Publication has no abstract
- Counting Bugs is Harder Than You ThinkPaul E. Black. 1-9 [doi]
- Knitting Music and Programming: Reflections on the Frontiers of Source Code AnalysisNicolas Gold. 10-14 [doi]
- Program Analysis Too Loopy? Set the Loops AsideEric Larson. 15-24 [doi]
- Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis PrecisionViktor Pavlu, Markus Schordan, Andreas Krall. 25-34 [doi]
- Assumption Hierarchy for a CHA Call Graph Construction AlgorithmJason Sawin, Atanas Rountev. 35-44 [doi]
- Tuning Static Data Race Analysis for Automotive Control SoftwareSteffen Keul. 45-54 [doi]
- Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android PlatformsMark D. Syer, Bram Adams, Ying Zou, Ahmed E. Hassan. 55-64 [doi]
- Are the Clients of Flawed Classes (Also) Defect Prone?Radu Marinescu, Cristina Marinescu. 65-74 [doi]
- Equational Reasoning on x86 Assembly CodeKevin Coogan, Saumya K. Debray. 75-84 [doi]
- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting VulnerabilitiesAndrea Avancini, Mariano Ceccato. 85-94 [doi]
- A Study of Cloning in the Linux SCSI DriversWei Wang, Michael W. Godfrey. 95-104 [doi]
- A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone RefactoringMinhaz F. Zibran, Chanchal K. Roy. 105-114 [doi]
- Analyzing the Effect of Preprocessor Annotations on Code ClonesSandro Schulze, Elmar Jürgens, Janet Feigenspan. 115-124 [doi]
- The Effect of Lexicon Bad Smells on Concept Location in Source CodeSurafel Lemma Abebe, Sonia Haiduc, Paolo Tonella, Andrian Marcus. 125-134 [doi]
- Recovering a Balanced Overview of Topics in a Software DomainMatthew B. Kelly, Jason S. Alexander, Bram Adams, Ahmed E. Hassan. 135-144 [doi]
- A Comparative Study of Code Query TechnologiesTiago L. Alves, Jurriaan Hage, Peter Rademaker. 145-154 [doi]
- I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with InterceptorsSerguei A. Roubtsov, Alexander Serebrenik, Aurélien Mazoyer, Mark van den Brand. 155-164 [doi]
- CheckPointer - A C Memory Access ValidatorMichael Mehlich. 165-172 [doi]
- Lightweight Transformation and Fact Extraction with the srcML ToolkitMichael L. Collard, Michael J. Decker, Jonathan I. Maletic. 173-184 [doi]
- Automatic Parallelization of Side-Effecting Higher-Order Scheme ProgramsJens Nicolay, Coen De Roover, Wolfgang De Meuter, Viviane Jonckers. 185-194 [doi]
- What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization ScenariosAhmed Sfayhi, Houari A. Sahraoui. 195-203 [doi]