Abstract is missing.
- The Law and Reverse EngineeringKeith Gallagher, Cem Caner, Jenifer Deignan. 3-4 [doi]
- Workshop on Mining Unstructured Data (MUD) ... Because "Mining Unstructured Data is Like Fishing in Muddy Waters"!Alberto Bacchelli, Nicolas Bettenburg, Latifa Guerrouj. 5-6 [doi]
- Structured Binary Editing with a CFG Transformation AlgebraAndrew R. Bernat, Barton P. Miller. 9-18 [doi]
- C to O-O Translation: Beyond the Easy StuffMarco Trudel, Carlo A. Furia, Martin Nordio, Bertrand Meyer, Manuel Oriol. 19-28 [doi]
- Refactoring with Unit Testing: A Match Made in Heaven?Frens Vonken, Andy Zaidman. 29-38 [doi]
- Astra: Bottom-up Construction of Structured Artifact RepositoriesJoel Ossher, Hitesh Sajnani, Cristina Videira Lopes. 41-50 [doi]
- Detection and Recovery of Functions and their Arguments in a Retargetable DecompilerLukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele. 51-60 [doi]
- Towards Static Analysis of Virtualization-Obfuscated BinariesJohannes Kinder. 61-70 [doi]
- Code Defactoring: Evaluating the Effectiveness of Java ObfuscationsAndrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff. 71-80 [doi]
- Understanding Android Fragmentation with Topic Analysis of Vendor-Specific BugsDan Han, Chenlei Zhang, Xiaochao Fan, Abram Hindle, Kenny Wong, Eleni Stroulia. 83-92 [doi]
- Using Network Analysis for Recommendation of Central Software ClassesDaniela Steidl, Benjamin Hummel, Elmar Jürgens. 93-102 [doi]
- TRIS: A Fast and Accurate Identifiers Splitting and Expansion AlgorithmLatifa Guerrouj, Philippe Galinier, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Massimiliano Di Penta. 103-112 [doi]
- Software Clustering: Unifying Syntactic and Semantic FeaturesJanardan Misra, K. M. Annervaz, Vikrant S. Kaulgud, Shubhashis Sengupta, Gary Titus. 113-122 [doi]
- Using Bug Report Similarity to Enhance Bug LocalisationSteven Davies, Marc Roper, Murray Wood. 125-134 [doi]
- SCAN: An Approach to Label and Relate Execution Trace SegmentsSoumaya Medini, Giuliano Antoniol, Yann-Gaël Guéhéneuc, Massimiliano Di Penta, Paolo Tonella. 135-144 [doi]
- Feature Location in a Collection of Product VariantsYinxing Xue, Zhenchang Xing, Stan Jarzabek. 145-154 [doi]
- Feature Location Using Data Mining on Existing Test-CasesCelal Ziftci, Ingolf Krueger. 155-164 [doi]
- Execution Trace Abstraction Based on Meta Patterns UsageKunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa. 167-176 [doi]
- Reverse Engineering iOS Mobile ApplicationsMona Erfani Joorabchi, Ali Mesbah. 177-186 [doi]
- Understanding the Runtime Topology of Service-Oriented SystemsTiago Espinha, Andy Zaidman, Hans-Gerhard Gross. 187-196 [doi]
- Precise Detection of Uninitialized Variables Using Dynamic Analysis - Extending to Aggregate and Vector TypesAnushri Jana, Ravindra Naik. 197-201 [doi]
- Automatic Defect CategorizationFerdian Thung, David Lo, Lingxiao Jiang. 205-214 [doi]
- Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity PredictionYuan Tian, David Lo, Chengnian Sun. 215-224 [doi]
- An Empirical Study on Factors Impacting Bug Fixing TimeFeng Zhang 0001, Foutse Khomh, Ying Zou, Ahmed E. Hassan. 225-234 [doi]
- Can Lexicon Bad Smells Improve Fault Prediction?Surafel Lemma Abebe, Venera Arnaoudova, Paolo Tonella, Giuliano Antoniol, Yann-Gaël Guéhéneuc. 235-244 [doi]
- Fast Detection of Access Control Vulnerabilities in PHP ApplicationsFrançois Gauthier, Ettore Merlo. 247-256 [doi]
- On the Evolutionary Nature of Architectural ViolationsJoão Brunet, Roberto Almeida Bittencourt, Dalton Serey Guerrero, Jorge C. A. de Figueiredo. 257-266 [doi]
- Ownership Object Graphs with Dataflow EdgesRadu Vanciu, Marwan Abi-Antoun. 267-276 [doi]
- A Framework to Compare Alert Ranking AlgorithmsSimon Allier, Nicolas Anquetil, Andre Hora, Stéphane Ducasse. 277-285 [doi]
- Mining Library Migration GraphsCédric Teyton, Jean-Rémy Falleri, Xavier Blanc. 289-298 [doi]
- What Do Foreign Keys Actually Mean?Anthony Cleve, Jean-Luc Hainaut. 299-307 [doi]
- A Rule-based Automated Approach for Extracting Models from Source CodeMakoto Ichii, Tomoyuki Myojin, Yuichiroh Nakagawa, Masaki Chikahisa, Hideto Ogawa. 308-317 [doi]
- Automated Acceptance Testing of JavaScript Web ApplicationsNatalia Negara, Eleni Stroulia. 318-322 [doi]
- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone DetectionThierry Lavoie, Foutse Khomh, Ettore Merlo, Ying Zou. 325-334 [doi]
- Linking Documentation and Source Code in a Software ChrestomathyJean-Marie Favre, Ralf Lammel, Martin Leinberger, Thomas Schmorleiz, Andrei Varanovich. 335-344 [doi]
- Reconstructing Architectural Views from Legacy SystemsGhizlane El-Boussaidi, Alvine Boaye Belle, Stéphane Vaucher, Hafedh Mili. 345-354 [doi]
- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic DevicesArmijn Hemel, Rainer Koschke. 357-366 [doi]
- Empirical Evaluation of Diagrams of the Run-time Structure for Coding TasksNariman Ammar, Marwan Abi-Antoun. 367-376 [doi]
- Empirically Examining the Parallelizability of Open Source Software SystemSaleh M. Alnaeli, Abdulkareem Alali, Jonathan I. Maletic. 377-386 [doi]
- Inter-Project Functional Clone Detection Toward Building Libraries - An Empirical Study on 13, 000 ProjectsTomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto. 387-391 [doi]
- AQUA: Android QUery AnalyzerChon Ju Kim, Phyllis Frankl. 395-404 [doi]
- Detecting Clones Across Microsoft .NET Programming LanguagesFarouq Al-Omari, Iman Keivanloo, Chanchal K. Roy, Juergen Rilling. 405-414 [doi]
- Modeling Software Execution EnvironmentDawei Qi, William N. Sumner, Feng Qin, Mai Zheng, Xiangyu Zhang, Abhik Roychoudhury. 415-424 [doi]
- A Very Efficient and Scalable Forward Static Slicing ApproachHakam W. Alomari, Michael L. Collard, Jonathan I. Maletic. 425-434 [doi]
- Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code ChangesDaniele Romano, Paulius Raila, Martin Pinzger, Foutse Khomh. 437-446 [doi]
- The Secret Life of Patches: A Firefox Case StudyOlga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey. 447-455 [doi]
- An Empirical Study of the Effect of File Editing Patterns on Software QualityFeng Zhang 0001, Foutse Khomh, Ying Zou, Ahmed E. Hassan. 456-465 [doi]
- SMURF: A SVM-based Incremental Anti-pattern Detection ApproachAbdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Esma Aïmeur. 466-475 [doi]
- Towards the Automatic Extraction of Structural Business Rules from Legacy DatabasesOscar Chaparro, Jairo Aponte, Fernando Ortega, Andrian Marcus. 479-488 [doi]
- Exploring How to Develop Transformations and Tools for Automated UmplificationMiguel Garzón, Timothy C. Lethbridge. 491-494 [doi]
- Towards Tracing at the Model LevelHamoud I. Aljamaan, Timothy C. Lethbridge. 495-498 [doi]
- Automatic C to O-O Translation with C2EiffelMarco Trudel, Carlo A. Furia, Martin Nordio. 501-502 [doi]
- Archimetrix: A Tool for Deficiency-Aware Software Architecture ReconstructionMarkus von Detten. 503-504 [doi]
- ATLANTIS - Assembly Trace Analysis EnvironmentBrendan Cleary, Margaret-Anne D. Storey, Laura Chan, Martin Salois, Frédéric Painchaud. 505-506 [doi]
- OpenTrace: An Open Source Workbench for Automatic Software Traceability Link RecoveryElian Angius, René Witte. 507-508 [doi]