Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSM
ICSM 2010
Generate Citations
2010 IEEE International Conference on Software Maintenance
Sept. 12 2010 to Sept. 18 2010
Timi oara, Romania
ISBN: 978-1-4244-8630-4
Table of Contents
Papers
Commitee
Freely available from IEEE.
pp. 1-4
Papers
Tool demonstrations committee
Freely available from IEEE.
pp. 1-1
Papers
[Copyright notice]
Freely available from IEEE.
pp. 1
Papers
Additional reviewers
Freely available from IEEE.
pp. 1-2
Papers
Steering Committee
Freely available from IEEE.
pp. 1-1
Papers
ERA track program committee
Freely available from IEEE.
pp. 1
Papers
Foreword
Freely available from IEEE.
pp. 1-2
by
Radu Marinescu
,
Michele Lanza
,
Andrian Marcus
Papers
Industrial track program committee
Freely available from IEEE.
pp. 1
Papers
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
Program Committee
Freely available from IEEE.
pp. 1-2
Papers
Title page
Freely available from IEEE.
pp. 1
Papers
Certifying software robustness using program slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Mohammad Abdallah
,
Malcolm Munro
,
Keith Gallagher
Papers
Program analysis and transformation for data-intensive system evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anthony Cleve
Papers
Reverse engineering object-oriented distributed systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dan C. Cosma
Papers
Software asset management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Martin Jakubicka
Papers
Conversion of fast inter-procedural static analysis to model checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Dominic Letarte
Papers
Empirical software evolvability - code smells and human evaluations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mika V. Mantyla
Papers
Improved size and effort estimation models for software maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Vu Nguyen
Papers
History-sensitive recovery of product line features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Camila Nunes
,
Alessandro Garcia
,
Carlos Lucena
Papers
Coherent Software Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Frank Steinbruckner
Papers
Using ontology fragments in concept location
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Leon A. Wilson
Papers
Physical and conceptual identifier dispersion: Measures and relation to fault proneness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Venera Arnaoudova
,
Laleh Eshkevari
,
Rocco Oliveto
,
Yann-Gael Gueheneuc
,
Giuliano Antoniol
Papers
Extracting reusable services from legacy object-oriented systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Liang Bao
,
Chao Yin
,
Weigang He
,
Jun Ge
,
Ping Chen
Papers
Playing with refactoring: Identifying extract class opportunities through game theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Gabriele Bavota
,
Rocco Oliveto
,
Andrea De Lucia
,
Giuliano Antoniol
,
Yann-Gael Gueheneuc
Papers
Model-driven detection of Design Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mario Luca Bernardi
,
Giuseppe Antonio Di Lucca
Papers
A Tree Kernel based approach for clone detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Anna Corazza
,
Sergio Di Martino
,
Valerio Maggio
,
Giuseppe Scanniello
Papers
Understanding where requirements are implemented
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Benedikt Burgstaller
,
Alexander Egyed
Papers
2D and 3D visualizations in WikiDev2.0
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Marios Fokaefs
,
Diego Serrano
,
Brendan Tansey
,
Eleni Stroulia
Papers
Combining micro-blogging and IDE interactions to support developers in their quests
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Anja Guzzi
,
Martin Pinzger
,
Arie van Deursen
Papers
On the implementation and correctness of information system upgrades
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Klaus Haller
Papers
Analyzing natural-language artifacts of the software process
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Maryam Hasan
,
Eleni Stroulia
,
Denilson Barbosa
,
Manar Alalfi
Papers
iFL: An interactive environment for understanding feature implementations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shinpei Hayashi
,
Katsuyuki Sekine
,
Motoshi Saeki
Papers
Using clone detection to identify bugs in concurrent software
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Kevin Jalbert
,
Jeremy S. Bradbury
Papers
SE-CodeSearch: A scalable Semantic Web-based source code search infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Iman Keivanloo
,
Laleh Roostapour
,
Philipp Schugerl
,
Juergen Rilling
Papers
Automatically repairing test cases for evolving method declarations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mehdi Mirzaaghaei
,
Fabrizio Pastore
,
Mauro Pezze
Papers
A longitudinal analysis of the dependency concentration in smaller modules for open-source software products
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mohammed Aziz Parande
,
Gunes Koru
Papers
Automatic verification of loop invariants
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Olivier Ponsini
,
Helene Collavizza
,
Carine Fedele
,
Claude Michel
,
Michel Rueher
Papers
Pairwise test set calculation using k-partite graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Elke Salecker
,
Sabine Glesner
Papers
Log filtering and interpretation for root cause analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hamzeh Zawawy
,
Kostas Kontogiannis
,
John Mylopoulos
Papers
Assessment of product maintainability for two space domain simulators
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tiago L. Alves
Papers
Enabling multi-tenancy: An industrial experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Cor-Paul Bezemer
,
Andy Zaidman
,
Bart Platzbeecker
,
Toine Hurkmans
,
Aad 't Hart
Papers
Extreme maintenance: Transforming Delphi into C#
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
John Brant
,
Don Roberts
,
Bill Plendl
,
Jeff Prince
Papers
Modernizing legacy software using a System Grokking technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yanjindulam Dajsuren
,
Maayan Goldstein
,
Dany Moshkovich
Papers
An approach to improving software inspections performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Andre L. Ferreira
,
Ricardo J. Machado
,
Jose G. Silva
,
Rui F. Batista
,
Lino Costa
,
Mark C. Paulk
Papers
Verifying the design of an outsourced COBOL system with IntensiVE
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Andy Kellens
,
Carlos Noguera
,
Theo D'Hondt
,
Luc Jorissen
,
Bart Van Passel
Papers
Cost drivers of software corrective maintenance: An empirical study in two companies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jingyue Li
,
Tor Stalhane
,
Jan M. W. Kristiansen
,
Reidar Conradi
Papers
Migrating from COBOL to Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Harry M. Sneed
Papers
Adapting COTS products
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
David Wile
,
Robert Balzer
,
Neil Goldman
,
Marcelo Tallis
,
Alexander Egyed
,
Tim Hollebeek
Papers
Fuzzy set approach for automatic tagging in evolving software
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jafar M. Al-Kofahi
,
Ahmed Tamrawi
,
Tung Thanh Nguyen
,
Hoan Anh Nguyen
,
Tien N. Nguyen
Papers
Deriving metric thresholds from benchmark data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Tiago L. Alves
,
Christiaan Ypma
,
Joost Visser
Papers
Domain-based change propagation analysis: An enterprise system case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Amir Aryani
,
Ian D. Peake
,
Margaret Hamilton
Papers
Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Pamela Bhattacharya
,
Iulian Neamtiu
Papers
Using multivariate time series and association rules to detect logical change coupling: An empirical study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Gerardo Canfora
,
Michele Ceccarelli
,
Luigi Cerulo
,
Massimiliano Di Penta
Papers
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mariano Ceccato
,
Paolo Tonella
Papers
WEBDIFF: Automated identification of cross-browser issues in web applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Shauvik Roy Choudhary
,
Husayn Versee
,
Alessandro Orso
Papers
A lightweight transformational approach to support large scale adaptive changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Michael L. Collard
,
Jonathan I. Maletic
,
Brian P. Robinson
Papers
Supporting change propagation in UML models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hoa Khanh Dam
,
Michael Winikoff
Papers
Automatic identification of class stereotypes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Natalia Dragan
,
Michael L. Collard
,
Jonathan I. Maletic
Papers
Exploring the impact of context sensitivity on blended analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Marc Fisher
,
Bruno Dufour
,
Shrutarshi Basu
,
Barbara G. Ryder
Papers
A human study of fault localization accuracy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Zachary P. Fry
,
Westley Weimer
Papers
Effect of test completeness and redundancy measurement on post release failures — An industrial experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Tamas Gergely
,
Arpad Beszedes
,
Tibor Gyimothy
,
Milan Imre Gyalai
Papers
Using Relational Topic Models to capture coupling among classes in object-oriented software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Malcom Gethers
,
Denys Poshyvanyk
Papers
A case study in matching service descriptions to implementations in an existing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hari S. Gupta
,
Deepak D'Souza
,
Raghavan Komondoor
,
Girish M. Rama
Papers
Software process recovery using Recovered Unified Process Views
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Abram Hindle
,
Michael W. Godfrey
,
Richard C. Holt
Papers
Index-based code clone detection: incremental, distributed, scalable
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Benjamin Hummel
,
Elmar Juergens
,
Lars Heinemann
,
Michael Conradt
Papers
Revisiting common bug prediction findings using effort-aware models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yasutaka Kamei
,
Shinsuke Matsumoto
,
Akito Monden
,
Ken-ichi Matsumoto
,
Bram Adams
,
Ahmed E. Hassan
Papers
Automatic test case selection and generation for regression testing of composite service based on extensible BPEL flow graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Bixin Li
,
Dong Qiu
,
Shunhui Ji
,
Di Wang
Papers
Comprehensive evaluation of association measures for fault localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Lucia
,
David Lo
,
Lingxiao Jiang
,
Aditya Budi
Papers
Software modularization operators
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Girish Maskeri Rama
,
Naineet Patel
Papers
Unit tests as API usage examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Seyed Mehdi Nasehi
,
Frank Maurer
Papers
Studying the impact of dependency network measures on software quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Thanh H. D. Nguyen
,
Bram Adams
,
Ahmed E. Hassan
Papers
Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Steffen M. Olbrich
,
Daniela S. Cruzes
,
Dag I.K. Sjoberg
Papers
Guided test generation for coverage criteria
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Rahul Pandita
,
Tao Xie
,
Nikolai Tillmann
,
Jonathan de Halleux
Papers
Recovery and analysis of transaction scope from scattered information in Java Enterprise Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Fabrizio Perin
,
Tudor Girba
,
Oscar Nierstrasz
Papers
A framework for the evaluation of specification miners based on finite state machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Michael Pradel
,
Philipp Bichsel
,
Thomas R. Gross
Papers
Template-based reconstruction of complex refactorings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kyle Prete
,
Napol Rachatasumrit
,
Nikita Sudan
,
Miryung Kim
Papers
Recovering traceability links between unit tests and classes under test: An improved method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Abdallah Qusef
,
Rocco Oliveto
,
Andrea De Lucia
Papers
Understanding parallelism-inhibiting dependences in sequential Java programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Atanas Rountev
,
Kevin Van Valkenburgh
,
Dacong Yan
,
P. Sadayappan
Papers
Theil index for aggregation of software metrics values
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Alexander Serebrenik
,
Mark van den Brand
Papers
An eye tracking study on the effects of layout in understanding the role of design patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Bonita Sharif
,
Jonathan I. Maletic
Papers
Hidden dependencies in software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Radu Vanciu
,
Vaclav Rajlich
Swing to SWT and back: Patterns for API migration by wrapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Thiago Tonelli Bartolomei
,
Krzysztof Czarnecki
,
Ralf Lämmel
Papers
Sampling program quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Hongyu Zhang
,
Rongxin Wu
Papers
Test generation via Dynamic Symbolic Execution for mutation testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Lingming Zhang
,
Tao Xie
,
Lu Zhang
,
Nikolai Tillmann
,
Jonathan de Halleux
,
Hong Mei
Papers
A cross-browser web application testing tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Shauvik Roy Choudhary
,
Husayn Versee
,
Alessandro Orso
Papers
An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Andrea De Lucia
,
Vincenzo Deufemia
,
Carmine Gravino
,
Michele Risi
Papers
SQUANER: A framework for monitoring the quality of software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Nicolas Haderer
,
Foutse Khomh
,
Giuliano Antoniol
Papers
An algorithmic debugger for Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
David Insa
,
Josep Silva
Papers
MAGISTER: Quality assurance of Magic applications for software developers and end users
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Csaba Nagy
,
Laszlo Vidacs
,
Rudolf Ferenc
,
Tibor Gyimothy
,
Ferenc Kocsis
,
Istvan Kovacs
Papers
MooseJEE: A moose extension to enable the assessment of JEAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Fabrizio Perin
Papers
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Trevor Savage
,
Bogdan Dit
,
Malcom Gethers
,
Denys Poshyvanyk
Papers
Automatic checking of license compliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Hongyu Zhang
,
Bei Shi
,
Lu Zhang
Papers
A practical tutorial on refactoring for parallelism
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Danny Dig
Papers
Teaching undergraduate software engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Vaclav Rajlich
Papers
Migrating software testing to the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Scott Tilley
,
Tauhida Parveen
Showing 95 out of 95