Default Cover Image

2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER)

March 2 2015 to March 6 2015

Montreal, QC, Canada

Table of Contents

[Title pages]Freely available from IEEE.pp. i-ii
ContentsFreely available from IEEE.pp. 1-6
SANER 2015 committeesFreely available from IEEE.pp. viii-xiv
On whose shoulders? (Keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
Checkpoint alpha (keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 2-2
Modeling the evolution of development topics using Dynamic Topic ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 3-12
Understanding developers' natural language queries with interactive clarificationFull-text access may be available. Sign in or learn about subscription options.pp. 13-22
Mining Multi-level API Usage PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 23-32
An observational study on API usage constraints and their documentationFull-text access may be available. Sign in or learn about subscription options.pp. 33-42
Improving pattern tracking with a language-aware tree differencing algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 43-52
Measuring the quality of design pattern detection resultsFull-text access may be available. Sign in or learn about subscription options.pp. 53-62
Are PHP applications ready for Hack?Full-text access may be available. Sign in or learn about subscription options.pp. 63-72
Does JavaScript software embrace classes?Full-text access may be available. Sign in or learn about subscription options.pp. 73-82
Evolution analysis for Accessibility Excessiveness in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
A software quality model for RPGFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
JCHARMING: A bug reproduction approach using crash traces and directed model checkingFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
Automated extraction of failure reproduction steps from user interaction tracesFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
Misery loves company: CrowdStacking traces to aid problem detectionFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Code review: Veni, ViDI, viciFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Would static analysis tools help developers with code reviews?Full-text access may be available. Sign in or learn about subscription options.pp. 161-170
Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projectsFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Scaling up evaluation of code search tools through developer usage metricsFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Optimized feature selection towards functional and non-functional requirements in Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Threshold-free code clone detection for a large-scale heterogeneous Java repositoryFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
Impact analysis based on a global hierarchical Object GraphFull-text access may be available. Sign in or learn about subscription options.pp. 221-230
A framework for cost-effective dependence-based dynamic impact analysisFull-text access may be available. Sign in or learn about subscription options.pp. 231-240
Circular dependencies and change-proneness: An empirical studyFull-text access may be available. Sign in or learn about subscription options.pp. 241-250
An empirical study of work fragmentation in software evolution tasksFull-text access may be available. Sign in or learn about subscription options.pp. 251-260
Library functions identification in binary code by using graph isomorphism testingsFull-text access may be available. Sign in or learn about subscription options.pp. 261-270
A non-convex abstract domain for the value analysis of binariesFull-text access may be available. Sign in or learn about subscription options.pp. 271-280
Precision vs. scalability: Context sensitive analysis with prefix approximationFull-text access may be available. Sign in or learn about subscription options.pp. 281-290
MG++: Memory graphs for analyzing dynamic data structuresFull-text access may be available. Sign in or learn about subscription options.pp. 291-300
SQA-Profiles: Rule-based activity profiles for Continuous Integration environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 301-310
Cross-project build co-change predictionFull-text access may be available. Sign in or learn about subscription options.pp. 311-320
The influence of App churn on App success and StackOverflow discussionsFull-text access may be available. Sign in or learn about subscription options.pp. 321-330
Beyond support and confidence: Exploring interestingness measures for rule-based specification miningFull-text access may be available. Sign in or learn about subscription options.pp. 331-340
Untangling fine-grained code changesFull-text access may be available. Sign in or learn about subscription options.pp. 341-350
A comprehensive and scalable method for analyzing fine-grained source code change patternsFull-text access may be available. Sign in or learn about subscription options.pp. 351-360
Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changesFull-text access may be available. Sign in or learn about subscription options.pp. 361-370
Identifying the exact fixing actions of static rule violationFull-text access may be available. Sign in or learn about subscription options.pp. 371-379
CloCom: Mining existing source code for automatic comment generationFull-text access may be available. Sign in or learn about subscription options.pp. 380-389
amAssist: In-IDE ambient search of online programming resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 390-398
Reverse engineering time-series interaction data from screen-captured videosFull-text access may be available. Sign in or learn about subscription options.pp. 399-408
Niche vs. breadth: Calculating expertise over time through a fine-grained analysisFull-text access may be available. Sign in or learn about subscription options.pp. 409-418
Protecting web applications via Unicode extensionFull-text access may be available. Sign in or learn about subscription options.pp. 419-428
A search-based approach to multi-view clustering of software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 429-438
CEL: Touching software modeling in essenceFull-text access may be available. Sign in or learn about subscription options.pp. 439-448
NIRMAL: Automatic identification of software relevant tweets leveraging language modelFull-text access may be available. Sign in or learn about subscription options.pp. 449-458
A static code analysis tool for control system softwareFull-text access may be available. Sign in or learn about subscription options.pp. 459-463
RbG: A documentation generator for scientific and engineering softwareFull-text access may be available. Sign in or learn about subscription options.pp. 464-468
Historef: A tool for edit history refactoringFull-text access may be available. Sign in or learn about subscription options.pp. 469-473
ClonePacker: A tool for clone set visualizationFull-text access may be available. Sign in or learn about subscription options.pp. 474-478
GiLA: GitHub label analyzerFull-text access may be available. Sign in or learn about subscription options.pp. 479-483
SPCP-Miner: A tool for mining code clones that are important for refactoring or trackingFull-text access may be available. Sign in or learn about subscription options.pp. 484-488
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained loggingFull-text access may be available. Sign in or learn about subscription options.pp. 489-493
Umple: A framework for Model Driven Development of Object-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 494-498
Assessing the bus factor of Git repositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 499-503
Old habits die hard: Why refactoring for understandability does not give immediate benefitsFull-text access may be available. Sign in or learn about subscription options.pp. 504-507
Bash2py: A bash to Python translatorFull-text access may be available. Sign in or learn about subscription options.pp. 508-511
On implementational variations in static analysis toolsFull-text access may be available. Sign in or learn about subscription options.pp. 512-515
Tracking known security vulnerabilities in proprietary software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 516-519
Trusting a library: A study of the latency to adopt the latest Maven releaseFull-text access may be available. Sign in or learn about subscription options.pp. 520-524
Evolution of dynamic feature usage in PHPFull-text access may be available. Sign in or learn about subscription options.pp. 525-529
Towards incremental model slicing for delta-oriented software product linesFull-text access may be available. Sign in or learn about subscription options.pp. 530-534
Understanding software performance regressions using differential flame graphsFull-text access may be available. Sign in or learn about subscription options.pp. 535-539
TextRank based search term identification for software change tasksFull-text access may be available. Sign in or learn about subscription options.pp. 540-544
Query expansion via WordNet for effective code searchFull-text access may be available. Sign in or learn about subscription options.pp. 545-549
Explore the evolution of development topics via on-line LDAFull-text access may be available. Sign in or learn about subscription options.pp. 555-559
Code coverage and test suite effectiveness: Empirical study with real bugs in large systemsFull-text access may be available. Sign in or learn about subscription options.pp. 560-564
Detection of violation causes in reflexion modelsFull-text access may be available. Sign in or learn about subscription options.pp. 565-569
A comparative study on the effectiveness of part-of-speech tagging techniques on bug reportsFull-text access may be available. Sign in or learn about subscription options.pp. 570-574
Efficiently identifying object production sitesFull-text access may be available. Sign in or learn about subscription options.pp. 575-579
Where was this SQL query executed? a static concept location approachFull-text access may be available. Sign in or learn about subscription options.pp. 580-584
Taint analysis of manual service compositions using Cross-Application Call GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 585-589
TXL source transformation in practiceFull-text access may be available. Sign in or learn about subscription options.pp. 590-591
Software risk management in practice: Shed light on your software productFull-text access may be available. Sign in or learn about subscription options.pp. 592-594
Software architecture reconstruction: Why? What? How?Full-text access may be available. Sign in or learn about subscription options.pp. 595-595
SKilLed communication for toolchainsFull-text access may be available. Sign in or learn about subscription options.pp. 596-596
The impact of column-orientation on the quality of class inheritance mapping specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 597-597
Improving the integration process of large software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 598-598
Handling the differential evolution of software artefacts: A framework for consistency managementFull-text access may be available. Sign in or learn about subscription options.pp. 599-600
Towards a framework for analysis, transformation, and manipulation of MakefilesFull-text access may be available. Sign in or learn about subscription options.pp. 601-602
Towards a framework for automatic correction of anti-patternsFull-text access may be available. Sign in or learn about subscription options.pp. 603-604
Towards an ontology-based context-aware meta-model for the software domainFull-text access may be available. Sign in or learn about subscription options.pp. 605-606
Investigating modern release engineering practicesFull-text access may be available. Sign in or learn about subscription options.pp. 607-608
Showing 90 out of 90