Abstract is missing.
- Incremental Code Clone Detection: A PDG-based ApproachYoshiki Higo, Yasushi Ueda, Minoru Nishino, Shinji Kusumoto. 3-12 [doi]
- On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software SystemsMd. Sharif Uddin, Chanchal K. Roy, Kevin A. Schneider, Abram Hindle. 13-22 [doi]
- Internet-scale Real-time Code Clone Search Via Multi-level IndexingIman Keivanloo, Juergen Rilling, Philippe Charland. 23-27 [doi]
- An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS ProjectsYu Kashima, Yasuhiro Hayase, Norihiro Yoshida, Yuki Manabe, Katsuro Inoue. 28-32 [doi]
- Automatic Segmentation of Method Code into Meaningful Blocks to Improve ReadabilityXiaoRan Wang, Lori L. Pollock, K. Vijay-Shanker. 35-44 [doi]
- Requirements Traceability for Object Oriented Systems by Partitioning Source CodeNasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 45-54 [doi]
- Can We Predict Dependencies Using Domain information?Amir Aryani, Fabrizio Perin, Mircea Lungu, Abdun Naser Mahmood, Oscar Nierstrasz. 55-64 [doi]
- Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled ExperimentsCarmine Gravino, Michele Risi, Giuseppe Scanniello, Genoveffa Tortora. 67-76 [doi]
- Towards the Extraction of Domain Concepts from the IdentifiersSurafel Lemma Abebe, Paolo Tonella. 77-86 [doi]
- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source CodeScott Grant, James R. Cordy, David B. Skillicorn. 87-91 [doi]
- Concern Localization using Information Retrieval: An Empirical Study on Linux KernelShaowei Wang, David Lo, Zhenchang Xing, Lingxiao Jiang. 92-96 [doi]
- Locating the Meaning of Terms in Source Code Research on "Term Introduction"Jan Nonnen, Daniel Speicher, Paul Imhoff. 99-108 [doi]
- Approximate Code Search in Program HistoriesSaman Bazrafshan, Rainer Koschke, Nils Göde. 109-118 [doi]
- Code Search via Topic-Enriched Dependence Graph MatchingShaowei Wang, David Lo, Lingxiao Jiang. 119-123 [doi]
- Measuring the Accuracy of Information Retrieval Based Bug Localization TechniquesMatthew D. Beard, Nicholas A. Kraft, Letha H. Etzkorn, Stacy K. Lukins. 124-128 [doi]
- Exploring the Intent behind API Evolution: A Case StudyDaqing Hou, Xiaojia Yao. 131-140 [doi]
- A Framework Profile of .NETRalf Lammel, Rufus Linke, Ekaterina Pek, Andrei Varanovich. 141-150 [doi]
- Useful, But Usable? Factors Affecting the Usability of APIsMinhaz F. Zibran, Farjana Zebin Eishita, Chanchal K. Roy. 151-155 [doi]
- Automatic Extraction of Secrets from MalwareZiming Zhao, Gail-Joon Ahn, Hongxin Hu. 159-168 [doi]
- Reverse Engineering of Protocols from Network TracesJoão Antunes, Nuno Ferreira Neves, Paulo Veríssimo. 169-178 [doi]
- An Android Security Case Study with BauhausBernhard J. Berger, Michaela Bunke, Karsten Sohr. 179-183 [doi]
- An Exploratory Study of Software Reverse Engineering in a Security ContextChristoph Treude, Fernando Marques Figueira Filho, Margaret-Anne D. Storey, Martin Salois. 184-188 [doi]
- How Long Does a Bug Survive? An Empirical StudyGerardo Canfora, Michele Ceccarelli, Luigi Cerulo, Massimiliano Di Penta. 191-200 [doi]
- A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of BugsSteven Davies, Marc Roper, Murray Wood. 201-210 [doi]
- Got Issues? Do New Features and Code Improvements Affect Defects?Daryl Posnett, Abram Hindle, Premkumar T. Devanbu. 211-215 [doi]
- Impact of Installation Counts on Perceived Quality: A Case Study on DebianIsrael Herraiz, Emad Shihab, Thanh H. D. Nguyen, Ahmed E. Hassan. 219-228 [doi]
- Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity ViewsTianmei Zhu, Yijian Wu, Xin Peng, Zhenchang Xing, Wenyun Zhao. 229-238 [doi]
- An Empirical Validation of the Benefits of Adhering to the Law of DemeterYi Guo, Michael Würsch, Emanuel Giger, Harald C. Gall. 239-243 [doi]
- Assessing Software Quality by Program Clustering and Defect PredictionXi Tan, Xin Peng, Sen Pan, Wenyun Zhao. 244-248 [doi]
- Object-Based Dynamic Protocol Recovery for Multi-Threading ProgramsBernhard Scholz, Rainer Koschke. 251-260 [doi]
- An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla FirefoxFoutse Khomh, Brian Chan, Ying Zou, Ahmed E. Hassan. 261-270 [doi]
- Meta-Level Runtime Feature Awareness for JavaAndrzej Olszak, Martin Rytter, Bo Nørregaard Jørgensen. 271-274 [doi]
- Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy CodeAndreas Fuhr, Tassilo Horn, Volker Riediger. 275-279 [doi]
- Reverse Engineering of Mobile Application LifecyclesDominik Franke, Corinna Elsemann, Stefan Kowalewski, Carsten Weise. 283-292 [doi]
- Reverse Engineering of Event Handlers of RAD-Based ApplicationsÓscar Sánchez Ramón, Jesús Sánchez Cuadrado, Jesús García Molina. 293-302 [doi]
- Analyzing the Source Code of Multiple Software Variants for Reuse PotentialSlawomir Duszynski, Jens Knodel, Martin Becker 0002. 303-307 [doi]
- Reverse Engineering Feature Models from Programs' Feature SetsEvelyn Nicole Haslinger, Roberto E. Lopez-Herrejon, Alexander Egyed. 308-312 [doi]
- Make it or Break it: Mining Anomalies from Linux KbuildSarah Nadi, Richard C. Holt. 315-324 [doi]
- An Exploratory Study of Macro Co-changesFehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol. 325-334 [doi]
- An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software SystemsWeiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed N. Nasser, Parminder Flora. 335-344 [doi]
- SmartDec: Approaching C++ DecompilationAlexander Fokin, Egor Derevenetc, Alexander Chernov, Katerina Troshina. 347-356 [doi]
- Precise Static Analysis of Binaries by Extracting Relational InformationAlexander Sepp, Bogdan Mihaila, Axel Simon. 357-366 [doi]
- Refactoring Traditional Forms into Ajax-enabled FormsMing Ying, James Miller. 367-371 [doi]
- An Empirical Study of Refactoring in the Context of FanIn and FanOut CouplingAlessandro Murgia, Roberto Tonelli, Steve Counsell, Giulio Concas, Michele Marchesi. 372-376 [doi]
- Recommending People in Developers' Collaboration NetworkDidi Surian, Nian Liu, David Lo, Hanghang Tong, Ee-Peng Lim, Christos Faloutsos. 379-388 [doi]
- Reasoning over the Evolution of Source Code Using Quantified Regular Path ExpressionsAndy Kellens, Coen De Roover, Carlos Noguera, Reinout Stevens, Viviane Jonckers. 389-393 [doi]
- Modularization Metrics: Assessing Package Organization in Legacy Large Object-Oriented SoftwareHani Abdeen, Stéphane Ducasse, Houari A. Sahraoui. 394-398 [doi]
- Application Architecture Discovery - Towards Domain-driven, Easily-Extensible Code StructureHitesh Sajnani, Ravindra Naik, Cristina Videira Lopes. 401-405 [doi]
- Renovation by Machine-Assisted Program Transformation in Production Reporting and IntegrationSava Mintchev. 406-410 [doi]
- Reconstructing Traceability between Bugs and Test Cases: An Experimental StudyNilam Kaushik, Ladan Tahvildari, Mark Moore. 411-414 [doi]
- Recovering Test-to-Code Traceability Via Slicing and Conceptual CouplingAbdallah Qusef. 417-420 [doi]
- In-Memory Database Support for Source Code Search and AnalyticsOleksandr Panchenko. 421-424 [doi]
- Extending Bug Localization Using Information Retrieval and Code Clone Location TechniquesMatthew D. Beard. 425-428 [doi]
- Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel SpaceJason Raber. 431-432 [doi]
- Function Insight: Highlighting Suspicious Sections in Binary Run TracesMichelle Cheatham, Jason Raber. 433-434 [doi]
- Understanding Legacy Features with FeatureousAndrzej Olszak, Bo Nørregaard Jørgensen. 435-436 [doi]
- iProblems - An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and DefectsMihai Codoban, Cristina Marinescu, Radu Marinescu. 437-438 [doi]
- Focusing on Execution Traces Using DiverDel Myers, Margaret-Anne D. Storey. 439-440 [doi]
- jPET: An Automatic Test-Case Generator for JavaElvira Albert, Israel Cabanas, Antonio Flores-Montoya, Miguel Gómez-Zamalloa, Sergio Gutierrez. 441-442 [doi]
- SCOTCH: Slicing and Coupling Based Test to Code Trace HunterAbdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley. 443-444 [doi]