Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSME
ICSME 2015
Generate Citations
2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)
Sept. 29 2015 to Oct. 1 2015
Bremen, Germany
Table of Contents
Author index
Freely available from IEEE.
pp. 610-611
Contents
Freely available from IEEE.
pp. xvi-xx
Messages
Freely available from IEEE.
pp. iii-ix
ICSME 2015 organization
Freely available from IEEE.
pp. x-xv
Software history under the lens: A study on why and how developers examine it
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Mihai Codoban
,
Sruti Srinivasa Ragavan
,
Danny Dig
,
Brian Bailey
To fix or to learn? How production bias affects developers' information foraging during debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
David Piorkowski
,
Scott D. Fleming
,
Christopher Scaffidi
,
Margaret Burnett
,
Irwin Kwan
,
Austin Z. Henley
,
Jamie Macbeth
,
Charles Hill
,
Amber Horvath
Developers' perception of co-change patterns: An empirical study
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Luciana L. Silva
,
Marco Tulio Valente
,
Marcelo de A. Maia
,
Nicolas Anquetil
When and why developers adopt and change software licenses
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Christopher Vendome
,
Mario Linares-Vasquez
,
Gabriele Bavota
,
Massimiliano Di Penta
,
Daniel M. German
,
Denys Poshyvanyk
Investigating naming convention adherence in Java references
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Simon Butler
,
Michel Wermelinger
,
Yijun Yu
Developing a model of loop actions by mining loop characteristics from a large code corpus
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Xiaoran Wang
,
Lori Pollock
,
K. Vijay-Shanker
Delta extraction: An abstraction technique to comprehend why two objects could be related
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Naoya Nitta
,
Tomohiro Matsuoka
Modeling changeset topics for feature location
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-80
by
Christopher S. Corley
,
Kelly L. Kashuda
,
Nicholas A. Kraft
Four eyes are better than two: On the impact of code reviews on software quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-90
by
Gabriele Bavota
,
Barbara Russo
A comparative study on the bug-proneness of different types of code clones
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-100
by
Manishankar Mondal
,
Chanchal K. Roy
,
Kevin A. Schneider
An empirical study of bugs in test code
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-110
by
Arash Vahabzadeh
,
Amin Milani Fard
,
Ali Mesbah
Investigating code review quality: Do people and participation matter?
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Oleksii Kononenko
,
Olga Baysal
,
Latifa Guerrouj
,
Yaxin Cao
,
Michael W. Godfrey
Inter-smell relations in industrial and open source systems: A replication and comparative analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-130
by
Aiko Yamashita
,
Marco Zanoni
,
Francesca Arcelli Fontana
,
Bartosz Walter
Evaluating clone detection tools with BigCloneBench
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-140
by
Jeffrey Svajlenko
,
Chanchal K. Roy
Uncovering dependence clusters and linchpin functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-150
by
David Binkley
,
Arpad Beszedes
,
Syed Islam
,
Judit Jasz
,
Bela Vancsics
Forked and integrated variants in an open-source firmware project
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-160
by
Stefan Stanciulescu
,
Sandro Schulze
,
Andrzej Wasowski
Towards automating dynamic analysis for behavioral design pattern detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Andrea De Lucia
,
Vincenzo Deufemia
,
Carmine Gravino
,
Michele Risi
Practical and accurate pinpointing of configuration errors using static analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Zhen Dong
,
Artur Andrzejak
,
Kun Shao
Deterministic dynamic race detection across program versions
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Sri Varun Poluri
,
Murali Krishna Ramanathan
Program specialization and verification using file format specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Raveendra Kumar Medicherla
,
Raghavan Komondoor
,
S. Narendran
An empirical evaluation of ant build maintenance using Formiga
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-210
by
Ryan Hardt
,
Ethan V. Munson
Scripting parametric refactorings in Java to retrofit design patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-220
by
Jongwook Kim
,
Don Batory
,
Danny Dig
System specific, source code transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-230
by
Gustavo Santos
,
Nicolas Anquetil
,
Anne Etien
,
Stephane Ducasse
,
Marco Tulio Valente
A decision support system to refactor class cycles
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-240
by
Tosin Daniel Oyetoyan
,
Daniela Soares Cruzes
,
Christian Thurmann-Nielsen
On the role of developer's scattered changes in bug prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-250
by
Dario Di Nucci
,
Fabio Palomba
,
Sandro Siravo
,
Gabriele Bavota
,
Rocco Oliveto
,
Andrea De Lucia
How do developers react to API evolution? The Pharo ecosystem case
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-260
by
André Hora
,
Romain Robbes
,
Nicolas Anquetil
,
Anne Etien
,
Stéphane Ducasse
,
Marco Tulio Valente
Who should review this change?: Putting text and file location analyses together for more accurate recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-270
by
Xin Xia
,
David Lo
,
Xinyu Wang
,
Xiaohu Yang
Exploring API method parameter recommendations
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-280
by
Muhammad Asaduzzaman
,
Chanchal K. Roy
,
Samiul Monir
,
Kevin A. Schneider
How can i improve my app? Classifying user reviews for software maintenance and evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-290
by
Sebastiano Panichella
,
Andrea Di Sorbo
,
Emitza Guzman
,
Corrado A. Visaggio
,
Gerardo Canfora
,
Harald C. Gall
User reviews matter! Tracking crowdsourced reviews to support evolution of successful apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-300
by
Fabio Palomba
,
Mario Linares-Vasquez
,
Gabriele Bavota
,
Rocco Oliveto
,
Massimiliano Di Penta
,
Denys Poshyvanyk
,
Andrea De Lucia
What are the characteristics of high-rated apps? A case study on free Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-310
by
Yuan Tian
,
Meiyappan Nagappan
,
David Lo
,
Ahmed E. Hassan
GreenAdvisor: A tool for analyzing the impact of software evolution on energy consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-320
by
Karan Aggarwal
,
Abram Hindle
,
Eleni Stroulia
Apiwave: Keeping track of API popularity and migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-323
by
Andre Hora
,
Marco Tulio Valente
UrbanIt: Visualizing repositories everywhere
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-326
by
Andrea Ciani
,
Roberto Minelli
,
Andrea Mocci
,
Michele Lanza
ePadEvo: A tool for the detection of behavioral design patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-329
by
Andrea De Lucia
,
Vincenzo Deufemia
,
Carmine Gravino
,
Michele Risi
,
Ciro Pirolli
PARC: Recommending API methods parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-332
by
Muhammad Asaduzzaman
,
Chanchal K. Roy
,
Kevin A. Schneider
ArchFLoc: Locating and explaining architectural features in running web applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-335
by
Yan Gao
,
Daqing Hou
WSDarwin: A web application for the support of REST service evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-338
by
Marios Fokaefs
,
Mihai Oprescu
,
Eleni Stroulia
DUM-Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-341
by
Simone Romano
,
Giuseppe Scanniello
An empirical study on the handling of crash reports in a large software company: An experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-351
by
Abdou Maiga
,
Abdelwahab Hamou-Lhadj
,
Mathieu Nayrolles
,
Korosh Koochekian Sabor
,
Alf Larsson
How developers detect and fix performance bottlenecks in Android apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-361
by
Mario Linares-Vasquez
,
Christopher Vendome
,
Qi Luo
,
Denys Poshyvanyk
Challenges for maintenance of PLC-software and its related hardware for automated production systems: Selected industrial Case Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-371
by
Birgit Vogel-Heuser
,
Juliane Fischer
,
Susanne Rosch
,
Stefan Feldmann
,
Sebastian Ulewicz
Code smells in spreadsheet formulas revisited on an industrial dataset
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-380
by
Bas Jansen
,
Felienne Hermans
Web usage patterns of developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-390
by
Christopher S. Corley
,
Federico Lois
,
Sebastian Quezada
Identifying wasted effort in the field via developer interaction data
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-400
by
Gergo Balogh
,
Gabor Antal
,
Arpad Beszedes
,
Laszlo Vidacs
,
Tibor Gyimothy
,
Adam Zoltan Vegh
Is this code written in English? A study of the natural language of comments and identifiers in practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-410
by
Timo Pawelka
,
Elmar Juergens
Impact assessment for vulnerabilities in open-source software libraries
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-420
by
Henrik Plate
,
Serena Elisa Ponta
,
Antonino Sabetta
Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-428
by
Aiko Yamashita
Do automatic refactorings improve maintainability? An industrial case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-438
by
Gabor Szoke
,
Csaba Nagy
,
Peter Hegedus
,
Rudolf Ferenc
,
Tibor Gyimothy
An empirical evaluation of the effectiveness of inspection scenarios developed from a defect repository
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-448
by
Kiyotaka Kasubuchi
,
Shuji Morisaki
,
Akiko Yoshida
,
Chikako Ogawa
Efficient regression testing based on test history: An industrial evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-457
by
Edward Dunn Ekelund
,
Emelie Engstrom
Migrating legacy control software to multi-core hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-466
by
Michael Wahler
,
Raphael Eidenbenz
,
Carsten Franke
,
Yvonne-Anne Pignolet
Query by example in large-scale code repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-476
by
Vipin Balachandran
Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-486
by
Ravi Khadka
,
Prajan Shrestha
,
Bart Klein
,
Amir Saeidi
,
Jurriaan Hage
,
Slinger Jansen
,
Edwin van Dis
,
Magiel Bruntink
Reverse engineering a visual age application
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-496
by
Harry M. Sneed
,
Chris Verhoef
Using static analysis for knowledge extraction from industrial User Interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-500
by
Bernhard Dorninger
,
Josef Pichler
,
Albin Kern
Constrained feature selection for localizing faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-505
by
Tien-Duy B. Le
,
David Lo
,
Ming Li
Crowdsourced bug triaging
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-510
by
Ali Sajedi Badashian
,
Abram Hindle
,
Eleni Stroulia
Toward improving graftability on automated program repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
Soichi Sumi
,
Yoshiki Higo
,
Keisuke Hotta
,
Shinji Kusumoto
Mining Stack Overflow for discovering error patterns in SQL queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-520
by
Csaba Nagy
,
Anthony Cleve
Towards purity-guided refactoring in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 521-525
by
Jiachen Yang
,
Keisuke Hotta
,
Yoshiki Higo
,
Shinji Kusumoto
Fitness workout for fat interfaces: Be slim, clean, and flexible
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-530
by
Spyros Kranas
,
Apostolos V. Zarras
,
Panos Vassiliadis
Choosing your weapons: On sentiment analysis tools for software engineering research
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-535
by
Robbert Jongeling
,
Subhajit Datta
,
Alexander Serebrenik
Assessing developer contribution with repository mining-based metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-540
by
Jalerson Lima
,
Christoph Treude
,
Fernando Figueira Filho
,
Uira Kulesza
What's hot in software engineering Twitter space?
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-545
by
Abhishek Sharma
,
Yuan Tian
,
David Lo
Validating metric thresholds with developers: An early result
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-550
by
Paloma Oliveira
,
Marco Tulio Valente
,
Alexandre Bergel
,
Alexander Serebrenik
Towards a survival analysis of database framework usage in Java projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-555
by
Mathieu Goeminne
,
Tom Mens
Exploring the use of deep learning for feature location
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-560
by
Christopher S. Corley
,
Kostadin Damevski
,
Nicholas A. Kraft
Using stereotypes in the automatic generation of natural language summaries for C++ methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-565
by
Nahla J. Abid
,
Natalia Dragan
,
Michael L. Collard
,
Jonathan I. Maletic
Keecle: Mining key architecturally relevant classes using dynamic analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 566-570
by
Liliane do Nascimento Vale
,
Marcelo de A. Maia
Combining software interrelationship data across heterogeneous software repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 571-575
by
Nikola Ilo
,
Johann Grabner
,
Thomas Artner
,
Mario Bernhart
,
Thomas Grechenig
Recovering transitive traceability links among software artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 576-580
by
Kazuki Nishikawa
,
Hironori Washizaki
,
Yoshiaki Fukazawa
,
Keishi Oshima
,
Ryota Mibe
Live object exploration: Observing and manipulating behavior and state of Java objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 581-585
by
Benjamin Biegel
,
Benedikt Lesch
,
Stephan Diehl
Supporting newcomers in software development projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-589
by
Sebastiano Panichella
Advances in software product quality measurement and its applications in software evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-593
by
Peter Hegedus
Treating software quality as a first-class entity
Full-text access may be available. Sign in or learn about subscription options.
pp. 594-597
by
Yuriy Tymchuk
Detection strategies of smells in web software development
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-601
by
Mauricio F. Aniche
Code smells in highly configurable software
Full-text access may be available. Sign in or learn about subscription options.
pp. 602-605
by
Wolfram Fenske
A model-based approach to software refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 606-609
by
Ioana Verebi
Showing 83 out of 83