


default search action
14th SCAM 2014: Victoria, BC, Canada
- 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014. IEEE Computer Society 2014, ISBN 978-0-7695-5304-7

Clones
- Saman Bazrafshan, Rainer Koschke:

Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. 1-10 - Manishankar Mondal, Chanchal Kumar Roy, Kevin A. Schneider

:
Automatic Identification of Important Clones for Refactoring and Tracking. 11-20 - Hitesh Sajnani, Vaibhav Saini, Cristina Videira Lopes:

A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code. 21-30 - Md. Saidur Rahman, Chanchal K. Roy:

A Change-Type Based Empirical Study on the Stability of Cloned Code. 31-40
Tools
- DeLesley Hutchins, Aaron Ballman, Dean Sutherland:

C/C++ Thread Safety Analysis. 41-46 - Dávid Tengeri, Árpád Beszédes

, David Havas, Tibor Gyimóthy
:
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. 47-52 - Coen De Roover

, Katsuro Inoue:
The Ekeko/X Program Transformation Tool. 53-58 - David A. Kosower, Juan J. Lopez-Villarejo, Serguei A. Roubtsov:

Flowgen: Flowchart-Based Documentation Framework for C++. 59-64 - Andrea Stocco

, Maurizio Leotta
, Filippo Ricca, Paolo Tonella
:
PESTO: A Tool for Migrating DOM-Based to Visual Web Tests. 65-70 - Andrea Caracciolo, Andrei Chis, Boris Spasojevic, Mircea Lungu:

Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora. 71-76 - Rudolf Ferenc

, Laszlo Lango, István Siket, Tibor Gyimóthy
, Tibor Bakota:
Source Meter Sonar Qube Plug-in. 77-82 - Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj

, Wael Khreich
, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. 83-88 - Wei Wu, Bram Adams

, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
ACUA: API Change and Usage Auditor. 89-94
Software Quality
- Gábor Szoke, Gabor Antal

, Csaba Nagy, Rudolf Ferenc
, Tibor Gyimóthy
:
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? 95-104 - Guillaume Petiot, Bernard Botella, Jacques Julliand, Nikolai Kosmatov

, Julien Signoles
:
Instrumentation of Annotated C Programs for Test Generation. 105-114 - Syrine Tlili, José M. Fernandez

, Abdelfettah Belghith
, Bilel Dridi, Soufien Hidouri:
Scalable Security Verification of Software at Compile Time. 115-124 - Malin Källén, Sverker Holmgren, Ebba Þóra Hvannberg

:
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application. 125-134 - Chanseok Oh, Martin Schäf

, Daniel Schwartz-Narbonne, Thomas Wies
:
Concolic Fault Localization. 135-144
Slicing
- Siyuan Jiang

, Raúl A. Santelices, Mark Grechanik
, Haipeng Cai
:
On the Accuracy of Forward Dynamic Slicing and Its Effects on Software Maintenance. 145-154 - Ulf Kargén

, Nahid Shahmehri:
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing. 155-164 - Haipeng Cai

, Siyuan Jiang
, Raúl A. Santelices, Ying-Jie Zhang, Yiji Zhang:
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction. 165-174 - Shin Yoo, David W. Binkley, Roger D. Eastman:

Seeing Is Slicing: Observation Based Slicing of Picture Description Languages. 175-184
Mining Software Repository
- Angela Lozano, Carlos Noguera, Viviane Jonckers:

Explaining Why Methods Change Together. 185-194 - Cosmin Marsavina, Daniele Romano, Andy Zaidman

:
Studying Fine-Grained Co-evolution Patterns of Production and Test Code. 195-204 - Le An, Foutse Khomh, Bram Adams

:
Supplementary Bug Fixes vs. Re-opened Bugs. 205-214 - Steven Raemaekers, Arie van Deursen

, Joost Visser
:
Semantic Versioning versus Breaking Changes: A Study of the Maven Repository. 215-224
Static Analysis
- Shuying Liang, Weibin Sun, Matthew Might:

Fast Flow Analysis with Godel Hashes. 225-234 - Aharon Abadi, Yishai A. Feldman:

A Parallel On-Demand Algorithm for Computing Interprocedural Dominators. 235-244 - Marwan Abi-Antoun, Sumukhi Chandrashekar, Radu Vanciu, Andrew Giang:

Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? 245-254 - Babak Yadegari, Saumya Debray:

Bit-Level Taint Analysis. 255-264 - Shuying Liang, Weibin Sun, Matthew Might, Andrew W. Keep, David Van Horn

:
Pruning, Pushdown Exception-Flow Analysis. 265-274
Recommendation Systems
- Luis Fernando Cortes-Coy, Mario Linares Vásquez

, Jairo Aponte, Denys Poshyvanyk
:
On Automatically Generating Commit Messages via Summarization of Source Code Changes. 275-284 - Mohammad Masudur Rahman

, Chanchal K. Roy:
On the Use of Context in Recommending Exception Handling Code Examples. 285-294 - Atsushi Yoshida, Yoshinari Hachisu:

A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees. 295-304 - Naohiro Kawamitsu, Takashi Ishio

, Tetsuya Kanda, Raula Gaikovina Kula
, Coen De Roover
, Katsuro Inoue:
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity. 305-314

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














