Proceedings of the 15th International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Michael W. Godfrey, David Lo, Foutse Khomh
Proceedings of the 15th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2015.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{SCAM-2015,
	editor        = "Michael W. Godfrey and David Lo and Foutse Khomh",
	isbn          = "978-1-4673-7529-0",
	publisher     = "{IEEE}",
	title         = "{Proceedings of the 15th International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2015,
}

Contents (30 items)

SCAM-2015-BinkleyGHIKY #slicing
ORBS and the limits of static slicing (DB, NEG, MH, SSI, JK, SY), pp. 1–10.
SCAM-2015-BrandtnerLG #dependence #integration #source code #testing
Intent, tests, and release dependencies: Pragmatic recipes for source code integration (MB, PL, HCG), pp. 11–20.
SCAM-2015-BonifacioCRKC #c++ #exception #using
The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAM-2015-SayaghA #empirical #multi
Multi-layer software configuration: Empirical study on wordpress (MS, BA), pp. 31–40.
SCAM-2015-LemosPSL #code search #query #question #scalability #using
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAM-2015-ChochlovEB #data flow #feature model #using
Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAM-2015-GhafariGR #automation #identification #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
SCAM-2015-LawrieB #navigation #source code #word
Navigating source code with words (DL, DB), pp. 71–80.
SCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAM-2015-HuckBU #c++
Checking C++ codes for compatibility with operator overloading (AH, CB, JU), pp. 91–100.
SCAM-2015-NicolayNRM #detection #javascript
Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
SCAM-2015-BlazyRS #obfuscation
Data tainting and obfuscation: Improving plausibility of incorrect taint (SB, SR, TS), pp. 111–120.
SCAM-2015-AivaloglouHH #dataset #scalability #spreadsheet
A grammar for spreadsheet formulas evaluated on two large datasets (EA, DH, FH), pp. 121–130.
SCAM-2015-BoisselleA #debugging #empirical
The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu (VB, BA), pp. 131–140.
SCAM-2015-FaragoHF #cumulative #maintenance
Cumulative code churn: Impact on maintainability (CF, PH, RF), pp. 141–150.
SCAM-2015-SteidlD #how #java #question
How do Java methods grow? (DS, FD), pp. 151–160.
SCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
SCAM-2015-FenskeSMS #detection #smell #variability
When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAM-2015-YuSF #named
LeakTracer: Tracing leaks along the way (HY, XS, WF), pp. 181–190.
SCAM-2015-GhanavatiA #automation #memory management #testing
Automated memory leak diagnosis by regression testing (MG, AA), pp. 191–200.
SCAM-2015-PintoKT #analysis #automation #multi #performance
Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
SCAM-2015-LudemannK #control flow #graph
From preprocessor-constrained parse graphs to preprocessor-constrained control flow (DL, RK), pp. 211–220.
SCAM-2015-SantosEADV #game studies #program transformation #source code
Recording and replaying system specific, source code transformations (GS, AE, NA, SD, MTV), pp. 221–230.
SCAM-2015-PanditaJSW #api #mining #using
Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAM-2015-RaposSAC #named #navigation
SimNav: Simulink navigation of model clone classes (EJR, AS, MHA, JRC), pp. 241–246.
SCAM-2015-BanerjeeMS #equivalence #framework #validation
A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs (KB, CAM, DS), pp. 247–252.
SCAM-2015-SzokeNFFG #automation #named #refactoring #smell #tool support
FaultBuster: An automatic code smell refactoring toolset (GS, CN, LJF, RF, TG), pp. 253–258.
SCAM-2015-RenatusBE #modelling #security #using
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAM-2015-DarizRS #analysis #programmable
A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAM-2015-BaloghSB #eclipse #named #source code
CodeMetropolis: Eclipse over the city of source code (GB, AS, ÁB), pp. 271–276.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.