Abstract is missing.
- Vulnerability Prediction Models: A Case Study on the Linux KernelMatthieu Jimenez, Mike Papadakis, Yves Le Traon. 1-10 [doi]
- Assessment of Source Code Obfuscation TechniquesAlessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella. 11-20 [doi]
- A Security Perspective on Code Review: The Case of ChromiumMarco di Biase, Magiel Bruntink, Alberto Bacchelli. 21-30 [doi]
- A Source-Level Energy Optimization Framework for Mobile ApplicationsXueliang Li 0002, John P. Gallagher. 31-40 [doi]
- SATT: Tailoring Code Metric Thresholds for Different Software ArchitecturesMauricio Finavaro Aniche, Christoph Treude, Andy Zaidman, Arie van Deursen, Marco Aurélio Gerosa. 41-50 [doi]
- Collective Intelligence for Smarter API Recommendations in PythonAndrea Renika D'Souza, Di Yang, Cristina V. Lopes. 51-60 [doi]
- BinCFP: Efficient Multi-threaded Binary Code Control Flow ProfilingJiang Ming, Dinghao Wu. 61-66 [doi]
- Conc2Seq: A Frama-C Plugin for Verification of Parallel Compositions of C ProgramsAllan Blanchard, Nikolai Kosmatov, Matthieu Lemerre, Frédéric Loulergue. 67-72 [doi]
- Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact AnalysisTushar Sharma, Girish Suryanarayana. 73-78 [doi]
- Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity VulnerabilitiesBenjamin Holland, Ganesh Ram Santhanam, Payas Awadhutkar, Suresh Kothari. 79-84 [doi]
- Scala-AM: A Modular Static Analysis FrameworkQuentin Stievenart, Maarten Vandercammen, Wolfgang De Meuter, Coen De Roover. 85-90 [doi]
- A Program Interpreter Framework for Arbitrary AbstractionsJochen Quante. 91-96 [doi]
- Mutation-Based Graph Inference for Fault LocalizationVincenzo Musco, Martin Monperrus, Philippe Preux. 97-106 [doi]
- An Exploratory Study of Interface Redundancy in Code RepositoriesAdriano Carvalho de Paula, Eduardo Guerra, Cristina V. Lopes, Hitesh Sajnani, Otávio Augusto Lazzarini Lemos. 107-116 [doi]
- Similarity of Source Code in the Presence of Pervasive ModificationsChaiyong Ragkhitwetsagul, Jens Krinke, David Clark. 117-126 [doi]
- LLSPLAT: Improving Concolic Testing by Bounded Model CheckingMin Gao, Lei He, Rupak Majumdar, Zilong Wang. 127-136 [doi]
- Are My Unit Tests in the Right Package?Gergo Balogh, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy. 137-146 [doi]
- Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual StudyMarinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis, Nicos Malevris. 147-156 [doi]
- Survey of Approaches for Handling Static Analysis AlarmsTukaram Muske, Alexander Serebrenik. 157-166 [doi]
- Effects Dependence Graph: A Key Data Concept for C Source-to-Source CompilersNelson Lossing, Pierre Guillou, François Irigoin. 167-176 [doi]
- Transforming C++11 Code to C++03 to Support Legacy Compilation EnvironmentsGabor Antal, David Havas, István Siket, Árpád Beszédes, Rudolf Ferenc, József Mihalicza. 177-186 [doi]
- A Case for Software Specific Natural Language TechniquesDavid Binkley, Dawn J. Lawrie. 187-196 [doi]
- A Source Level Empirical Study of Features and Their Interactions in Variable SoftwareStefan Fischer 0006, Lukas Linsbauer, Roberto E. Lopez-Herrejon, Alexander Egyed. 197-206 [doi]
- Exploring the Effects of History Length and Age on Mining Software Change ImpactLeon Moonen, Stefano Di Alesio, Thomas Rolfsnes, Dave W. Binkley. 207-216 [doi]