Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SANER
SANER 2015
Generate Citations
2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER)
March 2 2015 to March 6 2015
Montreal, QC, Canada
Table of Contents
[Title pages]
Freely available from IEEE.
pp. i-ii
Contents
Freely available from IEEE.
pp. 1-6
Message from the chairs
Freely available from IEEE.
pp. iii-vii
by
Yann-Gael Gueheneuc
,
Alexander Serebrenik
,
Bram Adams
,
Naouel Moha
,
Nikolaos Tsantalis
,
Ralf Lammel
,
Peter C. Rigby
,
Jens Krinke
,
Bonita Sharif
,
Jane Huffman Hayes
,
Marianne Huchard
,
Foutse Khomh
,
Wahab Hamou-Lhadj
,
Francesca Arcelli Fontana
,
Emily Hill
SANER 2015 committees
Freely available from IEEE.
pp. viii-xiv
On whose shoulders? (Keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Jane Cleland-Huang
Checkpoint alpha (keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-2
by
Boris Debić
Modeling the evolution of development topics using Dynamic Topic Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-12
by
Jiajun Hu
,
Xiaobing Sun
,
David Lo
,
Bin Li
Understanding developers' natural language queries with interactive clarification
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Shihai Jiang
,
Liwei Shen
,
Xin Peng
,
L. V. Zhaojin
,
Wenyun Zhao
Mining Multi-level API Usage Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-32
by
Mohamed Aymen Saied
,
Omar Benomar
,
Hani Abdeen
,
Houari Sahraoui
An observational study on API usage constraints and their documentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-42
by
Mohamed Aymen Saied
,
Houari Sahraoui
,
Bruno Dufour
Improving pattern tracking with a language-aware tree differencing algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-52
by
Nicolas Palix
,
Jean-Remy Falleri
,
Julia Lawall
Measuring the quality of design pattern detection results
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-62
by
Shouzheng Yang
,
Ayesha Manzer
,
Vassilios Tzerpos
Are PHP applications ready for Hack?
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-72
by
Laleh Eshkevari
,
Fabien Dos Santos
,
James R. Cordy
,
Giuliano Antoniol
Does JavaScript software embrace classes?
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Leonardo Humberto Silva
,
Miguel Ramos
,
Marco Tulio Valente
,
Alexandre Bergel
,
Nicolas Anquetil
Evolution analysis for Accessibility Excessiveness in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Kazuo Kobori
,
Makoto Matsushita
,
Katsuro Inoue
A software quality model for RPG
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-100
by
Gergely Ladanyi
,
Zoltan Toth
,
Rudolf Ferenc
,
Tibor Keresztesi
JCHARMING: A bug reproduction approach using crash traces and directed model checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-110
by
Mathieu Nayrolles
,
Abdelwahab Hamou-Lhadj
,
Sofiene Tahar
,
Alf Larsson
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Luay Alawneh
,
Abdelwahab Hamou-Lhadj
,
Jameleddine Hassine
Automated extraction of failure reproduction steps from user interaction traces
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-130
by
Tobias Roehm
,
Stefan Nosovic
,
Bernd Bruegge
Misery loves company: CrowdStacking traces to aid problem detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-140
by
Tommaso Dal Sasso
,
Andrea Mocci
,
Michele Lanza
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-150
by
Patanamon Thongtanunam
,
Chakkrit Tantithamthavorn
,
Raula Gaikovina Kula
,
Norihiro Yoshida
,
Hajimu Iida
,
Ken-ichi Matsumoto
Code review: Veni, ViDI, vici
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-160
by
Yuriy Tymchuk
,
Andrea Mocci
,
Michele Lanza
Would static analysis tools help developers with code reviews?
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Sebastiano Panichella
,
Venera Arnaoudova
,
Massimiliano Di Penta
,
Giuliano Antoniol
Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Rodrigo Morales
,
Shane McIntosh
,
Foutse Khomh
Scaling up evaluation of code search tools through developer usage metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Kostadin Damevski
,
David C. Shepherd
,
Lori Pollock
Optimized feature selection towards functional and non-functional requirements in Software Product Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Xiaoli Lian
,
Li Zhang
Threshold-free code clone detection for a large-scale heterogeneous Java repository
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-210
by
Iman Keivanloo
,
Feng Zhang
,
Ying Zou
Detecting duplicate bug reports with software engineering domain knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-220
by
Karan Aggarwal
,
Tanner Rutgers
,
Finbarr Timbers
,
Abram Hindle
,
Russ Greiner
,
Eleni Stroulia
Impact analysis based on a global hierarchical Object Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-230
by
Marwan Abi-Antoun
,
Yibin Wang
,
Ebrahim Khalaj
,
Andrew Giang
,
Vaclav Rajlich
A framework for cost-effective dependence-based dynamic impact analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-240
by
Haipeng Cai
,
Raul Santelices
Circular dependencies and change-proneness: An empirical study
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-250
by
Tosin Daniel Oyetoyan
,
Jean-Remy Falleri
,
Jens Dietrich
,
Kamil Jezek
An empirical study of work fragmentation in software evolution tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-260
by
Heider Sanchez
,
Romain Robbes
,
Victor M. Gonzalez
Library functions identification in binary code by using graph isomorphism testings
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-270
by
Jing Qiu
,
Xiaohong Su
,
Peijun Ma
A non-convex abstract domain for the value analysis of binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-280
by
Sven Mattsen
,
Arne Wichmann
,
Sibylle Schupp
Precision vs. scalability: Context sensitive analysis with prefix approximation
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-290
by
Raveendra Kumar Medicherla
,
Raghavan Komondoor
MG++: Memory graphs for analyzing dynamic data structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-300
by
Vineet Singh
,
Rajiv Gupta
,
Iulian Neamtiu
SQA-Profiles: Rule-based activity profiles for Continuous Integration environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-310
by
Martin Brandtner
,
Sebastian C. Muller
,
Philipp Leitner
,
Harald C. Gall
Cross-project build co-change prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-320
by
Xin Xia
,
David Lo
,
Shane McIntosh
,
Emad Shihab
,
Ahmed E. Hassan
The influence of App churn on App success and StackOverflow discussions
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-330
by
Latifa Guerrouj
,
Shams Azad
,
Peter C. Rigby
Beyond support and confidence: Exploring interestingness measures for rule-based specification mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-340
by
Tien-Duy B. Le
,
David Lo
Untangling fine-grained code changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-350
by
Martin Dias
,
Alberto Bacchelli
,
Georgios Gousios
,
Damien Cassou
,
Stephane Ducasse
A comprehensive and scalable method for analyzing fine-grained source code change patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-360
by
Masatomo Hashimoto
,
Akira Mori
,
Tomonori Izumida
Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-370
by
Qingtao Jiang
,
Xin Peng
,
Hai Wang
,
Zhenchang Xing
,
Wenyun Zhao
Identifying the exact fixing actions of static rule violation
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-379
by
Hayatou Oumarou
,
Nicolas Anquetil
,
Anne Etien
,
Stephane Ducasse
,
Kolyang Dina Taiwe
CloCom: Mining existing source code for automatic comment generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-389
by
Edmund Wong
,
Taiyue Liu
,
Lin Tan
amAssist: In-IDE ambient search of online programming resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-398
by
Hongwei Li
,
Xuejiao Zhao
,
Zhenchang Xing
,
Lingfeng Bao
,
Xin Peng
,
Dongjing Gao
,
Wenyun Zhao
Reverse engineering time-series interaction data from screen-captured videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-408
by
Lingfeng Bao
,
Jing Li
,
Zhenchang Xing
,
Xinyu Wang
,
Bo Zhou
Niche vs. breadth: Calculating expertise over time through a fine-grained analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-418
by
Jose Ricardo da Silva Jr.
,
Esteban Clua
,
Leonardo Murta
,
Anita Sarma
Protecting web applications via Unicode extension
Full-text access may be available. Sign in or learn about subscription options.
pp. 419-428
by
Boze Zekan
,
Mark Shtern
,
Vassilios Tzerpos
A search-based approach to multi-view clustering of software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-438
by
Amir M. Saeidi
,
Jurriaan Hage
,
Ravi Khadka
,
Slinger Jansen
CEL: Touching software modeling in essence
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-448
by
Remo Lemma
,
Michele Lanza
,
Andrea Mocci
NIRMAL: Automatic identification of software relevant tweets leveraging language model
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-458
by
Abhishek Sharma
,
Yuan Tian
,
David Lo
A static code analysis tool for control system software
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Sreeja Nair
,
Raoul Jetley
,
Anil Nair
,
Stefan Hauck-Stattelmann
RbG: A documentation generator for scientific and engineering software
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-468
by
Michael Moser
,
Josef Pichler
,
Gunther Fleck
,
Michael Witlatschil
Historef: A tool for edit history refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-473
by
Shinpei Hayashi
,
Daiki Hoshino
,
Jumpei Matsuda
,
Motoshi Saeki
,
Takayuki Omori
,
Katsuhisa Maruyama
ClonePacker: A tool for clone set visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-478
by
Hiroaki Murakami
,
Yoshiki Higo
,
Shinji Kusumoto
GiLA: GitHub label analyzer
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-483
by
Javier Luis Cánovas Izquierdo
,
Valerio Cosentino
,
Belén Rolandi
,
Alexandre Bergel
,
Jordi Cabot
SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-488
by
Manishankar Mondal
,
Chanchal K. Roy
,
Kevin A. Schneider
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-493
by
Haipeng Cai
,
Raul Santelices
Umple: A framework for Model Driven Development of Object-Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-498
by
Miguel A. Garzon
,
Hamoud Aljamaan
,
Timothy C. Lethbridge
Assessing the bus factor of Git repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-503
by
Valerio Cosentino
,
Javier Luis Canovas Izquierdo
,
Jordi Cabot
Old habits die hard: Why refactoring for understandability does not give immediate benefits
Full-text access may be available. Sign in or learn about subscription options.
pp. 504-507
by
Erik Ammerlaan
,
Wim Veninga
,
Andy Zaidman
Bash2py: A bash to Python translator
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-511
by
Ian J. Davis
,
Mike Wexler
,
Cheng Zhang
,
Richard C. Holt
,
Theresa Weber
On implementational variations in static analysis tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 512-515
by
Tukaram Muske
,
Prasad Bokil
Tracking known security vulnerabilities in proprietary software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-519
by
Mircea Cadariu
,
Eric Bouwers
,
Joost Visser
,
Arie van Deursen
Trusting a library: A study of the latency to adopt the latest Maven release
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-524
by
Raula Gaikovina Kula
,
Daniel M. German
,
Takashi Ishio
,
Katsuro Inoue
Evolution of dynamic feature usage in PHP
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-529
by
Mark Hills
Towards incremental model slicing for delta-oriented software product lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 530-534
by
Sascha Lity
,
Hauke Baller
,
Ina Schaefer
Understanding software performance regressions using differential flame graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-539
by
Cor-Paul Bezemer
,
Johan Pouwelse
,
Brendan Gregg
TextRank based search term identification for software change tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-544
by
Mohammad Masudur Rahman
,
Chanchal K. Roy
Query expansion via WordNet for effective code search
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-549
by
Meili Lu
,
Xiaobing Sun
,
Shaowei Wang
,
David Lo
,
Yucong Duan
Exploring the use of labels to categorize issues in Open-Source Software projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 550-554
by
Jordi Cabot
,
Javier Luis Canovas Izquierdo
,
Valerio Cosentino
,
Belen Rolandi
Explore the evolution of development topics via on-line LDA
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-559
by
Jiajun Hu
,
Xiaobing Sun
,
Bin Li
Code coverage and test suite effectiveness: Empirical study with real bugs in large systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-564
by
Pavneet Singh Kochhar
,
Ferdian Thung
,
David Lo
Detection of violation causes in reflexion models
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-569
by
Sebastian Herold
,
Michael English
,
Jim Buckley
,
Steve Counsell
,
Mel O Cinneide
A comparative study on the effectiveness of part-of-speech tagging techniques on bug reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 570-574
by
Yuan Tian
,
David Lo
Efficiently identifying object production sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-579
by
Alejandro Infante
,
Alexandre Bergel
Where was this SQL query executed? a static concept location approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 580-584
by
Csaba Nagy
,
Loup Meurice
,
Anthony Cleve
Taint analysis of manual service compositions using Cross-Application Call Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-589
by
Marc-Andre Laverdiere
,
Bernhard J. Berger
,
Ettore Merloz
TXL source transformation in practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-591
by
James R. Cordy
Software risk management in practice: Shed light on your software product
Full-text access may be available. Sign in or learn about subscription options.
pp. 592-594
by
Jens Knodel
,
Matthias Naab
,
Eric Bouwers
,
Joost Visser
Software architecture reconstruction: Why? What? How?
Full-text access may be available. Sign in or learn about subscription options.
pp. 595-595
by
Mehdi Mirakhorli
SKilLed communication for toolchains
Full-text access may be available. Sign in or learn about subscription options.
pp. 596-596
by
Timm Felden
The impact of column-orientation on the quality of class inheritance mapping specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 597-597
by
Martin Lorenz
Improving the integration process of large software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-598
by
Yujuan Jiang
Handling the differential evolution of software artefacts: A framework for consistency management
Full-text access may be available. Sign in or learn about subscription options.
pp. 599-600
by
Ildiko Pete
,
Dharini Balasubramaniam
Towards a framework for analysis, transformation, and manipulation of Makefiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-602
by
Douglas Martin
Towards a framework for automatic correction of anti-patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 603-604
by
Rodrigo Morales
Towards an ontology-based context-aware meta-model for the software domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 605-606
by
Mostafa Erfani
Investigating modern release engineering practices
Full-text access may be available. Sign in or learn about subscription options.
pp. 607-608
by
Md Tajmilur Rahman
Showing 90 out of 90