Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richárd Szalay, Zoltán Porkoláb, Dániel Krupp |
Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 17th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2017, Shanghai, China, September 17-18, 2017, pp. 101-110, 2017, IEEE Computer Society, 978-1-5386-3238-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz |
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 17th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2017, Shanghai, China, September 17-18, 2017, pp. 71-80, 2017, IEEE Computer Society, 978-1-5386-3238-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jochen Quante |
A Program Interpreter Framework for Arbitrary Abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 91-96, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xueliang Li 0002, John P. Gallagher |
A Source-Level Energy Optimization Framework for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 31-40, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gabor Antal, David Havas, István Siket, Árpád Beszédes, Rudolf Ferenc, József Mihalicza |
Transforming C++11 Code to C++03 to Support Legacy Compilation Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 177-186, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nelson Lossing, Pierre Guillou, François Irigoin |
Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 167-176, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Renika D'Souza, Di Yang, Cristina V. Lopes |
Collective Intelligence for Smarter API Recommendations in Python. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 51-60, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis, Nicos Malevris |
Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 147-156, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alessio Viticchié, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, Roberto Tiella |
Assessment of Source Code Obfuscation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 11-20, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Fischer 0006, Lukas Linsbauer, Roberto E. Lopez-Herrejon, Alexander Egyed |
A Source Level Empirical Study of Features and Their Interactions in Variable Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 197-206, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mauricio Finavaro Aniche, Christoph Treude, Andy Zaidman, Arie van Deursen, Marco Aurélio Gerosa |
SATT: Tailoring Code Metric Thresholds for Different Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 41-50, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Dawn J. Lawrie |
A Case for Software Specific Natural Language Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 187-196, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leon Moonen, Stefano Di Alesio, Thomas Rolfsnes, Dave W. Binkley |
Exploring the Effects of History Length and Age on Mining Software Change Impact. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 207-216, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marco di Biase, Magiel Bruntink, Alberto Bacchelli |
A Security Perspective on Code Review: The Case of Chromium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 21-30, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gergö Balogh, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy |
Are My Unit Tests in the Right Package? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 137-146, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu Jimenez, Mike Papadakis, Yves Le Traon |
Vulnerability Prediction Models: A Case Study on the Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 1-10, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Allan Blanchard, Nikolai Kosmatov, Matthieu Lemerre, Frédéric Loulergue |
Conc2Seq: A Frama-C Plugin for Verification of Parallel Compositions of C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 67-72, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Holland, Ganesh Ram Santhanam, Payas Awadhutkar, Suresh C. Kothari |
Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 79-84, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chaiyong Ragkhitwetsagul, Jens Krinke, David Clark 0001 |
Similarity of Source Code in the Presence of Pervasive Modifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 117-126, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tukaram Muske, Alexander Serebrenik |
Survey of Approaches for Handling Static Analysis Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 157-166, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Musco, Martin Monperrus, Philippe Preux |
Mutation-Based Graph Inference for Fault Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 97-106, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Min Gao 0003, Lei He 0001, Rupak Majumdar, Zilong Wang 0004 |
LLSPLAT: Improving Concolic Testing by Bounded Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 127-136, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Adriano Carvalho de Paula, Eduardo Guerra 0001, Cristina V. Lopes, Hitesh Sajnani, Otávio Augusto Lazzarini Lemos |
An Exploratory Study of Interface Redundancy in Code Repositories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 107-116, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Quentin Stiévenart, Maarten Vandercammen, Wolfgang De Meuter, Coen De Roover |
Scala-AM: A Modular Static Analysis Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 85-90, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Ming 0002, Dinghao Wu |
BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 61-66, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tushar Sharma 0001, Girish Suryanarayana |
Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016, pp. 73-78, 2016, IEEE Computer Society, 978-1-5090-3848-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, NC, USA, October 2-3, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 978-1-5090-3848-0 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Mohammed Sayagh, Bram Adams |
Multi-layer software configuration: Empirical study on wordpress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 31-40, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sandrine Blazy, Stéphanie Riaud, Thomas Sirvent |
Data tainting and obfuscation: Improving plausibility of incorrect taint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 111-120, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wolfram Fenske, Sandro Schulze, Daniel Meyer, Gunter Saake |
When code smells twice as much: Metric-based detection of variability-aware code smells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 171-180, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dawn J. Lawrie, Dave W. Binkley |
Navigating source code with words. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 71-80, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sami Uddin, Varun Gaur, Carl Gutwin, Chanchal K. Roy |
On the comprehension of code clone visualizations: A controlled study using eye tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 161-170, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felipe Pinto, Uirá Kulesza, Christoph Treude |
Automating the performance deviation analysis for multiple system releases: An evolutionary study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 201-210, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Pandita, Raoul Praful Jetley, Sithu D. Sudarsan, Laurie A. Williams |
Discovering likely mappings between APIs using text mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 231-240, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Nicolas E. Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo |
ORBS and the limits of static slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 1-10, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gergö Balogh, Attila Szabolics, Árpád Beszédes |
CodeMetropolis: Eclipse over the city of source code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 271-276, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ghafari, Carlo Ghezzi, Konstantin Rubinov |
Automatically identifying focal methods under test in unit test cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 61-70, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Boisselle, Bram Adams |
The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 131-140, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Eric J. Rapos, Andrew Stevenson, Manar H. Alalfi, James R. Cordy |
SimNav: Simulink navigation of model clone classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 241-246, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Bonifácio, Fausto Carvalho, Guilherme Novaes Ramos, Uirá Kulesza, Roberta Coelho |
The use of C++ exception handling constructs: A comprehensive study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 21-30, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Luca Dariz, Massimiliano Ruggeri, Michele Selvatici |
A static microcode analysis tool for programmable load drivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 265-270, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammadreza Ghanavati, Artur Andrzejak 0001 |
Automated memory leak diagnosis by regression testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 191-200, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Csaba Faragó, Péter Hegedüs, Rudolf Ferenc |
Cumulative code churn: Impact on maintainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 141-150, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Hück, Christian H. Bischof, Jean Utke |
Checking C++ codes for compatibility with operator overloading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 91-100, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muslim Chochlov, Michael English, Jim Buckley |
Using changeset descriptions as a data source to assist feature location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 51-60, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael W. Godfrey, David Lo 0001, Foutse Khomh (eds.) |
15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 978-1-4673-7529-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Martin Brandtner, Philipp Leitner 0001, Harald C. Gall |
Intent, tests, and release dependencies: Pragmatic recipes for source code integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 11-20, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gábor Szoke, Csaba Nagy 0001, Lajos Jeno Fülöp, Rudolf Ferenc, Tibor Gyimóthy |
FaultBuster: An automatic code smell refactoring toolset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 253-258, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Otávio Augusto Lazzarini Lemos, Adriano Carvalho de Paula, Hitesh Sajnani, Cristina V. Lopes |
Can the use of types and query expansion help improve large-scale code search? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 41-50, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jens Nicolay, Carlos Noguera, Coen De Roover, Wolfgang De Meuter |
Detecting function purity in JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 101-110, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gustavo Santos, Anne Etien, Nicolas Anquetil, Stéphane Ducasse, Marco Túlio Valente |
Recording and replaying system specific, source code transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 221-230, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hengyang Yu, Xiaohua Shi, Wei Feng |
LeakTracer: Tracing leaks along the way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 181-190, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniela Steidl, Florian Deissenboeck |
How do Java methods grow? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 151-160, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Masudur Rahman 0001, Chanchal K. Roy, Iman Keivanloo |
Recommending insightful comments for source code using crowdsourced knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 81-90, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kunal Banerjee 0001, Chittaranjan A. Mandal, Dipankar Sarkar 0001 |
A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 247-252, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Efthimia Aivaloglou, David Hoepelman, Felienne Hermans |
A grammar for spreadsheet formulas evaluated on two large datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 121-130, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dierk Lüdemann, Rainer Koschke |
From preprocessor-constrained parse graphs to preprocessor-constrained control flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 211-220, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stephan Renatus, Corrie Bartelheimer, Jörn Eichler |
Improving prioritization of software weaknesses using security models with AVUS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pp. 259-264, 2015, IEEE Computer Society, 978-1-4673-7529-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gábor Szoke, Gabor Antal, Csaba Nagy 0001, Rudolf Ferenc, Tibor Gyimóthy |
Bulk Fixing Coding Issues and Its Effects on Software Quality: Is It Worth Refactoring? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 95-104, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuying Liang, Weibin Sun, Matthew Might, Andrew W. Keep, David Van Horn |
Pruning, Pushdown Exception-Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 265-274, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Luis Fernando Cortes-Coy, Mario Linares Vásquez, Jairo Aponte, Denys Poshyvanyk |
On Automatically Generating Commit Messages via Summarization of Source Code Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 275-284, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wu, Bram Adams, Yann-Gaël Guéhéneuc, Giuliano Antoniol |
ACUA: API Change and Usage Auditor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 89-94, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuying Liang, Weibin Sun, Matthew Might |
Fast Flow Analysis with Godel Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 225-234, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Caracciolo, Andrei Chis, Boris Spasojevic, Mircea Lungu |
Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 71-76, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David A. Kosower, Juan J. Lopez-Villarejo, Serguei A. Roubtsov |
Flowgen: Flowchart-Based Documentation Framework for C++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 59-64, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | DeLesley Hutchins, Aaron Ballman, Dean Sutherland |
C/C++ Thread Safety Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 41-46, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Saman Bazrafshan, Rainer Koschke |
Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 1-10, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Syrine Tlili, José M. Fernandez 0001, Abdelfettah Belghith, Bilel Dridi, Soufien Hidouri |
Scalable Security Verification of Software at Compile Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 115-124, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dávid Tengeri, Árpád Beszédes, David Havas, Tibor Gyimóthy |
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 47-52, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Naohiro Kawamitsu, Takashi Ishio, Tetsuya Kanda 0001, Raula Gaikovina Kula, Coen De Roover, Katsuro Inoue |
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 305-314, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Babak Yadegari, Saumya Debray |
Bit-Level Taint Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 255-264, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Manishankar Mondal, Chanchal Kumar Roy, Kevin A. Schneider |
Automatic Identification of Important Clones for Refactoring and Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 11-20, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hitesh Sajnani, Vaibhav Saini, Cristina Videira Lopes |
A Comparative Study of Bug Patterns in Java Cloned and Non-cloned Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 21-30, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chanseok Oh, Martin Schäf, Daniel Schwartz-Narbonne, Thomas Wies |
Concolic Fault Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 135-144, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shin Yoo, David W. Binkley, Roger D. Eastman |
Seeing Is Slicing: Observation Based Slicing of Picture Description Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 175-184, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haipeng Cai, Siyuan Jiang, Raúl A. Santelices, Ying-Jie Zhang, Yiji Zhang |
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 165-174, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marwan Abi-Antoun, Sumukhi Chandrashekar, Radu Vanciu, Andrew Giang |
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 245-254, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Stocco 0001, Maurizio Leotta, Filippo Ricca, Paolo Tonella |
PESTO: A Tool for Migrating DOM-Based to Visual Web Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 65-70, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Ferenc, Laszlo Lango, István Siket, Tibor Gyimóthy, Tibor Bakota |
Source Meter Sonar Qube Plug-in. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 77-82, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 978-0-7695-5304-7 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Siyuan Jiang, Raúl A. Santelices, Mark Grechanik, Haipeng Cai |
On the Accuracy of Forward Dynamic Slicing and Its Effects on Software Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 145-154, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Md. Saidur Rahman 0002, Chanchal K. Roy |
A Change-Type Based Empirical Study on the Stability of Cloned Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 31-40, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Angela Lozano, Carlos Noguera, Viviane Jonckers |
Explaining Why Methods Change Together. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 185-194, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Cosmin Marsavina, Daniele Romano, Andy Zaidman |
Studying Fine-Grained Co-evolution Patterns of Production and Test Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 195-204, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Le An, Foutse Khomh, Bram Adams |
Supplementary Bug Fixes vs. Re-opened Bugs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 205-214, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Yoshida, Yoshinari Hachisu |
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 295-304, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aharon Abadi, Yishai A. Feldman |
A Parallel On-Demand Algorithm for Computing Interprocedural Dominators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 235-244, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Coen De Roover, Katsuro Inoue |
The Ekeko/X Program Transformation Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 53-58, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Masudur Rahman 0001, Chanchal K. Roy |
On the Use of Context in Recommending Exception Handling Code Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 285-294, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Steven Raemaekers, Arie van Deursen, Joost Visser 0001 |
Semantic Versioning versus Breaking Changes: A Study of the Maven Repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 215-224, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Wael Khreich, Mario Couture |
Total ADS: Automated Software Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 83-88, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Kargén, Nahid Shahmehri |
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 155-164, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Petiot, Bernard Botella, Jacques Julliand, Nikolai Kosmatov, Julien Signoles |
Instrumentation of Annotated C Programs for Test Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 105-114, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Malin Källén, Sverker Holmgren, Ebba Þóra Hvannberg |
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 14th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2014, Victoria, BC, Canada, September 28-29, 2014, pp. 125-134, 2014, IEEE Computer Society, 978-0-7695-5304-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Árpád Beszédes, Lajos Schrettner, Béla Csaba, Tamás Gergely, Judit Jász, Tibor Gyimóthy |
Empirical investigation of SEA-based dependence cluster properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 1-10, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tukaram B. Muske, Ankit Baid, Tushar Sanas |
Review efforts reduction by partitioning of static analysis warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 106-115, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yan Wang, Min Feng 0001, Rajiv Gupta 0001, Iulian Neamtiu |
A state alteration and inspection-based interactive debugger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 84-93, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Jbara, Dror G. Feitelson |
Characterization and assessment of the linux configuration complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 11-20, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jens Nicolay, Carlos Noguera, Coen De Roover, Wolfgang De Meuter |
Determining dynamic coupling in JavaScript using object type inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 126-135, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amin Milani Fard, Ali Mesbah 0001 |
JSNOSE: Detecting JavaScript Code Smells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013, pp. 116-125, 2013, IEEE Computer Society, 978-1-4673-5739-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|