Abstract is missing.
- UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)Engin Kirda. 1 [doi]
- An empirical comparison of dependency issues in OSS packaging ecosystemsAlexandre Decan, Tom Mens, Maëlick Claes. 2-12 [doi]
- Detecting similar repositories on GitHubYun Zhang, David Lo, Pavneet Singh Kochhar, Xin Xia, Quanlai Li, Jianling Sun. 13-23 [doi]
- Code of conduct in open source projectsParastou Tourani, Bram Adams, Alexander Serebrenik. 24-33 [doi]
- Socio-technical evolution of the Ruby ecosystem in GitHubEleni Constantinou, Tom Mens. 34-44 [doi]
- StiCProb: A novel feature mining approach using conditional probabilityYutian Tang, Hareton Leung. 45-55 [doi]
- HDSKG: Harvesting domain specific knowledge graph from content of webpagesXuejiao Zhao, Zhenchang Xing, Muhammad Ashad Kabir, Naoya Sawada, Jing Li, Shang-Wei Lin. 56-67 [doi]
- Analyzing closeness of code dependencies for improving IR-based Traceability RecoveryHongyu Kuang, Jia Nie, Hao Hu, Patrick Rempel, Jian Lu, Alexander Egyed, Patrick Mäder. 68-78 [doi]
- STRICT: Information retrieval based search term identification for concept locationMohammad Masudur Rahman 0001, Chanchal K. Roy. 79-90 [doi]
- Analyzing reviews and code of mobile apps for better release planningAdelina Ciurumelea, Andreas Schaufelbuhl, Sebastiano Panichella, Harald C. Gall. 91-102 [doi]
- Software-based energy profiling of Android apps: Simple, efficient and reliable?Dario Di Nucci, Fabio Palomba, Antonio Prota, Annibale Panichella, Andy Zaidman, Andrea De Lucia. 103-114 [doi]
- Investigating the energy impact of Android smellsAntonin Carette, Mehdi Adel Ait Younes, Geoffrey Hecht, Naouel Moha, Romain Rouvoy. 115-126 [doi]
- Automated generation of consistency-achieving model editorsPatrick Neubauer, Robert Bill, Tanja Mayerhofer, Manuel Wimmer. 127-137 [doi]
- Historical and impact analysis of API breaking changes: A large-scale studyLaerte Xavier, Aline Brito, André C. Hora, Marco Tulio Valente. 138-147 [doi]
- Reducing redundancies in multi-revision code analysisCarol V. Alexandru, Sebastiano Panichella, Harald C. Gall. 148-159 [doi]
- Recommending source code locations for system specific transformationsGustavo Santos, Klérisson Vinícius Ribeiro Paixão, Nicolas Anquetil, Anne Etien, Marcelo de Almeida Maia, Stéphane Ducasse. 160-170 [doi]
- Extracting executable transformations from distilled code changesReinout Stevens, Coen De Roover. 171-181 [doi]
- Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscationRoberto Tiella, Mariano Ceccato. 182-192 [doi]
- The dark side of event sourcing: Managing data conversionMichiel Overeem, Marten Spoor, Slinger Jansen. 193-204 [doi]
- Automatically generating natural language descriptions for object-related statement sequencesXiaoRan Wang, Lori L. Pollock, K. Vijay-Shanker. 205-216 [doi]
- Shorter identifier names take longer to comprehendJohannes Hofmeister, Janet Siegmund, Daniel V. Holt. 217-227 [doi]
- Lexical categories for source code identifiersChristian D. Newman, Reem S. Alsuhaibani, Michael L. Collard, Jonathan I. Maletic. 228-239 [doi]
- Computing counter-examples for privilege protection losses using security modelsMarc-André Laverdière, Ettore Merlo. 240-249 [doi]
- Enriching in-IDE process information with fine-grained source code historySebastian Proksch, Sarah Nadi, Sven Amann, Mira Mezini. 250-260 [doi]
- How to gamify software engineeringTommaso Dal Sasso, Andrea Mocci, Michele Lanza, Ebrisa Mastrodicasa. 261-271 [doi]
- Scalable tag recommendation for software information sitesPingyi Zhou, Jin Liu, Zijiang Yang, Guangyou Zhou. 272-282 [doi]
- Stack Overflow: A code laundering platform?Le An, Ons Mlouki, Foutse Khomh, Giuliano Antoniol. 283-293 [doi]
- An empirical study of code smells in JavaScript projectsAmir Saboury, Pooya Musavi, Foutse Khomh, Giulio Antoniol. 294-305 [doi]
- Antipatterns causing memory bloat: A case studyKamil Jezek, Richard Lipka. 306-315 [doi]
- Variant-preserving refactorings for migrating cloned products to a product lineWolfram Fenske, Jens Meinicke, Sandro Schulze, Steffen Schulze, Gunter Saake. 316-326 [doi]
- Efficient method extraction for automatic elimination of type-3 clonesRan Ettinger, Shmuel S. Tyszberowicz, Shay Menaia. 327-337 [doi]
- Spreadsheet testing in practiceSohon Roy, Felienne Hermans, Arie van Deursen. 338-348 [doi]
- Dynamic patch generation for null pointer exceptions using metaprogrammingThomas Durieux, Benoit Cornu, Lionel Seinturier, Martin Monperrus. 349-358 [doi]
- Improving fault localization for Simulink models using search-based testing and prediction modelsBing Liu, Lucia, Shiva Nejati, Lionel C. Briand. 359-370 [doi]
- An empirical investigation into the cost-effectiveness of test effort allocation strategies for finding faultsYiyang Feng, Wanwangying Ma, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu. 371-381 [doi]
- What information about code snippets is available in different software-related documents? An exploratory studyPreetha Chatterjee, Manziba Akanda Nishi, Kostadin Damevski, Vinay Augustine, Lori L. Pollock, Nicholas A. Kraft. 382-386 [doi]
- Harnessing Twitter to support serendipitous learning of developersAbhishek Sharma, Yuan Tian, Agus Sulistya, David Lo, Aiko Fallas Yamashita. 387-391 [doi]
- Why do we break APIs? First answers from developersLaerte Xavier, André C. Hora, Marco Tulio Valente. 392-396 [doi]
- An arc-based approach for visualization of code smellsMarcel Steinbeck. 397-401 [doi]
- Towards continuous software release planningDavid Ameller, Carles Farré, Xavier Franch, Danilo Valerio, Antonino Cassarino. 402-406 [doi]
- An exploratory study on library aging by monitoring client usage in a software ecosystemRaula Gaikovina Kula, Daniel M. Germán, Takashi Ishio, Ali Ouni 0001, Katsuro Inoue. 407-411 [doi]
- Trends on empty exception handlers for Java open source librariesAna Filipa Nogueira, José Carlos Bregieiro Ribeiro, Mário Alberto Zenha-Rela. 412-416 [doi]
- Analyzing the evolution of testing library usage in open source Java projectsAhmed Zerouali, Tom Mens. 417-421 [doi]
- On the evolution of exception usage in Java projectsHaidar Osman, Andrei Chis, Jakob Schaerer, Mohammad Ghafari, Oscar Nierstrasz. 422-426 [doi]
- Statically identifying class dependencies in legacy JavaScript systems: First resultsLeonardo Humberto Silva, Marco Tulio Valente, Alexandre Bergel. 427-431 [doi]
- CodeCritics applied to database schema: Challenges and first resultsJulien Delplanque, Anne Etien, Olivier Auverlot, Tom Mens, Nicolas Anquetil, Stéphane Ducasse. 432-436 [doi]
- Cloud-based parallel concolic executionTing Chen, Youzheng Feng, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang. 437-441 [doi]
- Under-optimized smart contracts devour your moneyTing Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang. 442-446 [doi]
- Pluggable Controllers and Nano-PatternsYossi Gil, Ori Marcovitch, Matteo Orrù. 447-451 [doi]
- Query Construction Patterns in PHPDavid Anderson, Mark Hills. 452-456 [doi]
- Supporting schema evolution in schema-less NoSQL data storesLoup Meurice, Anthony Cleve. 457-461 [doi]
- XCORE: Support for developing program analysis toolsAlexandru Stefanica, Petru Florin Mihancea. 462-466 [doi]
- srcQL: A syntax-aware query language for source codeBrian Bartman, Christian D. Newman, Michael L. Collard, Jonathan I. Maletic. 467-471 [doi]
- UAV: Warnings from multiple Automated Static Analysis Tools at a glanceTim Buckers, Clinton Cao, Michiel Doesburg, Boning Gong, Sunwei Wang, Moritz Beller, Andy Zaidman. 472-476 [doi]
- The Spartanizer: Massive automatic refactoringYossi Gil, Matteo Orrù. 477-481 [doi]
- c-JRefRec: Change-based identification of Move Method refactoring opportunitiesNaoya Ujihara, Ali Ouni 0001, Takashi Ishio, Katsuro Inoue. 482-486 [doi]
- Lightweight detection of Android-specific code smells: The aDoctor projectFabio Palomba, Dario Di Nucci, Annibale Panichella, Andy Zaidman, Andrea De Lucia. 487-491 [doi]
- scat: Learning from a single execution of a binaryFranck de Goër, Christopher Ferreira, Laurent Mounier. 492-496 [doi]
- dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysisDaniel Mercier, Aziem Chawdhary, Richard Jones. 497-501 [doi]
- InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applicationsJierui Liu, Tianyong Wu, Xi Deng, Jun Yan, Jian Zhang. 502-506 [doi]
- Columbo: High perfomance unpackingJason Raber. 507-510 [doi]
- Hindsight: Revealing the evolution of dependencies to developersGeorge Ganea. 511-515 [doi]
- Replan: A Release Planning ToolDavid Ameller, Carles Farré, Xavier Franch, Antonino Cassarino, Danilo Valerio, Valentin Elvassore. 516-520 [doi]
- Bringing back-in-time debugging down to the databaseArian Treffer, Michael Perscheid, Matthias Uflacker. 521-525 [doi]
- Performance tuning for automotive Software Fault PredictionHarald Altinger, Steffen Herbold, Friederike Schneemann, Jens Grabowski, Franz Wotawa. 526-530 [doi]
- Business process recovery based on system log and information of organizational structureRyota Mibe, Tadashi Tanaka, Takashi Kobayashi, Shingo Kobayashi. 531-535 [doi]
- Multi-language re-documentation to support a COBOL to Java migration projectBernhard Dorninger, Michael Moser, Josef Pichler. 536-540 [doi]
- Proactive reviews of textual requirementsVard Antinyan, Miroslaw Staron. 541-545 [doi]
- Data access visualization for legacy application maintenanceKeisuke Yano, Akihiko Matsuo. 546-550 [doi]
- An empirical study of clone density evolution and developer cloning tendencyBrent van Bladel, Alessandro Murgia, Serge Demeyer. 551-552 [doi]
- Towards reverse engineering of intermediate code for documentation generatorsMichael Moser, Michael Pfeiffer, Josef Pichler. 553-554 [doi]
- A framework for classifying and comparing source code recommendation systemsMohammad Ghafari, Hamidreza Moradi. 555-556 [doi]
- Self-adaptive systems framework based on agent and search-based optimizationLiu He, Qingshan Li, Lu Wang, Jiewen Wan. 557-558 [doi]
- The importance of program Design Patterns trainingViggo Holmstedt, Shegaw A. Mengiste. 559-560 [doi]
- Conventionality analysis of array objects in JavaScriptAstrid Younang, Lunjin Lu. 561-562 [doi]
- Two improvements to detect duplicates in Stack OverflowYuji Mizobuchi, Kuniharu Takayama. 563-564 [doi]
- Modernizing domain-specific languages with XMLText and IntellEditPatrick Neubauer, Robert Bill, Manuel Wimmer. 565-566 [doi]
- Lost comments support program comprehensionTakayuki Omori. 567-568 [doi]
- Does the release cycle of a library project influence when it is adopted by a client project?Daiki Fujibayashi, Akinori Ihara, Hirohiko Suwa, Raula Gaikovina Kula, Ken-ichi Matsumoto. 569-570 [doi]
- Which review feedback did long-term contributors get on OSS projects?Takuto Norikane, Akinori Ihara, Kenichi Matsumoto. 571-572 [doi]
- Frame-based behavior preservation in refactoringKatsuhisa Maruyama, Shinpei Hayashi, Norihiro Yoshida, Eunjong Choi. 573-574 [doi]
- Log generation for coding behavior analysis: For focusing on how kids are coding not what they are codingRa-Jeong Moon, Kyu-Min Shim, Hae Young Lee, Hyung-Jong Kim. 575-576 [doi]
- Towards understanding an open-source bounty: Analysis of BountysourceTetsuya Kanda, Mingyu Guo, Hideaki Hata, Ken-ichi Matsumoto. 577-578 [doi]