Abstract is missing.
- A Fuzzy Expert System for Cost-Effective Regression Testing StrategiesAmanda Schwartz, Hyunsook Do. 1-10 [doi]
- Identifying Process Improvement Targets in Test Processes: A Case StudyTanja Toroi, Anu Raninen, Lauri Väätäinen. 11-19 [doi]
- On Rapid Releases and Software TestingMika V. Mäntylä, Foutse Khomh, Bram Adams, Emelie Engstrom, Kai Petersen. 20-29 [doi]
- How Multiple Developers Affect the Evolution of Code ClonesJan Harder. 30-39 [doi]
- Mining Logical Clones in Software: Revealing High-Level Business and Programming RulesWenyi Qian, Xin Peng, Zhenchang Xing, Stan Jarzabek, Wenyun Zhao. 40-49 [doi]
- An Empirical Study of Clone RemovalsSaman Bazrafshan, Rainer Koschke. 50-59 [doi]
- Content Categorization of API DiscussionsDaqing Hou, Lingfeng Mo. 60-69 [doi]
- An Empirical Study of API Stability and Adoption in the Android EcosystemTyler McDonnell, Baishakhi Ray, Miryung Kim. 70-79 [doi]
- How We Design Interfaces, and How to Assess ItHani Abdeen, Houari A. Sahraoui, Osama Shata. 80-89 [doi]
- An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for ExecutablesKapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis. 90-99 [doi]
- An Automation-Assisted Empirical Study on Lock Usage for Concurrent ProgramsRui Xin, Zhengwei Qi, Shiqiu Huang, Chengcheng Xiang, Yudi Zheng, Yin Wang, Haibing Guan. 100-109 [doi]
- Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance IssuesMark D. Syer, Zhen Ming Jiang, Meiyappan Nagappan, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora. 110-119 [doi]
- Exploring the Limits of Domain Model RecoveryPaul Klint, Davy Landman, Jurgen J. Vinju. 120-129 [doi]
- Combining Static and Dynamic Analyses to Reverse-Engineer Scenario DiagramsYvan Labiche, Bojana Kolbah, Hossein Mehrfard. 130-139 [doi]
- An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class DiagramsMohd Hafeez Osman, Michel R. V. Chaudron, Peter van der Putten. 140-149 [doi]
- Output-Oriented Refactoring in PHP-Based Dynamic Web ApplicationsHoan Anh Nguyen, Hung Viet Nguyen, Tung Thanh Nguyen, Tien N. Nguyen. 150-159 [doi]
- On the Automation of Dependency-Breaking Refactorings in JavaSyed Muhammad Ali Shah, Jens Dietrich, Catherine McCartin. 160-169 [doi]
- Reducing the Energy Consumption of Mobile Applications Behind the ScenesYoung-Woo Kwon, Eli Tilevich. 170-179 [doi]
- Efficient Automated Program Repair through Fault-Recorded Testing PrioritizationYuhua Qi, Xiaoguang Mao, Yan Lei. 180-189 [doi]
- Dealing with Faults in Source Code: Abbreviated vs. Full-Word Identifier NamesGiuseppe Scanniello, Michele Risi. 190-199 [doi]
- DRONE: Predicting Priority of Reported Bugs by Multi-factor AnalysisYuan Tian, David Lo, Chengnian Sun. 200-209 [doi]
- An Empirical Investigation on Documentation Usage Patterns in Maintenance TasksGabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella. 210-219 [doi]
- Architecture Compliance Checking of Semantically Rich Modular Architectures: A Comparative Study of Tool SupportLeo Pruijt, Christian Koppe, Sjaak Brinkkemper. 220-229 [doi]
- LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code LinesMuhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Massimiliano Di Penta. 230-239 [doi]
- Mining Software Profile across Multiple Repositories for Hierarchical CategorizationTao Wang, Huaimin Wang, Gang Yin, Charles X. Ling, Xiang Li, Peng Zou. 240-249 [doi]
- Mining Software Repositories for Accurate AuthorshipXiaozhu Meng, Barton P. Miller, William R. Williams, Andrew R. Bernat. 250-259 [doi]
- Investigating the Impact of Code Smells on System's Quality: An Empirical Study on Systems of Different Application DomainsFrancesca Arcelli Fontana, Vincenzo Ferme, Alessandro Marino, Bartosz Walter, Pawel Martenka. 260-269 [doi]
- Predicting Bugs Using AntipatternsSeyyed Ehsan Salamati Taba, Foutse Khomh, Ying Zou, Ahmed E. Hassan, Meiyappan Nagappan. 270-279 [doi]
- The Evolution of Project Inter-dependencies in a Software Ecosystem: The Case of ApacheGabriele Bavota, Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella. 280-289 [doi]
- Stakeholders' Information Needs for Artifacts and Their Dependencies in a Real World ContextSebastian C. Muller, Thomas Fritz. 290-299 [doi]
- Improving Feature Location by Enhancing Source Code with StereotypesNouh Alhindawi, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic. 300-309 [doi]
- Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization ToolsTien-Duy B. Le, David Lo. 310-319 [doi]
- Enhancing Software Traceability by Automatically Expanding Corpora with Relevant DocumentationTathagata Dasgupta, Mark Grechanik, Evan Moritz, Bogdan Dit, Denys Poshyvanyk. 320-329 [doi]
- Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component LibraryBogdan Dit, Evan Moritz, Mario Linares Vásquez, Denys Poshyvanyk. 330-339 [doi]
- Social Activities Rival Patch Submission for Prediction of Developer Initiation in OSS ProjectsMohammad Gharehyazie, Daryl Posnett, Vladimir Filkov. 340-349 [doi]
- How Does Context Affect the Distribution of Software Maintainability Metrics?Feng Zhang, Audris Mockus, Ying Zou, Foutse Khomh, Ahmed E. Hassan. 350-359 [doi]
- Refactoring Clones: An Optimization ProblemGiri Panamoottil Krishnan, Nikolaos Tsantalis. 360-363 [doi]
- Multi-abstraction Concern LocalizationTien-Duy B. Le, Shaowei Wang, David Lo. 364-367 [doi]
- Towards a Weighted Voting System for Q&A SitesDaniele Romano, Martin Pinzger. 368-371 [doi]
- Latent Co-development Analysis Based Semantic Search for Large Code RepositoriesRahul Venkataramani, Allahbaksh M. Asadullah, Vasudev D. Bhat, Basavaraju Muddu. 372-375 [doi]
- Differentiating Roles of Program Elements in Action-Oriented ConcernsEmily Hill, David Shepherd, Lori L. Pollock, K. Vijay-Shanker. 376-379 [doi]
- Theory and Practice, Do They Match? A Case with Spectrum-Based Fault LocalizationTien-Duy B. Le, Ferdian Thung, David Lo. 380-383 [doi]
- An Initial Investigation into Change-Based Reconstruction of Floss-RefactoringsQuinten David Soetens, Javier Pérez, Serge Demeyer. 384-387 [doi]
- Automatically Extracting Instances of Code Change Patterns with AST AnalysisMatias Martinez, Laurence Duchien, Martin Monperrus. 388-391 [doi]
- Identification of Refused Bequest Code SmellsElvis Ligu, Alexander Chatzigeorgiou, Theodoros Chaikalis, Nikolaos Ygeionomakis. 392-395 [doi]
- Code Smell Detection: Towards a Machine Learning-Based ApproachFrancesca Arcelli Fontana, Marco Zanoni, Alessandro Marino, Mika Mäntylä. 396-399 [doi]
- Variations on Using Propagation Cost to Measure Architecture Modifiability PropertiesRobert L. Nord, Ipek Ozkaya, Raghvinder S. Sangwan, Julien Delange, Marco A. Gonzalez, Philippe Kruchten. 400-403 [doi]
- Multi-objective Optimal Test Suite Computation for Software Product Line Pairwise TestingRoberto E. Lopez-Herrejon, J. Francisco Chicano, Javier Ferrer, Alexander Egyed, Enrique Alba. 404-407 [doi]
- Which Feature Location Technique is Better?Emily Hill, Alberto Bacchelli, Dave Binkley, Bogdan Dit, Dawn Lawrie, Rocco Oliveto. 408-411 [doi]
- Automatic Means of Identifying Evolutionary Events in Software DevelopmentSiim Karus. 412-415 [doi]
- Towards Understanding Large-Scale Adaptive Changes from Version HistoriesOmar Meqdadi, Nouh Alhindawi, Michael L. Collard, Jonathan I. Maletic. 416-419 [doi]
- Can Refactoring Cyclic Dependent Components Reduce Defect-Proneness?Tosin Daniel Oyetoyan, Daniela S. Cruzes, Reidar Conradi. 420-423 [doi]
- Towards a Taxonomy of Programming-Related Difficulties during MaintenanceAiko Fallas Yamashita, Leon Moonen. 424-427 [doi]
- A Pilot Experiment to Quantify the Effect of Documentation Accuracy on Maintenance TasksMaurizio Leotta, Filippo Ricca, Giuliano Antoniol, Vahid Garousi, Junji Zhi, Günther Ruhe. 428-431 [doi]
- Task-Driven Software SummarizationDave Binkley, Dawn Lawrie, Emily Hill, Janet Burge, Ian Harris, Regina Hebig, Oliver Keszocze, Karl Reed, John Slankas. 432-435 [doi]
- Determining "Grim Reaper" Policies to Prevent Languishing BugsPatrick Francis, Laurie Williams. 436-439 [doi]
- Which Practices Are Suitable for an Academic Software Project?Vaclav Rajlich, Jing Hua. 440-443 [doi]
- WSDARWIN: A Decision-Support Tool for Web-Service EvolutionMarios Fokaefs, Eleni Stroulia. 444-447 [doi]
- A Study on Developers' Perceptions about Exception Handling BugsFelipe Ebert, Fernando Castor. 448-451 [doi]
- On the Relationship between the Vocabulary of Bug Reports and Source CodeLaura Moreno, Wathsala Bandara, Sonia Haiduc, Andrian Marcus. 452-455 [doi]
- Database-Aware Fault Localization for Dynamic Web ApplicationsHung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen, Tien N. Nguyen. 456-459 [doi]
- On the Personality Traits of StackOverflow UsersBlerina Bazelli, Abram Hindle, Eleni Stroulia. 460-463 [doi]
- Towards Identification of Software Improvements and Specification Updates by Comparing Monitored and Specified End-User BehaviorTobias Roehm, Bernd Bruegge, Tom-Michael Hesse, Barbara Paech. 464-467 [doi]
- An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped CurvesAna Erika Camargo Cruz, Hajimu Iida, Norbert Preining. 468-471 [doi]
- Understanding Schema Evolution as a Basis for Database ReengineeringMaxime Gobert, Jerome Maes, Anthony Cleve, Jens Weber. 472-475 [doi]
- SAMOA - A Visual Software Analytics Platform for Mobile ApplicationsRoberto Minelli, Michele Lanza. 476-479 [doi]
- Towards a Scalable Cloud Platform for Search-Based Probabilistic TestingLouis M. Rose, Simon M. Poulding, Robert Feldt, Richard F. Paige. 480-483 [doi]
- LHDiff: Tracking Source Code Lines to Support Software Maintenance ActivitiesMuhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Massimiliano Di Penta. 484-487 [doi]
- gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution AnalysisRipon K. Saha, Chanchal K. Roy, Kevin A. Schneider. 488-491 [doi]
- eCITY: A Tool to Track Software Structural Changes Using an Evolving CityTaimur Khan, Henning Barthel, Achim Ebert, Peter Liggesmeyer. 492-495 [doi]
- ExSchema: Discovering and Maintaining Schemas from Polyglot Persistence ApplicationsJuan Carlos Castrejón, Genoveva Vargas-Solar, Christine Collet, Rafael Lozano. 496-499 [doi]
- A Visualization Tool for Reverse-Engineering of Complex Component ApplicationsLukas Holy, Jaroslav Snajberk, Premek Brada, Kamil Jezek. 500-503 [doi]
- Interactive Exploration of Collaborative Software-Development DataEleni Stroulia, Isaac Matichuk, Fabio Rocha, Ken Bauer. 504-507 [doi]
- SourceMiner Evolution: A Tool for Supporting Feature Evolution ComprehensionRenato Lima Novais, Camila Nunes, Alessandro Garcia, Manoel G. Mendonça. 508-511 [doi]
- CONQUER: A Tool for NL-Based Query Refinement and Contextualizing Code Search ResultsManuel Roldan-Vega, Greg Mallet, Emily Hill, Jerry Alan Fails. 512-515 [doi]
- srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool DemonstrationMichael L. Collard, Michael John Decker, Jonathan I. Maletic. 516-519 [doi]
- TRINITY: An IDE for the MatrixJeroen van den Bos, Tijs van der Storm. 520-523 [doi]
- E-Xplore: Enterprise API ExplorerAllahbaksh M. Asadullah, Basavaraju M., Nikita Jain. 524-527 [doi]
- Browserbite: Accurate Cross-Browser Testing via Machine Learning over Image FeaturesNataliia Semenenko, Marlon Dumas, Tonis Saar. 528-531 [doi]
- Automated Classification of Static Code Analysis Alerts: A Case StudyUlas Yuksel, Hasan Sözer. 532-535 [doi]
- Mining Telecom System Logs to Facilitate Debugging TasksAlf Larsson, Abdelwahab Hamou-Lhadj. 536-539 [doi]
- Test Case Prioritization for Continuous Regression Testing: An Industrial Case StudyDusica Marijan, Arnaud Gotlieb, Sagar Sen. 540-543 [doi]
- Improving Statistical Approach for Memory Leak Detection Using Machine LearningVladimir Sor, Plumbr Ou, Tarvo Treier, Satish Narayana Srirama. 544-547 [doi]
- Large-Scale Automated Refactoring Using ClangMRHyrum K. Wright, Daniel Jasper, Manuel Klimek, Chandler Carruth, Zhanyong Wan. 548-551 [doi]
- Assuming Software Maintenance of a Large, Embedded Legacy System from the Original DeveloperWilliam L. Miller, Lawrence B. Compton, Bruce L. Woodmansee. 552-555 [doi]
- The Adventure of Developing a Software Application on a Pre-release Platform: Features and Learned LessonsClauirton de Siebra, Angélica Mascaro, Fabio Q. B. Silva, Andre L. M. Santos. 556-559 [doi]
- Analysis of Multi-dimensional Code CouplingsFabian Beck. 560-565 [doi]
- How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case StudyAiko Yamashita. 566-571 [doi]
- Refactoring Planning for Design Smell Correction: Summary, Opportunities and Lessons LearnedJavier Perez. 572-577 [doi]
- Revealing the Effect of Coding Practices on Software MaintainabilityPéter Hegedus. 578-581 [doi]
- Automated S/W Reengineering for Fault-Tolerant and Energy-Efficient Distributed ExecutionYoung-Woo Kwon. 582-585 [doi]
- Reverse Engineering Web Sales ConfiguratorsEbrahim Khalil Abbasi. 586-589 [doi]