Default Cover Image

2010 IEEE International Conference on Software Maintenance

Sept. 12 2010 to Sept. 18 2010

Timi oara, Romania

ISBN: 978-1-4244-8630-4

Table of Contents

Papers
CommiteeFreely available from IEEE.pp. 1-4
Papers
Tool demonstrations committeeFreely available from IEEE.pp. 1-1
Papers
[Copyright notice]Freely available from IEEE.pp. 1
Papers
Additional reviewersFreely available from IEEE.pp. 1-2
Papers
Steering CommitteeFreely available from IEEE.pp. 1-1
Papers
ERA track program committeeFreely available from IEEE.pp. 1
Papers
ForewordFreely available from IEEE.pp. 1-2
Papers
Industrial track program committeeFreely available from IEEE.pp. 1
Papers
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Program CommitteeFreely available from IEEE.pp. 1-2
Papers
Title pageFreely available from IEEE.pp. 1
Papers
Certifying software robustness using program slicingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Program analysis and transformation for data-intensive system evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Reverse engineering object-oriented distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Software asset managementFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Conversion of fast inter-procedural static analysis to model checkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Empirical software evolvability - code smells and human evaluationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Improved size and effort estimation models for software maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
History-sensitive recovery of product line featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Coherent Software CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Using ontology fragments in concept locationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Extracting reusable services from legacy object-oriented systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Model-driven detection of Design PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
A Tree Kernel based approach for clone detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Understanding where requirements are implementedFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
2D and 3D visualizations in WikiDev2.0Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Combining micro-blogging and IDE interactions to support developers in their questsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
On the implementation and correctness of information system upgradesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Analyzing natural-language artifacts of the software processFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
iFL: An interactive environment for understanding feature implementationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Using clone detection to identify bugs in concurrent softwareFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
SE-CodeSearch: A scalable Semantic Web-based source code search infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Automatically repairing test cases for evolving method declarationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
A longitudinal analysis of the dependency concentration in smaller modules for open-source software productsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Automatic verification of loop invariantsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Pairwise test set calculation using k-partite graphsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Log filtering and interpretation for root cause analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Assessment of product maintainability for two space domain simulatorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
Enabling multi-tenancy: An industrial experience reportFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Extreme maintenance: Transforming Delphi into C#Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Modernizing legacy software using a System Grokking technologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
An approach to improving software inspections performanceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Verifying the design of an outsourced COBOL system with IntensiVEFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Cost drivers of software corrective maintenance: An empirical study in two companiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Migrating from COBOL to JavaFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
Adapting COTS productsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
Fuzzy set approach for automatic tagging in evolving softwareFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Deriving metric thresholds from benchmark dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Domain-based change propagation analysis: An enterprise system case studyFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
Fine-grained incremental learning and multi-feature tossing graphs to improve bug triagingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
WEBDIFF: Automated identification of cross-browser issues in web applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A lightweight transformational approach to support large scale adaptive changesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Supporting change propagation in UML modelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Automatic identification of class stereotypesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Exploring the impact of context sensitivity on blended analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A human study of fault localization accuracyFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Using Relational Topic Models to capture coupling among classes in object-oriented software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A case study in matching service descriptions to implementations in an existing systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Software process recovery using Recovered Unified Process ViewsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Index-based code clone detection: incremental, distributed, scalableFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
Revisiting common bug prediction findings using effort-aware modelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Comprehensive evaluation of association measures for fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Software modularization operatorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Unit tests as API usage examplesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Studying the impact of dependency network measures on software qualityFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Guided test generation for coverage criteriaFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Recovery and analysis of transaction scope from scattered information in Java Enterprise ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A framework for the evaluation of specification miners based on finite state machinesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Template-based reconstruction of complex refactoringsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Recovering traceability links between unit tests and classes under test: An improved methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Understanding parallelism-inhibiting dependences in sequential Java programsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
Theil index for aggregation of software metrics valuesFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
An eye tracking study on the effects of layout in understanding the role of design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Hidden dependencies in software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Swing to SWT and back: Patterns for API migration by wrappingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Sampling program qualityFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Test generation via Dynamic Symbolic Execution for mutation testingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
A cross-browser web application testing toolFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
SQUANER: A framework for monitoring the quality of software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
An algorithmic debugger for JavaFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
MooseJEE: A moose extension to enable the assessment of JEAsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Papers
TopicXP: Exploring topics in source code using Latent Dirichlet AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Automatic checking of license complianceFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Papers
A practical tutorial on refactoring for parallelismFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Teaching undergraduate software engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Papers
Migrating software testing to the cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1
Showing 95 out of 95