Default Cover Image

2012 34th International Conference on Software Engineering (ICSE 2012)

June 2 2012 to June 9 2012

Zurich

Table of Contents

Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reportsFull-text access may be available. Sign in or learn about subscription options.pp. 14-24
Developer prioritization in bug repositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 25-35
WhoseFault: Automatic developer-to-fault assignment through fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 36-46
Recovering traceability links between an API and its learning resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 47-57
Generating range fixes for software configurationFull-text access may be available. Sign in or learn about subscription options.pp. 58-68
Automatic input rectificationFull-text access may be available. Sign in or learn about subscription options.pp. 80-90
Overcoming the challenges in cost estimation for distributed software projectsFull-text access may be available. Sign in or learn about subscription options.pp. 91-101
Characterizing logging practices in open-source softwareFull-text access may be available. Sign in or learn about subscription options.pp. 102-112
The impacts of software process improvement on developers: A systematic reviewFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Uncovering performance problems in Java applications with reference propagation profilingFull-text access may be available. Sign in or learn about subscription options.pp. 134-144
Performance debugging in the large via mining millions of stack tracesFull-text access may be available. Sign in or learn about subscription options.pp. 145-155
Automatically finding performance problems with feedback-directed learning software testingFull-text access may be available. Sign in or learn about subscription options.pp. 156-166
Sound empirical evidence in software testingFull-text access may be available. Sign in or learn about subscription options.pp. 178-188
Privacy and utility for defect prediction: Experiments with MORPHFull-text access may be available. Sign in or learn about subscription options.pp. 189-199
Bug prediction based on fine-grained module historiesFull-text access may be available. Sign in or learn about subscription options.pp. 200-210
Reconciling manual and automatic refactoringFull-text access may be available. Sign in or learn about subscription options.pp. 211-221
WitchDoctor: IDE support for real-time auto-completion of refactoringsFull-text access may be available. Sign in or learn about subscription options.pp. 222-232
Use, disuse, and misuse of automated refactoringsFull-text access may be available. Sign in or learn about subscription options.pp. 233-243
Test confessions: A study of testing practices for plug-in systemsFull-text access may be available. Sign in or learn about subscription options.pp. 244-254
How do professional developers comprehend software?Full-text access may be available. Sign in or learn about subscription options.pp. 255-265
Asking and answering questions about unfamiliar APIs: An exploratory studyFull-text access may be available. Sign in or learn about subscription options.pp. 266-276
Leveraging test generation and specification mining for automated bug detection without false positivesFull-text access may be available. Sign in or learn about subscription options.pp. 288-298
Axis: Automatically fixing atomicity violations through solving control constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 299-309
CBCD: Cloned buggy code detectorFull-text access may be available. Sign in or learn about subscription options.pp. 310-320
Crosscutting revision control systemFull-text access may be available. Sign in or learn about subscription options.pp. 321-330
Improving early detection of software merge conflictsFull-text access may be available. Sign in or learn about subscription options.pp. 342-352
A history-based matching approach to identification of framework evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 353-363
Detecting similar software applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 364-374
Content classification of development emailsFull-text access may be available. Sign in or learn about subscription options.pp. 375-385
Identifying Linux bug fixing patchesFull-text access may be available. Sign in or learn about subscription options.pp. 386-396
Active refinement of clone anomaly reportsFull-text access may be available. Sign in or learn about subscription options.pp. 397-407
Automated analysis of CSS rules to support style maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 408-418
Graph-based analysis and prediction for software evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 419-429
Integrated impact analysis for managing software changesFull-text access may be available. Sign in or learn about subscription options.pp. 430-440
Detecting and visualizing inter-worksheet smells in spreadsheetsFull-text access may be available. Sign in or learn about subscription options.pp. 441-451
Reducing confounding bias in predicate-level statistical debugging metricsFull-text access may be available. Sign in or learn about subscription options.pp. 463-473
BugRedux: Reproducing field failures for in-house debuggingFull-text access may be available. Sign in or learn about subscription options.pp. 474-484
Object-centric debuggingFull-text access may be available. Sign in or learn about subscription options.pp. 485-495
Disengagement in pair programming: Does it matter?Full-text access may be available. Sign in or learn about subscription options.pp. 496-506
Ambient awareness of build status in collocated software teamsFull-text access may be available. Sign in or learn about subscription options.pp. 507-517
What make long term contributors: Willingness and opportunity in OSS communityFull-text access may be available. Sign in or learn about subscription options.pp. 518-528
Maintaining invariant traceability through bidirectional transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 540-550
Slicing MATLAB Simulink modelsFull-text access may be available. Sign in or learn about subscription options.pp. 551-561
Partial evaluation of model transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 562-572
Partial models: Towards modeling and reasoning with uncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 573-583
Static detection of resource contention problems in server-side scriptsFull-text access may be available. Sign in or learn about subscription options.pp. 584-594
Amplifying tests to validate exception handling codeFull-text access may be available. Sign in or learn about subscription options.pp. 595-605
MagicFuzzer: Scalable deadlock detection for large-scale applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 606-616
Does organizing security patterns focus architectural choices?Full-text access may be available. Sign in or learn about subscription options.pp. 617-627
Enhancing architecture-implementation conformance with change management and support for behavioral mappingFull-text access may be available. Sign in or learn about subscription options.pp. 628-638
A tactic-centric approach for automating traceability of quality concernsFull-text access may be available. Sign in or learn about subscription options.pp. 639-649
Build code analysis with symbolic evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 650-660
An automated approach to generating efficient constraint solversFull-text access may be available. Sign in or learn about subscription options.pp. 661-671
Using dynamic analysis to discover polynomial and array invariantsFull-text access may be available. Sign in or learn about subscription options.pp. 683-693
Metadata invariants: Checking and inferring metadata coding conventionsFull-text access may be available. Sign in or learn about subscription options.pp. 694-704
Generating obstacle conditions for requirements completenessFull-text access may be available. Sign in or learn about subscription options.pp. 705-715
make test-zesti: A symbolic execution solution for improving regression testingFull-text access may be available. Sign in or learn about subscription options.pp. 716-726
On-demand test suite reductionFull-text access may be available. Sign in or learn about subscription options.pp. 738-748
Automated detection of client-state manipulation vulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 749-759
Understanding integer overflow in C/C++Full-text access may be available. Sign in or learn about subscription options.pp. 760-770
A large scale exploratory analysis of software vulnerability life cyclesFull-text access may be available. Sign in or learn about subscription options.pp. 771-781
Synthesizing API usage examplesFull-text access may be available. Sign in or learn about subscription options.pp. 782-792
Semi-automatically extracting FAQs to improve accessibility of software development knowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 793-803
Temporal analysis of API usage conceptsFull-text access may be available. Sign in or learn about subscription options.pp. 804-814
Inferring method specifications from natural language API descriptionsFull-text access may be available. Sign in or learn about subscription options.pp. 815-825
Automatic parameter recommendation for practical API usageFull-text access may be available. Sign in or learn about subscription options.pp. 826-836
On the naturalness of softwareFull-text access may be available. Sign in or learn about subscription options.pp. 837-847
Recommending source code for use in rapid software prototypesFull-text access may be available. Sign in or learn about subscription options.pp. 848-858
Active code completionFull-text access may be available. Sign in or learn about subscription options.pp. 859-869
Automating test automationFull-text access may be available. Sign in or learn about subscription options.pp. 881-891
Stride: Search-based deterministic replay in polynomial time via bounded linkageFull-text access may be available. Sign in or learn about subscription options.pp. 892-902
iTree: Efficiently discovering high-coverage configurations using interaction treesFull-text access may be available. Sign in or learn about subscription options.pp. 903-913
Inferring class level specifications for distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 914-924
Statically checking API protocol conformance with mined multi-object specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 925-935
Behavioral validation of JFSL specifications through model synthesisFull-text access may be available. Sign in or learn about subscription options.pp. 936-946
Verifying client-side input validation functions using string analysisFull-text access may be available. Sign in or learn about subscription options.pp. 947-957
Digital formations of the powerful and the powerless (Keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 961-961
Supporting sustainability with software — An industrial perspective (Keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 962-962
Whither software architecture? (Keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 963-963
Towards a federated cloud ecosystem (Invited industrial talk)Full-text access may be available. Sign in or learn about subscription options.pp. 967-967
Information needs for software development analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 987-996
Software analytics in practice: Mini tutorialFull-text access may be available. Sign in or learn about subscription options.pp. 997-997
Software architecture — What does it mean in industry? (Invited industrial talk)Full-text access may be available. Sign in or learn about subscription options.pp. 999-999
How software engineering can benefit from traditional industries — A practical experience report (Invited industrial talk)Full-text access may be available. Sign in or learn about subscription options.pp. 1000-1000
Ten years of automated code analysis at Microsoft (Invited industrial talk)Full-text access may be available. Sign in or learn about subscription options.pp. 1001-1001
Large-scale formal verification in practice: A process perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1002-1011
Showing 100 out of 239