Default Cover Image

2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)

Feb. 20 2017 to Feb. 24 2017

Klagenfurt, Austria

Table of Contents

Author indexFreely available from IEEE.pp. 579-580
ContentsFreely available from IEEE.pp. xi-xvi
Message from the chairsFreely available from IEEE.pp. iii-iii
Committees and additional reviewersFreely available from IEEE.pp. iv-ix
SANER 2017 sponsors and supportersFreely available from IEEE.pp. x-x
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote)Full-text access may be available. Sign in or learn about subscription options.pp. 1-1
An empirical comparison of dependency issues in OSS packaging ecosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 2-12
Detecting similar repositories on GitHubFull-text access may be available. Sign in or learn about subscription options.pp. 13-23
Code of conduct in open source projectsFull-text access may be available. Sign in or learn about subscription options.pp. 24-33
Socio-technical evolution of the Ruby ecosystem in GitHubFull-text access may be available. Sign in or learn about subscription options.pp. 34-44
StiCProb: A novel feature mining approach using conditional probabilityFull-text access may be available. Sign in or learn about subscription options.pp. 45-55
STRICT: Information retrieval based search term identification for concept locationFull-text access may be available. Sign in or learn about subscription options.pp. 79-90
Analyzing reviews and code of mobile apps for better release planningFull-text access may be available. Sign in or learn about subscription options.pp. 91-102
Investigating the energy impact of Android smellsFull-text access may be available. Sign in or learn about subscription options.pp. 115-126
Automated generation of consistency-achieving model editorsFull-text access may be available. Sign in or learn about subscription options.pp. 127-137
Historical and impact analysis of API breaking changes: A large-scale studyFull-text access may be available. Sign in or learn about subscription options.pp. 138-147
Reducing redundancies in multi-revision code analysisFull-text access may be available. Sign in or learn about subscription options.pp. 148-159
Extracting executable transformations from distilled code changesFull-text access may be available. Sign in or learn about subscription options.pp. 171-181
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 182-192
The dark side of event sourcing: Managing data conversionFull-text access may be available. Sign in or learn about subscription options.pp. 193-204
Automatically generating natural language descriptions for object-related statement sequencesFull-text access may be available. Sign in or learn about subscription options.pp. 205-216
Shorter identifier names take longer to comprehendFull-text access may be available. Sign in or learn about subscription options.pp. 217-227
Lexical categories for source code identifiersFull-text access may be available. Sign in or learn about subscription options.pp. 228-239
Computing counter-examples for privilege protection losses using security modelsFull-text access may be available. Sign in or learn about subscription options.pp. 240-249
Enriching in-IDE process information with fine-grained source code historyFull-text access may be available. Sign in or learn about subscription options.pp. 250-260
How to gamify software engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 261-271
Scalable tag recommendation for software information sitesFull-text access may be available. Sign in or learn about subscription options.pp. 272-282
Stack Overflow: A code laundering platform?Full-text access may be available. Sign in or learn about subscription options.pp. 283-293
An empirical study of code smells in JavaScript projectsFull-text access may be available. Sign in or learn about subscription options.pp. 294-305
Antipatterns causing memory bloat: A case studyFull-text access may be available. Sign in or learn about subscription options.pp. 306-315
Variant-preserving refactorings for migrating cloned products to a product lineFull-text access may be available. Sign in or learn about subscription options.pp. 316-326
Efficient method extraction for automatic elimination of type-3 clonesFull-text access may be available. Sign in or learn about subscription options.pp. 327-337
Spreadsheet testing in practiceFull-text access may be available. Sign in or learn about subscription options.pp. 338-348
Dynamic patch generation for null pointer exceptions using metaprogrammingFull-text access may be available. Sign in or learn about subscription options.pp. 349-358
Improving fault localization for Simulink models using search-based testing and prediction modelsFull-text access may be available. Sign in or learn about subscription options.pp. 359-370
Harnessing Twitter to support serendipitous learning of developersFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Why do we break APIs? First answers from developersFull-text access may be available. Sign in or learn about subscription options.pp. 392-396
An arc-based approach for visualization of code smellsFull-text access may be available. Sign in or learn about subscription options.pp. 397-401
Towards continuous software release planningFull-text access may be available. Sign in or learn about subscription options.pp. 402-406
Trends on empty exception handlers for Java open source librariesFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
Analyzing the evolution of testing library usage in open source Java projectsFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
On the evolution of exception usage in Java projectsFull-text access may be available. Sign in or learn about subscription options.pp. 422-426
Statically identifying class dependencies in legacy JavaScript systems: First resultsFull-text access may be available. Sign in or learn about subscription options.pp. 427-431
CodeCritics applied to database schema: Challenges and first resultsFull-text access may be available. Sign in or learn about subscription options.pp. 432-436
Cloud-based parallel concolic executionFull-text access may be available. Sign in or learn about subscription options.pp. 437-441
Under-optimized smart contracts devour your moneyFull-text access may be available. Sign in or learn about subscription options.pp. 442-446
Pluggable Controllers and Nano-PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 447-451
Query Construction Patterns in PHPFull-text access may be available. Sign in or learn about subscription options.pp. 452-456
Supporting schema evolution in schema-less NoSQL data storesFull-text access may be available. Sign in or learn about subscription options.pp. 457-461
XCORE: Support for developing program analysis toolsFull-text access may be available. Sign in or learn about subscription options.pp. 462-466
srcQL: A syntax-aware query language for source codeFull-text access may be available. Sign in or learn about subscription options.pp. 467-471
UAV: Warnings from multiple Automated Static Analysis Tools at a glanceFull-text access may be available. Sign in or learn about subscription options.pp. 472-476
The Spartanizer: Massive automatic refactoringFull-text access may be available. Sign in or learn about subscription options.pp. 477-481
c-JRefRec: Change-based identification of Move Method refactoring opportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 482-486
Lightweight detection of Android-specific code smells: The aDoctor projectFull-text access may be available. Sign in or learn about subscription options.pp. 487-491
scat: Learning from a single execution of a binaryFull-text access may be available. Sign in or learn about subscription options.pp. 492-496
dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysisFull-text access may be available. Sign in or learn about subscription options.pp. 497-501
InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 502-506
Columbo: High perfomance unpackingFull-text access may be available. Sign in or learn about subscription options.pp. 507-510
Hindsight: Revealing the evolution of dependencies to developersFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
Replan: A Release Planning ToolFull-text access may be available. Sign in or learn about subscription options.pp. 516-520
Bringing back-in-time debugging down to the databaseFull-text access may be available. Sign in or learn about subscription options.pp. 521-525
Performance tuning for automotive Software Fault PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 526-530
Business process recovery based on system log and information of organizational structureFull-text access may be available. Sign in or learn about subscription options.pp. 531-535
Multi-language re-documentation to support a COBOL to Java migration projectFull-text access may be available. Sign in or learn about subscription options.pp. 536-540
Proactive reviews of textual requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 541-545
Data access visualization for legacy application maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 546-550
An empirical study of clone density evolution and developer cloning tendencyFull-text access may be available. Sign in or learn about subscription options.pp. 551-552
Towards reverse engineering of intermediate code for documentation generatorsFull-text access may be available. Sign in or learn about subscription options.pp. 553-554
A framework for classifying and comparing source code recommendation systemsFull-text access may be available. Sign in or learn about subscription options.pp. 555-556
Self-adaptive systems framework based on agent and search-based optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 557-558
The importance of program Design Patterns trainingFull-text access may be available. Sign in or learn about subscription options.pp. 559-560
Conventionality analysis of array objects in JavaScriptFull-text access may be available. Sign in or learn about subscription options.pp. 561-562
Two improvements to detect duplicates in Stack OverflowFull-text access may be available. Sign in or learn about subscription options.pp. 563-564
Modernizing domain-specific languages with XMLText and IntellEditFull-text access may be available. Sign in or learn about subscription options.pp. 565-566
Lost comments support program comprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 567-568
Which review feedback did long-term contributors get on OSS projects?Full-text access may be available. Sign in or learn about subscription options.pp. 571-572
Frame-based behavior preservation in refactoringFull-text access may be available. Sign in or learn about subscription options.pp. 573-574
Towards understanding an open-source bounty: Analysis of BountysourceFull-text access may be available. Sign in or learn about subscription options.pp. 577-578
Showing 88 out of 88