Abstract is missing.
- Normalizing Source Code VocabularyDawn J. Lawrie, David Binkley, Christopher Morrell. 3-12 [doi]
- Studying the Impact of Clones on Software DefectsGehan M. K. Selim, Liliane Barbour, Weiyi Shang, Bram Adams, Ahmed E. Hassan, Ying Zou. 13-21 [doi]
- Mining Source Code for Structural RegularitiesAngela Lozano, Andy Kellens, Kim Mens, Gabriela Arévalo. 22-31 [doi]
- On the Use of Automated Text Summarization Techniques for Summarizing Source CodeSonia Haiduc, Jairo Aponte, Laura Moreno, Andrian Marcus. 35-44 [doi]
- Static Analysis for Understanding Shared Objects in Open Concurrent Java ProgramsAna Milanova, Yin Liu. 45-54 [doi]
- Visually Supporting Source Code Changes Integration: The Torch DashboardVeroonica Uquillas Gomez, Stéphane Ducasse, Theo D Hondt. 55-64 [doi]
- Understanding Plug-in Test Suites from an Extensibility PerspectiveMichaela Greiler, Hans-Gerhard Gross, Arie van Deursen. 67-76 [doi]
- Immediacy through Interactivity: Online Analysis of Run-time BehaviorMichael Perscheid, Bastian Steinert, Robert Hirschfeld, Felix Geller, Michael Haupt. 77-86 [doi]
- Extracting Sequence Diagrams from Execution Traces Using Interactive VisualizationHassen Grati, Houari A. Sahraoui, Pierre Poulin. 87-96 [doi]
- Evaluating the Impact of Software Evolution on Software ClusteringFabian Beck, Stephan Diehl. 99-108 [doi]
- Understanding Feature Evolution in a Family of Product VariantsYinxing Xue, Zhenchang Xing, Stan Jarzabek. 109-118 [doi]
- Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source CodeHuzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk, Michael L. Collard. 119-128 [doi]
- Reverse Engineering Self-Modifying Code: Unpacker ExtractionSaumya K. Debray, Jay Patel. 131-140 [doi]
- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in SoftwareSunny Wong, Melissa Aaron, Jeffrey Segall, Kevin Lynch, Spiros Mancoridis. 141-149 [doi]
- A Refined Decompiler to Generate C Code with High ReadabilityGengbiao Chen, Zhuo Wang, Ruoyu Zhang, Kan Zhou, Shiqiu Huang, Kangqi Ni, Zhengwei Qi, Kai Chen, Haibing Guan. 150-154 [doi]
- Heroes in FLOSS Projects: An Explorative StudyFilippo Ricca, Alessandro Marchetto. 155-159 [doi]
- Improving Automated Mapping in Reflexion Models Using Information Retrieval TechniquesRoberto Almeida Bittencourt, Gustavo Jansen de Souza Santos, Dalton Dario Serey Guerrero, Gail C. Murphy. 163-172 [doi]
- Architectural Analysis of Systems Based on the Publisher-Subscriber StyleDharmalingam Ganesan, Mikael Lindvall, Lamont Ruley, Robert Wiegand, Vuong Ly, Tina Tsui. 173-182 [doi]
- Computer-Aided Extraction of Software ComponentsAndreas Marx, Fabian Beck, Stephan Diehl. 183-192 [doi]
- Software Re-Modularization Based on Structural and Semantic MetricsGabriele Bavota, Andrea De Lucia, Andrian Marcus, Rocco Oliveto. 195-204 [doi]
- An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in JavaChandan Raj Rupakheti, Daqing Hou. 205-214 [doi]
- Identification of REST-like Resources from Legacy Service DescriptionsMichael Athanasopoulos, Kostas Kontogiannis. 215-219 [doi]
- Umplification: Refactoring to Incrementally Add Abstraction to a ProgramTimothy C. Lethbridge, Andrew Forward, Omar Bahy Badreddin. 220-224 [doi]
- Enhancing Source-Based Clone Detection Using Intermediate RepresentationGehan M. K. Selim, King Chun Foo, Ying Zou. 227-236 [doi]
- Highly Configurable and Extensible Code Clone DetectionBenjamin Biegel, Stephan Diehl. 237-241 [doi]
- From Whence It Came: Detecting Source Code Clones by Analyzing AssemblerIan J. Davis, Michael W. Godfrey. 242-246 [doi]
- Predicting Re-opened Bugs: A Case Study on the Eclipse ProjectEmad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, Ken-ichi Matsumoto. 249-258 [doi]
- A Case Study of Bias in Bug-Fix DatasetsThanh H. D. Nguyen, Bram Adams, Ahmed E. Hassan. 259-268 [doi]
- Mining Collaboration Patterns from a Large Developer NetworkDidi Surian, David Lo, Ee-Peng Lim. 269-273 [doi]
- Workshop on Mining Unstructured Data (MUD) because Mining Unstructured Data is Like Fishing in Muddy Waters !Nicolas Bettenburg, Bram Adams. 277-278 [doi]
- Workshop on Program Comprehension through Dynamic Analysis (PCODA10)Abdelwahab Hamou-Lhadj, David Röthlisberger, Andy Zaidman, Orla Greevy. 279-280 [doi]
- International Workshop on Processes for Software Evolution and Maintenance (WoSEMP 2010)Mira Kajko-Mattsson, Alain April. 281-282 [doi]
- Improving Source Code Quality through the Definition of Linguistic AntipatternsVenera Arnaoudova. 285-288 [doi]
- Conformance Checking during Software EvolutionRoberto Almeida Bittencourt. 289-292 [doi]
- Multi-Language and Heterogeneously-licensed Software AnalysisFerdaous Boughanmi. 293-296 [doi]
- Linguistic Driven Refactoring of Source Code IdentifiersLaleh Mousavi Eshkevari. 297-300 [doi]
- Automatic Derivation of Concepts Based on the Analysis of Source Code IdentifiersLatifa Guerrouj. 301-304 [doi]
- Software Process Recovery: Recovering Process from ArtifactsAbram Hindle. 305-308 [doi]
- Improving System Testability and Testing with MicroarchitecturesAminata Sabane. 309-312 [doi]