Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2019.
Contents (28 items)
- SCAM-2019-BradleyG #c++ #case study #exception #open source
- A Study on the Effects of Exception Usage in Open-Source C++ Systems (KB, MG), pp. 1–11.
- SCAM-2019-LeeBFGY #approximate #dependence #modelling #named
- MOAD: Modeling Observation-Based Approximate Dependency (SL, DWB, RF, NG, SY), pp. 12–22.
- SCAM-2019-MasudC #towards #using
- Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
- SCAM-2019-MarcilioFB0 #analysis #automation #generative
- Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings (DM, CAF, RB, GP0), pp. 34–44.
- SCAM-2019-PaixaoM #code review #empirical #harmful #overview #scalability
- Rebasing in Code Review Considered Harmful: A Large-Scale Empirical Investigation (MP, PHMM), pp. 45–55.
- SCAM-2019-Kessel0 #automation #set
- Automatically Curated Data Sets (MK, CA0), pp. 56–61.
- SCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language #using
- An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
- SCAM-2019-PerumaMDN #commit #refactoring #using
- Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
- SCAM-2019-GomesCS #developer
- No Accounting for Taste: Supporting Developers' Individual Choices of Coding Styles (IMMG, DC, MS), pp. 86–91.
- SCAM-2019-HarrandSMB #behaviour #bytecode #java
- The Strengths and Behavioral Quirks of Java Bytecode Decompilers (NH, CSV, MM, BB), pp. 92–102.
- SCAM-2019-KashyapRKTSPHMS #automation #benchmark #generative
- Automated Customized Bug-Benchmark Generation (VK, JR, LK, ET, RS, SAP, JH, DM, ES), pp. 103–114.
- SCAM-2019-HendersonPK #automation #fault #locality #markov #process #using
- Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
- SCAM-2019-RahmanCKR #information retrieval #modelling #re-engineering #towards
- Toward Optimal Selection of Information Retrieval Models for Software Engineering Tasks (MMR, SC, GEK, BR), pp. 127–138.
- SCAM-2019-KlintSV #rascal #years after
- Rascal, 10 Years Later (PK, TvdS, JJV), p. 139.
- SCAM-2019-CordyDMS #experience #re-engineering #txl
- Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001) (JRC, TRD, AJM, KAS), p. 140.
- SCAM-2019-GeremiaBOLP #stack overflow
- Characterizing Leveraged Stack Overflow Posts (SG, GB, RO, ML, MDP), pp. 141–151.
- SCAM-2019-RebaiSAKC #documentation #interactive #refactoring
- Interactive Refactoring Documentation Bot (SR, OBS, VA, MK, MC), pp. 152–162.
- SCAM-2019-MarcelRR #3d #visualisation
- Movement Patterns and Trajectories in Three-Dimensional Software Visualization (SM, KR, MR), pp. 163–174.
- SCAM-2019-TeotonioGMM #evolution #legacy #named #runtime #web
- WAL: A Tool for Diagnosing Accessibility Issues and Evolving Legacy Web Systems at Runtime (WT, PG, PM, PM), pp. 175–180.
- SCAM-2019-AlizadehFK #developer #less is more #multi #refactoring
- Less is More: From Multi-objective to Mono-objective Refactoring via Developer's Knowledge Extraction (VA, HF, MK), pp. 181–192.
- SCAM-2019-Kessel019a #behaviour #comparison #equivalence #functional #on the
- On the Efficacy of Dynamic Behavior Comparison for Judging Functional Equivalence (MK, CA0), pp. 193–203.
- SCAM-2019-00080BML #identifier #on the #quality
- On the Quality of Identifiers in Test Code (BL0, CN0, GB, AM, ML), pp. 204–215.
- SCAM-2019-YackleyKBAM #refactoring #testing
- Simultaneous Refactoring and Regression Testing (JJY, MK, GB, VA, BRM), pp. 216–227.
- SCAM-2019-StorerB #automation #behaviour #development #exclamation #generative #testing
- Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites (TS, RB), pp. 228–237.
- SCAM-2019-ScocciaPPMK #android #case study #open source
- Permission Issues in Open-Source Android Apps: An Exploratory Study (GLS, AP, VP, IM, DEK), pp. 238–249.
- SCAM-2019-BergerSK #architecture #security
- The Architectural Security Tool Suite - ARCHSEC (BJB, KS, RK), pp. 250–255.
- SCAM-2019-TiwariPG0 #analysis #android #named #scalability #web
- LUDroid: A Large Scale Analysis of Android - Web Hybridization (AT, JP, SG, CH0), pp. 256–267.
- SCAM-2019-0006LBR #analysis #android #privacy
- Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.