Abstract is missing.
- On whose shoulders? (Keynote)Jane Cleland-Huang. 1 [doi]
- Checkpoint alpha (keynote)Boris Debic. 2 [doi]
- Modeling the evolution of development topics using Dynamic Topic ModelsJiajun Hu, Xiaobing Sun, David Lo, Bin Li. 3-12 [doi]
- Understanding developers' natural language queries with interactive clarificationShihai Jiang, Liwei Shen, Xin Peng, Zhaojin Lv, Wenyun Zhao. 13-22 [doi]
- Mining Multi-level API Usage PatternsMohamed Aymen Saied, Omar Benomar, Hani Abdeen, Houari A. Sahraoui. 23-32 [doi]
- An observational study on API usage constraints and their documentationMohamed Aymen Saied, Houari A. Sahraoui, Bruno Dufour. 33-42 [doi]
- Improving pattern tracking with a language-aware tree differencing algorithmNicolas Palix, Jean-Rémy Falleri, Julia Lawall. 43-52 [doi]
- Measuring the quality of design pattern detection resultsShouzheng Yang, Ayesha Manzer, Vassilios Tzerpos. 53-62 [doi]
- Are PHP applications ready for Hack?Laleh Mousavi Eshkevari, Fabien Dos Santos, James R. Cordy, Giuliano Antoniol. 63-72 [doi]
- Does JavaScript software embrace classes?Leonardo Silva, Miguel Ramos, Marco Tulio Valente, Alexandre Bergel, Nicolas Anquetil. 73-82 [doi]
- Evolution analysis for Accessibility Excessiveness in JavaKazuo Kobori, Makoto Matsushita, Katsuro Inoue. 83-90 [doi]
- A software quality model for RPGGergely Ladányi, Zoltan Toth, Rudolf Ferenc, Tibor Keresztesi. 91-100 [doi]
- JCHARMING: A bug reproduction approach using crash traces and directed model checkingMathieu Nayrolles, Abdelwahab Hamou-Lhadj, Sofiène Tahar, Alf Larsson. 101-110 [doi]
- Towards a common metamodel for traces of high performance computing systems to enable software analysis tasksLuay Alawneh, Abdelwahab Hamou-Lhadj, Jameleddine Hassine. 111-120 [doi]
- Automated extraction of failure reproduction steps from user interaction tracesTobias Roehm, Stefan Nosovic, Bernd Bruegge. 121-130 [doi]
- Misery loves company: CrowdStacking traces to aid problem detectionTommaso Dal Sasso, Andrea Mocci, Michele Lanza. 131-140 [doi]
- Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code ReviewPatanamon Thongtanunam, Chakkrit Tantithamthavorn, Raula Gaikovina Kula, Norihiro Yoshida, Hajimu Iida, Ken-ichi Matsumoto. 141-150 [doi]
- Code review: Veni, ViDI, viciYuriy Tymchuk, Andrea Mocci, Michele Lanza. 151-160 [doi]
- Would static analysis tools help developers with code reviews?Sebastiano Panichella, Venera Arnaoudova, Massimiliano Di Penta, Giuliano Antoniol. 161-170 [doi]
- Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projectsRodrigo Morales, Shane McIntosh, Foutse Khomh. 171-180 [doi]
- Scaling up evaluation of code search tools through developer usage metricsKostadin Damevski, David C. Shepherd, Lori L. Pollock. 181-190 [doi]
- Optimized feature selection towards functional and non-functional requirements in Software Product LinesXiaoli Lian, Li Zhang. 191-200 [doi]
- Threshold-free code clone detection for a large-scale heterogeneous Java repositoryIman Keivanloo, Feng Zhang 0001, Ying Zou. 201-210 [doi]
- Detecting duplicate bug reports with software engineering domain knowledgeKaran Aggarwal, Tanner Rutgers, Finbarr Timbers, Abram Hindle, Russ Greiner, Eleni Stroulia. 211-220 [doi]
- Impact analysis based on a global hierarchical Object GraphMarwan Abi-Antoun, Yibin Wang, Ebrahim Khalaj, Andrew Giang, Vaclav Rajlich. 221-230 [doi]
- A framework for cost-effective dependence-based dynamic impact analysisHaipeng Cai, Raúl A. Santelices. 231-240 [doi]
- Circular dependencies and change-proneness: An empirical studyTosin Daniel Oyetoyan, Jean-Rémy Falleri, Jens Dietrich, Kamil Jezek. 241-250 [doi]
- An empirical study of work fragmentation in software evolution tasksHeider Sanchez, Romain Robbes, Victor M. Gonzalez. 251-260 [doi]
- Library functions identification in binary code by using graph isomorphism testingsJing Qiu, Xiaohong Su, Peijun Ma. 261-270 [doi]
- A non-convex abstract domain for the value analysis of binariesSven Mattsen, Arne Wichmann, Sibylle Schupp. 271-280 [doi]
- Precision vs. scalability: Context sensitive analysis with prefix approximationRaveendra Kumar Medicherla, Raghavan Komondoor. 281-290 [doi]
- MG++: Memory graphs for analyzing dynamic data structuresVineet Singh, Rajiv Gupta, Iulian Neamtiu. 291-300 [doi]
- SQA-Profiles: Rule-based activity profiles for Continuous Integration environmentsMartin Brandtner, Sebastian C. Müller, Philipp Leitner, Harald C. Gall. 301-310 [doi]
- Cross-project build co-change predictionXin Xia, David Lo, Shane McIntosh, Emad Shihab, Ahmed E. Hassan. 311-320 [doi]
- The influence of App churn on App success and StackOverflow discussionsLatifa Guerrouj, Shams Azad, Peter C. Rigby. 321-330 [doi]
- Beyond support and confidence: Exploring interestingness measures for rule-based specification miningTien-Duy B. Le, David Lo. 331-340 [doi]
- Untangling fine-grained code changesMartin Dias, Alberto Bacchelli, Georgios Gousios, Damien Cassou, Stéphane Ducasse. 341-350 [doi]
- A comprehensive and scalable method for analyzing fine-grained source code change patternsMasatomo Hashimoto, Akira Mori, Tomonori Izumida. 351-360 [doi]
- Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changesQingtao Jiang, Xin Peng, Hai Wang, Zhenchang Xing, Wenyun Zhao. 361-370 [doi]
- Identifying the exact fixing actions of static rule violationHayatou Oumarou, Nicolas Anquetil, Anne Etien, Stéphane Ducasse, Dina Taiwe Kolyang. 371-379 [doi]
- CloCom: Mining existing source code for automatic comment generationEdmund Wong, Taiyue Liu, Lin Tan. 380-389 [doi]
- amAssist: In-IDE ambient search of online programming resourcesHongwei Li, Xuejiao Zhao, Zhenchang Xing, Lingfeng Bao, Xin Peng, Dongjing Gao, Wenyun Zhao. 390-398 [doi]
- Reverse engineering time-series interaction data from screen-captured videosLingfeng Bao, Jing Li, Zhenchang Xing, Xinyu Wang, Bo Zhou. 399-408 [doi]
- Niche vs. breadth: Calculating expertise over time through a fine-grained analysisJose Ricardo da Silva Jr., Esteban Clua, Leonardo Murta, Anita Sarma. 409-418 [doi]
- Protecting web applications via Unicode extensionBoze Zekan, Mark Shtern, Vassilios Tzerpos. 419-428 [doi]
- A search-based approach to multi-view clustering of software systemsAmir Saeidi, Jurriaan Hage, Ravi Khadka, Slinger Jansen. 429-438 [doi]
- CEL: Touching software modeling in essenceRemo Lemma, Michele Lanza, Andrea Mocci. 439-448 [doi]
- NIRMAL: Automatic identification of software relevant tweets leveraging language modelAbhishek Sharma, Yuan Tian, David Lo. 449-458 [doi]
- A static code analysis tool for control system softwareSreeja Nair, Raoul Jetley, Anil R. Nair, Stefan Hauck-Stattelmann. 459-463 [doi]
- RbG: A documentation generator for scientific and engineering softwareMichael Moser, Josef Pichler, Günther Fleck, Michael Witlatschil. 464-468 [doi]
- Historef: A tool for edit history refactoringShinpei Hayashi, Daiki Hoshino, Jumpei Matsuda, Motoshi Saeki, Takayuki Omori, Katsuhisa Maruyama. 469-473 [doi]
- ClonePacker: A tool for clone set visualizationHiroaki Murakami, Yoshiki Higo, Shinji Kusumoto. 474-478 [doi]
- GiLA: GitHub label analyzerJavier Luis Cánovas Izquierdo, Valerio Cosentino, Belen Rolandi, Alexandre Bergel, Jordi Cabot. 479-483 [doi]
- SPCP-Miner: A tool for mining code clones that are important for refactoring or trackingManishankar Mondal, Chanchal K. Roy, Kevin A. Schneider. 484-488 [doi]
- TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained loggingHaipeng Cai, Raúl A. Santelices. 489-493 [doi]
- Umple: A framework for Model Driven Development of Object-Oriented SystemsMiguel Garzón, Hamoud I. Aljamaan, Timothy C. Lethbridge. 494-498 [doi]
- Assessing the bus factor of Git repositoriesValerio Cosentino, Javier Luis Cánovas Izquierdo, Jordi Cabot. 499-503 [doi]
- Old habits die hard: Why refactoring for understandability does not give immediate benefitsErik Ammerlaan, Wim Veninga, Andy Zaidman. 504-507 [doi]
- Bash2py: A bash to Python translatorIan J. Davis, Mike Wexler, Cheng Zhang, Richard C. Holt, Theresa Weber. 508-511 [doi]
- On implementational variations in static analysis toolsTukaram Muske, Prasad Bokil. 512-515 [doi]
- Tracking known security vulnerabilities in proprietary software systemsMircea Cadariu, Eric Bouwers, Joost Visser, Arie van Deursen. 516-519 [doi]
- Trusting a library: A study of the latency to adopt the latest Maven releaseRaula Gaikovina Kula, Daniel M. Germán, Takashi Ishio, Katsuro Inoue. 520-524 [doi]
- Evolution of dynamic feature usage in PHPMark Hills 0001. 525-529 [doi]
- Towards incremental model slicing for delta-oriented software product linesSascha Lity, Hauke Baller, Ina Schaefer. 530-534 [doi]
- Understanding software performance regressions using differential flame graphsCor-Paul Bezemer, Johan Pouwelse, Brendan Gregg. 535-539 [doi]
- TextRank based search term identification for software change tasksMohammad Masudur Rahman, Chanchal K. Roy. 540-544 [doi]
- Query expansion via WordNet for effective code searchMeili Lu, Xiaobing Sun, Shaowei Wang, David Lo, Yucong Duan. 545-549 [doi]
- Exploring the use of labels to categorize issues in Open-Source Software projectsJordi Cabot, Javier Luis Cánovas Izquierdo, Valerio Cosentino, Belen Rolandi. 550-554 [doi]
- Explore the evolution of development topics via on-line LDAJiajun Hu, Xiaobing Sun, Bin Li. 555-559 [doi]
- Code coverage and test suite effectiveness: Empirical study with real bugs in large systemsPavneet Singh Kochhar, Ferdian Thung, David Lo. 560-564 [doi]
- Detection of violation causes in reflexion modelsSebastian Herold, Michael English, Jim Buckley, Steve Counsell, Mel Ó Cinnéide. 565-569 [doi]
- A comparative study on the effectiveness of part-of-speech tagging techniques on bug reportsYuan Tian, David Lo. 570-574 [doi]
- Efficiently identifying object production sitesAlejandro Infante, Alexandre Bergel. 575-579 [doi]
- Where was this SQL query executed? a static concept location approachCsaba Nagy, Loup Meurice, Anthony Cleve. 580-584 [doi]
- Taint analysis of manual service compositions using Cross-Application Call GraphsMarc-André Laverdière, Bernhard J. Berger, Ettore Merlo. 585-589 [doi]
- TXL source transformation in practiceJames R. Cordy. 590-591 [doi]
- Software risk management in practice: Shed light on your software productJens Knodel, Matthias Naab, Eric Bouwers, Joost Visser. 592-594 [doi]
- Software architecture reconstruction: Why? What? How?Mehdi Mirakhorli. 595 [doi]
- SKilLed communication for toolchainsTimm Felden. 596 [doi]
- The impact of column-orientation on the quality of class inheritance mapping specificationsMartin Lorenz. 597 [doi]
- Improving the integration process of large software systemsYujuan Jiang. 598 [doi]
- Handling the differential evolution of software artefacts: A framework for consistency managementIldiko Pete, Dharini Balasubramaniam. 599-600 [doi]
- Towards a framework for analysis, transformation, and manipulation of MakefilesDouglas Martin. 601-602 [doi]
- Towards a framework for automatic correction of anti-patternsRodrigo Morales. 603-604 [doi]
- Towards an ontology-based context-aware meta-model for the software domainMostafa Erfani. 605-606 [doi]
- Investigating modern release engineering practicesMd Tajmilur Rahman. 607-608 [doi]