Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SCAM
SCAM 2015
Generate Citations
2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)
Sept. 27 2015 to Sept. 28 2015
Bremen, Germany
Table of Contents
Author index
Freely available from IEEE.
pp. 277-277
Contents
Freely available from IEEE.
pp. vii-viii
Message from the chairs
Freely available from IEEE.
pp. iii-vi
ORBS and the limits of static slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
David Binkley
,
Nicolas Gold
,
Mark Harman
,
Syed Islam
,
Jens Krinke
,
Shin Yoo
Intent, tests, and release dependencies: Pragmatic recipes for source code integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Martin Brandtner
,
Philipp Leitner
,
Harald C. Gall
The use of C++ exception handling constructs: A comprehensive study
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Rodrigo Bonifacio
,
Fausto Carvalho
,
Guilherme N. Ramos
,
Uira Kulesza
,
Roberta Coelho
Multi-layer software configuration: Empirical study on wordpress
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Mohammed Sayagh
,
Bram Adams
Can the use of types and query expansion help improve large-scale code search?
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Otavio Augusto Lazzarini Lemos
,
Adriano Carvalho de Paula
,
Hitesh Sajnani
,
Cristina V. Lopes
Using changeset descriptions as a data source to assist feature location
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Muslim Chochlov
,
Michael English
,
Jim Buckley
Automatically identifying focal methods under test in unit test cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Mohammad Ghafari
,
Carlo Ghezzi
,
Konstantin Rubinov
Navigating source code with words
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-80
by
Dawn Lawrie
,
Dave Binkley
Recommending insightful comments for source code using crowdsourced knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-90
by
Mohammad Masudur Rahman
,
Chanchal K. Roy
,
Iman Keivanloo
Checking C++ codes for compatibility with operator overloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-100
by
Alexander Huck
,
Christian Bischof
,
Jean Utke
Detecting function purity in JavaScript
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-110
by
Jens Nicolay
,
Carlos Noguera
,
Coen De Roover
,
Wolfgang De Meuter
Data tainting and obfuscation: Improving plausibility of incorrect taint
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Sandrine Blazy
,
Stephanie Riaud
,
Thomas Sirvent
A grammar for spreadsheet formulas evaluated on two large datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-130
by
Efthimia Aivaloglou
,
David Hoepelman
,
Felienne Hermans
The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-140
by
Vincent Boisselle
,
Bram Adams
Cumulative code churn: Impact on maintainability
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-150
by
Csaba Farago
,
Peter Hegedus
,
Rudolf Ferenc
How do Java methods grow?
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-160
by
Daniela Steidl
,
Florian Deissenboeck
On the comprehension of code clone visualizations: A controlled study using eye tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-170
by
Md Sami Uddin
,
Varun Gaur
,
Carl Gutwin
,
Chanchal K. Roy
When code smells twice as much: Metric-based detection of variability-aware code smells
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-180
by
Wolfram Fenske
,
Sandro Schulze
,
Daniel Meyer
,
Gunter Saake
LeakTracer: Tracing leaks along the way
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Hengyang Yu
,
Xiaohua Shi
,
Wei Feng
Automated memory leak diagnosis by regression testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Mohammadreza Ghanavati
,
Artur Andrzejak
Automating the performance deviation analysis for multiple system releases: An evolutionary study
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-210
by
Felipe Pinto
,
Uira Kulesza
,
Christoph Treude
From preprocessor-constrained parse graphs to preprocessor-constrained control flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-220
by
Dierk Ludemann
,
Rainer Koschke
Recording and replaying system specific, source code transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-230
by
Gustavo Santos
,
Anne Etien
,
Nicolas Anquetil
,
Stephane Ducasse
,
Marco Tulio Valente
Discovering likely mappings between APIs using text mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-240
by
Rahul Pandita
,
Raoul Praful Jetley
,
Sithu D Sudarsan
,
Laurie Williams
SimNav: Simulink navigation of model clone classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Eric J. Rapos
,
Andrew Stevenson
,
Manar H. Alalfi
,
James R. Cordy
A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Kunal Banerjee
,
Chittaranjan Mandal
,
Dipankar Sarkar
FaultBuster: An automatic code smell refactoring toolset
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Gabor Szoke
,
Csaba Nagy
,
Lajos Jeno Fulop
,
Rudolf Ferenc
,
Tibor Gyimothy
Improving prioritization of software weaknesses using security models with AVUS
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Stephan Renatus
,
Corrie Bartelheimer
,
Jorn Eichler
A static microcode analysis tool for programmable load drivers
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Luca Dariz
,
Massimiliano Ruggeri
,
Michele Selvatici
CodeMetropolis: Eclipse over the city of source code
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Gergo Balogh
,
Attila Szabolics
,
Arpad Beszedes
Showing 33 out of 33