Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SANER
SANER 2017
Generate Citations
2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)
Feb. 20 2017 to Feb. 24 2017
Klagenfurt, Austria
Table of Contents
Author index
Freely available from IEEE.
pp. 579-580
Contents
Freely available from IEEE.
pp. xi-xvi
Message from the chairs
Freely available from IEEE.
pp. iii-iii
by
Martin Pinzger
,
Gabriele Bavota
,
Andrian Marcus
Committees and additional reviewers
Freely available from IEEE.
pp. iv-ix
SANER 2017 sponsors and supporters
Freely available from IEEE.
pp. x-x
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Engin Kirda
An empirical comparison of dependency issues in OSS packaging ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-12
by
Alexandre Decan
,
Tom Mens
,
Maëlick Claes
Detecting similar repositories on GitHub
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-23
by
Yun Zhang
,
David Lo
,
Pavneet Singh Kochhar
,
Xin Xia
,
Quanlai Li
,
Jianling Sun
Code of conduct in open source projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-33
by
Parastou Tourani
,
Bram Adams
,
Alexander Serebrenik
Socio-technical evolution of the Ruby ecosystem in GitHub
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-44
by
Eleni Constantinou
,
Tom Mens
StiCProb: A novel feature mining approach using conditional probability
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-55
by
Yutian Tang
,
Hareton Leung
HDSKG: Harvesting domain specific knowledge graph from content of webpages
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-67
by
Xuejiao Zhao
,
Zhenchang Xing
,
Muhammad Ashad Kabir
,
Naoya Sawada
,
Jing Li
,
Shang-Wei Lin
Analyzing closeness of code dependencies for improving IR-based Traceability Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-78
by
Hongyu Kuang
,
Jia Nie
,
Hao Hu
,
Patrick Rempel
,
Jian Lü
,
Alexander Egyed
,
Patrick Mäder
STRICT: Information retrieval based search term identification for concept location
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-90
by
Mohammad Masudur Rahman
,
Chanchal K. Roy
Analyzing reviews and code of mobile apps for better release planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-102
by
Adelina Ciurumelea
,
Andreas Schaufelbühl
,
Sebastiano Panichella
,
Harald C. Gall
Software-based energy profiling of Android apps: Simple, efficient and reliable?
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-114
by
Dario Di Nucci
,
Fabio Palomba
,
Antonio Prota
,
Annibale Panichella
,
Andy Zaidman
,
Andrea De Lucia
Investigating the energy impact of Android smells
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-126
by
Antonin Carette
,
Mehdi Adel Ait Younes
,
Geoffrey Hecht
,
Naouel Moha
,
Romain Rouvoy
Automated generation of consistency-achieving model editors
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-137
by
Patrick Neubauer
,
Robert Bill
,
Tanja Mayerhofer
,
Manuel Wimmer
Historical and impact analysis of API breaking changes: A large-scale study
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-147
by
Laerte Xavier
,
Aline Brito
,
Andre Hora
,
Marco Tulio Valente
Reducing redundancies in multi-revision code analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-159
by
Carol V. Alexandru
,
Sebastiano Panichella
,
Harald C. Gall
Recommending source code locations for system specific transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-170
by
Gustavo Santos
,
Klérisson V. R. Paixão
,
Nicolas Anquetil
,
Anne Etien
,
Marcelo de Almeida Maia
,
Stéphane Ducasse
Extracting executable transformations from distilled code changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-181
by
Reinout Stevens
,
Coen De Roover
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-192
by
Roberto Tiella
,
Mariano Ceccato
The dark side of event sourcing: Managing data conversion
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-204
by
Michiel Overeem
,
Marten Spoor
,
Slinger Jansen
Automatically generating natural language descriptions for object-related statement sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-216
by
Xiaoran Wang
,
Lori Pollock
,
K. Vijay-Shanker
Shorter identifier names take longer to comprehend
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-227
by
Johannes Hofmeister
,
Janet Siegmund
,
Daniel V. Holt
Lexical categories for source code identifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-239
by
Christian D. Newman
,
Reem S. AlSuhaibani
,
Michael L. Collard
,
Jonathan I. Maletic
Computing counter-examples for privilege protection losses using security models
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-249
by
Marc-André Laverdière
,
Ettore Merlo
Enriching in-IDE process information with fine-grained source code history
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-260
by
Sebastian Proksch
,
Sarah Nadi
,
Sven Amann
,
Mira Mezini
How to gamify software engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-271
by
Tommaso Dal Sasso
,
Andrea Mocci
,
Michele Lanza
,
Ebrisa Mastrodicasa
Scalable tag recommendation for software information sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-282
by
Pingyi Zhou
,
Jin Liu
,
Zijiang Yang
,
Guangyou Zhou
Stack Overflow: A code laundering platform?
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-293
by
Le An
,
Ons Mlouki
,
Foutse Khomh
,
Giuliano Antoniol
An empirical study of code smells in JavaScript projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-305
by
Amir Saboury
,
Pooya Musavi
,
Foutse Khomh
,
Giulio Antoniol
Antipatterns causing memory bloat: A case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-315
by
Kamil Jezek
,
Richard Lipka
Variant-preserving refactorings for migrating cloned products to a product line
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-326
by
Wolfram Fenske
,
Jens Meinicke
,
Sandro Schulze
,
Steffen Schulze
,
Gunter Saake
Efficient method extraction for automatic elimination of type-3 clones
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-337
by
Ran Ettinger
,
Shmuel Tyszberowicz
,
Shay Menaia
Spreadsheet testing in practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-348
by
Sohon Roy
,
Felienne Hermans
,
Arie van Deursen
Dynamic patch generation for null pointer exceptions using metaprogramming
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-358
by
Thomas Durieux
,
Benoit Cornu
,
Lionel Seinturier
,
Martin Monperrus
Improving fault localization for Simulink models using search-based testing and prediction models
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-370
by
Bing Liu
,
Lucia
,
Shiva Nejati
,
Lionel C. Briand
An empirical investigation into the cost-effectiveness of test effort allocation strategies for finding faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-381
by
Yiyang Feng
,
Wanwangying Ma
,
Yibiao Yang
,
Hongmin Lu
,
Yuming Zhou
,
Baowen Xu
What information about code snippets is available in different software-related documents? An exploratory study
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-386
by
Preetha Chatterjee
,
Manziba Akanda Nishi
,
Kostadin Damevski
,
Vinay Augustine
,
Lori Pollock
,
Nicholas A. Kraft
Harnessing Twitter to support serendipitous learning of developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-391
by
Abhishek Sharma
,
Yuan Tian
,
Agus Sulistya
,
David Lo
,
Aiko Fallas Yamashita
Why do we break APIs? First answers from developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-396
by
Laerte Xavier
,
Andre Hora
,
Marco Tulio Valente
An arc-based approach for visualization of code smells
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-401
by
Marcel Steinbeck
Towards continuous software release planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-406
by
David Ameller
,
Carles Farré
,
Xavier Franch
,
Danilo Valerio
,
Antonino Cassarino
An exploratory study on library aging by monitoring client usage in a software ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-411
by
Raula Gaikovina Kula
,
Daniel M. German
,
Takashi Ishio
,
Ali Ouni
,
Katsuro Inoue
Trends on empty exception handlers for Java open source libraries
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
Ana Filipa Nogueira
,
José C. B. Ribeiro
,
Mário A. Zenha-Rela
Analyzing the evolution of testing library usage in open source Java projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Ahmed Zerouali
,
Tom Mens
On the evolution of exception usage in Java projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-426
by
Haidar Osman
,
Andrei Chiş
,
Jakob Schaerer
,
Mohammad Ghafari
,
Oscar Nierstrasz
Statically identifying class dependencies in legacy JavaScript systems: First results
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-431
by
Leonardo Humberto Silva
,
Marco Tulio Valente
,
Alexandre Bergel
CodeCritics applied to database schema: Challenges and first results
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-436
by
Julien Delplanque
,
Anne Etien
,
Olivier Auverlot
,
Tom Mens
,
Nicolas Anquetil
,
Stéphane Ducasse
Cloud-based parallel concolic execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-441
by
Ting Chen
,
Youzheng Feng
,
Xiapu Luo
,
Xiaodong Lin
,
Xiaosong Zhang
Under-optimized smart contracts devour your money
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-446
by
Ting Chen
,
Xiaoqi Li
,
Xiapu Luo
,
Xiaosong Zhang
Pluggable Controllers and Nano-Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-451
by
Yossi Gil
,
Ori Marcovitch
,
Matteo Orrù
Query Construction Patterns in PHP
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-456
by
David Anderson
,
Mark Hills
Supporting schema evolution in schema-less NoSQL data stores
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-461
by
Loup Meurice
,
Anthony Cleve
XCORE: Support for developing program analysis tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-466
by
Alexandru Ştefănică
,
Petru Florin Mihancea
srcQL: A syntax-aware query language for source code
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-471
by
Brian Bartman
,
Christian D. Newman
,
Michael L. Collard
,
Jonathan I. Maletic
UAV: Warnings from multiple Automated Static Analysis Tools at a glance
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-476
by
Tim Buckers
,
Clinton Cao
,
Michiel Doesburg
,
Boning Gong
,
Sunwei Wang
,
Moritz Beller
,
Andy Zaidman
The Spartanizer: Massive automatic refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-481
by
Yossi Gil
,
Matteo Orrù
c-JRefRec: Change-based identification of Move Method refactoring opportunities
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-486
by
Naoya Ujihara
,
Ali Ouni
,
Takashi Ishio
,
Katsuro Inoue
Lightweight detection of Android-specific code smells: The aDoctor project
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-491
by
Fabio Palomba
,
Dario Di Nucci
,
Annibale Panichella
,
Andy Zaidman
,
Andrea De Lucia
scat: Learning from a single execution of a binary
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-496
by
Franck de Goër
,
Christopher Ferreira
,
Laurent Mounier
dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-501
by
Daniel Mercier
,
Aziem Chawdhary
,
Richard Jones
InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-506
by
Jierui Liu
,
Tianyong Wu
,
Xi Deng
,
Jun Yan
,
Jian Zhang
Columbo: High perfomance unpacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-510
by
Jason Raber
Hindsight: Revealing the evolution of dependencies to developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
George Ganea
Replan: A Release Planning Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-520
by
David Ameller
,
Carles Farré
,
Xavier Franch
,
Antonino Cassarino
,
Danilo Valerio
,
Valentin Elvassore
Bringing back-in-time debugging down to the database
Full-text access may be available. Sign in or learn about subscription options.
pp. 521-525
by
Arian Treffer
,
Michael Perscheid
,
Matthias Uflacker
Performance tuning for automotive Software Fault Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-530
by
Harald Altinger
,
Steffen Herbold
,
Friederike Schneemann
,
Jens Grabowski
,
Franz Wotawa
Business process recovery based on system log and information of organizational structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-535
by
Ryota Mibe
,
Tadashi Tanaka
,
Takashi Kobayashi
,
Shingo Kobayashi
Multi-language re-documentation to support a COBOL to Java migration project
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-540
by
Bernhard Dorninger
,
Michael Moser
,
Josef Pichler
Proactive reviews of textual requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-545
by
Vard Antinyan
,
Miroslaw Staron
Data access visualization for legacy application maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-550
by
Keisuke Yano
,
Akihiko Matsuo
An empirical study of clone density evolution and developer cloning tendency
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-552
by
Brent van Bladel
,
Alessandro Murgia
,
Serge Demeyer
Towards reverse engineering of intermediate code for documentation generators
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-554
by
Michael Moser
,
Michael Pfeiffer
,
Josef Pichler
A framework for classifying and comparing source code recommendation systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-556
by
Mohammad Ghafari
,
Hamidreza Moradi
Self-adaptive systems framework based on agent and search-based optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 557-558
by
Liu He
,
Qingshan Li
,
Lu Wang
,
Jiewen Wan
The importance of program Design Patterns training
Full-text access may be available. Sign in or learn about subscription options.
pp. 559-560
by
Viggo Holmstedt
,
Shegaw A. Mengiste
Conventionality analysis of array objects in JavaScript
Full-text access may be available. Sign in or learn about subscription options.
pp. 561-562
by
Astrid Younang
,
Lunjin Lu
Two improvements to detect duplicates in Stack Overflow
Full-text access may be available. Sign in or learn about subscription options.
pp. 563-564
by
Yuji Mizobuchi
,
Kuniharu Takayama
Modernizing domain-specific languages with XMLText and IntellEdit
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-566
by
Patrick Neubauer
,
Robert Bill
,
Manuel Wimmer
Lost comments support program comprehension
Full-text access may be available. Sign in or learn about subscription options.
pp. 567-568
by
Takayuki Omori
Does the release cycle of a library project influence when it is adopted by a client project?
Full-text access may be available. Sign in or learn about subscription options.
pp. 569-570
by
Daiki Fujibayashi
,
Akinori Ihara
,
Hirohiko Suwa
,
Raula Gaikovina Kula
,
Kenichi Matsumoto
Which review feedback did long-term contributors get on OSS projects?
Full-text access may be available. Sign in or learn about subscription options.
pp. 571-572
by
Takuto Norikane
,
Akinori Ihara
,
Kenichi Matsumoto
Frame-based behavior preservation in refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 573-574
by
Katsuhisa Maruyama
,
Shinpei Hayashi
,
Norihiro Yoshida
,
Eunjong Choi
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-576
by
Ra-Jeong Moon
,
Kyu-Min Shim
,
Hae-Young Lee
,
Hyung-Jong Kim
Towards understanding an open-source bounty: Analysis of Bountysource
Full-text access may be available. Sign in or learn about subscription options.
pp. 577-578
by
Tetsuya Kanda
,
Mingyu Guo
,
Hideaki Hata
,
Kenichi Matsumoto
Showing 88 out of 88