Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2014.

EVOL
DBLP
Scholar
CSDL
Full names Links ISxN
@proceedings{SCAM-2014,
	address       = "Victoria, British Columbia, Canada",
	ee            = "http://www.computer.org/csdl/proceedings/scam/2014/6148/00/index.html",
	isbn          = "978-0-7695-5304-7",
	publisher     = "{IEEE Computer Society}",
	title         = "{Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2014,
}

Contents (35 items)

SCAM-2014-BazrafshanK #debugging #developer #performance
Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs (SB, RK), pp. 1–10.
SCAM-2014-MondalRS #automation #identification #refactoring
Automatic Identification of Important Clones for Refactoring and Tracking (MM, CKR, KAS), pp. 11–20.
SCAM-2014-SajnaniSL #case study #comparative #debugging #java
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code (HS, VS, CVL), pp. 21–30.
SCAM-2014-RahmanR #empirical
A Change-Type Based Empirical Study on the Stability of Cloned Code (MSR, CKR), pp. 31–40.
SCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAM-2014-RooverI #program transformation
The Ekeko/X Program Transformation Tool (CDR, KI), pp. 53–58.
SCAM-2014-KosowerLR #c++ #documentation #framework #named
Flowgen: Flowchart-Based Documentation Framework for C++ (DAK, JJLV, SAR), pp. 59–64.
SCAM-2014-StoccoLRT #migration #named #testing #visual notation #web
PESTO: A Tool for Migrating DOM-Based to Visual Web Tests (AS, ML, FR, PT), pp. 65–70.
SCAM-2014-CaraccioloCSL #corpus #multi #named
Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora (AC, AC, BS, ML), pp. 71–76.
SCAM-2014-FerencLSGB #plugin
Source Meter Sonar Qube Plug-in (RF, LL, IS, TG, TB), pp. 77–82.
SCAM-2014-MurtazaHKC #automation #detection
Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
SCAM-2014-WuAGA #api #named
ACUA: API Change and Usage Auditor (WW, BA, YGG, GA), pp. 89–94.
SCAM-2014-SzokeANFG #quality #question #refactoring
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? (GS, GA, CN, RF, TG), pp. 95–104.
SCAM-2014-PetiotBJKS #c #generative #source code #testing
Instrumentation of Annotated C Programs for Test Generation (GP, BB, JJ, NK, JS), pp. 105–114.
SCAM-2014-TliliFBDH #scalability #security #verification
Scalable Security Verification of Software at Compile Time (ST, JMF, AB, BD, SH), pp. 115–124.
SCAM-2014-KallenHH #object-oriented #refactoring #using
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAM-2014-OhSSW #fault #locality
Concolic Fault Localization (CO, MS, DSN, TW), pp. 135–144.
SCAM-2014-JiangSGC #maintenance #on the #slicing
On the Accuracy of Forward Dynamic Slicing and Its Effects on Software Maintenance (SJ, RAS, MG, HC), pp. 145–154.
SCAM-2014-KargenS #performance #scalability #slicing
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing (UK, NS), pp. 155–164.
SCAM-2014-CaiJSZZ #analysis #named #predict
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAM-2014-YooBE #slicing
Seeing Is Slicing: Observation Based Slicing of Picture Description Languages (SY, DB, RDE), pp. 175–184.
SCAM-2014-LozanoNJ #why
Explaining Why Methods Change Together (AL, CN, VJ), pp. 185–194.
SCAM-2014-MarsavinaRZ #co-evolution #fine-grained
Studying Fine-Grained Co-evolution Patterns of Production and Test Code (CM, DR, AZ), pp. 195–204.
SCAM-2014-AnKA #debugging
Supplementary Bug Fixes vs. Re-opened Bugs (LA, FK, BA), pp. 205–214.
SCAM-2014-RaemaekersDV #case study #repository #semantics #version control
Semantic Versioning versus Breaking Changes: A Study of the Maven Repository (SR, AvD, JV), pp. 215–224.
SCAM-2014-LiangSM #analysis #performance
Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAM-2014-AbadiF #algorithm #interprocedural #on-demand #parallel
A Parallel On-Demand Algorithm for Computing Interprocedural Dominators (AA, YAF), pp. 235–244.
SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAM-2014-YadegariD #analysis
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
SCAM-2014-LiangSMKH #analysis #automaton #exception
Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAM-2014-Cortes-CoyVAP #automation #commit #generative #on the #source code #summary
On Automatically Generating Commit Messages via Summarization of Source Code Changes (LFCC, MLV, JA, DP), pp. 275–284.
SCAM-2014-RahmanR14a #exception #on the #recommendation #using
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
SCAM-2014-YoshidaH #c #semiparsing #source code #syntax
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
SCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.