Abstract is missing.
- ORBS and the limits of static slicingDavid Binkley, Nicolas E. Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo. 1-10 [doi]
- Intent, tests, and release dependencies: Pragmatic recipes for source code integrationMartin Brandtner, Philipp Leitner, Harald C. Gall. 11-20 [doi]
- The use of C++ exception handling constructs: A comprehensive studyRodrigo Bonifácio, Fausto Carvalho, Guilherme N. Ramos, Uirá Kulesza, Roberta Coelho. 21-30 [doi]
- Multi-layer software configuration: Empirical study on wordpressMohammed Sayagh, Bram Adams. 31-40 [doi]
- Can the use of types and query expansion help improve large-scale code search?Otávio Augusto Lazzarini Lemos, Adriano Carvalho de Paula, Hitesh Sajnani, Cristina V. Lopes. 41-50 [doi]
- Using changeset descriptions as a data source to assist feature locationMuslim Chochlov, Michael English, Jim Buckley. 51-60 [doi]
- Automatically identifying focal methods under test in unit test casesMohammad Ghafari, Carlo Ghezzi, Konstantin Rubinov. 61-70 [doi]
- Navigating source code with wordsDawn Lawrie, Dave Binkley. 71-80 [doi]
- Recommending insightful comments for source code using crowdsourced knowledgeMohammad Masudur Rahman, Chanchal K. Roy, Iman Keivanloo. 81-90 [doi]
- Checking C++ codes for compatibility with operator overloadingAlexander Huck, Christian Bischof, Jean Utke. 91-100 [doi]
- Detecting function purity in JavaScriptJens Nicolay, Carlos Noguera, Coen De Roover, Wolfgang De Meuter. 101-110 [doi]
- Data tainting and obfuscation: Improving plausibility of incorrect taintSandrine Blazy, Stéphanie Riaud, Thomas Sirvent. 111-120 [doi]
- A grammar for spreadsheet formulas evaluated on two large datasetsEfthimia Aivaloglou, David Hoepelman, Felienne Hermans. 121-130 [doi]
- The impact of cross-distribution bug duplicates, empirical study on Debian and UbuntuVincent Boisselle, Bram Adams. 131-140 [doi]
- Cumulative code churn: Impact on maintainabilityCsaba Faragó, Péter Hegedüs, Rudolf Ferenc. 141-150 [doi]
- How do Java methods grow?Daniela Steidl, Florian Deissenboeck. 151-160 [doi]
- On the comprehension of code clone visualizations: A controlled study using eye trackingMd Sami Uddin, Varun Gaur, Carl Gutwin, Chanchal K. Roy. 161-170 [doi]
- When code smells twice as much: Metric-based detection of variability-aware code smellsWolfram Fenske, Sandro Schulze, Daniel Meyer, Gunter Saake. 171-180 [doi]
- LeakTracer: Tracing leaks along the wayHengyang Yu, Xiaohua Shi, Wei Feng. 181-190 [doi]
- Automated memory leak diagnosis by regression testingMohammadreza Ghanavati, Artur Andrzejak. 191-200 [doi]
- Automating the performance deviation analysis for multiple system releases: An evolutionary studyFelipe Pinto, Uirá Kulesza, Christoph Treude. 201-210 [doi]
- From preprocessor-constrained parse graphs to preprocessor-constrained control flowDierk Lüdemann, Rainer Koschke. 211-220 [doi]
- Recording and replaying system specific, source code transformationsGustavo Santos, Anne Etien, Nicolas Anquetil, Stéphane Ducasse, Marco Tulio Valente. 221-230 [doi]
- Discovering likely mappings between APIs using text miningRahul Pandita, Raoul Praful Jetley, Sithu D. Sudarsan, Laurie A. Williams. 231-240 [doi]
- SimNav: Simulink navigation of model clone classesEric J. Rapos, Andrew Stevenson, Manar H. Alalfi, James R. Cordy. 241-246 [doi]
- A translation validation framework for symbolic value propagation based equivalence checking of FSMDAsKunal Banerjee, Chittaranjan A. Mandal, Dipankar Sarkar. 247-252 [doi]
- FaultBuster: An automatic code smell refactoring toolsetGábor Szoke, Csaba Nagy, Lajos Jeno Fülöp, Rudolf Ferenc, Tibor Gyimóthy. 253-258 [doi]
- Improving prioritization of software weaknesses using security models with AVUSStephan Renatus, Corrie Bartelheimer, Jörn Eichler. 259-264 [doi]
- A static microcode analysis tool for programmable load driversLuca Dariz, Massimiliano Ruggeri, Michele Selvatici. 265-270 [doi]
- CodeMetropolis: Eclipse over the city of source codeGergo Balogh, Attila Szabolics, Árpád Beszédes. 271-276 [doi]