Michael W. Godfrey, David Lo, Foutse Khomh
Proceedings of the 15th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2015.
@proceedings{SCAM-2015, editor = "Michael W. Godfrey and David Lo and Foutse Khomh", isbn = "978-1-4673-7529-0", publisher = "{IEEE}", title = "{Proceedings of the 15th International Working Conference on Source Code Analysis and Manipulation}", year = 2015, }
Contents (30 items)
- SCAM-2015-BinkleyGHIKY #slicing
- ORBS and the limits of static slicing (DB, NEG, MH, SSI, JK, SY), pp. 1–10.
- SCAM-2015-BrandtnerLG #dependence #integration #source code #testing
- Intent, tests, and release dependencies: Pragmatic recipes for source code integration (MB, PL, HCG), pp. 11–20.
- SCAM-2015-BonifacioCRKC #c++ #exception #using
- The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
- SCAM-2015-SayaghA #empirical #multi
- Multi-layer software configuration: Empirical study on wordpress (MS, BA), pp. 31–40.
- SCAM-2015-LemosPSL #code search #query #question #scalability #using
- Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
- SCAM-2015-ChochlovEB #data flow #feature model #using
- Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
- SCAM-2015-GhafariGR #automation #identification #testing
- Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
- SCAM-2015-LawrieB #navigation #source code #word
- Navigating source code with words (DL, DB), pp. 71–80.
- SCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
- Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
- SCAM-2015-HuckBU #c++
- Checking C++ codes for compatibility with operator overloading (AH, CB, JU), pp. 91–100.
- SCAM-2015-NicolayNRM #detection #javascript
- Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
- SCAM-2015-BlazyRS #obfuscation
- Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
- SCAM-2015-AivaloglouHH #dataset #scalability #spreadsheet
- A grammar for spreadsheet formulas evaluated on two large datasets (EA, DH, FH), pp. 121–130.
- SCAM-2015-BoisselleA #debugging #empirical
- The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu (VB, BA), pp. 131–140.
- SCAM-2015-FaragoHF #cumulative #maintenance
- Cumulative code churn: Impact on maintainability (CF, PH, RF), pp. 141–150.
- SCAM-2015-SteidlD #how #java #question
- How do Java methods grow? (DS, FD), pp. 151–160.
- SCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
- On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
- SCAM-2015-FenskeSMS #detection #smell #variability
- When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
- SCAM-2015-YuSF #named
- LeakTracer: Tracing leaks along the way (HY, XS, WF), pp. 181–190.
- SCAM-2015-GhanavatiA #automation #memory management #testing
- Automated memory leak diagnosis by regression testing (MG, AA), pp. 191–200.
- SCAM-2015-PintoKT #analysis #automation #multi #performance
- Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
- SCAM-2015-LudemannK #control flow #graph
- From preprocessor-constrained parse graphs to preprocessor-constrained control flow (DL, RK), pp. 211–220.
- SCAM-2015-SantosEADV #game studies #program transformation #source code
- Recording and replaying system specific, source code transformations (GS, AE, NA, SD, MTV), pp. 221–230.
- SCAM-2015-PanditaJSW #api #mining #using
- Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
- SCAM-2015-RaposSAC #named #navigation
- SimNav: Simulink navigation of model clone classes (EJR, AS, MHA, JRC), pp. 241–246.
- SCAM-2015-BanerjeeMS #equivalence #framework #validation
- A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs (KB, CAM, DS), pp. 247–252.
- SCAM-2015-SzokeNFFG #automation #named #refactoring #smell #tool support
- FaultBuster: An automatic code smell refactoring toolset (GS, CN, LJF, RF, TG), pp. 253–258.
- SCAM-2015-RenatusBE #modelling #security #using
- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
- SCAM-2015-DarizRS #analysis #programmable
- A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
- SCAM-2015-BaloghSB #eclipse #named #source code
- CodeMetropolis: Eclipse over the city of source code (GB, AS, ÁB), pp. 271–276.
5 ×#source code
5 ×#using
4 ×#automation
4 ×#named
3 ×#testing
2 ×#analysis
2 ×#c++
2 ×#detection
2 ×#empirical
2 ×#multi
5 ×#using
4 ×#automation
4 ×#named
3 ×#testing
2 ×#analysis
2 ×#c++
2 ×#detection
2 ×#empirical
2 ×#multi