Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2019.

EVOL
DBLP
Scholar
?EE?
Full names Links ISxN
@proceedings{SCAM-2019,
	ee            = "https://ieeexplore.ieee.org/xpl/conhome/8913408/proceeding",
	isbn          = "978-1-7281-4937-0",
	publisher     = "{IEEE}",
	title         = "{Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2019,
}

Contents (28 items)

SCAM-2019-BradleyG #c++ #case study #exception #open source
A Study on the Effects of Exception Usage in Open-Source C++ Systems (KB, MG), pp. 1–11.
SCAM-2019-LeeBFGY #approximate #dependence #modelling #named
MOAD: Modeling Observation-Based Approximate Dependency (SL, DWB, RF, NG, SY), pp. 12–22.
SCAM-2019-MasudC #towards #using
Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
SCAM-2019-MarcilioFB0 #analysis #automation #generative
Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings (DM, CAF, RB, GP0), pp. 34–44.
SCAM-2019-PaixaoM #code review #empirical #harmful #overview #scalability
Rebasing in Code Review Considered Harmful: A Large-Scale Empirical Investigation (MP, PHMM), pp. 45–55.
SCAM-2019-Kessel0 #automation #set
Automatically Curated Data Sets (MK, CA0), pp. 56–61.
SCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language #using
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAM-2019-PerumaMDN #commit #refactoring #using
Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
SCAM-2019-GomesCS #developer
No Accounting for Taste: Supporting Developers' Individual Choices of Coding Styles (IMMG, DC, MS), pp. 86–91.
SCAM-2019-HarrandSMB #behaviour #bytecode #java
The Strengths and Behavioral Quirks of Java Bytecode Decompilers (NH, CSV, MM, BB), pp. 92–102.
SCAM-2019-KashyapRKTSPHMS #automation #benchmark #generative
Automated Customized Bug-Benchmark Generation (VK, JR, LK, ET, RS, SAP, JH, DM, ES), pp. 103–114.
SCAM-2019-HendersonPK #automation #fault #locality #markov #process #using
Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
SCAM-2019-RahmanCKR #information retrieval #modelling #re-engineering #towards
Toward Optimal Selection of Information Retrieval Models for Software Engineering Tasks (MMR, SC, GEK, BR), pp. 127–138.
SCAM-2019-KlintSV #rascal #years after
Rascal, 10 Years Later (PK, TvdS, JJV), p. 139.
SCAM-2019-CordyDMS #experience #re-engineering #txl
Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001) (JRC, TRD, AJM, KAS), p. 140.
SCAM-2019-GeremiaBOLP #stack overflow
Characterizing Leveraged Stack Overflow Posts (SG, GB, RO, ML, MDP), pp. 141–151.
SCAM-2019-RebaiSAKC #documentation #interactive #refactoring
Interactive Refactoring Documentation Bot (SR, OBS, VA, MK, MC), pp. 152–162.
SCAM-2019-MarcelRR #3d #visualisation
Movement Patterns and Trajectories in Three-Dimensional Software Visualization (SM, KR, MR), pp. 163–174.
SCAM-2019-TeotonioGMM #evolution #legacy #named #runtime #web
WAL: A Tool for Diagnosing Accessibility Issues and Evolving Legacy Web Systems at Runtime (WT, PG, PM, PM), pp. 175–180.
SCAM-2019-AlizadehFK #developer #less is more #multi #refactoring
Less is More: From Multi-objective to Mono-objective Refactoring via Developer's Knowledge Extraction (VA, HF, MK), pp. 181–192.
SCAM-2019-Kessel019a #behaviour #comparison #equivalence #functional #on the
On the Efficacy of Dynamic Behavior Comparison for Judging Functional Equivalence (MK, CA0), pp. 193–203.
SCAM-2019-00080BML #identifier #on the #quality
On the Quality of Identifiers in Test Code (BL0, CN0, GB, AM, ML), pp. 204–215.
SCAM-2019-YackleyKBAM #refactoring #testing
Simultaneous Refactoring and Regression Testing (JJY, MK, GB, VA, BRM), pp. 216–227.
SCAM-2019-StorerB #automation #behaviour #development #exclamation #generative #testing
Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites (TS, RB), pp. 228–237.
SCAM-2019-ScocciaPPMK #android #case study #open source
Permission Issues in Open-Source Android Apps: An Exploratory Study (GLS, AP, VP, IM, DEK), pp. 238–249.
SCAM-2019-BergerSK #architecture #security
The Architectural Security Tool Suite - ARCHSEC (BJB, KS, RK), pp. 250–255.
SCAM-2019-TiwariPG0 #analysis #android #named #scalability #web
LUDroid: A Large Scale Analysis of Android - Web Hybridization (AT, JP, SG, CH0), pp. 256–267.
SCAM-2019-0006LBR #analysis #android #privacy
Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.