Abstract is missing.
- 25 years of software maintenanceScott R. Tilley. 3-4 [doi]
- Reduce, reuse, recycle, recover: Techniques for improved regression testingMary Jean Harrold. 5 [doi]
- Architecture of product linesDavid M. Weiss. 6 [doi]
- Experimental assessment of manual versus tool-based maintenance of GUI-directed test scriptsMark Grechanik, Qing Xie, Chen Fu. 9-18 [doi]
- Prioritizing JUnit test cases in absence of coverage informationLingming Zhang, Ji Zhou, Dan Hao, Lu Zhang, Hong Mei. 19-28 [doi]
- Prioritizing component compatibility tests via user preferencesIl-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A. Porter. 29-38 [doi]
- Linux kernels as complex networks: A novel method to study evolutionLei Wang, Zheng Wang, Chen Yang, Li Zhang, Qiang Ye. 41-50 [doi]
- Towards a better understanding of software evolution: An empirical study on open source softwareGuowu Xie, Jianbo Chen, Iulian Neamtiu. 51-60 [doi]
- A survey-based study of the mapping of system properties to ISO/IEC 9126 maintainability characteristicsJosé Pedro Correia, Yiannis Kanellopoulos, Joost Visser. 61-70 [doi]
- Criteria for the evaluation of implemented architecturesEric Bouwers, Joost Visser, Arie van Deursen. 73-82 [doi]
- Playing roles in design patterns: An empirical descriptive and analytic studyFoutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 83-92 [doi]
- Decomposing object-oriented class modules using an agglomerative clustering techniqueMarios Fokaefs, Nikolaos Tsantalis, Alexander Chatzigeorgiou, Jörg Sander. 93-101 [doi]
- Detecting virus mutations via dynamic matchingMin Feng, Rajiv Gupta. 105-114 [doi]
- Regression model checkingGuowei Yang, Matthew B. Dwyer, Gregg Rothermel. 115-124 [doi]
- Automated performance analysis of load testsZhen Ming Jiang, Ahmed E. Hassan, Gilbert Hamann, Parminder Flora. 125-134 [doi]
- Inquiring the usage of aspect-oriented programming: An empirical studyFreddy Munoz, Benoit Baudry, Romain Delamare, Yves Le Traon. 137-146 [doi]
- Studying the use of developer IRC meetings in open source projectsEmad Shihab, Zhen Ming Jiang, Ahmed E. Hassan. 147-156 [doi]
- Searching and skimming: An exploratory studyJamie Starke, Chris Luce, Jonathan Sillito. 157-166 [doi]
- Managing code clones using dynamic change tracking and resolutionMichiel de Wit, Andy Zaidman, Arie van Deursen. 169-178 [doi]
- Comparative analysis of evolving software systems using the Gini coefficientRajesh Vasa, Markus Lumpe, Philip Branch, Oscar Nierstrasz. 179-188 [doi]
- Assessing the impact of framework changes using component rankingReishi Yokomori, Harvey P. Siy, Masami Noro, Katsuro Inoue. 189-198 [doi]
- Object aware execution trace explorationStefan Voigt, Johannes Bohnet, Jürgen Döllner. 201-210 [doi]
- A combinatorial approach to building navigation graphs for dynamic web applicationsWenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacker, Rick Kuhn, James Lawrence. 211-220 [doi]
- Effective and efficient localization of multiple faults using value replacementDennis Jeffrey, Neelam Gupta, Rajiv Gupta. 221-230 [doi]
- Modeling class cohesion as mixtures of latent topicsYixun Liu, Denys Poshyvanyk, Rudolf Ferenc, Tibor Gyimóthy, Nikos Chrisochoides. 233-242 [doi]
- Introducing a test suite similarity metric for event sequence-based test casesPenelope A. Brooks, Atif M. Memon. 243-252 [doi]
- Augmenting static source views in IDEs with dynamic metricsDavid Röthlisberger, Marcel Harry, Alex Villazón, Danilo Ansaloni, Walter Binder, Oscar Nierstrasz, Philippe Moret. 253-262 [doi]
- Analysis of pervasive multiple-component defects in a large software systemZude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini. 265-273 [doi]
- An investigation of the relationships between lines of code and defectsHongyu Zhang. 274-283 [doi]
- A theoretical and empirical study of EFSM dependenceKelly Androutsopoulos, Nicolas Gold, Mark Harman, Zheng Li, Laurence Tratt. 287-296 [doi]
- Refining clustering evaluation using structure indicatorsMark Shtern, Vassilios Tzerpos. 297-305 [doi]
- Incremental call graph reanalysis for AspectJ softwareYu Lin, Sai Zhang, Jianjun Zhao. 306-315 [doi]
- Coordination and productivity issues in free software: The role of brooks lawPaul J. Adams, Andrea Capiluppi, Cornelia Boldyreff. 319-328 [doi]
- Measuring the progress of projects using the time dependence of code changesOmar Alam, Bram Adams, Ahmed E. Hassan. 329-338 [doi]
- What s hot and what s not: Windowed developer topic analysisAbram Hindle, Michael W. Godfrey, Richard C. Holt. 339-348 [doi]
- On the use of relevance feedback in IR-based concept locationGregory Gay, Sonia Haiduc, Andrian Marcus, Tim Menzies. 351-360 [doi]
- Feature location in COBOL mainframe systems: An experience reportJoris Van Geet, Serge Demeyer. 361-370 [doi]
- The role of the coverage analysis during IR-based traceability recovery: A controlled experimentAndrea De Lucia, Rocco Oliveto, Genoveffa Tortora. 371-380 [doi]
- Senseo: Enriching Eclipse s static source views with dynamic metricsDavid Röthlisberger, Marcel Harry, Alex Villazón, Danilo Ansaloni, Walter Binder, Oscar Nierstrasz, Philippe Moret. 383-384 [doi]
- Semantics-based code search demonstration proposalSteven P. Reiss. 385-386 [doi]
- MAJOR: Flexible tool development with aspect-oriented programmingAlex Villazón, Walter Binder, Philippe Moret, Danilo Ansaloni. 387-388 [doi]
- Visualizing the Java heap demonstration proposalSteven P. Reiss. 389-390 [doi]
- Proactively managing copy-and-paste induced code clonesDaqing Hou, Ferosh Jacob, Patricia Jablonski. 391-392 [doi]
- BCC: Enhancing code completion for better API usabilityDavid M. Pletcher, Daqing Hou. 393-394 [doi]
- Guide: A GUI differentiatorQing Xie, Mark Grechanik, Chen Fu, Chad M. Cumby. 395-396 [doi]
- Business process recovery for system maintenance - An empirical approachZhengong Cai, Xiaohu Yang, Xinyu Wang. 399-402 [doi]
- Preprocessing the noise in legacy user permission assignment data for role mining - An industrial practiceChao Huang, Jianling Sun, Xinyu Wang, Yuanjie Si, Di Wu. 403-406 [doi]
- Digging deep: Software reengineering supported by database reverse engineering of a system with 30+ years of legacyStefan Strobl, Mario Bernhart, Thomas Grechenig, Wolfgang Kleinert. 407-410 [doi]
- What motivate software engineers to refactor source code? evidences from professional developersYi Wang. 413-416 [doi]
- Software maintainability benefits from annotation-driven codeLeho Nigul, Ernest Mah. 417-421 [doi]
- Towards a distributed execution framework for JUnit test casesTauhida Parveen, Scott R. Tilley, Nigel Daley, Pedro Morales. 425-428 [doi]
- Visualizing the structure of field testing problemsBrian Chan, Ying Zou, Ahmed E. Hassan, Anand Sinha. 429-432 [doi]
- Using dynamic execution data to generate test casesRozita Dara, Shimin Li, Weining Liu, Angi Smith-Ghorbani, Ladan Tahvildari. 433-436 [doi]
- A statistical examination of the evolution and properties of libre softwareIsrael Herraiz. 439-442 [doi]
- Changes and bugs - Mining and predicting development activitiesThomas Zimmermann. 443-446 [doi]
- Detection and analysis of near-miss software clonesChanchal K. Roy. 447-450 [doi]
- Using information retrieval to support software maintenance tasksDenys Poshyvanyk. 453-456 [doi]
- Identifying high-level dependence structures using slice-based dependence analysisZheng Li. 457-460 [doi]
- Co-evolution of source code and the build systemBram Adams. 461-464 [doi]
- Predicting change impact from logical modelsSunny Wong, Yuanfang Cai. 467-470 [doi]
- Software change classification using hunk metricsJaved Ferzund, Syed Nadeem Ahsan, Franz Wotawa. 471-474 [doi]
- Evolution analysis with animated and 3D-visualizationsSven Wenzel, Jens Koch, Udo Kelter, Andreas Kolb. 475-478 [doi]
- Analyzing the evolution of user-visible features: A case study with EclipseDaqing Hou, Yuejiao Wang. 479-482 [doi]
- Maintenance, or the 3rd dimension of eXtreme model-driven designBernhard Steffen, Sven Jörges, Christian Wagner, Tiziana Margaria. 483-486 [doi]
- Maintenance and agile development: Challenges, opportunities and future directionsGeir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar Conradi, Leon Moonen. 487-490 [doi]
- Scalable and incremental clone detection for evolving softwareTung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Kofahi, Nam H. Pham, Tien N. Nguyen. 491-494 [doi]
- Balancing value and modifiability when planning for the next releaseAnas Jadallah, Matthias Galster, Mahmood Moussavi, Günther Ruhe. 495-498 [doi]
- Software maintenance in complying with IT governance: A report from the fieldNed Chapin. 499-502 [doi]
- Performance impact analysis with KPP using application response measurement in E-government systemsNamho Yoo. 503-506 [doi]
- Modularizing error recoveryJeeva Paudel, Christopher Dutchyn. 507-510 [doi]
- Model-driven testing in software product linesBeatriz Pérez Lamancha, Macario Polo Usaola, Ignacio GarcÃa RodrÃguez de Guzmán. 511-514 [doi]
- A model-based regression test selection techniqueLeila Naslavsky, Hadar Ziv, Debra J. Richardson. 515-518 [doi]
- Data transformation and attribute subset selection: Do they help make differences in software failure prediction?Hao Jia, Fengdi Shu, Ye Yang, Qi Li. 519-522 [doi]
- On predicting the time taken to correct bug reports in open source projectsPrasanth Anbalagan, Mladen A. Vouk. 523-526 [doi]
- Interactive views for analyzing problem reportsPatrick Knab, Beat Fluri, Harald Gall, Martin Pinzger. 527-530 [doi]
- The squale model - A practice-based industrial quality modelKarine Mordal-Manet, Francoise Balmas, Simon Denier, stéphane-ducasse, Harald Wertz, Jannik Laval, Fabrice Bellingard, Philippe Vaillergues. 531-534 [doi]
- Expert recommendation with usage expertiseDavid Ma, David Schuler, Thomas Zimmermann, Jonathan Sillito. 535-538 [doi]
- An empirical study on the risks of using off-the-shelf techniques for processing mailing list dataNicolas Bettenburg, Emad Shihab, Ahmed E. Hassan. 539-542 [doi]
- Recovering design rationale from email repositoriesAndrea De Lucia, Fausto Fasano, Claudia Grieco, Genoveffa Tortora. 543-546 [doi]
- Beyond generated software documentation - A web 2.0 perspectivePhilipp Schügerl, Juergen Rilling, Philippe Charland. 547-550 [doi]
- Recovering traceability links between a simple natural language sentence and source code using domain ontologiesTakashi Yoshikawa, Shinpei Hayashi, Motoshi Saeki. 551-554 [doi]
- The end-to-end use of source code examples: An exploratory studyReid Holmes, Rylan Cottrell, Robert J. Walker, Jörg Denzinger. 555-558 [doi]
- Abstracting the template instantiation relation in C++Andrew Sutton, Ryan Holeman, Jonathan I. Maletic. 559-562 [doi]
- UI traces: Supporting the maintenance of interactive softwareAndrew Sutherland, Kevin Schneider. 563-566 [doi]
- Using method stereotype distribution as a signature descriptor for software systemsNatalia Dragan, Michael L. Collard, Jonathan I. Maletic. 567-570 [doi]
- Experimenting a reverse engineering technique for modelling the behaviour of rich internet applicationsDomenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana. 571-574 [doi]
- Understanding source package organization using the hybrid modelXinyi Dong, Michael W. Godfrey. 575-578 [doi]
- MESOA 2009: 3:::rd::: International workshop on maintenance and evolution of service-oriented systemsGrace A. Lewis, Dennis B. Smith, Ned Chapin, Kostas Kontogiannis. 581-582 [doi]
- First international workshop on service-oriented architecture testing (SOAT 2009)Scott R. Tilley, Xiaoying Bai, Grace A. Lewis. 583-584 [doi]