Abstract is missing.
- ForewordAndrian Marcus, James R. Cordy, Paolo Tonella. [doi]
- How to steal a botnet and what can happen when you doRichard A. Kemmerer. 1 [doi]
- Useful software engineering research - leading a double-agent lifeLionel C. Briand. 2 [doi]
- Fault interaction and its repercussionsNicholas DiGiuseppe, James A. Jones. 3-12 [doi]
- A novel approach to regression test selection for J2EE applicationsSheng Huang, Zhong Jie Li, Jun Zhu, Yanghua Xiao, Wei Wang 0009. 13-22 [doi]
- Localizing failure-inducing program edits based on spectrum informationLingming Zhang, Miryung Kim, Sarfraz Khurshid. 23-32 [doi]
- Automated change impact analysis for agent systemsHoa Khanh Dam, Aditya Ghose. 33-42 [doi]
- ImpactScale: Quantifying change impact to predict faults in large software systemsKenichi Kobayashi, Akihiko Matsuo, Katsuro Inoue, Yasuhiro Hayase, Manabu Kamimura, Toshiaki Yoshino. 43-52 [doi]
- A seismology-inspired approach to study change propagationSalima Hassaine, Ferdaous Boughanmi, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol. 53-62 [doi]
- SCOTCH: Test-to-code traceability using slicing and conceptual couplingAbdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley. 63-72 [doi]
- Identifying distributed features in SOA by mining dynamic call treesAnis Yousefi, Kamran Sartipi. 73-82 [doi]
- Identifying performance deviations in thread poolsMark D. Syer, Bram Adams, Ahmed E. Hassan. 83-92 [doi]
- Mining java class naming conventionsSimon Butler, Michel Wermelinger, Yijun Yu, Helen Sharp. 93-102 [doi]
- Generating natural language summaries for crosscutting source code concernsSarah Rastkar, Gail C. Murphy, Alexander W. J. Bradley. 103-112 [doi]
- Expanding identifiers to normalize source code vocabularyDawn Lawrie, David Binkley. 113-122 [doi]
- Using tactic traceability information models to reduce the risk of architectural degradation during system maintenanceMehdi Mirakhorli, Jane Cleland-Huang. 123-132 [doi]
- On integrating orthogonal information retrieval methods to improve traceability recoveryMalcom Gethers, Rocco Oliveto, Denys Poshyvanyk, Andrea De Lucia. 133-142 [doi]
- Structural conformance checking with design tests: An evaluation of usability and calabilityJoão Brunet, Dalton Serey Guerrero, Jorge C. A. de Figueiredo. 143-152 [doi]
- MoMS: Multi-objective miniaturization of softwareNasir Ali, Wei Wu, Giuliano Antoniol, Massimiliano Di Penta, Yann-Gaël Guéhéneuc, Jane Huffman Hayes. 153-162 [doi]
- A method engineering based legacy to SOA migration methodRavi Khadka, Gijs Reijnders, Amir Saeidi, Slinger Jansen, Jurriaan Hage. 163-172 [doi]
- Identifying overly strong conditions in refactoring implementationsGustavo Soares, Melina Mongiovi, Rohit Gheyi. 173-182 [doi]
- Graph-based detection of library API imitationsChengnian Sun, Siau-Cheng Khoo, Shao Jie Zhang. 183-192 [doi]
- Crossing the boundaries while analyzing heterogeneous component-based software systemsAmir Reza Yazdanshenas, Leon Moonen. 193-202 [doi]
- On the maintenance of UI-integrated mashup applicationsMaxim Shevertalov, Spiros Mancoridis. 203-212 [doi]
- An exploratory study of feature location process: Distinct phases, recurring patterns, and elementary actionsJinshui Wang, Xin Peng, Zhenchang Xing, Wenyun Zhao. 213-222 [doi]
- Exploiting text mining techniques in the analysis of execution tracesHeidar Pirzadeh, Abdelwahab Hamou-Lhadj, Mohak Shah. 223-232 [doi]
- An evaluation of the strategies of sorting, filtering, and grouping API methods for Code CompletionDaqing Hou, David M. Pletcher. 233-242 [doi]
- A probabilistic software quality modelTibor Bakota, Péter Hegedus, Peter Kortvelyesi, Rudolf Ferenc, Tibor Gyimóthy. 243-252 [doi]
- Predicting post-release defects using pre-release field testing resultsFoutse Khomh, Brian Chan, Ying Zou, Anand Sinha, Dave Dietz. 253-262 [doi]
- Sahara: Guiding the debugging of failed software upgradesRekha Bachwani, Olivier Crameri, Ricardo Bianchini, Dejan Kostic, Willy Zwaenepoel. 263-272 [doi]
- Late propagation in software clonesLiliane Barbour, Foutse Khomh, Ying Zou. 273-282 [doi]
- File cloning in open source Java projects: The good, the bad, and the uglyJoel Ossher, Hitesh Sajnani, Cristina Videira Lopes. 283-292 [doi]
- An automatic framework for extracting and classifying near-miss clone genealogiesRipon K. Saha, Chanchal K. Roy, Kevin A. Schneider. 293-302 [doi]
- Using source code metrics to predict change-prone Java interfacesDaniele Romano, Martin Pinzger. 303-312 [doi]
- You can't control the unfamiliar: A study on the relations between aggregation techniques for software metricsBogdan Vasilescu, Alexander Serebrenik, Mark van den Brand. 313-322 [doi]
- Understanding a developer social network and its evolutionQiaona Hong, Sunghun Kim, S. C. Cheung, Christian Bird. 323-332 [doi]
- Classifying field crash reports for fixing bugs: A case study of Mozilla FirefoxTejinder Dhaliwal, Foutse Khomh, Ying Zou. 333-342 [doi]
- Categorizing software applications for maintenanceCollin McMillan, Mario Linares Vásquez, Denys Poshyvanyk, Mark Grechanik. 343-352 [doi]
- Evaluating software clustering using multiple simulated authoritative decompositionsMark Shtern, Vassilios Tzerpos. 353-361 [doi]
- Industrial experiences with automated regression testing of a legacy database applicationErik Rogstad, Lionel C. Briand, Ronny Dalberg, Marianne Rynning, Erik Arisholm. 362-371 [doi]
- Regression testing in Software as a Service: An industrial case studyHema Srikanth, Myra B. Cohen. 372-381 [doi]
- A clustering approach to improving test case prioritization: An industrial case studyRyan Carlson, Hyunsook Do, Anne Denton. 382-391 [doi]
- Code Hot Spot: A tool for extraction and analysis of code change historyWill Snipes, Brian P. Robinson, Emerson R. Murphy-Hill. 392-401 [doi]
- An integration resolution algorithm for mining multiple branches in version control systemsAlexander Tarvo, Thomas Zimmermann, Jacek Czerwonka. 402-411 [doi]
- Relating developers' concepts and artefact vocabulary in a financial software moduleTezcan Dilshener, Michel Wermelinger. 412-417 [doi]
- Incremental and iterative reengineering towards Software Product Line: An industrial case studyGang Zhang, Liwei Shen, Xin Peng, Zhenchang Xing, Wenyun Zhao. 418-427 [doi]
- The evolution of Information Systems a case study on document managementPaolo Salvaneschi. 428-437 [doi]
- Testing & quality assurance in data migration projectsFlorian Matthes, Christopher Schulz, Klaus Haller. 438-447 [doi]
- Precise detection of un-initialized variables in large, real-life COBOL programs in presence of unrealizable pathsRahul Jiresal, Adnan Contractor, Ravindra Naik. 448-456 [doi]
- Type-preserving heap profiler for C++József Mihalicza, Zoltán Porkoláb, Abel Gabor. 457-466 [doi]
- Analyzing the effects of formal methods on the development of industrial control softwareJan Friso Groote, Ammar Osaiweran, Jacco H. Wesselius. 467-472 [doi]
- Source code comprehension strategies and metrics to predict comprehension effort in software maintenance and evolution tasks - an empirical study with industry practitionersKazuki Nishizono, Shuji Morisaki, Rodrigo Vivanco, Ken-ichi Matsumoto. 473-481 [doi]
- Estimating software maintenance effort from use cases: An industrial case studyYan Ku, Jing Du, Ye Yang, Qing Wang. 482-491 [doi]
- Toward a metrics suite for source code lexiconsLauren R. Biggers, Brian P. Eddy, Nicholas A. Kraft, Letha H. Etzkorn. 492-495 [doi]
- A comparison of stemmers on source code identifiers for software searchAndrew Wiese, Valerie Ho, Emily Hill. 496-499 [doi]
- Clustering and lexical information support for the recovery of design pattern in source codeSimone Romano, Giuseppe Scanniello, Michele Risi, Carmine Gravino. 500-503 [doi]
- Code convention adherence in evolving softwareMichael Smit, Barry Gergel, H. James Hoover, Eleni Stroulia. 504-507 [doi]
- 2 model to support software evolutionHuzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk. 512-515 [doi]
- Measuring maintainability of spreadsheets in the wildJosé Pedro Correia, Miguel Alexandre Ferreira. 516-519 [doi]
- Using stereotypes to help characterize commitsNatalia Dragan, Michael L. Collard, Maen Hammad, Jonathan I. Maletic. 520-523 [doi]
- Source code survival with the Kaplan MeierGiuseppe Scanniello. 524-527 [doi]
- Tracking technical debt - An exploratory case studyYuepu Guo, Carolyn B. Seaman, Rebeka Gomes, Antonio Cavalcanti, Graziela Tonin, Fabio Q. B. da Silva, André Luis M. Santos, Clauirton de Siebra. 528-531 [doi]
- Measuring disruption from software evolution activities using graph-based metricsPrashant Paymal, Rajvardhan Patil, Sanjukta Bhowmick, Harvey P. Siy. 532-535 [doi]
- Clustering and recommending collections of code relevant to tasksSeonah Lee, Sungwon Kang. 536-539 [doi]
- Dependency profiles for software architecture evaluationsEric Bouwers, Arie van Deursen, Joost Visser. 540-543 [doi]
- Empirical assessment of UML class diagram layouts based on architectural importanceBonita Sharif. 544-549 [doi]
- Emergent laws of method and class stereotypes in object oriented softwareNatalia Dragan. 550-555 [doi]
- A logic meta-programming foundation for example-driven pattern detection in object-oriented programsCoen De Roover. 556-561 [doi]
- Evidence-based software process recovery: A post-doctoral viewAbram Hindle. 562-567 [doi]
- Sociotechnical coordination and collaboration in open source softwareChristian Bird. 568-573 [doi]
- A tool for combination-based prioritization and reduction of user-session-based test suitesSreedevi Sampath, Renée C. Bryce, Sachin Jain, Schuyler Manchester. 574-577 [doi]
- MARBLE. A business process archeology toolRicardo Pérez-Castillo, María Fernández-Ropero, Ignacio García Rodríguez de Guzmán, Mario Piattini. 578-581 [doi]
- Program querying with a SOUL: The BARISTA tool suiteCarlos Noguera, Coen De Roover, Andy Kellens, Viviane Jonckers. 582-585 [doi]
- Webdiff: A generic differencing service for software artifactsNikolaos Tsantalis, Natalia Negara, Eleni Stroulia. 586-589 [doi]
- EQ: Checking the implementation of equality in JavaChandan Raj Rupakheti, Daqing Hou. 590-593 [doi]
- Maleku: An evolutionary visual software analysis tool for providing insights into software evolutionAntonio González Torres, Roberto Therón, Francisco José García Peñalvo, Michel Wermelinger, Yijun Yu. 594-597 [doi]
- Effective mining of software repositoriesMarco D'Ambros, Romain Robbes. 598 [doi]
- Practical combinatorial (t-way) methods for detecting complex faults in regression testingRick Kuhn, Raghu Kacker. 599 [doi]
- Research methods in computer scienceSerge Demeyer. 600 [doi]