Default Cover Image

2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)

Sept. 27 2015 to Sept. 28 2015

Bremen, Germany

Table of Contents

Author indexFreely available from IEEE.pp. 277-277
ContentsFreely available from IEEE.pp. vii-viii
Message from the chairsFreely available from IEEE.pp. iii-vi
ORBS and the limits of static slicingFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Intent, tests, and release dependencies: Pragmatic recipes for source code integrationFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
The use of C++ exception handling constructs: A comprehensive studyFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Multi-layer software configuration: Empirical study on wordpressFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Using changeset descriptions as a data source to assist feature locationFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Automatically identifying focal methods under test in unit test casesFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Navigating source code with wordsFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Recommending insightful comments for source code using crowdsourced knowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 81-90
Checking C++ codes for compatibility with operator overloadingFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
Detecting function purity in JavaScriptFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
Data tainting and obfuscation: Improving plausibility of incorrect taintFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
A grammar for spreadsheet formulas evaluated on two large datasetsFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
The impact of cross-distribution bug duplicates, empirical study on Debian and UbuntuFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Cumulative code churn: Impact on maintainabilityFull-text access may be available. Sign in or learn about subscription options.pp. 141-150
How do Java methods grow?Full-text access may be available. Sign in or learn about subscription options.pp. 151-160
On the comprehension of code clone visualizations: A controlled study using eye trackingFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
When code smells twice as much: Metric-based detection of variability-aware code smellsFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
LeakTracer: Tracing leaks along the wayFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Automated memory leak diagnosis by regression testingFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Automating the performance deviation analysis for multiple system releases: An evolutionary studyFull-text access may be available. Sign in or learn about subscription options.pp. 201-210
From preprocessor-constrained parse graphs to preprocessor-constrained control flowFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
Recording and replaying system specific, source code transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 221-230
Discovering likely mappings between APIs using text miningFull-text access may be available. Sign in or learn about subscription options.pp. 231-240
SimNav: Simulink navigation of model clone classesFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
FaultBuster: An automatic code smell refactoring toolsetFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Improving prioritization of software weaknesses using security models with AVUSFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
A static microcode analysis tool for programmable load driversFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
CodeMetropolis: Eclipse over the city of source codeFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Showing 33 out of 33