSS #memory management #self
A self-adjusting code cache manager to balance start-up time and memory usage (WSa, MBC, YS, MS), pp. 82–91.
CGOCGO-2010-YuXHFZ #analysis #pointer #scalability
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
DATEDATE-2010-AgyekumN #communication #hardware #robust
An error-correcting unordered code and hardware support for robust asynchronous global communication (MYA, SMN), pp. 765–770.
DATEDATE-2010-BaudischBS #independence #parallel #source code #thread
Multithreaded code from synchronous programs: Extracting independent threads for OpenMP (DB, JB, KS), pp. 949–952.
DATEDATE-2010-CharfiMGTB #code generation #modelling #optimisation #towards
Toward optimized code generation through model-based optimization (AC, CM, SG, FT, PB), pp. 1313–1316.
DATEDATE-2010-ChenW #adaptation #memory management #random
An adaptive code rate EDAC scheme for random access memory (CYC, CWW), pp. 735–740.
DATEDATE-2010-CollinsVC #code generation #manycore #parallel #recursion
Recursion-driven parallel code generation for multi-core platforms (RLC, BV, LPC), pp. 190–195.
DATEDATE-2010-HuangCLH #robust
A robust ADC code hit counting technique (JLH, KYC, MHL, XLH), pp. 1749–1754.
DATEDATE-2010-MayIWR
A 150Mbit/s 3GPP LTE Turbo code decoder (MM, TI, NW, WR), pp. 1420–1425.
DATEDATE-2010-ZhangDYMZKCPS #code generation #compilation #evaluation
A special-purpose compiler for look-up table and code generation for function evaluation (YZ, LD, PY, SPM, HZ, MTK, CC, NP, XS), pp. 1130–1135.
LCTESLCTES-2010-LiZ #embedded #mobile #performance
An efficient code update scheme for DSP applications in mobile embedded systems (WL, YZ), pp. 105–114.
PDPPDP-2010-LorenzoPLRS #lessons learnt #migration #parallel
Lessons Learnt Porting Parallelisation Techniques for Irregular Codes to NUMA Systems (JAL, JCP, DLL, FFR, DES), pp. 213–217.
PDPPDP-2010-Rodriguez-PascualGCRLM #grid
A Grid Version of the Fusion Code FAFNER (MARP, JG, FC, AJRM, IML, RM), pp. 449–453.
PDPPDP-2010-TskhakayaSSBYW #simulation
PIC/MC Code BIT1 for Plasma Simulations on HPC (DT, AS, RS, MB, EY, JW), pp. 476–481.
FASEFASE-2010-HashimotoM #evolution
A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
STOCSTOC-2010-GuruswamiHK #linear #on the #random
On the list-decodability of random linear codes (VG, JH, SK), pp. 409–416.
STOCSTOC-2010-KoppartyS #fault #linear #random #testing
Local list-decoding and testing of random linear codes from high error (SK, SS), pp. 417–426.
TACASTACAS-2010-DonaldsonKR #analysis #automation #manycore #memory management
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
TACASTACAS-2010-KatzP #automation #verification
Code Mutation in Verification and Automatic Code Correction (GK, DP), pp. 435–450.
CAVCAV-2010-Jha #legacy #security
Retrofitting Legacy Code for Security (SJ), p. 19.
CAVCAV-2010-RepsLTBL #verification
There’s Plenty of Room at the Bottom: Analyzing and Verifying Machine Code (TWR, JL, AVT, GB, AL), pp. 41–56.
CAVCAV-2010-ThakurLLBDEAR #generative #proving
Directed Proof Generation for Machine Code (AVT, JL, AL, AB, ED, ME, TA, TWR), pp. 288–305.
CSLCSL-2010-BiancoMM #logic
Graded Computation Tree Logic with Binary Coding (AB, FM, AM), pp. 125–139.
ICLPICLP-2010-Dandois10 #logic programming #program analysis #source code
Program analysis for code duplication in logic programs (CD), pp. 241–247.
ICSTICST-2010-GligoricJM #mutation testing #named #parallel #performance #testing #thread
MuTMuT: Efficient Exploration for Mutation Testing of Multithreaded Code (MG, VJ, DM), pp. 55–64.
ISSTAISSTA-2010-CarbinR #automation #identification
Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
WICSA-ECSAWICSA-ECSA-2009-BontaB #algebra #architecture #code generation #java #named #process
PADL2Java: A Java code generator for process algebraic architectural descriptions (EB, MB), pp. 161–170.
ICDARICDAR-2009-BaiLT #documentation #image #keyword #word
Keyword Spotting in Document Images through Word Shape Coding (SB, LL, CLT), pp. 331–335.
ICDARICDAR-2009-DengSS #network #recognition
Error-Correcting Output Coding for the Convolutional Neural Network for Optical Character Recognition (HD, GS, CYS), pp. 581–585.
ICDARICDAR-2009-LiT #identification #independence #online #sequence
Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes (BL, TT), pp. 931–935.
ICDARICDAR-2009-PalRRK #automation #multi #recognition #string
Indian Multi-Script Full Pin-code String Recognition for Postal Automation (UP, RKR, KR, FK), pp. 456–460.
ICDARICDAR-2009-SiddiqiV #recognition #set
A Set of Chain Code Based Features for Writer Recognition (IS, NV), pp. 981–985.
JCDLJCDL-2009-EdvardsenSAT #automation #documentation #generative #metadata #quality
Automatically generating high quality metadata by analyzing the document code of common file types (LFHE, IS, TA, HT), pp. 29–38.
ITiCSEITiCSE-2009-Gibson #reuse
Software reuse and plagiarism: a code of practice (JPG), pp. 55–59.
ITiCSEITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming #using
Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ICPCICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-AbebeHMTA #evolution #source code
Analyzing the Evolution of the Source Code Vocabulary (SLA, SH, AM, PT, GA), pp. 189–198.
CSMRCSMR-2009-Ghazarian #case study #evolution #source code
A Case Study of Source Code Evolution (AG), pp. 159–168.
CSMRCSMR-2009-LuciaDGR #behaviour #identification #parsing #visual notation
Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation (ADL, VD, CG, MR), pp. 99–108.
ICPCICPC-2009-AuprasertL #representation #source code
Representing source code with Granular hierarchical structures (BA, YL), pp. 319–320.
ICPCICPC-2009-CeccatoPNFRTT #assessment #effectiveness #obfuscation #source code
The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
ICPCICPC-2009-ChilowiczDR #detection #similarity #source code #syntax
Syntax tree fingerprinting for source code similarity detection (MC, ÉD, GR), pp. 243–247.
ICPCICPC-2009-HammadCM #automation #identification #traceability
Automatically identifying changes that impact code-to-design traceability (MH, MLC, JIM), pp. 20–29.
ICPCICPC-2009-HanWYCZL #clustering #comprehension #design pattern #open source #source code
Design pattern directed clustering for understanding open source code (ZH, LW, LY, XC, JZ, XL), pp. 295–296.
ICPCICPC-2009-NilssonLHN #fact extraction #natural language #parsing #source code
Natural language parsing for fact extraction from source code (JN, WL, JH, JN), pp. 223–227.
ICPCICPC-2009-PortoMF #comprehension #named #visualisation
CRISTA: A tool to support code comprehension based on visualization and reading technique (DP, MGM, SCPFF), pp. 285–286.
ICSMEICSM-2009-Adams #co-evolution #source code
Co-evolution of source code and the build system (BA), pp. 461–464.
ICSMEICSM-2009-AlamAH #dependence #using
Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSMEICSM-2009-HolmesCWD #case study #source code #using
The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSMEICSM-2009-HouJJ
Proactively managing copy-and-paste induced code clones (DH, FJ, PJ), pp. 391–392.
ICSMEICSM-2009-NigulM #maintenance
Software maintainability benefits from annotation-driven code (LN, EM), pp. 417–421.
ICSMEICSM-2009-PletcherH #api #code completion #named #usability
BCC: Enhancing code completion for better API usability (DMP, DH), pp. 393–394.
ICSMEICSM-2009-Reiss #code search #semantics
Semantics-based code search demonstration proposal (SPR), pp. 385–386.
ICSMEICSM-2009-Wang #developer #motivation #source code #what
What motivate software engineers to refactor source code? evidences from professional developers (YW), pp. 413–416.
ICSMEICSM-2009-WitZD #clone tracking #using
Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSMEICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability #using
Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
ICSMEICSM-2009-Zhang #fault
An investigation of the relationships between lines of code and defects (HZ), pp. 274–283.
MSRMSR-2009-BajracharyaL #code search #mining #topic
Mining search topics from a code search engine usage log (SKB, CVL), pp. 111–120.
MSRMSR-2009-BoogerdM #standard
Evaluating the relation between coding standard violations and faultswithin and across software versions (CB, LM), pp. 41–50.
MSRMSR-2009-EnslenHPV #analysis #automation #identifier #mining #source code
Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
MSRMSR-2009-GermanPGA
Code siblings: Technical and legal implications of copying code between applications (DMG, MDP, YGG, GA), pp. 81–90.
MSRMSR-2009-HattoriL #mining
Mining the history of synchronous changes to refine code ownership (LH, ML), pp. 141–150.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #using #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSRMSR-2009-LubsenZP #co-evolution #using
Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSRMSR-2009-Mockus #scalability #source code #towards #version control
Amassing and indexing a large sample of version control systems: Towards the census of public source code history (AM), pp. 11–20.
SCAMSCAM-2009-GutzmannS #java
Backporting Java 5 Code (TG, TS), pp. 121–122.
SCAMSCAM-2009-KlintSV #analysis #domain-specific language #named #rascal #source code
RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
SCAMSCAM-2009-Prause #fine-grained #maintenance #metadata
Maintaining Fine-Grained Code Metadata Regardless of Moving, Copying and Merging (CP), pp. 109–118.
WCREWCRE-1999-AlamAH99a #case study #dependence
A Study of the Time Dependence of Code Changes (OA, BA, AEH), pp. 21–30.
WCREWCRE-1999-AnquetilRAAHPPP99a #architecture #java #named #source code
JavaCompExt: Extracting Architectural Elements from Java Source Code (NA, JCR, PA, GA, PH, TP, DP, VP), pp. 317–318.
WCREWCRE-1999-BacchelliDLR99a #benchmark #lightweight #metric #source code
Benchmarking Lightweight Techniques to Link E-Mails and Source Code (AB, MD, ML, RR), pp. 205–214.
WCREWCRE-1999-BettenburgSIAZH99a #consistency #empirical
An Empirical Study on Inconsistent Changes to Code Clones at Release Level (NB, WS, WMI, BA, YZ, AEH), pp. 85–94.
WCREWCRE-1999-ButlerWYS99a #empirical #identifier #quality
Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
WCREWCRE-1999-HigoK99a #clone detection #dependence #detection #graph #quality
Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
WCREWCRE-1999-KawaguchiYUFKNI99a #automation #clone detection #detection #ide #named
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
WCREWCRE-1999-KhomhPG99a #case study #smell
An Exploratory Study of the Impact of Code Smells on Software Change-proneness (FK, MDP, YGG), pp. 75–84.
WCREWCRE-1999-LetarteM99a #interprocedural #modelling #php
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code (DL, EM), pp. 187–191.
WCREWCRE-1999-PentaG99a #how #question #source code
Who are Source Code Contributors and How do they Change? (MDP, DMG), pp. 11–20.
WCREWCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code #using
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
ICALPICALP-v1-2009-KobayashiGNR #communication #network #quantum
General Scheme for Perfect Quantum Network Coding with Free Classical Communication (HK, FLG, HN, MR), pp. 622–633.
ICFPICFP-2009-Steele #execution #functional #parallel
Organizing functional code for parallel execution or, foldl and foldr considered slightly harmful (GLSJ), pp. 1–2.
CHICHI-2009-BrandtGLDK #learning #programming #web
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code (JB, PJG, JL, MD, SRK), pp. 1589–1598.
CHICHI-2009-JakobsenH #source code #using #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
VISSOFTVISSOFT-2009-CottrellGHWD #source code #visual notation
Compare and contrast: Visual exploration of source code examples (RC, BG, RH, RJW, JD), pp. 29–32.
VISSOFTVISSOFT-2009-ParkJ #open source #visualisation
Beyond pretty pictures: Examining the benefits of code visualization for Open Source newcomers (YP, CJ), pp. 3–10.
VISSOFTVISSOFT-2009-TeleaHER #c #c++ #case study #comparative #dependence #scalability #visualisation
Extraction and visualization of call dependencies for large C/C++ code bases: A comparative study (ACT, HH, OE, DR), pp. 81–88.
CIKMCIKM-2009-GedikAW #approach #code generation #data type #distributed #optimisation
A code generation approach to optimizing high-performance distributed data stream processing (BG, HA, KLW), pp. 847–856.
ICMLICML-2009-MairalBPS #learning #online #taxonomy
Online dictionary learning for sparse coding (JM, FRB, JP, GS), pp. 689–696.
KDDKDD-2009-BohmHMP #detection #named
CoCo: coding cost for parameter-free outlier detection (CB, KH, NSM, CP), pp. 149–158.
RecSysRecSys-2009-WeimerKB #matrix #recommendation
Maximum margin matrix factorization for code recommendation (MW, AK, MB), pp. 309–312.
SEKESEKE-2009-AxelssonBFSK #code review #detection #fault #interactive #machine learning #overview #visualisation
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning (SA, DB, RF, DS, DK), pp. 412–417.
SEKESEKE-2009-HauboldBG #code generation #metamodelling #object-oriented #uml
A Pragmatic UML-based Meta Model for Object-oriented Code Generation (TH, GB, WG), pp. 733–738.
SIGIRSIGIR-2009-LinYCWW #approach #modelling #semantics #thread
Simultaneously modeling semantics and structure of threaded discussions: a sparse coding approach and its applications (CL, JMY, RC, XJW, WW, LZ), pp. 131–138.
MODELSMoDELS-2009-MoiseevHS #approach #generative #implementation #ocl
Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
MODELSMoDELS-2009-MoiseevHS #approach #generative #implementation #ocl
Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages (RM, SH, MS), pp. 650–664.
OOPSLAOOPSLA-2009-LeeHGM #debugging
Debug all your code: portable mixed-environment debugging (BL, MH, RG, KSM), pp. 207–226.
OOPSLAOOPSLA-2009-Mullen #design #people
Writing code for other people: cognitive psychology and the fundamentals of good software design principles (TM), pp. 481–492.
OOPSLAOOPSLA-2009-PluquetLW #graph #in memory #performance #version control
Executing code in the past: efficient in-memory object graph versioning (FP, SL, RW), pp. 391–408.
TOOLSTOOLS-EUROPE-2009-CaronCMV #adaptation #component #framework #functional
A Coding Framework for Functional Adaptation of Coarse-Grained Components in Extensible EJB Servers (OC, BC, AM, GV), pp. 215–230.
AdaEuropeAdaEurope-2009-LasnierZPH #analysis #automation #code generation #modelling
Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
PLDIPLDI-2009-TristanL #lazy evaluation #validation
Verified validation of lazy code motion (JBT, XL), pp. 316–326.
POPLPOPL-2009-BartheGB #certification #encryption #proving
Formal certification of code-based cryptographic proofs (GB, BG, SZB), pp. 90–101.
POPLPOPL-2009-ConditHLQ #low level #type checking
Unifying type checking and property checking for low-level code (JC, BH, SKL, SQ), pp. 302–314.
POPLPOPL-2009-LublinermanST #code generation #composition #diagrams
Modular code generation from synchronous block diagrams: modularity vs. code size (RL, CS, ST), pp. 78–89.
POPLPOPL-2009-SarkarSNORBMA #multi #semantics
The semantics of x86-CC multiprocessor machine code (SS, PS, FZN, SO, TR, TB, MOM, JA), pp. 379–391.
RERE-2009-OmoronyiaSRFW #case study #developer #navigation #source code #traceability
Use Case to Source Code Traceability: The Developer Navigation View Point (IO, GS, MR, JDF, MW), pp. 237–242.
ASEASE-2009-HanWM #code completion
Code Completion from Abbreviated Input (SH, DRW, RCM), pp. 332–343.
ASEASE-2009-KawrykowR #api #automation #detection
Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
ESEC-FSEESEC-FSE-2009-BruchMM #code completion #learning
Learning from examples to improve code completion systems (MB, MM, MM), pp. 213–222.
ESEC-FSEESEC-FSE-2009-ThummalapentaXTHS #generative #mining #named #object-oriented #source code #testing
MSeqGen: object-oriented unit-test generation via mining source code (ST, TX, NT, JdH, WS), pp. 193–202.
GTTSEGTTSE-2009-DinizC #architecture #configuration management #embedded #program transformation
Code Transformations for Embedded Reconfigurable Computing Architectures (PCD, JMPC), pp. 322–344.
GTTSEGTTSE-2009-JorgesSM #code generation #tutorial
Building Code Generators with Genesys: A Tutorial Introduction (SJ, BS, TMS), pp. 364–385.
ICSEICSE-2009-DigME #concurrent #java #library #refactoring
Refactoring sequential Java code for concurrency via concurrent libraries (DD, JM, MDE), pp. 397–407.
ICSEICSE-2009-Hassan #complexity #fault #predict #using
Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSEICSE-2009-HillPV #automation #maintenance #reuse #source code
Automatically capturing source code context of NL-queries for software maintenance and reuse (EH, LLP, KVS), pp. 232–242.
ICSEICSE-2009-JurgensDHW #matter #question
Do code clones matter? (EJ, FD, BH, SW), pp. 485–495.
ICSEICSE-2009-KimN #representation
Discovering and representing systematic code changes (MK, DN), pp. 309–319.
ICSEICSE-2009-Mockus #developer #named
Succession: Measuring transfer of code and developer productivity (AM), pp. 67–77.
ICSEICSE-2009-PadioleauTZ #operating system #taxonomy
Listening to programmers — Taxonomies and characteristics of comments in operating system code (YP, LT, YZ), pp. 331–341.
ICSEICSE-2009-Reiss #code search #semantics
Semantics-based code search (SPR), pp. 243–253.
SACSAC-2009-BohnetVD #debugging #execution #locality
Projecting code changes onto execution traces to support localization of recently introduced bugs (JB, SV, JD), pp. 438–442.
SACSAC-2009-GohKCC #analysis #performance #scalability #video
Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
SACSAC-2009-KiyoharaMMNK #embedded #performance
Method for fast compression of program codes for remote updates in embedded systems (RK, SM, MM, MN, SK), pp. 1683–1684.
SACSAC-2009-LemosBOML #code search #reuse #testing #using
Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
SACSAC-2009-MathuriyaBHH #manycore #named #predict #scalability
GTfold: a scalable multicore code for RNA secondary structure prediction (AM, DAB, CEH, SCH), pp. 981–988.
SACSAC-2009-WangT #algorithm #morphism
An algorithm for optimal comma free codes with isomorphism rejection (HW, VDT), pp. 1007–1008.
LDTALDTA-2008-ChilowiczDR09 #source code
Finding Similarities in Source Code Through Factorization (MC, ÉD, GR), pp. 47–62.
LDTALDTA-2008-Nilsson-NymanHME09 #analysis #declarative #java #source code
Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
CCCC-2009-Grosslinger #array #precise
Precise Management of Scratchpad Memories for Localising Array Accesses in Scientific Codes (AG), pp. 236–250.
CCCC-2009-Padioleau #c #c++ #parsing #preprocessor
Parsing C/C++ Code without Pre-processing (YP), pp. 109–125.
CCCC-2009-Sarkar #challenge #optimisation #parallel #source code
Challenges in Code Optimization of Parallel Programs (VS), p. 1.
CGOCGO-2009-BoissinotDRDG #correctness #performance #quality
Revisiting Out-of-SSA Translation for Correctness, Code Quality and Efficiency (BB, AD, FR, BDdD, CG), pp. 114–125.
CGOCGO-2009-CollinB #embedded #taxonomy
Two-Level Dictionary Code Compression: A New Scheme to Improve Instruction Code Density of Embedded Applications (MC, MB), pp. 231–242.
CGOCGO-2009-KumarCS #debugging
Transparent Debugging of Dynamically Optimized Code (NK, BRC, MLS), pp. 275–286.
DACDAC-2009-BaiocchiC #in memory #memory management #using
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DACDAC-2009-FalkK
Optimal static WCET-aware scratchpad allocation of program code (HF, JCK), pp. 732–737.
DACDAC-2009-PapirlaC #energy #fault
Energy-aware error control coding for Flash memories (VP, CC), pp. 658–663.
DATEDATE-2009-ChenKLA
Accelerating FPGA-based emulation of quasi-cyclic LDPC codes with vector processing (XC, JK, SL, VA), pp. 1530–1535.
DATEDATE-2009-VidalLGSD #approach #co-evolution #code generation #design #embedded #modelling #uml
A co-design approach for embedded system modeling and code generation with UML and MARTE (JV, FdL, GG, PS, JPD), pp. 226–231.
LCTESLCTES-2009-HeinzW #code generation #towards
Towards device emulation code generation (TH, RW), pp. 109–118.
FASEFASE-2009-AcharyaX #api #mining #source code #specification
Mining API Error-Handling Specifications from Source Code (MA, TX), pp. 370–384.
FASEFASE-2009-Wachsmuth
A Formal Way from Text to Code Templates (GW), pp. 109–123.
STOCSTOC-2009-Efremenko
3-query locally decodable codes of subexponential length (KE), pp. 39–44.
STOCSTOC-2009-GopalanGR
List decoding tensor products and interleaved codes (PG, VG, PR), pp. 13–22.
STOCSTOC-2009-Guruswami #morphism
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes (VG), pp. 23–32.
CAVCAV-2009-LahiriQR #concurrent #detection #fault #precise #smt #using
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
ICLPICLP-2009-Moura #effectiveness #encapsulation #prolog #reuse
From Plain Prolog to Logtalk Objects: Effective Code Encapsulation and Reuse (PM), p. 23.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage #using
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-JiangS #automation #mining #random testing #testing
Automatic mining of functionally equivalent code fragments via random testing (LJ, ZS), pp. 81–92.
ISSTAISSTA-2009-SaebjornsenWPQS #bytecode #detection
Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
VMCAIVMCAI-2009-RakamaricH #low level #memory management #scalability
A Scalable Memory Model for Low-Level Code (ZR, AJH), pp. 290–304.
CSEETCSEET-2008-GotterbarnM #re-engineering #using
Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
ITiCSEITiCSE-2008-JiWC #contest #detection #experience #programming #source code
An experience of detecting plagiarized source codes in competitive programming contests (JHJ, GW, HGC), p. 369.
CSMRCSMR-2008-Bruntink #c #exception #legacy #re-engineering
Reengineering Idiomatic Exception Handling in Legacy C Code (MB), pp. 133–142.
CSMRCSMR-2008-CeccatoTM #goto #java #legacy #migration
Goto Elimination Strategies in the Migration of Legacy Code to Java (MC, PT, CM), pp. 53–62.
CSMRCSMR-2008-KanellopoulosTHV #clustering #maintenance #source code
Interpretation of Source Code Clusters in Terms of the ISO/IEC-9126 Maintainability Characteristics (YK, CT, IH, JV), pp. 63–72.
CSMRCSMR-2008-PantosBGG #adaptation #assessment #case study #experience #quality #source code
Experiences in Adapting a Source Code-Based Quality Assessment Technology (JP, ÁB, PG, TG), pp. 311–313.
CSMRCSMR-2008-TeleaV08a #optimisation #performance #scalability
A Tool for Optimizing the Build Performance of Large Software Code Bases (ACT, LV), pp. 323–325.
ICPCICPC-2008-BhattiDR #mining #object-oriented
Aspect Mining in Procedural Object Oriented Code (MUB, SD, AR), pp. 230–235.
ICPCICPC-2008-BohnetVD #comprehension #execution
Locating and Understanding Features of Complex Software Systems by Synchronizing Time-, Collaboration- and Code-Focused Views on Execution Traces (JB, SV, JD), pp. 268–271.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code #using
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-HaiducM #on the #source code #using
On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPCICPC-2008-PinzgerGKG #comprehension #dependence #source code #visual notation
A Tool for Visual Understanding of Source Code Dependencies (MP, KG, PK, HCG), pp. 254–259.
ICPCICPC-2008-RobillardM #comprehension #reuse
Reusing Program Investigation Knowledge for Code Understanding (MPR, PM), pp. 202–211.
ICPCICPC-2008-RohatgiHR #approach #dynamic analysis
An Approach for Mapping Features to Code Based on Static and Dynamic Analysis (AR, AHL, JR), pp. 236–241.
ICPCICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing #using
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-AnvikS #issue tracking #maintenance #source code
Task articulation in software maintenance: Integrating source code annotations with an issue tracking system (JA, MADS), pp. 460–461.
ICSMEICSM-2008-BoogerdM #empirical #standard
Assessing the value of coding standards: An empirical study (CB, LM), pp. 277–286.
ICSMEICSM-2008-KagdiHM #question #source code
Who can help me with this source code change? (HHK, MH, JIM), pp. 157–166.
ICSMEICSM-2008-Kamiya #analysis #identifier
Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
ICSMEICSM-2008-Lozano #source code
A methodology to assess the impact of source code flaws in changeability, and its application to clones (AL), pp. 424–427.
MSRMSR-2008-ChangM #detection #evaluation #source code
Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
MSRMSR-2008-OmoriM #development #editing #source code
A change-aware development environment by recording editing operations of source code (TO, KM), pp. 31–34.
SCAMSCAM-2008-Cifuentes #c #debugging #named #scalability
Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
SCAMSCAM-2008-FehnkerHRS #assembly #embedded #program analysis
Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
SCAMSCAM-2008-GermanRH #graph #impact analysis
Change Impact Graphs: Determining the Impact of Prior Code Changes (DMG, GR, AEH), pp. 184–193.
SCAMSCAM-2008-Gomez-ZamalloaAP #composition #decompiler #low level #partial evaluation
Modular Decompilation of Low-Level Code by Partial Evaluation (MGZ, EA, GP), pp. 239–248.
SCAMSCAM-2008-HindleGH
From Indentation Shapes to Code Structures (AH, MWG, RCH), pp. 111–120.
SCAMSCAM-2008-Krinke #question
Is Cloned Code More Stable than Non-cloned Code? (JK), pp. 57–66.
SCAMSCAM-2008-PentaCA #detection #evolution #source code
The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
SCAMSCAM-2008-RodriguesB #coordination #legacy #named
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code (NFR, LSB), pp. 265–266.
SCAMSCAM-2008-WangZZ #automation #detection #model checking #program analysis
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
WCREWCRE-2008-BhattiDH #object-oriented
Reconsidering Classes in Procedural Object-Oriented Code (MUB, SD, MH), pp. 257–266.
WCREWCRE-2008-IshioDMI #detection #java #mining #source code
Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs (TI, HD, TM, KI), pp. 123–132.
WCREWCRE-2008-LukinsKE #debugging #locality #retrieval #source code #using
Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCREWCRE-2008-RompaeyD #estimation #using
Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
WCREWCRE-2008-Zhang #source code
Exploring Regularity in Source Code: Software Science and Zipf’s Law (HZ), pp. 101–110.
AFLAFL-2008-Cruz-ReyesK #automaton
Non-Linear Subband Coding with Cellular Automata (CCR, JK), pp. 146–157.
CIAACIAA-2008-LahodaMZ #pattern matching
Pattern Matching in DCA Coded Text (JL, BM, JZ), pp. 151–160.
ICALPICALP-A-2008-ChengW #complexity
Complexity of Decoding Positive-Rate Reed-Solomon Codes (QC, DW), pp. 283–293.
ICALPICALP-A-2008-IwamaNPRY #linear #network #polynomial
Polynomial-Time Construction of Linear Network Coding (KI, HN, MP, RR, SY), pp. 271–282.
LATALATA-2008-MoczuradM #how #question #set
How Many Figure Sets Are Codes? (MM, WM), pp. 385–396.
LATALATA-2008-SalomaaSY
Length Codes, Products of Languages and Primality (AS, KS, SY), pp. 476–486.
FMFM-2008-GrandyBSSR #protocol #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
SEFMSEFM-2008-Giacobazzi #abstract interpretation #security
Abstract Interpretation in Code Security (RG), p. 3.
SEFMSEFM-2008-Giacobazzi08a #obfuscation
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
SEFMSEFM-2008-SampathRRS #behaviour #code generation #testing
Behaviour Directed Testing of Auto-code Generators (PS, ACR, SR, KCS), pp. 191–200.
CHICHI-2008-SubrahmaniyanBGBWNBDF #debugging #testing #what
Testing vs. code inspection vs. what else?: male and female end users’ debugging strategies (NS, LB, VG, MMB, SW, VN, KB, RD, XZF), pp. 617–626.
SOFTVISSOFTVIS-2008-ParninGN #lightweight #smell #visualisation
A catalogue of lightweight visualizations to support code smell inspection (CP, CG, ON), pp. 77–86.
SOFTVISSOFTVIS-2008-TeleaV #c++ #interactive #reverse engineering #scalability
An interactive reverse engineering environment for large-scale C++ code (ACT, LV), pp. 67–76.
ICPRICPR-2008-EscaleraPR
Separability of ternary Error-Correcting Output Codes (SE, OP, PR), pp. 1–4.
ICPRICPR-2008-EscaleraPR08a
Error-Correcting output coding for chagasic patients characterization (SE, OP, PR), pp. 1–4.
ICPRICPR-2008-Rokui #using
Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
KDDKDD-2008-Sindhgatta #developer #identification #source code
Identifying domain expertise of developers from source code (RS), pp. 981–989.
SEKESEKE-2008-BaiL #named #source code #testing
SyncTest: a Tool to Synchronize Source Code, Model and Testing (XB, TL), pp. 723–728.
SEKESEKE-2008-DuffyHM #c++ #comprehension #evolution #interface #library #protocol #reverse engineering #scalability
Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks (EBD, JOH, BAM), pp. 303–308.
SEKESEKE-2008-Fuad #architecture #distributed #program transformation #self
Code Transformation Techniques and Management Architecture for Self-manageable Distributed Applications (MMF), pp. 315–320.
SEKESEKE-2008-SandersZ #contract #design #execution #java
Object-Z to Java/OO-Perl: A Conversion from Object-Z to Executable Skeletal Code with Dynamically Checkable Design Contracts (SMS, CZ), pp. 824–829.
SEKESEKE-2008-TurhanB #fault #predict
Weighted Static Code Attributes for Software Defect Prediction (BT, ABB), pp. 143–148.
SIGIRSIGIR-2008-LiT #documentation #image #word
A word shape coding method for camera-based document images (LL, CLT), pp. 771–772.
ICMTICMT-2008-HemelKV #code generation #model transformation
Code Generation by Model Transformation (ZH, LCLK, EV), pp. 183–198.
MODELSMoDELS-2008-Gessenharter #code generation #java #semantics #uml
Mapping the UML2 Semantics of Associations to a Java Code Generation Model (DG), pp. 813–827.
MODELSMoDELS-2008-ProutADS #code generation #configuration management #semantics
Semantically Configurable Code Generation (AP, JMA, NAD, PS), pp. 705–720.
SPLCSPLC-2008-WeissLSDS #code generation
Decision-Model-Based Code Generation for SPLE (DMW, JJL, JHS, TTDT, HS), pp. 129–138.
MODELSMoDELS-2008-Gessenharter #code generation #java #semantics #uml
Mapping the UML2 Semantics of Associations to a Java Code Generation Model (DG), pp. 813–827.
MODELSMoDELS-2008-ProutADS #code generation #configuration management #semantics
Semantically Configurable Code Generation (AP, JMA, NAD, PS), pp. 705–720.
ECOOPECOOP-2008-HessellundS #analysis
Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
OOPSLAOOPSLA-2008-FerraraLF #dot-net
Safer unsafe code for .NET (PF, FL, MF), pp. 329–346.
OOPSLAOOPSLA-2008-ProkopskiV #performance #virtual machine
Analyzing the performance of code-copying virtual machines (GBP, CV), pp. 403–422.
TOOLSTOOLS-EUROPE-2008-DiskinED #modelling #semantics
Engineering Associations: From Models to Code and Back through Semantics (ZD, SME, JD), pp. 336–355.
AdaEuropeAdaEurope-2008-AlonsoVPA #ada #modelling #state machine #thread #visual notation
StateML+s: From Graphical State Machine Models to Thread-Safe Ada Code (DA, CVC, JAP, ), pp. 158–170.
LOPSTRLOPSTR-2008-CalcagnoDOY
Space Invading Systems Code (CC, DD, PWO, HY), pp. 1–3.
PADLPADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming #using
Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
PEPMPEPM-2008-KameyamaKS #staged
Closing the stage: from staged code to typed closures (YK, OK, CcS), pp. 147–157.
ASEASE-2008-BrichauKM #source code #using
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASEASE-2008-LiHG #code generation #interface #modelling #multi #named #process
MaramaEML: An Integrated Multi-View Business Process Modelling Environment with Tree-Overlays, Zoomable Interfaces and Code Generation (RLL, JGH, JCG), pp. 477–478.
ASEASE-2008-RobbesL #code completion #how #repository
How Program History Can Improve Code Completion (RR, ML), pp. 317–326.
ASEASE-2008-ThummalapentaX #detection #framework #mining #named #open source #source code #web
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web (ST, TX), pp. 327–336.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
FSEFSE-2008-CottrellWD #reuse #source code
Semi-automating small-scale source code reuse via structural correspondence (RC, RJW, JD), pp. 214–225.
FSEFSE-2008-DragertDR #concurrent #generative #using
Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSEFSE-2008-LivshitsK #bound #named #web
Doloto: code splitting for network-bound web 2.0 applications (VBL, EK), pp. 350–360.
ICSEICSE-2008-Duala-EkokoR #named #tool support
Clonetracker: tool support for code clone management (EDE, MPR), pp. 843–846.
ICSEICSE-2008-MoserPS #analysis #comparative #fault #metric #performance #predict
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
ICSEICSE-2008-SchaferJM #framework #mining
Mining framework usage changes from instantiation code (TS, JJ, MM), pp. 471–480.
SACSAC-2008-DuraoVAM #code search #semantics #source code
Applying a semantic layer in a source code search tool (FAD, TAV, ESdA, SRdLM), pp. 1151–1157.
SACSAC-2008-KhanCB #optimisation
Optimizing code through iterative specialization (MAK, HPC, DB), pp. 206–210.
SACSAC-2008-VargunM
Code-carrying theory (AV, DRM), pp. 376–383.
GPCEGPCE-2008-DenneyF #automation #generative #verification
Generating customized verifiers for automatically generated code (ED, BF), pp. 77–88.
GPCEGPCE-2008-KulkarniR #abstraction #code generation #component #generative #modelling #reuse
An abstraction for reusable MDD components: model-based generation of model-based code generators (VK, SR), pp. 181–184.
GPCEGPCE-2008-RosenmullerSSA #code generation #composition #product line
Code generation to support static and dynamic composition of software product lines (MR, NS, GS, SA), pp. 3–12.
SLESLE-2008-BastenK #fact extraction #named #parametricity #source code
DeFacto: Language-Parametric Fact Extraction from Source Code (BB, PK), pp. 265–284.
ASPLOSASPLOS-2008-ErtveldeE #benchmark #metric
Dispersing proprietary applications as benchmarks through code mutation (LVE, LE), pp. 201–210.
ASPLOSASPLOS-2008-McCunePPRS #execution #how #recommendation
How low can you go?: recommendations for hardware-supported minimal TCB code execution (JMM, BP, AP, MKR, AS), pp. 14–25.
ASPLOSASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CASECASE-2008-NagleW #named #using
GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CCCC-2008-LogozzoF #analysis #bytecode #on the #source code
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
CCCC-2008-NitaG #automation #c #multi
Automatic Transformation of Bit-Level C Code to Support Multiple Equivalent Data Layouts (MN, DG), pp. 85–99.
CCCC-2008-ProkopskiV #safety #virtual machine
Compiler-Guaranteed Safety in Code-Copying Virtual Machines (GBP, CV), pp. 163–177.
CCCC-2008-WangYW #compilation #legacy #optimisation #transaction
Supporting Legacy Binary Code in a Software Transaction Compiler with Dynamic Binary Translation and Optimization (CW, VY, YW), pp. 291–306.
CGOCGO-2008-MurphyMSSA #type safety
Fault-safe code motion for type-safe languages (BRM, VM, FTS, TS, ARAT), pp. 144–154.
CGOCGO-2008-Sarkar #optimisation #parallel #source code
Code optimization of parallel programs: evolutionary vs. revolutionary approaches (VS), p. 1.
DATEDATE-2008-BonnyH #embedded #encoding
Instruction Re-encoding Facilitating Dense Embedded Code (TB, JH), pp. 770–775.
DATEDATE-2008-BrisolaraORLCW #code generation #uml #using
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-HohenauerELAMBS #execution #optimisation
Retargetable Code Optimization for Predicated Execution (MH, FE, RL, GA, HM, GB, BS), pp. 1492–1497.
DATEDATE-2008-LublinermanT #code generation #composition #diagrams #reuse #usability
Modularity vs. Reusability: Code Generation from Synchronous Block Diagrams (RL, ST), pp. 1504–1509.
DATEDATE-2008-MayAW #case study #design
A Case Study in Reliability-Aware Design: A Resilient LDPC Code Decoder (MM, MA, NW), pp. 456–461.
DATEDATE-2008-ZezzaM #implementation
VLSI implementation of SISO arithmetic decoders for joint source channel coding (SZ, GM), pp. 1075–1078.
HPDCHPDC-2008-HeSWF #approximate #automation #performance #recognition #test coverage
Code coverage, performance approximation and automatic recognition of idioms in scientific applications (JH, AS, RFVdW, MAF), pp. 223–224.
LCTESLCTES-2008-BiernackiCHP #code generation #composition #data flow
Clock-directed modular code generation for synchronous data-flow languages (DB, JLC, GH, MP), pp. 121–130.
OSDIOSDI-2008-DouceurEHL #legacy #web
Leveraging Legacy Code to Deploy Desktop Applications on the Web (JRD, JE, JH, JRL), pp. 339–354.
STOCSTOC-2008-GopalanKZ
List-decoding reed-muller codes over small fields (PG, ARK, DZ), pp. 265–274.
STOCSTOC-2008-Meir #combinator
Combinatorial construction of locally testable codes (OM), pp. 285–294.
STOCSTOC-2008-ODonnellW #algorithm #testing
An optimal sdp algorithm for max-cut, and equally optimal long code tests (RO, YW), pp. 335–344.
CAVCAV-2008-YangLBCCDO #analysis #scalability
Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
ICLPICLP-2008-VanhoofD #algorithm #logic programming #source code
An Algorithm for Sophisticated Code Matching in Logic Programs (WV, FD), pp. 785–789.
ICSTICST-2008-PloschGPSS #tool support
Tool Support for Expert-Centred Code Assessments (RP, HG, GP, MS, SS), pp. 258–267.
ICSTICST-2008-ZaidmanRDD #co-evolution #mining #repository
Mining Software Repositories to Study Co-Evolution of Production & Test Code (AZ, BVR, SD, AvD), pp. 220–229.
ECSAECSA-2007-CorreiaMHE #architecture #categorisation #migration
Architecture Migration Driven by Code Categorization (RC, CMPM, RH, MER), pp. 115–122.
DRRDRR-2007-AndraNLZBBHST #effectiveness
Frequency coding: an effective method for combining dichotomizers (SA, GN, CLL, IZ, EB, AB, LH, KMS, MT).
ICDARICDAR-2007-BhattacharyaGP #online #recognition
Direction Code Based Features for Recognition of Online Handwritten Characters of Bangla (UB, BKG, SKP), pp. 58–62.
ICDARICDAR-2007-TerasawaT #documentation #image #locality #pseudo
Locality Sensitive Pseudo-Code for Document Images (KT, YT), pp. 73–77.
SIGMODSIGMOD-2007-GrustMRST #code generation #compilation #sql #xquery
A SQL: 1999 code generator for the pathfinder xquery compiler (TG, MM, JR, SS, JT), pp. 1162–1164.
ITiCSEITiCSE-2007-HayesTSW #assessment #automation #interface
An investigation into the automated assessment of the design-code interface (AH, PGT, NS, KGW), p. 324.
ITiCSEITiCSE-2007-JiWC #detection #source code
A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
ITiCSEITiCSE-2007-JonesB #navigation #source code
Spatial skills and navigation of source code (SJJ, GEB), pp. 231–235.
ITiCSEITiCSE-2007-PatersonH #design #implementation
From classes to code: supporting the transition from design to implementation (JHP, JH), p. 362.
SIGITESIGITE-2007-GasparL #programming
Restoring “coding with intention” in introductory programming courses (AG, SL), pp. 91–98.
WCREWCRE-J-2005-KuhnDG07 #clustering #identification #semantics #source code #topic
Semantic clustering: Identifying topics in source code (AK, SD, TG), pp. 230–243.
CSMRCSMR-2007-Leeten #configuration management #evolution #scalability
Software Configuration Management, Fundament for Evolution of Large Existing Code Bases (BL), pp. 321–322.
ICPCICPC-2007-CareyG #automation #concept #identification #source code
Recovering Concepts from Source Code with Automated Concept Identification (MMC, GCG), pp. 27–36.
ICPCICPC-2007-Kiczales #aspect-oriented #design
Making the Code Look Like the Design — Aspects and Other Recent Work (GK), p. 14.
ICPCICPC-2007-PoshyvanykM #concept analysis #information retrieval #source code
Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code (DP, AM), pp. 37–48.
ICPCICPC-2007-ShearerC #constraints #source code
Enforcing Constraints Between Documentary Comments and Source Code (CDS, MLC), pp. 271–280.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code #using
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-Ceccato #aspect-oriented #migration #object-oriented #programming
Migrating Object Oriented code to Aspect Oriented Programming (MC), pp. 497–498.
ICSMEICSM-2007-Chaabane #analysis #detection
Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
ICSMEICSM-2007-CorboGP #learning #source code
Smart Formatter: Learning Coding Style from Existing Source Code (FC, CDG, MDP), pp. 525–526.
ICSMEICSM-2007-OezbekP #comprehension #documentation #named #source code
JTourBus: Simplifying Program Understanding by Documentation that Provides Tours Through the Source Code (CO, LP), pp. 64–73.
ICSMEICSM-2007-Reiss
Finding Unusual Code (SPR), pp. 34–43.
ICSMEICSM-2007-StoreyCSMMR #how #navigation
How Programmers Can Turn Comments into Waypoints for Code Navigation (MADS, LTC, JS, MJM, DM, JR), pp. 265–274.
MSRMSR-2007-CanforaCP #identification #repository #source code
Identifying Changed Source Code Lines from Version Repositories (GC, LC, MDP), p. 14.
MSRMSR-2007-KagdiCM #mining #source code
Comparing Approaches to Mining Source Code for Call-Usage Patterns (HHK, MLC, JIM), p. 20.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux #using
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
SCAMSCAM-2007-Johannes #composition #framework #reuse #source code
Source Code Composition with the Reuseware Composition Framework (JJ), pp. 159–160.
SCAMSCAM-2007-MoorVHAEOST #analysis #source code
Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
WCREWCRE-2007-FluriWG #source code
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes (BF, MW, HG), pp. 70–79.
WCREWCRE-2007-Krinke #case study #consistency
A Study of Consistent and Inconsistent Changes to Code Clones (JK), pp. 170–178.
WCREWCRE-2007-RaberL07a #approach #automation #identification #named #obfuscation
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
DLTDLT-2007-BealBR #ambiguity
Coding Partitions: Regularity, Maximality and Global Ambiguity (MPB, FB, AR), pp. 48–59.
ICALPICALP-2007-OstrovskyPS
Private Locally Decodable Codes (RO, OP, AS), pp. 387–398.
IFMIFM-2007-BraghinSB #automation #mobile #policy #security #verification
Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
HaskellHaskell-2007-GrabmullerK #code generation #haskell #named #runtime
Harpy: run-time code generation in haskell (MG, DK), p. 94.
IFLIFL-2007-Kleeblatt #dependent type #using
Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
AGTIVEAGTIVE-2007-AnandK #assembly #generative #graph transformation
Code Graph Transformations for Verifiable Generation of SIMD-Parallel Assembly Code (CKA, WK), pp. 217–232.
CHICHI-2007-BoshernitsanGH #development #tool support
Aligning development tools with the way programmers think about code changes (MB, SLG, MAH), pp. 567–576.
HCIHCI-IPT-2007-CheongKH #evaluation #image #interface #mobile #usability
Usability Evaluation of Designed Image Code Interface for Mobile Computing Environment (CC, DCK, TDH), pp. 241–251.
HCIHCI-IPT-2007-YoshidaMS #interactive #mobile #using #visual notation
Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #using #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-BohnetD #2d #graph #source code #visualisation
Facilitating Exploration of Unfamiliar Source Code by Providing 21/2D Visualizations of Dynamic Call Graphs (JB, JD), pp. 63–66.
VISSOFTVISSOFT-2007-BohnetD07a #compilation #comprehension #graph
CGA Call Graph Analyzer — Locating and Understanding Functionality within the Gnu Compiler Collection’s Million Lines of Code (JB, JD), pp. 161–162.
VISSOFTVISSOFT-2007-HolmesW #dependence #source code
Task-specific source code dependency investigation (RH, RJW), pp. 100–107.
VISSOFTVISSOFT-2007-VoineaT #debugging #process #repository #source code #visualisation
Visualizing Debugging Activity in Source Code Repositories (LV, ACT), pp. 156–157.
ICMLICML-2007-Bar-HillelW #distance #learning #similarity
Learning distance function by coding similarity (ABH, DW), pp. 65–72.
ICMLICML-2007-LongZWY #clustering #relational #symmetry
Relational clustering by symmetric convex coding (BL, Z(Z, XW, PSY), pp. 569–576.
SEKESEKE-2007-FilhoZ #design #modelling #traceability
Traceability for Agent-Oriented Design Models and Code (GACF, AZ), pp. 552–558.
SEKESEKE-2007-MonteiroOG #implementation #source code #user interface #using
A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKESEKE-2007-XuXW #automation #code generation #protocol #state machine #uml
Automated Test Code Generation from UML Protocol State Machines (DX, WX, WEW), pp. 99–104.
SIGIRSIGIR-2007-TanW #categorisation
Combining error-correcting output codes and model-refinement for text categorization (ST, YW), pp. 699–700.
TOOLSTOOLS-EUROPE-2007-HundtMPS #feature model #product line
Improving Alignment of Crosscutting Features with Code in Product Line Engineering (CH, KM, CP, DS), pp. 417–436.
AdaEuropeAdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling #using
Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, , FL), pp. 168–179.
PEPMPEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code #using
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-CaiSV #self
Certified self-modifying code (HC, ZS, AV), pp. 66–77.
PLDIPLDI-2007-HardekopfL #analysis #performance #pointer
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
QAPLQAPL-2007-Smith #communication #modelling #probability #protocol #source code
Stochastic Modelling of Communication Protocols from Source Code (MJAS), pp. 129–145.
AdaSIGAda-2007-Maurer #ada #proving #using
Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
ASEASE-2007-AntkiewiczBC #automation #modelling
Automatic extraction of framework-specific models from framework-based application code (MA, TTB, KC), pp. 214–223.
ASEASE-2007-CaiWHW #array #automation #kernel #testing
Test automation for kernel code and disk arrays with virtual devices (LZC, RSW, WTH, FW), pp. 505–508.
ASEASE-2007-JurjensY #modelling #security #tool support
Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
ASEASE-2007-Kagdi #fine-grained #mining #predict #source code
Improving change prediction with fine-grained source code mining (HHK), pp. 559–562.
ASEASE-2007-LemosBOMMBL #named #reuse #source code #using
CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASEASE-2007-LinsteadRBLB #concept #mining #modelling #probability #topic
Mining concepts from code with probabilistic topic models (EL, PR, SKB, CVL, PB), pp. 461–464.
ASEASE-2007-Reiss #automation
Automatic code stylizing (SPR), pp. 74–83.
ASEASE-2007-ThummalapentaX #named #open source #reuse #source code #web
Parseweb: a programmer assistant for reusing open source code on the web (ST, TX), pp. 204–213.
ESEC-FSEESEC-FSE-2007-AcharyaXPX #api #mining #partial order #source code #specification
Mining API patterns as partial orders from source code: from usage scenarios to specifications (MA, TX, JP, JX), pp. 25–34.
ESEC-FSEESEC-FSE-2007-FritzMH #process #question
Does a programmer’s activity indicate knowledge of code? (TF, GCM, EH), pp. 341–350.
ESEC-FSEESEC-FSE-2007-GrechanikMP #traceability #using
Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSEESEC-FSE-2007-VoungJL #concurrent #detection #named
RELAY: static race detection on millions of lines of code (JWV, RJ, SL), pp. 205–214.
GTTSEGTTSE-2007-ChellappaFP #how #performance
How to Write Fast Numerical Code: A Small Introduction (SC, FF, MP), pp. 196–259.
ICSEICSE-2007-AdarK #named #visualisation
SoftGUESS: Visualization and Exploration of Code Clones in Context (EA, MK), pp. 762–766.
ICSEICSE-2007-BernerWK #test coverage #testing #using
Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSEICSE-2007-Duala-EkokoR #clone tracking #evolution
Tracking Code Clones in Evolving Software (EDE, MPR), pp. 158–167.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-JiangMSG #detection #named #scalability
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones (LJ, GM, ZS, SG), pp. 96–105.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #using #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
SACSAC-2007-CazzolaPGS #co-evolution #design #metadata #modelling
Co-evolving application code and design models by exploiting meta-data (WC, SP, AG, GS), pp. 1275–1279.
SACSAC-2007-FerreiraLO #approach #java #model checking
A Java code annotation approach for model checking software systems (GF, EL, EASO), pp. 1536–1537.
SACSAC-2007-Hamid #memory management #runtime
Integrating a certified memory management runtime with proof-carrying code (NAH), pp. 1526–1533.
SACSAC-2007-JohnsB #approximate #automation #injection #named #web
SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
SACSAC-2007-LongoG #protocol
A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
SACSAC-2007-XianhuaJX #performance #reduction
Efficient code size reduction without performance loss (LX, ZJ, CX), pp. 666–672.
LDTALDTA-J-2005-WaddingtonY #c #c++ #program transformation
High-fidelity C/C++ code transformation (DGW, BY), pp. 64–78.
CCCC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling #using
Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CGOCGO-2007-HeTPDA #kernel #operating system
Code Compaction of an Operating System Kernel (HH, JT, SP, SKD, GRA), pp. 283–298.
CGOCGO-2007-ReddiCCS #persistent #reuse
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications (VJR, DC, RC, MDS), pp. 74–88.
CGOCGO-2007-WangCWSA #code generation #memory management #optimisation #transaction
Code Generation and Optimization for Transactional Memory Constructs in an Unmanaged Language (CW, WYC, YW, BS, ARAT), pp. 34–48.
COCVCOCV-2007-BlechP #code generation
A Certifying Code Generation Phase (JOB, APH), pp. 65–82.
DACDAC-2007-AmbroseRP #analysis #injection #named #random
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
DACDAC-2007-BonnyH #performance
Instruction Splitting for Efficient Code Compression (TB, JH), pp. 646–651.
DACDAC-2007-XueOK #parallel
A Memory-Conscious Code Parallelization Scheme (LX, ÖÖ, MTK), pp. 230–233.
DATEDATE-2007-BonnyH #performance
Efficient code density through look-up table compression (TB, JH), pp. 809–814.
DATEDATE-2007-BrackALKWLRRF #complexity #generative #standard
Low complexity LDPC code decoders for next generation standards (TB, MA, TLE, FK, NW, NEL, FR, MR, LF), pp. 331–336.
DATEDATE-2007-ChoudhuryRRM #interactive #memory management
Interactive presentation: Single-ended coding techniques for off-chip interconnects to commodity memory (MRC, KR, SR, KM), pp. 1072–1077.
DATEDATE-2007-ErdoganO #analysis #using
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-FeiS #architecture #monitoring #set
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors (YF, ZJS), pp. 815–820.
DATEDATE-2007-KhanA #architecture #configuration management #implementation #pipes and filters #programmable #realtime
Pipelined implementation of a real time programmable encoder for low density parity check code on a reconfigurable instruction cell architecture (ZK, TA), pp. 349–354.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code #using
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-MavroidisP #hardware #performance #synthesis
Efficient testbench code synthesis for a hardware emulator system (IM, IP), pp. 888–893.
DATEDATE-2007-NarayananKB #clustering #performance
Performance aware secure code partitioning (SHKN, MTK, RRB), pp. 1122–1127.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
LCTESLCTES-2007-ChuM #clustering #parallel
Code and data partitioning for fine-grain parallelism (MLC, SAM), pp. 161–164.
LCTESLCTES-2007-Kastner #abstract interpretation #analysis #execution #worst-case
Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
PDPPDP-2007-Sobe #distributed
Distributed Storage with Compressed (1 out-of N) Codes (PS), pp. 179–188.
SOSPSOSP-2007-SeshadriLQP #kernel #named
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes (AS, ML, NQ, AP), pp. 335–350.
STOCSTOC-2007-Yekhanin #towards
Towards 3-query locally decodable codes of subexponential length (SY), pp. 266–274.
TACASTACAS-2007-MyreenG #hoare #logic
Hoare Logic for Realistically Modelled Machine Code (MOM, MJCG), pp. 568–582.
AMOSTA-MOST-2007-KicillofGTB #automation #test coverage #testing
Achieving both model and code coverage with automated gray-box testing (NK, WG, NT, VAB), pp. 1–11.
ISSTAISSTA-2007-EnglerD #automation #execution #scalability
Under-constrained execution: making automatic code destruction easy and scalable (DRE, DD), pp. 1–4.
FATESTestCom-FATES-2007-NeukirchenB #detection #problem #quality #smell #testing
Utilising Code Smells to Detect Quality Problems in TTCN-3 Test Suites (HN, MB), pp. 228–243.
ITiCSEITiCSE-2006-OKellyG #approach #education #learning #problem #programming
RoboCode & problem-based learning: a non-prescriptive approach to teaching programming (JO, JPG), pp. 217–221.
SCAMSCAM-J-2005-AntoniolKT06 #analysis #source code
Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
CSMRCSMR-2006-MensK #source code
IntensiVE, a toolsuite for documenting and checking structural source-code regularities (KM, AK), pp. 239–248.
ICPCICPC-2006-DesmondSE #source code
Fluid Source Code Views (MD, MADS, CE), pp. 260–263.
ICPCICPC-2006-LuciaOZP #empirical #information management #source code #traceability
Improving Comprehensibility of Source Code via Traceability Information: a Controlled Experiment (ADL, RO, FZ, MDP), pp. 317–326.
ICPCICPC-2006-MadouPB #comprehension #obfuscation
Understanding Obfuscated Code (MM, LVP, KDB), pp. 268–274.
ICPCICPC-2006-PoshyvanykMD #eclipse #named #plugin #source code
JIRiSS — an Eclipse plug-in for Source Code Exploration (DP, AM, YD), pp. 252–255.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the #using
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code #using
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSMEICSM-2006-Hou #constraints #design #source code #using
Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSMEICSM-2006-NeginhalK #c #comprehension #graph #reduction
Event Views and Graph Reductions for Understanding System Level C Code (SN, SK), pp. 279–288.
ICSMEICSM-2006-PoshyvanykPMXL #source code
Source Code Exploration with Google (DP, MP, AM, XX, DL), pp. 334–338.
ICSMEICSM-2006-Robillard #empirical #evolution #source code
Tracking Concerns in Evolving Source Code: An Empirical Study (MPR), pp. 479–482.
ICSMEICSM-2006-YaoMKB #automation #c #metaprogramming #program transformation #source code
C Macro Handling in Automated Source Code Transformation Systems (BY, WM, SK, RB), pp. 68–69.
MSRMSR-2006-JiangH #evolution
Examining the evolution of code comments in PostgreSQL (ZMJ, AEH), pp. 179–180.
MSRMSR-2006-KnabPB #fault #predict #source code
Predicting defect densities in source code files with decision tree learners (PK, MP, AB), pp. 119–125.
WCREWCRE-2006-GanesanMKY #aspect-oriented #case study #product line #source code
Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase — A Case Study (DG, DM, JK, KY), pp. 211–220.
WCREWCRE-2006-KorshunovaPBM #c++ #diagrams #named #process #reverse engineering #sequence #source code #uml #xmi
CPP2XMI: Reverse Engineering of UML Class, Sequence, and Activity Diagrams from C++ Source Code (EK, MP, MvdB, MRM), pp. 297–298.
WCREWCRE-2006-MoiseW #fact extraction #perl
Extracting Facts from Perl Code (DLM, KW), pp. 243–252.
WCREWCRE-2006-MoonenM #security
Code Based Software Security Assessments (LM, SM), p. 313.
WCREWCRE-2006-Ribic #concept #decompiler #embedded #equivalence #execution #implementation #programming language
Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code (SR), pp. 307–308.
CIAACIAA-2006-Tischler #automaton #finite #random #refinement #video
Refinement of Near Random Access Video Coding with Weighted Finite Automata (GT), pp. 46–57.
DLTDLT-2006-JonoskaKM
Involution Solid and Join Codes (NJ, LK, KM), pp. 192–202.
ICALPICALP-v1-2006-Reichardt #fault tolerance #quantum
Fault-Tolerance Threshold for a Distance-Three Quantum Code (BR), pp. 50–61.
CHICHI-2006-JakobsenH #source code
Evaluating a fisheye view of source code (MRJ, KH), pp. 377–386.
CHICHI-2006-KoM #editing #framework #implementation #interactive #named #tool support
Barista: An implementation framework for enabling new tools, interaction techniques and views in code editors (AJK, BAM), pp. 387–396.
SOFTVISSOFTVIS-2006-FronkBK #3d #java #visualisation
3D visualisation of code structures in Java software systems (AF, AB, MK), pp. 145–146.
SOFTVISSOFTVIS-2006-ParninG #lightweight #smell #visualisation
Lightweight visualizations for inspecting code smells (CP, CG), pp. 171–172.
ICPRICPR-v3-2006-EscaleraP #named #novel
ECOC-ONE: A Novel Coding and Decoding Strategy (SE, OP), pp. 578–581.
ICPRICPR-v3-2006-Haralick #concept #testing
Basic Concepts For Testing The Torah Code Hypothesis (RMH), pp. 104–109.
ICPRICPR-v3-2006-Haralick06a #protocol #testing
Testing The Torah Code Hypothesis: The Experimental Protocol (RMH), pp. 110–115.
ICPRICPR-v3-2006-Levitt #analysis #component
Component Analysis of Torah Code Phrases (AL), pp. 412–416.
ICPRICPR-v3-2006-RipsL #clustering
The Twin Towers Cluster in Torah Codes (ER, AL), pp. 408–411.
ICPRICPR-v3-2006-ZhangY #image #multi #using
Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPRICPR-v4-2006-EscaleraPR #fault
Forest Extension of Error Correcting Output Codes and Boosted Landmarks (SE, OP, PR), pp. 104–107.
ICPRICPR-v4-2006-KongZK #precise #representation
An Anatomy of IrisCode for Precise Phase Representation (AWKK, DZ, MK), pp. 429–432.
ICPRICPR-v4-2006-QuanZ #using
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
SEKESEKE-2006-SadaouiS #implementation #java #specification
Implementation of CafeOBJ Specifications to Java Code (SS, SS), pp. 446–449.
SPLCSPLC-2006-Tolvanen #code generation #modelling #product line
Domain-Specific Modeling and Code Generation for Product Lines (JPT), p. 229.
ECOOPECOOP-2006-HajiyevVM #datalog #named #query #scalability #source code
codeQuest: Scalable Source Code Queries with Datalog (EH, MV, OdM), pp. 2–27.
OOPSLAOOPSLA-2006-SahavechaphanC #mining #named
XSnippet: mining For sample code (NS, KTC), pp. 413–430.
AdaEuropeAdaEurope-2006-BreuerP #fault #kernel #linux #source code #static analysis
One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code (PTB, SP), pp. 56–70.
AdaEuropeAdaEurope-2006-Maurer #ada #using
Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
PADLPADL-2006-Volder #declarative #named
JQuery: A Generic Code Browser with a Declarative Configuration Language (KDV), pp. 88–102.
PEPMPEPM-2006-GeayYF #assurance #quality
Continuous code-quality assurance with SAFE (EG, EY, SJF), pp. 145–149.
PEPMPEPM-2006-MadouPB #interactive #named #obfuscation
LOCO: an interactive code (De)obfuscation tool (MM, LVP, KDB), pp. 140–144.
PEPMPEPM-2006-RepsBL #low level
Intermediate-representation recovery from low-level code (TWR, GB, JL), pp. 100–111.
PEPMPEPM-2006-SwadiTKP #approach #monad #staging
A monadic approach for avoiding code duplication when staging memoized functions (KNS, WT, OK, EP), pp. 160–169.
PLDIPLDI-2006-CookPR #proving #termination
Termination proofs for systems code (BC, AP, AR), pp. 415–426.
PLDIPLDI-2006-DhurjatiKA #alias #analysis #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
PLDIPLDI-2006-FengSVXN #abstraction #assembly #composition #verification
Modular verification of assembly code with stack-based control abstractions (XF, ZS, AV, SX, ZN), pp. 401–414.
POPLPOPL-2006-NiS #assembly #embedded #pointer #programming
Certified assembly programming with embedded code pointers (ZN, ZS), pp. 320–333.
POPLPOPL-2006-Thielecke #pointer
Frame rules from answer types for code pointers (HT), pp. 309–319.
PPDPPPDP-2006-YuseI #generative #multi #persistent #type system
A modal type system for multi-level generating extensions with persistent code (YY, AI), pp. 201–212.
SASSAS-2006-ChangHN #analysis #low level #using
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
SASSAS-2006-Yang #analysis #low level
Shape Analysis for Low-Level Code (HY), p. 280.
ASEASE-2006-DenneyF #automation #certification #safety
Annotation Inference for Safety Certification of Automatically Generated Code (ED, BF), pp. 265–268.
ASEASE-2006-HanakawaI #ajax #web
A new web browser including a transferable function to Ajax codes (NH, NI), pp. 351–352.
ASEASE-2006-PenseriniPSM #multi #specification
From Capability Specifications to Code for Multi-Agent Software (LP, AP, AS, JM), pp. 253–256.
ASEASE-2006-ShiO #design pattern #java #reverse engineering #source code
Reverse Engineering of Design Patterns from Java Source Code (NS, RAO), pp. 123–134.
ASEASE-2006-WeissgerberD #identification #refactoring #source code
Identifying Refactorings from Source-Code Changes (PW, SD), pp. 231–240.
FSEFSE-2006-MaozH #aspectj #compilation #multi
From multi-modal scenarios to code: compiling LSCs into aspectJ (SM, DH), pp. 219–230.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code #using
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-MoriISI #detection #mobile
A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
ICSEICSE-2006-Sindhgatta #information retrieval #source code #using
Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSE