Default Cover Image

2012 28th IEEE International Conference on Software Maintenance (ICSM)

Sept. 23 2012 to Sept. 28 2012

Trento, Italy Italy

ISSN: 1063-6773

ISBN: 978-1-4673-2313-0

Table of Contents

Papers
TeamFull-text access may be available. Sign in or learn about subscription options.pp. v-xi
Papers
[Copyright notice]Full-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
ForewordFull-text access may be available. Sign in or learn about subscription options.pp. iv
Papers
Table of contentsFull-text access may be available. Sign in or learn about subscription options.pp. xiii-xviii
Papers
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Research track: Session I — Program comprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 5
Papers
Research track: Session II — Testing and maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 35
Papers
Research track: Session III — Fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 66
Papers
Research track: Session IV — Maintenance issues in OO systemsFull-text access may be available. Sign in or learn about subscription options.pp. 87
Papers
Research track: Session V — Change impact analysisFull-text access may be available. Sign in or learn about subscription options.pp. 108
Papers
Research track: Session VI — Analysis of build systemsFull-text access may be available. Sign in or learn about subscription options.pp. 139
Papers
Research track: Session VII — TraceabilityFull-text access may be available. Sign in or learn about subscription options.pp. 170
Papers
Research track: Session VIII — Software changesFull-text access may be available. Sign in or learn about subscription options.pp. 201
Papers
Research track: Session IX — Textual analysisFull-text access may be available. Sign in or learn about subscription options.pp. 232
Papers
Research track: Session X — Fault correctionFull-text access may be available. Sign in or learn about subscription options.pp. 253
Papers
Research track: Session XI — CloningFull-text access may be available. Sign in or learn about subscription options.pp. 274
Papers
Research track: Session XII — MaintainabilityFull-text access may be available. Sign in or learn about subscription options.pp. 305
Papers
Research track: Session XIII — RefactoringFull-text access may be available. Sign in or learn about subscription options.pp. 336
Papers
Research track: Session XIV — Library and API evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 367
Papers
Research track: Session XV — Spreadsheet maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 398
Papers
Research track: Session XVI — Bug reportingFull-text access may be available. Sign in or learn about subscription options.pp. 419
Papers
Research track: Session XVII — Bug and warning managementFull-text access may be available. Sign in or learn about subscription options.pp. 440
Papers
Research track: Session XVIII — Clustering and modularizationFull-text access may be available. Sign in or learn about subscription options.pp. 461
Papers
Industry track: Session IFull-text access may be available. Sign in or learn about subscription options.pp. 482
Papers
Industry track: Session IIFull-text access may be available. Sign in or learn about subscription options.pp. 516
Papers
Era track: Session I — SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 566
Papers
Era track: Session II — InformationFull-text access may be available. Sign in or learn about subscription options.pp. 583
Papers
Era track: Session III — HistoryFull-text access may be available. Sign in or learn about subscription options.pp. 608
Papers
Tool demonstrations trackFull-text access may be available. Sign in or learn about subscription options.pp. 633
Papers
Doctoral symposiumFull-text access may be available. Sign in or learn about subscription options.pp. 670
Papers
List of AuthorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Papers
From off-Line to continuous on-line maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 2-3
Papers
Leveraging natural language analysis of software: Achievements, challenges, and opportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 4
Papers
An industrial case study of Coman's automated task detection algorithm: What Worked, What Didn't, and WhyFull-text access may be available. Sign in or learn about subscription options.pp. 6-14
Papers
Vasco: A visual approach to explore object churn in framework-intensive applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 15-24
Papers
What makes a good code example?: A study of programming Q&A in StackOverflowFull-text access may be available. Sign in or learn about subscription options.pp. 25-34
Papers
Testing C++ generic librariesFull-text access may be available. Sign in or learn about subscription options.pp. 36-45
Papers
Code coverage-based regression test selection and prioritization in WebKitFull-text access may be available. Sign in or learn about subscription options.pp. 46-55
Papers
Interactive fault localization leveraging simple user feedbackFull-text access may be available. Sign in or learn about subscription options.pp. 67-76
Papers
Finding errors from reverse-engineered equality models using a constraint solverFull-text access may be available. Sign in or learn about subscription options.pp. 77-86
Papers
The Order of Things: How developers sort fields and methodsFull-text access may be available. Sign in or learn about subscription options.pp. 88-97
Papers
Rejuvenating C++ programs through demacroficationFull-text access may be available. Sign in or learn about subscription options.pp. 98-107
Papers
A change impact analysis to characterize evolving program behaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 109-118
Papers
Fine-grained change impact analysis for component-based product familiesFull-text access may be available. Sign in or learn about subscription options.pp. 119-128
Papers
Configuration selection using code change impact analysis for regression testingFull-text access may be available. Sign in or learn about subscription options.pp. 129-138
Papers
Build system issues in multilanguage softwareFull-text access may be available. Sign in or learn about subscription options.pp. 140-149
Papers
Detecting semantic changes in Makefile build codeFull-text access may be available. Sign in or learn about subscription options.pp. 150-159
Papers
An empirical study of build system migrations in practice: Case studies on KDE and the Linux kernelFull-text access may be available. Sign in or learn about subscription options.pp. 160-169
Papers
Assessing the effect of requirements traceability for software maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Papers
An empirical study on requirements traceability using eye-trackingFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Papers
Recovering commit dependencies for selective code integration in software product linesFull-text access may be available. Sign in or learn about subscription options.pp. 202-211
Papers
Search-based detection of high-level model changesFull-text access may be available. Sign in or learn about subscription options.pp. 212-221
Papers
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragmentsFull-text access may be available. Sign in or learn about subscription options.pp. 222-231
Papers
LINSEN: An efficient approach to split identifiers and expand abbreviationsFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Papers
Making automatic repair for large-scale programs more efficient using weak recompilationFull-text access may be available. Sign in or learn about subscription options.pp. 254-263
Papers
The impact of bug management patterns on bug fixing: A case study of Eclipse projectsFull-text access may be available. Sign in or learn about subscription options.pp. 264-273
Papers
Things structural clones tell that simple clones don'tFull-text access may be available. Sign in or learn about subscription options.pp. 275-284
Papers
Cloning practices: Why developers clone and what can be changedFull-text access may be available. Sign in or learn about subscription options.pp. 285-294
Papers
Models are code too: Near-miss clone detection for Simulink modelsFull-text access may be available. Sign in or learn about subscription options.pp. 295-304
Papers
Do code smells reflect important maintainability aspects?Full-text access may be available. Sign in or learn about subscription options.pp. 306-315
Papers
A cost model based on software maintainabilityFull-text access may be available. Sign in or learn about subscription options.pp. 316-325
Papers
A systematic mapping study on dynamic metrics and software qualityFull-text access may be available. Sign in or learn about subscription options.pp. 326-335
Papers
Refactoring in the presence of annotationsFull-text access may be available. Sign in or learn about subscription options.pp. 337-346
When would this bug get reported?Full-text access may be available. Sign in or learn about subscription options.pp. 420-429
Papers
Search-based refactoring: Towards semantics preservationFull-text access may be available. Sign in or learn about subscription options.pp. 347-356
Papers
An empirical investigation into the impact of refactoring on regression testingFull-text access may be available. Sign in or learn about subscription options.pp. 357-366
Papers
Measuring software library stability through historical version analysisFull-text access may be available. Sign in or learn about subscription options.pp. 378-387
Papers
Inferring the data access from the clients of generic APIsFull-text access may be available. Sign in or learn about subscription options.pp. 388-397
Papers
Refactoring meets spreadsheet formulasFull-text access may be available. Sign in or learn about subscription options.pp. 399-409
Papers
Detecting code smells in spreadsheet formulasFull-text access may be available. Sign in or learn about subscription options.pp. 409-418
Papers
Modelling the ‘Hurried’ bug report reading process to summarize bug reportsFull-text access may be available. Sign in or learn about subscription options.pp. 430-439
Papers
Domain specific warnings: Are they any better?Full-text access may be available. Sign in or learn about subscription options.pp. 441-450
Papers
Triaging incoming change requests: Bug or commit history, or code authorship?Full-text access may be available. Sign in or learn about subscription options.pp. 451-460
Papers
Feature-gathering dependency-based software clustering using Dedication and ModularityFull-text access may be available. Sign in or learn about subscription options.pp. 462-471
Papers
Supervised software modularisationFull-text access may be available. Sign in or learn about subscription options.pp. 472-481
Papers
A structured approach to assess third-party library usageFull-text access may be available. Sign in or learn about subscription options.pp. 483-492
Papers
Reengineering embedded automotive softwareFull-text access may be available. Sign in or learn about subscription options.pp. 493-502
Papers
Incremental reengineering and migration of a 40 year old airport operations systemFull-text access may be available. Sign in or learn about subscription options.pp. 503-510
Papers
Dead code elimination for web systems written in PHP: Lessons learned from an industry caseFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
Papers
Sustainability guidelines for long-living software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 517-526
Papers
Facilitating enterprise software developer communication with CARESFull-text access may be available. Sign in or learn about subscription options.pp. 527-536
Papers
A framework for incremental quality analysis of large software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 537-546
Papers
Automated architectural reviews with SemmleFull-text access may be available. Sign in or learn about subscription options.pp. 557-565
Papers
Time-leverage point detection for time sensitive software maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 567-570
Papers
Inferring weak references for fixing Java memory leaksFull-text access may be available. Sign in or learn about subscription options.pp. 571-574
Papers
Move code refactoring with dynamic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 575-578
Papers
Dependence communities in source codeFull-text access may be available. Sign in or learn about subscription options.pp. 579-582
Papers
A study on repetitiveness of code completion operationsFull-text access may be available. Sign in or learn about subscription options.pp. 584-587
Papers
Vocabulary normalization improves IR-based concept locationFull-text access may be available. Sign in or learn about subscription options.pp. 588-591
Papers
Who's who in Gnome: Using LSA to merge software repository identitiesFull-text access may be available. Sign in or learn about subscription options.pp. 592-595
Papers
Automatic classification of software related microblogsFull-text access may be available. Sign in or learn about subscription options.pp. 596-599
Papers
Detecting similar applications with collaborative taggingFull-text access may be available. Sign in or learn about subscription options.pp. 600-603
Papers
Inferring semantically related software terms and their taxonomy by leveraging collaborative taggingFull-text access may be available. Sign in or learn about subscription options.pp. 604-607
Papers
Version history based source code plagiarism detection in proprietary systemsFull-text access may be available. Sign in or learn about subscription options.pp. 609-612
Papers
Applying technical stock market indicators to analyze and predict the evolvability of open source projectsFull-text access may be available. Sign in or learn about subscription options.pp. 613-616
Papers
Refactoring edit history of source codeFull-text access may be available. Sign in or learn about subscription options.pp. 617-620
Showing 100 out of 116