Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2014.
@proceedings{SCAM-2014, address = "Victoria, British Columbia, Canada", ee = "http://www.computer.org/csdl/proceedings/scam/2014/6148/00/index.html", isbn = "978-0-7695-5304-7", publisher = "{IEEE Computer Society}", title = "{Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulation}", year = 2014, }
Contents (35 items)
- SCAM-2014-BazrafshanK #debugging #developer #performance
- Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs (SB, RK), pp. 1–10.
- SCAM-2014-MondalRS #automation #identification #refactoring
- Automatic Identification of Important Clones for Refactoring and Tracking (MM, CKR, KAS), pp. 11–20.
- SCAM-2014-SajnaniSL #case study #comparative #debugging #java
- A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code (HS, VS, CVL), pp. 21–30.
- SCAM-2014-RahmanR #empirical
- A Change-Type Based Empirical Study on the Stability of Cloned Code (MSR, CKR), pp. 31–40.
- SCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread
- C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
- SCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
- Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
- SCAM-2014-RooverI #program transformation
- The Ekeko/X Program Transformation Tool (CDR, KI), pp. 53–58.
- SCAM-2014-KosowerLR #c++ #documentation #framework #named
- Flowgen: Flowchart-Based Documentation Framework for C++ (DAK, JJLV, SAR), pp. 59–64.
- SCAM-2014-StoccoLRT #migration #named #testing #visual notation #web
- PESTO: A Tool for Migrating DOM-Based to Visual Web Tests (AS, ML, FR, PT), pp. 65–70.
- SCAM-2014-CaraccioloCSL #corpus #multi #named
- Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora (AC, AC, BS, ML), pp. 71–76.
- SCAM-2014-FerencLSGB #plugin
- Source Meter Sonar Qube Plug-in (RF, LL, IS, TG, TB), pp. 77–82.
- SCAM-2014-MurtazaHKC #automation #detection
- Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
- SCAM-2014-WuAGA #api #named
- ACUA: API Change and Usage Auditor (WW, BA, YGG, GA), pp. 89–94.
- SCAM-2014-SzokeANFG #quality #question #refactoring
- Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? (GS, GA, CN, RF, TG), pp. 95–104.
- SCAM-2014-PetiotBJKS #c #generative #source code #testing
- Instrumentation of Annotated C Programs for Test Generation (GP, BB, JJ, NK, JS), pp. 105–114.
- SCAM-2014-TliliFBDH #scalability #security #verification
- Scalable Security Verification of Software at Compile Time (ST, JMF, AB, BD, SH), pp. 115–124.
- SCAM-2014-KallenHH #object-oriented #refactoring #using
- Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
- SCAM-2014-OhSSW #fault #locality
- Concolic Fault Localization (CO, MS, DSN, TW), pp. 135–144.
- SCAM-2014-JiangSGC #maintenance #on the #slicing
- On the Accuracy of Forward Dynamic Slicing and Its Effects on Software Maintenance (SJ, RAS, MG, HC), pp. 145–154.
- SCAM-2014-KargenS #performance #scalability #slicing
- Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing (UK, NS), pp. 155–164.
- SCAM-2014-CaiJSZZ #analysis #named #predict
- SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
- SCAM-2014-YooBE #slicing
- Seeing Is Slicing: Observation Based Slicing of Picture Description Languages (SY, DB, RDE), pp. 175–184.
- SCAM-2014-LozanoNJ #why
- Explaining Why Methods Change Together (AL, CN, VJ), pp. 185–194.
- SCAM-2014-MarsavinaRZ #co-evolution #fine-grained
- Studying Fine-Grained Co-evolution Patterns of Production and Test Code (CM, DR, AZ), pp. 195–204.
- SCAM-2014-AnKA #debugging
- Supplementary Bug Fixes vs. Re-opened Bugs (LA, FK, BA), pp. 205–214.
- SCAM-2014-RaemaekersDV #case study #repository #semantics #version control
- Semantic Versioning versus Breaking Changes: A Study of the Maven Repository (SR, AvD, JV), pp. 215–224.
- SCAM-2014-LiangSM #analysis #performance
- Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
- SCAM-2014-AbadiF #algorithm #interprocedural #on-demand #parallel
- A Parallel On-Demand Algorithm for Computing Interprocedural Dominators (AA, YAF), pp. 235–244.
- SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
- Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
- SCAM-2014-YadegariD #analysis
- Bit-Level Taint Analysis (BY, SD), pp. 255–264.
- SCAM-2014-LiangSMKH #analysis #automaton #exception
- Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
- SCAM-2014-Cortes-CoyVAP #automation #commit #generative #on the #source code #summary
- On Automatically Generating Commit Messages via Summarization of Source Code Changes (LFCC, MLV, JA, DP), pp. 275–284.
- SCAM-2014-RahmanR14a #exception #on the #recommendation #using
- On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
- SCAM-2014-YoshidaH #c #semiparsing #source code #syntax
- A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
- SCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
- Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
6 ×#analysis
5 ×#named
4 ×#source code
3 ×#automation
3 ×#c
3 ×#debugging
3 ×#on the
3 ×#performance
3 ×#refactoring
3 ×#repository
5 ×#named
4 ×#source code
3 ×#automation
3 ×#c
3 ×#debugging
3 ×#on the
3 ×#performance
3 ×#refactoring
3 ×#repository