researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Java
Meta-Environment
analysis
data-flow
design
graph-rewriting
meta-model
model transformation
model-to-model transformation
open-source
peer-to-peer
points-to analysis
programming
rewriting
rule-based
slicing
source-to-source
systematic-approach
transformation
Filter by Author
[+]
OR
AND
NOT
1
Ahmed E. Hassan
Andy Zaidman
Bram Adams
Chanchal K. Roy
Coen De Roover
David Binkley
David W. Binkley
Gabriele Bavota
James R. Cordy
Jens Krinke
Kevin A. Schneider
Mariano Ceccato
Mark Harman
Massimiliano Di Penta
Paolo Tonella
Quentin Stiévenart
Rainer Koschke
Rudolf Ferenc
Tibor Gyimóthy
Árpád Beszédes
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
c
code
data
engineering
ieee
international
java
language
manipulation
program
programs
scam
slicing
software
source
static
study
tool
using
Tags
analysis, manipulation
SCAM
source code
Source Code Analysis and Manipulation (SCAM)
Editions
Publications
Viewing Publication 1 - 100 from 622
2023
CIGAR: Contrastive Learning for GitHub Action Recommendation
Jiangnan Huang 0001
,
Bin Lin
.
SCAM 2023
:
61-71
[doi]
PTLVD:Program Slicing and Transformer-based Line-level Vulnerability Detection System
Tao Peng 0006
,
Shixu Chen
,
Fei Zhu
,
Junwei Tang
,
Junping Liu
,
Xinrong Hu
.
SCAM 2023
:
162-173
[doi]
Reproducing and Improving the BugsInPy Dataset
Faustino Aguilar
,
Samuel Grayson
,
Darko Marinov
.
SCAM 2023
:
260-264
[doi]
When to Let the Developer Guide: Trade-offs Between Open and Guided Test Amplification
Carolin E. Brandt
,
Danyao Wang
,
Andy Zaidman
.
SCAM 2023
:
231-241
[doi]
ACER: An AST-based Call Graph Generator Framework
Andrew Chen
,
Yanfu Yan
,
Denys Poshyvanyk
.
SCAM 2023
:
254-259
[doi]
Generating Understandable Unit Tests through End-to-End Test Scenario Carving
Amirhossein Deljouyi
,
Andy Zaidman
.
SCAM 2023
:
107-118
[doi]
Uncovering the Hidden Risks: The Importance of Predicting Bugginess in Untouched Methods
Matteo Esposito
,
Davide Falessi
.
SCAM 2023
:
277-282
[doi]
Can We Trust the Default Vulnerabilities Severity?
Matteo Esposito
,
Sergio Moreschini
,
Valentina Lenarduzzi
,
David Hästbacka
,
Davide Falessi
.
SCAM 2023
:
265-270
[doi]
On Developing and Improving Tools for Architecture-Smell Tracking in Java Systems
Philipp Gnoyke
,
Sandro Schulze
,
Jacob Krüger
.
SCAM 2023
:
248-253
[doi]
On the Impact of Language Selection for Training and Evaluating Programming Language Models
Jonathan Katzy
,
Maliheh Izadi
,
Arie van Deursen
.
SCAM 2023
:
271-276
[doi]
PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel Events
Mohammed Adib Khan
,
Morteza Noferesti
,
Naser Ezzati Jivan
.
SCAM 2023
:
151-161
[doi]
Quality Assurance Awareness in Open Source Software Projects on GitHub
Ali Khatami
,
Andy Zaidman
.
SCAM 2023
:
174-185
[doi]
Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection
Hongyu Kuang
,
Feng Yang
,
Long Zhang 0004
,
Gaigai Tang
,
Lin Yang
.
SCAM 2023
:
143-150
[doi]
Automating Test-Specific Refactoring Mining: A Mixed-Method Investigation
Luana Almeida Martins
,
Heitor A. X. Costa
,
Márcio Ribeiro 0001
,
Fabio Palomba
,
Ivan Machado
.
SCAM 2023
:
13-24
[doi]
Explaining Transformer-based Code Models: What Do They Learn? When They Do Not Work?
Ahmad Haji Mohammadkhani
,
Chakkrit Tantithamthavorn
,
Hadi Hemmati
.
SCAM 2023
:
96-106
[doi]
Unboxing Default Argument Breaking Changes in Scikit Learn
João Eduardo Montandon
,
Luciana Lourdes Silva
,
Cristiano Politowski
,
Ghizlane El-Boussaidi
,
Marco Túlio Valente
.
SCAM 2023
:
209-219
[doi]
23rd IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2023, Bogotá, Colombia, October 2-3, 2023
Leon Moonen
,
Christian D. Newman
,
Alessandra Gorla
, editors,
IEEE,
2023.
[doi]
Symbolic Execution to Detect Semantic Merge Conflicts
Ward Muylaert
,
Johannes Härtel
,
Coen De Roover
.
SCAM 2023
:
186-197
[doi]
Calibrating Deep Learning-based Code Smell Detection using Human Feedback
Himesh Nandani
,
Mootez Saad
,
Tushar Sharma 0001
.
SCAM 2023
:
37-48
[doi]
The Docker Hub Image Inheritance Network: Construction and Empirical Insights
Ruben Opdebeeck
,
Jonas Lesy
,
Ahmed Zerouali
,
Coen De Roover
.
SCAM 2023
:
198-208
[doi]
How They Relate and Leave: Understanding Atoms of Confusion in Open-Source Java Projects
Oton Pinheiro
,
Lincoln S. Rocha
,
Windson Viana
.
SCAM 2023
:
119-130
[doi]
Applying the Universal Version History Concept to Help De-Risk Copy-Based Code Reuse
David Reid
,
Audris Mockus
.
SCAM 2023
:
1-12
[doi]
Using the TypeScript compiler to fix erroneous Node.js snippets
Brittany Reid
,
Christoph Treude
,
Markus Wagner 0007
.
SCAM 2023
:
220-230
[doi]
Evolutionary Feature Dependencies: Analyzing Feature Co-Changes in C Systems
Sandro Schulze
,
Phillipp Engelke
,
Jacob Krüger
.
SCAM 2023
:
84-95
[doi]
Do Code Quality and Style Issues Differ Across (Non-)Machine Learning Notebooks? Yes!
Md. Saeed Siddik
,
Cor-Paul Bezemer
.
SCAM 2023
:
72-83
[doi]
Enabling Go Program Analysis in Rascal
Luke Swearngan
,
Mark Hills 0001
.
SCAM 2023
:
242-247
[doi]
Behind Developer Contributions on Conflicting Merge Scenarios
Gustavo Vale
,
Eduardo Fernandes
,
Eduardo Figueiredo 0001
,
Sven Apel
.
SCAM 2023
:
25-36
[doi]
How Well Can Masked Language Models Spot Identifiers That Violate Naming Guidelines?
Johannes Villmow
,
Viola Campos
,
Jean Petry
,
Amine Abbad Andaloussi
,
Adrian Ulges
,
Barbara Weber
.
SCAM 2023
:
131-142
[doi]
Change Pattern Detection for Optimising Incremental Static Analysis
Cindy Wauters
,
Jens Van der Plas
,
Quentin Stiévenart
,
Coen De Roover
.
SCAM 2023
:
49-60
[doi]
2021
What Do Developers Discuss about Code Comments?
Pooja Rani 0001
,
Mathias Birrer
,
Sebastiano Panichella
,
Mohammad Ghafari
,
Oscar Nierstrasz
.
SCAM 2021
:
153-164
[doi]
Do Comments follow Commenting Conventions? A Case Study in Java and Python
Pooja Rani 0001
,
Suada Abukar
,
Nataliia Stulova
,
Alexandre Bergel
,
Oscar Nierstrasz
.
SCAM 2021
:
165-169
[doi]
An Experimental Analysis of Graph-Distance Algorithms for Comparing API Usages
Sebastian Nielebock 0001
,
Paul Blockhaus
,
Jacob Krüger
,
Frank Ortmeier
.
SCAM 2021
:
214-225
[doi]
21st IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2021, Luxembourg, September 27-28, 2021
IEEE,
2021.
[doi]
Improving Readability of Scratch Programs with Search-based Refactoring
Felix Adler
,
Gordon Fraser 0001
,
Eva Gründinger
,
Nina Körber
,
Simon Labrenz
,
Jonas Lerchenberger
,
Stephan Lukasczyk
,
Sebastian Schweikl
.
SCAM 2021
:
120-130
[doi]
PYREF: Refactoring Detection in Python Projects
Hassan Atwi
,
Bin Lin 0008
,
Nikolaos Tsantalis
,
Yutaro Kashiwa
,
Yasutaka Kamei
,
Naoyasu Ubayashi
,
Gabriele Bavota
,
Michele Lanza
.
SCAM 2021
:
136-141
[doi]
Measuring source code conciseness across programming languages using compression
Lodewijk Bergmans
,
Xander Schrijen
,
Edwin Ouwehand
,
Magiel Bruntink
.
SCAM 2021
:
47-57
[doi]
Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs
Davide Corradini
,
Amedeo Zampieri
,
Michele Pasqua
,
Mariano Ceccato
.
SCAM 2021
:
226-236
[doi]
D-REX: Static Detection of Relevant Runtime Exceptions with Location Aware Transformer
Farima Farmahinifarahani
,
Yadong Lu
,
Vaibhav Saini
,
Pierre Baldi
,
Cristina V. Lopes
.
SCAM 2021
:
198-208
[doi]
Towards Understanding Developers' Machine-Learning Challenges: A Multi-Language Study on Stack Overflow
Alaleh Hamidi
,
Giuliano Antoniol
,
Foutse Khomh
,
Massimiliano Di Penta
,
Mohammad Hamidi
.
SCAM 2021
:
58-69
[doi]
Formal Definition and Automatic Generation of Semantic Metrics: An Empirical Study on Bug Prediction
Ting Hu
,
Ran Mo
,
Pu Xiong
,
Zengyang Li
,
Qiong Feng
.
SCAM 2021
:
92-102
[doi]
Towards a Taxonomy of Inline Code Comment Smells
Elgun Jabrayilzade
,
Olcaytu Gürkan
,
Eray Tüzün
.
SCAM 2021
:
131-135
[doi]
SootFX: A Static Code Feature Extraction Tool for Java and Android
Kadiray Karakaya
,
Eric Bodden
.
SCAM 2021
:
181-186
[doi]
Fex: Assisted Identification of Domain Features from C Programs
Patrick Müller
,
Krishna Narasimhan
,
Mira Mezini
.
SCAM 2021
:
170-180
[doi]
Leveraging Unsupervised Learning to Summarize APIs Discussed in Stack Overflow
AmirHossein Naghshzan
,
Latifa Guerrouj
,
Olga Baysal
.
SCAM 2021
:
142-152
[doi]
Unambiguity of Python Language Elements for Static Analysis
Bence Nagy
,
Tibor Brunner
,
Zoltán Porkoláb
.
SCAM 2021
:
70-75
[doi]
[Engineering] eNYPD - Entry Points Detector Jakarta Server Faces Use Case
Rodrigue Wete Nguempnang
,
Bernhard J. Berger
,
Karsten Sohr
.
SCAM 2021
:
30-35
[doi]
Naming Amplified Tests Based on Improved Coverage
Nienke Nijkamp
,
Carolin E. Brandt
,
Andy Zaidman
.
SCAM 2021
:
237-241
[doi]
Removing Redundant Statements in Amplified Test Cases
Wessel Oosterbroek
,
Carolin E. Brandt
,
Andy Zaidman
.
SCAM 2021
:
242-246
[doi]
Jicer: Simplifying Cooperative Android App Analysis Tasks
Felix Pauck
,
Heike Wehrheim
.
SCAM 2021
:
187-197
[doi]
How does Migrating to Kotlin Impact the Run-time Efficiency of Android Apps?
Michael Peters
,
Gian Luca Scoccia
,
Ivano Malavolta
.
SCAM 2021
:
36-46
[doi]
SecuCheck: Engineering configurable taint analysis for software developers
Goran Piskachev
,
Ranjith Krishnamurthy
,
Eric Bodden
.
SCAM 2021
:
24-29
[doi]
BoostNSift: A Query Boosting and Code Sifting Technique for Method Level Bug Localization
Abdul Razzaq
,
Jim Buckley
,
James Vincent Patten
,
Muslim Chochlov
,
Ashish Rajendra Sai
.
SCAM 2021
:
81-91
[doi]
A Precise Framework for Source-Level Control-Flow Analysis
Idriss Riouak
,
Christoph Reichenbach
,
Görel Hedin
,
Niklas Fors
.
SCAM 2021
:
1-11
[doi]
Linkage of Similar Code Snippets Assessed in the Micro Benchmark Service jsPerf
Kazuya Saiki
,
Akinori Ihara
.
SCAM 2021
:
247-251
[doi]
Method Calls Frequency-Based Tie-Breaking Strategy For Software Fault Localization
Qusay Idrees Sarhan
,
Béla Vancsics
,
Árpád Beszédes
.
SCAM 2021
:
103-113
[doi]
CharmFL: A Fault Localization Tool for Python
Qusay Idrees Sarhan
,
Attila Szatmári
,
Rajmond Tóth
,
Árpád Beszédes
.
SCAM 2021
:
114-119
[doi]
Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++
Philipp Dominik Schubert
,
Florian Sattler
,
Fabian Schiebel
,
Ben Hermann 0001
,
Eric Bodden
.
SCAM 2021
:
12-17
[doi]
Into the Woods: Experiences from Building a Dataflow Analysis Framework for C/C++
Philipp Dominik Schubert
,
Richard Leer
,
Ben Hermann 0001
,
Eric Bodden
.
SCAM 2021
:
18-23
[doi]
Towards a taxonomy for annotation of data science experiment repositories
Shangeetha Sivasothy
,
Scott Barnett
,
Niroshinie Fernando
,
Rajesh Vasa
,
Roopak Sinha
,
Andrew J. Simmons
.
SCAM 2021
:
76-80
[doi]
QSES: Quasi-Static Executable Slices
Quentin Stiévenart
,
David W. Binkley
,
Coen De Roover
.
SCAM 2021
:
209-213
[doi]
2020
20th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2020, Adelaide, Australia, September 28 - October 2, 2020
IEEE,
2020.
[doi]
Understanding and Characterizing Changes in Bugs Priority: The Practitioners' Perceptive
Rafi Almhana
,
Thiago do Nascimento Ferreira
,
Marouane Kessentini
,
Tushar Sharma
.
SCAM 2020
:
87-97
[doi]
Fix that Fix Commit: A real-world remediation analysis of JavaScript projects
Vinuri Bandara
,
Thisura Rathnayake
,
Nipuna Weerasekara
,
Charitha Elvitigala
,
Kenneth Thilakarathna
,
Primal Wijesekera
,
Chamath Keppitiyagama
.
SCAM 2020
:
198-202
[doi]
Static Extraction of Enforced Authorization Policies SeeAuthz
Bernhard J. Berger
,
Rodrigue Wete Nguempnang
,
Karsten Sohr
,
Rainer Koschke
.
SCAM 2020
:
187-197
[doi]
An Investigation into the Effect of Control and Data Dependence Paths on Predicate Testability
Dave W. Binkley
,
James Glenn
,
Abdullah Alsharif
,
Phil McMinn
.
SCAM 2020
:
160-170
[doi]
DroidXP: A Benchmark for Supporting the Research on Mining Android Sandboxes
Francisco Handrick da Costa
,
Ismael Medeiros
,
Pedro Costa
,
Thales Menezes
,
Marcos Vinícius
,
Rodrigo Bonifácio
,
Edna Dias Canedo
.
SCAM 2020
:
143-148
[doi]
Incremental Flow Analysis through Computational Dependency Reification
Jens Van der Plas
,
Quentin Stiévenart
,
Noah Van Es
,
Coen De Roover
.
SCAM 2020
:
25-36
[doi]
GitHub Label Embeddings
João P. Diniz
,
Daniel Cruz
,
Fabio Ferreira
,
Cleiton Silva Tavares
,
Eduardo Figueiredo 0001
.
SCAM 2020
:
249-253
[doi]
Free the Bugs: Disclosing Blocking Violations in Reactive Programming
Felix Dobslaw
,
Morgan Vallin
,
Robin Sundström
.
SCAM 2020
:
177-186
[doi]
Failure of One, Fall of Many: An Exploratory Study of Software Features for Defect Prediction
Geanderson Esteves dos Santos
,
Eduardo Figueiredo 0001
.
SCAM 2020
:
98-109
[doi]
MAF: A Framework for Modular Static Analysis of Higher-Order Languages
Noah Van Es
,
Jens Van der Plas
,
Quentin Stiévenart
,
Coen De Roover
.
SCAM 2020
:
37-42
[doi]
A Parallel Worklist Algorithm for Modular Analyses
Noah Van Es
,
Quentin Stiévenart
,
Jens Van der Plas
,
Coen De Roover
.
SCAM 2020
:
1-12
[doi]
Engineering a Converter Between Two Domain-Specific Languages for Sorting
Johan Fabry
,
Ynès Jaradin
,
Aynel Gül
.
SCAM 2020
:
221-226
[doi]
Adapting Queries to Database Schema Changes in Hybrid Polystores
Jérôme Fink
,
Maxime Gobert
,
Anthony Cleve
.
SCAM 2020
:
127-131
[doi]
Does code review really remove coding convention violations?
DongGyun Han
,
Chaiyong Ragkhitwetsagul
,
Jens Krinke
,
Matheus Paixão
,
Giovanni Rosa
.
SCAM 2020
:
43-53
[doi]
Optimizing Away JavaScript Obfuscation
Adrian Herrera
.
SCAM 2020
:
215-220
[doi]
Annotation practices in Android apps
Ajay Kumar Jha
,
Sarah Nadi
.
SCAM 2020
:
132-142
[doi]
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications Using Waiting Dependency Graphs and Software Tracing
Naser Ezzati Jivan
,
Quentin Fournier
,
Michel R. Dagenais
,
Abdelwahab Hamou-Lhadj
.
SCAM 2020
:
149-159
[doi]
Automated Identification of On-hold Self-admitted Technical Debt
Rungroj Maipradit
,
Bin Lin 0008
,
Csaba Nagy 0001
,
Gabriele Bavota
,
Michele Lanza
,
Hideaki Hata
,
Kenichi Matsumoto
.
SCAM 2020
:
54-64
[doi]
An Approach for the Identification of Information Leakage in Automotive Infotainment systems
Abdul Moiz
,
Manar H. Alalfi
.
SCAM 2020
:
110-114
[doi]
Looking for Software Defects? First Find the Nonconformists
Sara Moshtari
,
Joanna C. S. Santos
,
Mehdi Mirakhorli
,
Ahmet Okutan
.
SCAM 2020
:
75-86
[doi]
Techniques for Efficient Automated Elimination of False Positives
Tukaram Muske
,
Alexander Serebrenik
.
SCAM 2020
:
259-263
[doi]
Does Infrastructure as Code Adhere to Semantic Versioning? An Analysis of Ansible Role Evolution
Ruben Opdebeeck
,
Ahmed Zerouali
,
Camilo Velázquez-Rodríguez
,
Coen De Roover
.
SCAM 2020
:
238-248
[doi]
Ad hoc Test Generation Through Binary Rewriting
Anthony Saieva
,
Shirish Singh
,
Gail E. Kaiser
.
SCAM 2020
:
115-126
[doi]
Can Refactorings Indicate Design Tradeoffs?
Thomas Schweizer
,
Vassilis Zafeiris
,
Marios Fokaefs
,
Michalis Famelis
.
SCAM 2020
:
70-74
[doi]
Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments
Roger Scott
,
Joseph Ranieri
,
Lucja Kot
,
Vineeth Kashyap
.
SCAM 2020
:
227-237
[doi]
Compositional Information Flow Analysis for WebAssembly Programs
Quentin Stiévenart
,
Coen De Roover
.
SCAM 2020
:
13-24
[doi]
Towards Detecting Inconsistent Comments in Java Source Code Automatically
Nataliia Stulova
,
Arianna Blasi
,
Alessandra Gorla
,
Oscar Nierstrasz
.
SCAM 2020
:
65-69
[doi]
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C++
Richárd Szalay
,
Ábel Sinkovics
,
Zoltán Porkoláb
.
SCAM 2020
:
203-214
[doi]
DCT: An Scalable Multi-Objective Module Clustering Tool
Ana Paula M. Tarchetti
,
Luis Henrique Vieira Amaral
,
Marcos C. Oliveira
,
Rodrigo Bonifácio
,
Gustavo Pinto 0001
,
David Lo 0001
.
SCAM 2020
:
171-176
[doi]
MUTAMA: An Automated Multi-label Tagging Approach for Software Libraries on Maven
Camilo Velázquez-Rodríguez
,
Coen De Roover
.
SCAM 2020
:
254-258
[doi]
2019
19th International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, Cleveland, OH, USA, September 30 - October 1, 2019
IEEE,
2019.
[doi]
Less is More: From Multi-objective to Mono-objective Refactoring via Developer's Knowledge Extraction
Vahid Alizadeh
,
Houcem Fehri
,
Marouane Kessentini
.
SCAM 2019
:
181-192
[doi]
A Study on the Effects of Exception Usage in Open-Source C++ Systems
Kirsten Bradley
,
Michael Godfrey
.
SCAM 2019
:
1-11
[doi]
Evaluating Automatic Fault Localization Using Markov Processes
Tim A. D. Henderson
,
Andy Podgurski
,
Yigit Küçük
.
SCAM 2019
:
115-126
[doi]
Automated Customized Bug-Benchmark Generation
Vineeth Kashyap
,
Jason Ruchti
,
Lucja Kot
,
Emma Turetsky
,
Rebecca Swords
,
Shih An Pan
,
Julien Henry
,
David Melski
,
Eric Schulte
.
SCAM 2019
:
103-114
[doi]
Movement Patterns and Trajectories in Three-Dimensional Software Visualization
Steinbeck Marcel
,
Koschke Rainer
,
Marc Rudel
.
SCAM 2019
:
163-174
[doi]
Rebasing in Code Review Considered Harmful: A Large-Scale Empirical Investigation
Matheus Paixão
,
Paulo Henrique Maia
.
SCAM 2019
:
45-55
[doi]
Interactive Refactoring Documentation Bot
Soumaya Rebai
,
Oussama Ben Sghaier
,
Vahid Alizadeh
,
Marouane Kessentini
,
Meriem Chater
.
SCAM 2019
:
152-162
[doi]
WAL: A Tool for Diagnosing Accessibility Issues and Evolving Legacy Web Systems at Runtime
Wanessa Teotônio
,
Pablo Gonzalez
,
Paulo Maia
,
Pedro Muniz
.
SCAM 2019
:
175-180
[doi]
Sign in
or
sign up
to see more results.