Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSE
ICSE 2012
Generate Citations
2012 34th International Conference on Software Engineering (ICSE 2012)
June 2 2012 to June 9 2012
Zurich
Table of Contents
A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-13
by
Claire Le Goues
,
Michael Dewey-Vogt
,
Stephanie Forrest
,
Westley Weimer
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-24
by
Jian Zhou
,
Hongyu Zhang
,
David Lo
Developer prioritization in bug repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-35
by
Jifeng Xuan
,
He Jiang
,
Zhilei Ren
,
Weiqin Zou
WhoseFault: Automatic developer-to-fault assignment through fault localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-46
by
Francisco Servant
,
James A. Jones
Recovering traceability links between an API and its learning resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-57
by
Barthélémy Dagenais
,
Martin P. Robillard
Generating range fixes for software configuration
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-68
by
Yingfei Xiong
,
Arnaud Hubaux
,
Steven She
,
Krzysztof Czarnecki
Graph-based pattern-oriented, context-sensitive source code completion
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-79
by
Anh Tuan Nguyen
,
Tung Thanh Nguyen
,
Hoan Anh Nguyen
,
Ahmed Tamrawi
,
Hung Viet Nguyen
,
Jafar Al-Kofahi
,
Tien N. Nguyen
Automatic input rectification
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-90
by
Fan Long
,
Vijay Ganesh
,
Michael Carbin
,
Stelios Sidiroglou
,
Martin Rinard
Overcoming the challenges in cost estimation for distributed software projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-101
by
Narayan Ramasubbu
,
Rajesh Krishna Balan
Characterizing logging practices in open-source software
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-112
by
Ding Yuan
,
Soyeon Park
,
Yuanyuan Zhou
The impacts of software process improvement on developers: A systematic review
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Mathieu Lavallée
,
Pierre N. Robillard
Combining functional and imperative programming for multicore software: An empirical study evaluating Scala and Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-133
by
Victor Pankratius
,
Felix Schmidt
,
Gilda Garretón
Uncovering performance problems in Java applications with reference propagation profiling
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-144
by
Dacong Yan
,
Guoqing Xu
,
Atanas Rountev
Performance debugging in the large via mining millions of stack traces
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-155
by
Shi Han
,
Yingnong Dang
,
Song Ge
,
Dongmei Zhang
,
Tao Xie
Automatically finding performance problems with feedback-directed learning software testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-166
by
Mark Grechanik
,
Chen Fu
,
Qing Xie
Predicting performance via automated feature-interaction detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-177
by
Norbert Siegmund
,
Sergiy S. Kolesnikov
,
Christian Kästner
,
Sven Apel
,
Don Batory
,
Marko Rosenmüller
,
Gunter Saake
Sound empirical evidence in software testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-188
by
Gordon Fraser
,
Andrea Arcuri
Privacy and utility for defect prediction: Experiments with MORPH
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-199
by
Fayola Peters
,
Tim Menzies
Bug prediction based on fine-grained module histories
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-210
by
Hideaki Hata
,
Osamu Mizuno
,
Tohru Kikuno
Reconciling manual and automatic refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-221
by
Xi Ge
,
Quinton L. DuBose
,
Emerson Murphy-Hill
WitchDoctor: IDE support for real-time auto-completion of refactorings
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-232
by
Stephen R. Foster
,
William G. Griswold
,
Sorin Lerner
Use, disuse, and misuse of automated refactorings
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-243
by
Mohsen Vakilian
,
Nicholas Chen
,
Stas Negara
,
Balaji Ambresh Rajkumar
,
Brian P. Bailey
,
Ralph E. Johnson
Test confessions: A study of testing practices for plug-in systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-254
by
Michaela Greiler
,
Arie van Deursen
,
Margaret-Anne Storey
How do professional developers comprehend software?
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-265
by
Tobias Roehm
,
Rebecca Tiarks
,
Rainer Koschke
,
Walid Maalej
Asking and answering questions about unfamiliar APIs: An exploratory study
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-276
by
Ekwa Duala-Ekoko
,
Martin P. Robillard
Automated repair of HTML generation errors in PHP applications using string constraint solving
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-287
by
Hesam Samimi
,
Max Schäfer
,
Shay Artzi
,
Todd Millstein
,
Frank Tip
,
Laurie Hendren
Leveraging test generation and specification mining for automated bug detection without false positives
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-298
by
Michael Pradel
,
Thomas R. Gross
Axis: Automatically fixing atomicity violations through solving control constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-309
by
Peng Liu
,
Charles Zhang
CBCD: Cloned buggy code detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-320
by
Jingyue Li
,
Michael D. Ernst
Crosscutting revision control system
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-330
by
Sagi Ifrah
,
David H. Lorenz
Where does this code come from and where does it go? — Integrated code history tracker for open source systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-341
by
Katsuro Inoue
,
Yusuke Sasaki
,
Pei Xia
,
Yuki Manabe
Improving early detection of software merge conflicts
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-352
by
Mário Luís Guimarães
,
António Rito Silva
A history-based matching approach to identification of framework evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-363
by
Sichen Meng
,
Xiaoyin Wang
,
Lu Zhang
,
Hong Mei
Detecting similar software applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-374
by
Collin McMillan
,
Mark Grechanik
,
Denys Poshyvanyk
Content classification of development emails
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-385
by
Alberto Bacchelli
,
Tommaso Dal Sasso
,
Marco D'Ambros
,
Michele Lanza
Identifying Linux bug fixing patches
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-396
by
Yuan Tian
,
Julia Lawall
,
David Lo
Active refinement of clone anomaly reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-407
by
Lucia
,
David Lo
,
Lingxiao Jiang
,
Aditya Budi
Automated analysis of CSS rules to support style maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-418
by
Ali Mesbah
,
Shabnam Mirshokraie
Graph-based analysis and prediction for software evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-429
by
Pamela Bhattacharya
,
Marios Iliofotou
,
Iulian Neamtiu
,
Michalis Faloutsos
Integrated impact analysis for managing software changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-440
by
Malcom Gethers
,
Bogdan Dit
,
Huzefa Kagdi
,
Denys Poshyvanyk
Detecting and visualizing inter-worksheet smells in spreadsheets
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-451
by
Felienne Hermans
,
Martin Pinzger
,
Arie van Deursen
An empirical study about the effectiveness of debugging when random test cases are used
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-462
by
Mariano Ceccato
,
Alessandro Marchetto
,
Leonardo Mariani
,
Cu D. Nguyen
,
Paolo Tonella
Reducing confounding bias in predicate-level statistical debugging metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-473
by
Ross Gore
,
Paul F. Reynolds
BugRedux: Reproducing field failures for in-house debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-484
by
Wei Jin
,
Alessandro Orso
Object-centric debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-495
by
Jorge Ressia
,
Alexandre Bergel
,
Oscar Nierstrasz
Disengagement in pair programming: Does it matter?
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-506
by
Laura Plonka
,
Helen Sharp
,
Janet van der Linden
Ambient awareness of build status in collocated software teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-517
by
John Downs
,
Beryl Plimmer
,
John G. Hosking
What make long term contributors: Willingness and opportunity in OSS community
Full-text access may be available. Sign in or learn about subscription options.
pp. 518-528
by
Minghui Zhou
,
Audris Mockus
Development of auxiliary functions: Should you be agile? An empirical assessment of pair programming and test-first programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-539
by
Otávio Auguste Lazzarini Lemos
,
Fabiano Cutigi Ferrari
,
Fábio Fagundes Silveira
,
Alessandro Garcia
Maintaining invariant traceability through bidirectional transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-550
by
Yijun Yu
,
Yu Lin
,
Zhenjiang Hu
,
Soichiro Hidaka
,
Hiroyuki Kato
,
Lionel Montrieux
Slicing MATLAB Simulink models
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-561
by
Robert Reicherdt
,
Sabine Glesner
Partial evaluation of model transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 562-572
by
Ali Razavi
,
Kostas Kontogiannis
Partial models: Towards modeling and reasoning with uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 573-583
by
Michais Famelis
,
Rick Salay
,
Marsha Chechik
Static detection of resource contention problems in server-side scripts
Full-text access may be available. Sign in or learn about subscription options.
pp. 584-594
by
Yunhui Zheng
,
Xiangyu Zhang
Amplifying tests to validate exception handling code
Full-text access may be available. Sign in or learn about subscription options.
pp. 595-605
by
Pingyu Zhang
,
Sebastian Elbaum
MagicFuzzer: Scalable deadlock detection for large-scale applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 606-616
by
Yan Cai
,
W. K. Chan
Does organizing security patterns focus architectural choices?
Full-text access may be available. Sign in or learn about subscription options.
pp. 617-627
by
Koen Yskout
,
Riccardo Scandariato
,
Wouter Joosen
Enhancing architecture-implementation conformance with change management and support for behavioral mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 628-638
by
Yongjie Zheng
,
Richard N. Taylor
A tactic-centric approach for automating traceability of quality concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 639-649
by
Mehdi Mirakhorli
,
Yonghee Shin
,
Jane Cleland-Huang
,
Murat Cinar
Build code analysis with symbolic evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 650-660
by
Ahmed Tamrawi
,
Hoan Anh Nguyen
,
Hung Viet Nguyen
,
Tien N. Nguyen
An automated approach to generating efficient constraint solvers
Full-text access may be available. Sign in or learn about subscription options.
pp. 661-671
by
Dharini Balasubramaniam
,
Christopher Jefferson
,
Lars Kotthoff
,
Ian Miguel
,
Peter Nightingale
Simulation-based abstractions for software product-line model checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 672-682
by
Maxime Cordy
,
Andreas Classen
,
Gilles Perrouin
,
Pierre-Yves Schobbens
,
Patrick Heymans
,
Axel Legay
Using dynamic analysis to discover polynomial and array invariants
Full-text access may be available. Sign in or learn about subscription options.
pp. 683-693
by
ThanhVu Nguyen
,
Deepak Kapur
,
Westley Weimer
,
Stephanie Forrest
Metadata invariants: Checking and inferring metadata coding conventions
Full-text access may be available. Sign in or learn about subscription options.
pp. 694-704
by
Myoungkyu Song
,
Eli Tilevich
Generating obstacle conditions for requirements completeness
Full-text access may be available. Sign in or learn about subscription options.
pp. 705-715
by
Dalal Alrajeh
,
Jeff Kramer
,
Axel van Lamsweerde
,
Alessandra Russo
,
Sebastian Uchitel
make test-zesti: A symbolic execution solution for improving regression testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 716-726
by
Paul Dan Marinescu
,
Cristian Cadar
Ballerina: Automatic generation and clustering of efficient random unit tests for multithreaded code
Full-text access may be available. Sign in or learn about subscription options.
pp. 727-737
by
Adrian Nistor
,
Qingzhou Luo
,
Michael Pradel
,
Thomas R. Gross
,
Darko Marinov
On-demand test suite reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 738-748
by
Dan Hao
,
Lu Zhang
,
Xingxia Wu
,
Hong Mei
,
Gregg Rothermel
Automated detection of client-state manipulation vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 749-759
by
Anders Møller
,
Mathias Schwarz
Understanding integer overflow in C/C++
Full-text access may be available. Sign in or learn about subscription options.
pp. 760-770
by
Will Dietz
,
Peng Li
,
John Regehr
,
Vikram Adve
A large scale exploratory analysis of software vulnerability life cycles
Full-text access may be available. Sign in or learn about subscription options.
pp. 771-781
by
Muhammad Shahzad
,
Muhammad Zubair Shafiq
,
Alex X. Liu
Synthesizing API usage examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 782-792
by
Raymond P. L. Buse
,
Westley Weimer
Semi-automatically extracting FAQs to improve accessibility of software development knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 793-803
by
Stefan Henß
,
Martin Monperrus
,
Mira Mezini
Temporal analysis of API usage concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 804-814
by
Gias Uddin
,
Barthélémy Dagenais
,
Martin P. Robillard
Inferring method specifications from natural language API descriptions
Full-text access may be available. Sign in or learn about subscription options.
pp. 815-825
by
Rahul Pandita
,
Xusheng Xiao
,
Hao Zhong
,
Tao Xie
,
Stephen Oney
,
Amit Paradkar
Automatic parameter recommendation for practical API usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 826-836
by
Cheng Zhang
,
Juyuan Yang
,
Yi Zhang
,
Jing Fan
,
Xin Zhang
,
Jianjun Zhao
,
Peizhao Ou
On the naturalness of software
Full-text access may be available. Sign in or learn about subscription options.
pp. 837-847
by
Abram Hindle
,
Earl T. Barr
,
Zhendong Su
,
Mark Gabel
,
Premkumar Devanbu
Recommending source code for use in rapid software prototypes
Full-text access may be available. Sign in or learn about subscription options.
pp. 848-858
by
Collin McMillan
,
Negar Hariri
,
Denys Poshyvanyk
,
Jane Cleland-Huang
,
Bamshad Mobasher
Active code completion
Full-text access may be available. Sign in or learn about subscription options.
pp. 859-869
by
Cyrus Omar
,
Young Seok Yoon
,
Thomas D. LaToza
,
Brad A. Myers
Automated oracle creation support, or: How I learned to stop worrying about fault propagation and love mutation testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 870-880
by
Matt Staats
,
Gregory Gay
,
Mats P. E. Heimdahl
Automating test automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 881-891
by
Suresh Thummalapenta
,
Saurabh Sinha
,
Nimit Singhania
,
Satish Chandra
Stride: Search-based deterministic replay in polynomial time via bounded linkage
Full-text access may be available. Sign in or learn about subscription options.
pp. 892-902
by
Jinguo Zhou
,
Xiao Xiao
,
Charles Zhang
iTree: Efficiently discovering high-coverage configurations using interaction trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 903-913
by
Charles Song
,
Adam Porter
,
Jeffrey S. Foster
Inferring class level specifications for distributed systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 914-924
by
Sandeep Kumar
,
Siau-Cheng Khoo
,
Abhik Roychoudhury
,
David Lo
Statically checking API protocol conformance with mined multi-object specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 925-935
by
Michael Pradel
,
Ciera Jaspan
,
Jonathan Aldrich
,
Thomas R. Gross
Behavioral validation of JFSL specifications through model synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 936-946
by
Carlo Ghezzi
,
Andrea Mocci
Verifying client-side input validation functions using string analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 947-957
by
Muath Alkhalaf
,
Tevfik Bultan
,
Jose L. Gallegos
Digital formations of the powerful and the powerless (Keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 961-961
by
Saskia Sassen
Supporting sustainability with software — An industrial perspective (Keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 962-962
by
Frank-Dieter Clesle
Whither software architecture? (Keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 963-963
by
Jeff Kramer
Towards a federated cloud ecosystem (Invited industrial talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 967-967
by
Clovis Chapman
Specification patterns from research to industry: A case study in service-based applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 968-976
by
Domenico Bianculli
,
Carlo Ghezzi
,
Cesare Pautasso
,
Patrick Senti
Methodology for migration of long running process instances in a global large scale BPM environment in Credit Suisse's SOA landscape
Full-text access may be available. Sign in or learn about subscription options.
pp. 977-986
by
Tarmo Ploom
,
Stefan Scheit
,
Axel Glaser
Information needs for software development analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 987-996
by
Raymond P. L. Buse
,
Thomas Zimmermann
Software analytics in practice: Mini tutorial
Full-text access may be available. Sign in or learn about subscription options.
pp. 997-997
by
Dongmei Zhang
,
Tao Xie
Software as an engineering material: How the affordances of programming have changed and what to do about it (Invited industrial talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 998-998
by
Keith Braithwaite
Software architecture — What does it mean in industry? (Invited industrial talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 999-999
by
Eberhard Wolff
How software engineering can benefit from traditional industries — A practical experience report (Invited industrial talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1000-1000
by
Tom Sprenger
Ten years of automated code analysis at Microsoft (Invited industrial talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1001-1001
by
Wolfram Schulte
Large-scale formal verification in practice: A process perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1002-1011
by
June Andronick
,
Ross Jeffery
,
Gerwin Klein
,
Rafal Kolanski
,
Mark Staples
,
He Zhang
,
Liming Zhu
Showing 100 out of 239
Load More
Load All