default search action
14th SCAM 2014: Victoria, BC, Canada
- 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014. IEEE Computer Society 2014, ISBN 978-0-7695-5304-7
Clones
- Saman Bazrafshan, Rainer Koschke:
Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. 1-10 - Manishankar Mondal, Chanchal Kumar Roy, Kevin A. Schneider:
Automatic Identification of Important Clones for Refactoring and Tracking. 11-20 - Hitesh Sajnani, Vaibhav Saini, Cristina Videira Lopes:
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code. 21-30 - Md. Saidur Rahman, Chanchal K. Roy:
A Change-Type Based Empirical Study on the Stability of Cloned Code. 31-40
Tools
- DeLesley Hutchins, Aaron Ballman, Dean Sutherland:
C/C++ Thread Safety Analysis. 41-46 - Dávid Tengeri, Árpád Beszédes, David Havas, Tibor Gyimóthy:
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. 47-52 - Coen De Roover, Katsuro Inoue:
The Ekeko/X Program Transformation Tool. 53-58 - David A. Kosower, Juan J. Lopez-Villarejo, Serguei A. Roubtsov:
Flowgen: Flowchart-Based Documentation Framework for C++. 59-64 - Andrea Stocco, Maurizio Leotta, Filippo Ricca, Paolo Tonella:
PESTO: A Tool for Migrating DOM-Based to Visual Web Tests. 65-70 - Andrea Caracciolo, Andrei Chis, Boris Spasojevic, Mircea Lungu:
Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora. 71-76 - Rudolf Ferenc, Laszlo Lango, István Siket, Tibor Gyimóthy, Tibor Bakota:
Source Meter Sonar Qube Plug-in. 77-82 - Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Wael Khreich, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. 83-88 - Wei Wu, Bram Adams, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
ACUA: API Change and Usage Auditor. 89-94
Software Quality
- Gábor Szoke, Gabor Antal, Csaba Nagy, Rudolf Ferenc, Tibor Gyimóthy:
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? 95-104 - Guillaume Petiot, Bernard Botella, Jacques Julliand, Nikolai Kosmatov, Julien Signoles:
Instrumentation of Annotated C Programs for Test Generation. 105-114 - Syrine Tlili, José M. Fernandez, Abdelfettah Belghith, Bilel Dridi, Soufien Hidouri:
Scalable Security Verification of Software at Compile Time. 115-124 - Malin Källén, Sverker Holmgren, Ebba Þóra Hvannberg:
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application. 125-134 - Chanseok Oh, Martin Schäf, Daniel Schwartz-Narbonne, Thomas Wies:
Concolic Fault Localization. 135-144
Slicing
- Siyuan Jiang, Raúl A. Santelices, Mark Grechanik, Haipeng Cai:
On the Accuracy of Forward Dynamic Slicing and Its Effects on Software Maintenance. 145-154 - Ulf Kargén, Nahid Shahmehri:
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing. 155-164 - Haipeng Cai, Siyuan Jiang, Raúl A. Santelices, Ying-Jie Zhang, Yiji Zhang:
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction. 165-174 - Shin Yoo, David W. Binkley, Roger D. Eastman:
Seeing Is Slicing: Observation Based Slicing of Picture Description Languages. 175-184
Mining Software Repository
- Angela Lozano, Carlos Noguera, Viviane Jonckers:
Explaining Why Methods Change Together. 185-194 - Cosmin Marsavina, Daniele Romano, Andy Zaidman:
Studying Fine-Grained Co-evolution Patterns of Production and Test Code. 195-204 - Le An, Foutse Khomh, Bram Adams:
Supplementary Bug Fixes vs. Re-opened Bugs. 205-214 - Steven Raemaekers, Arie van Deursen, Joost Visser:
Semantic Versioning versus Breaking Changes: A Study of the Maven Repository. 215-224
Static Analysis
- Shuying Liang, Weibin Sun, Matthew Might:
Fast Flow Analysis with Godel Hashes. 225-234 - Aharon Abadi, Yishai A. Feldman:
A Parallel On-Demand Algorithm for Computing Interprocedural Dominators. 235-244 - Marwan Abi-Antoun, Sumukhi Chandrashekar, Radu Vanciu, Andrew Giang:
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? 245-254 - Babak Yadegari, Saumya Debray:
Bit-Level Taint Analysis. 255-264 - Shuying Liang, Weibin Sun, Matthew Might, Andrew W. Keep, David Van Horn:
Pruning, Pushdown Exception-Flow Analysis. 265-274
Recommendation Systems
- Luis Fernando Cortes-Coy, Mario Linares Vásquez, Jairo Aponte, Denys Poshyvanyk:
On Automatically Generating Commit Messages via Summarization of Source Code Changes. 275-284 - Mohammad Masudur Rahman, Chanchal K. Roy:
On the Use of Context in Recommending Exception Handling Code Examples. 285-294 - Atsushi Yoshida, Yoshinari Hachisu:
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees. 295-304 - Naohiro Kawamitsu, Takashi Ishio, Tetsuya Kanda, Raula Gaikovina Kula, Coen De Roover, Katsuro Inoue:
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity. 305-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.