Default Cover Image

2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)

Sept. 29 2015 to Oct. 1 2015

Bremen, Germany

Table of Contents

Author indexFreely available from IEEE.pp. 610-611
ContentsFreely available from IEEE.pp. xvi-xx
MessagesFreely available from IEEE.pp. iii-ix
ICSME 2015 organizationFreely available from IEEE.pp. x-xv
Software history under the lens: A study on why and how developers examine itFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Developers' perception of co-change patterns: An empirical studyFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Investigating naming convention adherence in Java referencesFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Developing a model of loop actions by mining loop characteristics from a large code corpusFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Delta extraction: An abstraction technique to comprehend why two objects could be relatedFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Modeling changeset topics for feature locationFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Four eyes are better than two: On the impact of code reviews on software qualityFull-text access may be available. Sign in or learn about subscription options.pp. 81-90
A comparative study on the bug-proneness of different types of code clonesFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
An empirical study of bugs in test codeFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
Investigating code review quality: Do people and participation matter?Full-text access may be available. Sign in or learn about subscription options.pp. 111-120
Evaluating clone detection tools with BigCloneBenchFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Uncovering dependence clusters and linchpin functionsFull-text access may be available. Sign in or learn about subscription options.pp. 141-150
Forked and integrated variants in an open-source firmware projectFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Towards automating dynamic analysis for behavioral design pattern detectionFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Practical and accurate pinpointing of configuration errors using static analysisFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Deterministic dynamic race detection across program versionsFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Program specialization and verification using file format specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
An empirical evaluation of ant build maintenance using FormigaFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
Scripting parametric refactorings in Java to retrofit design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
System specific, source code transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 221-230
A decision support system to refactor class cyclesFull-text access may be available. Sign in or learn about subscription options.pp. 231-240
On the role of developer's scattered changes in bug predictionFull-text access may be available. Sign in or learn about subscription options.pp. 241-250
How do developers react to API evolution? The Pharo ecosystem caseFull-text access may be available. Sign in or learn about subscription options.pp. 251-260
Exploring API method parameter recommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 271-280
What are the characteristics of high-rated apps? A case study on free Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 301-310
GreenAdvisor: A tool for analyzing the impact of software evolution on energy consumptionFull-text access may be available. Sign in or learn about subscription options.pp. 311-320
Apiwave: Keeping track of API popularity and migrationFull-text access may be available. Sign in or learn about subscription options.pp. 321-323
UrbanIt: Visualizing repositories everywhereFull-text access may be available. Sign in or learn about subscription options.pp. 324-326
ePadEvo: A tool for the detection of behavioral design patternsFull-text access may be available. Sign in or learn about subscription options.pp. 327-329
PARC: Recommending API methods parametersFull-text access may be available. Sign in or learn about subscription options.pp. 330-332
ArchFLoc: Locating and explaining architectural features in running web applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 333-335
WSDarwin: A web application for the support of REST service evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 336-338
DUM-ToolFull-text access may be available. Sign in or learn about subscription options.pp. 339-341
How developers detect and fix performance bottlenecks in Android appsFull-text access may be available. Sign in or learn about subscription options.pp. 352-361
Code smells in spreadsheet formulas revisited on an industrial datasetFull-text access may be available. Sign in or learn about subscription options.pp. 372-380
Web usage patterns of developersFull-text access may be available. Sign in or learn about subscription options.pp. 381-390
Identifying wasted effort in the field via developer interaction dataFull-text access may be available. Sign in or learn about subscription options.pp. 391-400
Is this code written in English? A study of the natural language of comments and identifiers in practiceFull-text access may be available. Sign in or learn about subscription options.pp. 401-410
Impact assessment for vulnerabilities in open-source software librariesFull-text access may be available. Sign in or learn about subscription options.pp. 411-420
Do automatic refactorings improve maintainability? An industrial case studyFull-text access may be available. Sign in or learn about subscription options.pp. 429-438
Efficient regression testing based on test history: An industrial evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 449-457
Migrating legacy control software to multi-core hardwareFull-text access may be available. Sign in or learn about subscription options.pp. 458-466
Query by example in large-scale code repositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 467-476
Reverse engineering a visual age applicationFull-text access may be available. Sign in or learn about subscription options.pp. 487-496
Using static analysis for knowledge extraction from industrial User InterfacesFull-text access may be available. Sign in or learn about subscription options.pp. 497-500
Constrained feature selection for localizing faultsFull-text access may be available. Sign in or learn about subscription options.pp. 501-505
Crowdsourced bug triagingFull-text access may be available. Sign in or learn about subscription options.pp. 506-510
Toward improving graftability on automated program repairFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
Mining Stack Overflow for discovering error patterns in SQL queriesFull-text access may be available. Sign in or learn about subscription options.pp. 516-520
Towards purity-guided refactoring in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 521-525
Fitness workout for fat interfaces: Be slim, clean, and flexibleFull-text access may be available. Sign in or learn about subscription options.pp. 526-530
Choosing your weapons: On sentiment analysis tools for software engineering researchFull-text access may be available. Sign in or learn about subscription options.pp. 531-535
Assessing developer contribution with repository mining-based metricsFull-text access may be available. Sign in or learn about subscription options.pp. 536-540
What's hot in software engineering Twitter space?Full-text access may be available. Sign in or learn about subscription options.pp. 541-545
Validating metric thresholds with developers: An early resultFull-text access may be available. Sign in or learn about subscription options.pp. 546-550
Towards a survival analysis of database framework usage in Java projectsFull-text access may be available. Sign in or learn about subscription options.pp. 551-555
Exploring the use of deep learning for feature locationFull-text access may be available. Sign in or learn about subscription options.pp. 556-560
Keecle: Mining key architecturally relevant classes using dynamic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 566-570
Combining software interrelationship data across heterogeneous software repositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 571-575
Recovering transitive traceability links among software artifactsFull-text access may be available. Sign in or learn about subscription options.pp. 576-580
Live object exploration: Observing and manipulating behavior and state of Java objectsFull-text access may be available. Sign in or learn about subscription options.pp. 581-585
Supporting newcomers in software development projectsFull-text access may be available. Sign in or learn about subscription options.pp. 586-589
Advances in software product quality measurement and its applications in software evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 590-593
Treating software quality as a first-class entityFull-text access may be available. Sign in or learn about subscription options.pp. 594-597
Detection strategies of smells in web software developmentFull-text access may be available. Sign in or learn about subscription options.pp. 598-601
Code smells in highly configurable softwareFull-text access may be available. Sign in or learn about subscription options.pp. 602-605
A model-based approach to software refactoringFull-text access may be available. Sign in or learn about subscription options.pp. 606-609
Showing 83 out of 83