


default search action
ICSM 2013: Eindhoven, The Netherlands
- 2013 IEEE International Conference on Software Maintenance, Eindhoven, The Netherlands, September 22-28, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-4981-1

Testing
- Amanda Schwartz, Hyunsook Do:

A Fuzzy Expert System for Cost-Effective Regression Testing Strategies. 1-10 - Tanja Toroi, Anu Raninen, Lauri Väätäinen:

Identifying Process Improvement Targets in Test Processes: A Case Study. 11-19 - Mika Mäntylä

, Foutse Khomh, Bram Adams
, Emelie Engström
, Kai Petersen
:
On Rapid Releases and Software Testing. 20-29
Code Cloning
- Jan Harder:

How Multiple Developers Affect the Evolution of Code Clones. 30-39 - Wenyi Qian, Xin Peng, Zhenchang Xing, Stan Jarzabek, Wenyun Zhao:

Mining Logical Clones in Software: Revealing High-Level Business and Programming Rules. 40-49 - Saman Bazrafshan, Rainer Koschke:

An Empirical Study of Clone Removals. 50-59
APIs
- Daqing Hou, Lingfeng Mo:

Content Categorization of API Discussions. 60-69 - Tyler McDonnell, Baishakhi Ray, Miryung Kim:

An Empirical Study of API Stability and Adoption in the Android Ecosystem. 70-79 - Hani Abdeen, Houari A. Sahraoui, Osama Shata:

How We Design Interfaces, and How to Assess It. 80-89
Runtime Analysis
- Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis:

An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables. 90-99 - Rui Xin, Zhengwei Qi, Shiqiu Huang, Chengcheng Xiang

, Yudi Zheng, Yin Wang, Haibing Guan:
An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs. 100-109 - Mark D. Syer, Zhen Ming Jiang, Meiyappan Nagappan, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:

Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues. 110-119
Reverse Engineering
- Paul Klint, Davy Landman, Jurgen J. Vinju:

Exploring the Limits of Domain Model Recovery. 120-129 - Yvan Labiche

, Bojana Kolbah, Hossein Mehrfard:
Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams. 130-139 - Mohd Hafeez Osman

, Michel R. V. Chaudron
, Peter van der Putten:
An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams. 140-149
Refactoring
- Hoan Anh Nguyen, Hung Viet Nguyen, Tung Thanh Nguyen

, Tien N. Nguyen:
Output-Oriented Refactoring in PHP-Based Dynamic Web Applications. 150-159 - Syed Muhammad Ali Shah, Jens Dietrich

, Catherine McCartin:
On the Automation of Dependency-Breaking Refactorings in Java. 160-169 - Young-Woo Kwon

, Eli Tilevich
:
Reducing the Energy Consumption of Mobile Applications Behind the Scenes. 170-179
Fault and Defect Management
- Yuhua Qi

, Xiaoguang Mao
, Yan Lei:
Efficient Automated Program Repair through Fault-Recorded Testing Prioritization. 180-189 - Giuseppe Scanniello

, Michele Risi:
Dealing with Faults in Source Code: Abbreviated vs. Full-Word Identifier Names. 190-199 - Yuan Tian, David Lo

, Chengnian Sun:
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis. 200-209
Software Comprehension
- Gabriele Bavota

, Gerardo Canfora
, Massimiliano Di Penta
, Rocco Oliveto, Sebastiano Panichella
:
An Empirical Investigation on Documentation Usage Patterns in Maintenance Tasks. 210-219 - Leo Pruijt, Christian Köppe

, Sjaak Brinkkemper:
Architecture Compliance Checking of Semantically Rich Modular Architectures: A Comparative Study of Tool Support. 220-229 - Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider

, Massimiliano Di Penta
:
LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines. 230-239
Software Authorship
- Tao Wang, Huaimin Wang, Gang Yin, Charles X. Ling, Xiang Li, Peng Zou:

Mining Software Profile across Multiple Repositories for Hierarchical Categorization. 240-249 - Xiaozhu Meng, Barton P. Miller, William R. Williams

, Andrew R. Bernat:
Mining Software Repositories for Accurate Authorship. 250-259
Smells and Anti-patterns
- Francesca Arcelli Fontana, Vincenzo Ferme, Alessandro Marino, Bartosz Walter

, Pawel Martenka:
Investigating the Impact of Code Smells on System's Quality: An Empirical Study on Systems of Different Application Domains. 260-269 - Seyyed Ehsan Salamati Taba, Foutse Khomh, Ying Zou, Ahmed E. Hassan, Meiyappan Nagappan:

Predicting Bugs Using Antipatterns. 270-279
Dependencies
- Gabriele Bavota

, Gerardo Canfora
, Massimiliano Di Penta
, Rocco Oliveto, Sebastiano Panichella
:
The Evolution of Project Inter-dependencies in a Software Ecosystem: The Case of Apache. 280-289 - Sebastian C. Muller, Thomas Fritz:

Stakeholders' Information Needs for Artifacts and Their Dependencies in a Real World Context. 290-299
Feature Location
- Nouh Alhindawi

, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic:
Improving Feature Location by Enhancing Source Code with Stereotypes. 300-309 - Tien-Duy B. Le, David Lo

:
Will Fault Localization Work for These Failures? An Automated Approach to Predict Effectiveness of Fault Localization Tools. 310-319
Traceability
- Tathagata Dasgupta, Mark Grechanik

, Evan Moritz, Bogdan Dit, Denys Poshyvanyk
:
Enhancing Software Traceability by Automatically Expanding Corpora with Relevant Documentation. 320-329 - Bogdan Dit, Evan Moritz, Mario Linares Vásquez

, Denys Poshyvanyk
:
Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library. 330-339
Context
- Mohammad Gharehyazie

, Daryl Posnett, Vladimir Filkov:
Social Activities Rival Patch Submission for Prediction of Developer Initiation in OSS Projects. 340-349 - Feng Zhang, Audris Mockus

, Ying Zou, Foutse Khomh, Ahmed E. Hassan:
How Does Context Affect the Distribution of Software Maintainability Metrics? 350-359
ERA
- Giri Panamoottil Krishnan, Nikolaos Tsantalis

:
Refactoring Clones: An Optimization Problem. 360-363 - Tien-Duy B. Le, Shaowei Wang, David Lo

:
Multi-abstraction Concern Localization. 364-367 - Daniele Romano, Martin Pinzger:

Towards a Weighted Voting System for Q&A Sites. 368-371 - Rahul Venkataramani, Allahbaksh M. Asadullah, Vasudev D. Bhat, Basavaraju Muddu:

Latent Co-development Analysis Based Semantic Search for Large Code Repositories. 372-375 - Emily Hill, David C. Shepherd

, Lori L. Pollock, K. Vijay-Shanker:
Differentiating Roles of Program Elements in Action-Oriented Concerns. 376-379 - Tien-Duy B. Le, Ferdian Thung, David Lo

:
Theory and Practice, Do They Match? A Case with Spectrum-Based Fault Localization. 380-383 - Quinten David Soetens, Javier Pérez, Serge Demeyer

:
An Initial Investigation into Change-Based Reconstruction of Floss-Refactorings. 384-387 - Matias Martinez

, Laurence Duchien, Martin Monperrus
:
Automatically Extracting Instances of Code Change Patterns with AST Analysis. 388-391 - Elvis Ligu, Alexander Chatzigeorgiou, Theodoros Chaikalis, Nikolaos Ygeionomakis:

Identification of Refused Bequest Code Smells. 392-395 - Francesca Arcelli Fontana

, Marco Zanoni
, Alessandro Marino, Mika Mäntylä
:
Code Smell Detection: Towards a Machine Learning-Based Approach. 396-399 - Robert L. Nord

, Ipek Ozkaya
, Raghvinder S. Sangwan, Julien Delange
, Marco A. Gonzalez, Philippe Kruchten
:
Variations on Using Propagation Cost to Measure Architecture Modifiability Properties. 400-403 - Roberto E. Lopez-Herrejon, Francisco Chicano

, Javier Ferrer
, Alexander Egyed, Enrique Alba
:
Multi-objective Optimal Test Suite Computation for Software Product Line Pairwise Testing. 404-407 - Emily Hill, Alberto Bacchelli, Dave W. Binkley, Bogdan Dit, Dawn J. Lawrie, Rocco Oliveto:

Which Feature Location Technique is Better? 408-411 - Siim Karus:

Automatic Means of Identifying Evolutionary Events in Software Development. 412-415 - Omar Meqdadi

, Nouh Alhindawi
, Michael L. Collard, Jonathan I. Maletic:
Towards Understanding Large-Scale Adaptive Changes from Version Histories. 416-419 - Tosin Daniel Oyetoyan, Daniela S. Cruzes, Reidar Conradi:

Can Refactoring Cyclic Dependent Components Reduce Defect-Proneness? 420-423 - Aiko Fallas Yamashita, Leon Moonen

:
Towards a Taxonomy of Programming-Related Difficulties during Maintenance. 424-427 - Maurizio Leotta

, Filippo Ricca, Giuliano Antoniol, Vahid Garousi
, Junji Zhi, Günther Ruhe:
A Pilot Experiment to Quantify the Effect of Documentation Accuracy on Maintenance Tasks. 428-431 - Dave W. Binkley, Dawn J. Lawrie, Emily Hill, Janet E. Burge, Ian G. Harris, Regina Hebig

, Oliver Keszöcze
, Karl Reed, John Slankas:
Task-Driven Software Summarization. 432-435 - Patrick Francis, Laurie A. Williams:

Determining "Grim Reaper" Policies to Prevent Languishing Bugs. 436-439 - Václav Rajlich, Jing Hua:

Which Practices Are Suitable for an Academic Software Project? 440-443 - Marios Fokaefs, Eleni Stroulia:

WSDARWIN: A Decision-Support Tool for Web-Service Evolution. 444-447 - Felipe Ebert, Fernando Castor

:
A Study on Developers' Perceptions about Exception Handling Bugs. 448-451 - Laura Moreno, Wathsala Bandara, Sonia Haiduc, Andrian Marcus

:
On the Relationship between the Vocabulary of Bug Reports and Source Code. 452-455 - Hung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen

, Tien N. Nguyen:
Database-Aware Fault Localization for Dynamic Web Applications. 456-459 - Blerina Bazelli, Abram Hindle, Eleni Stroulia:

On the Personality Traits of StackOverflow Users. 460-463 - Tobias Roehm, Bernd Bruegge, Tom-Michael Hesse, Barbara Paech:

Towards Identification of Software Improvements and Specification Updates by Comparing Monitored and Specified End-User Behavior. 464-467 - Ana Erika Camargo Cruz, Hajimu Iida, Norbert Preining:

An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves. 468-471 - Maxime Gobert

, Jerome Maes, Anthony Cleve, Jens H. Weber:
Understanding Schema Evolution as a Basis for Database Reengineering. 472-475
Tools
- Roberto Minelli

, Michele Lanza
:
SAMOA - A Visual Software Analytics Platform for Mobile Applications. 476-479 - Louis M. Rose, Simon M. Poulding, Robert Feldt, Richard F. Paige:

Towards a Scalable Cloud Platform for Search-Based Probabilistic Testing. 480-483 - Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider

, Massimiliano Di Penta
:
LHDiff: Tracking Source Code Lines to Support Software Maintenance Activities. 484-487 - Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider

:
gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis. 488-491 - Taimur Khan, Henning Barthel

, Achim Ebert
, Peter Liggesmeyer:
eCITY: A Tool to Track Software Structural Changes Using an Evolving City. 492-495 - Juan Carlos Castrejón, Genoveva Vargas-Solar

, Christine Collet, Rafael Lozano:
ExSchema: Discovering and Maintaining Schemas from Polyglot Persistence Applications. 496-499 - Lukas Holy, Jaroslav Snajberk, Premek Brada

, Kamil Jezek:
A Visualization Tool for Reverse-Engineering of Complex Component Applications. 500-503 - Eleni Stroulia, Isaac Matichuk, Fabio Rocha, Ken Bauer:

Interactive Exploration of Collaborative Software-Development Data. 504-507 - Renato Lima Novais, Camila Nunes, Alessandro Garcia, Manoel G. Mendonça

:
SourceMiner Evolution: A Tool for Supporting Feature Evolution Comprehension. 508-511 - Manuel Roldan-Vega, Greg Mallet, Emily Hill, Jerry Alan Fails:

CONQUER: A Tool for NL-Based Query Refinement and Contextualizing Code Search Results. 512-515 - Michael L. Collard, Michael John Decker, Jonathan I. Maletic:

srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration. 516-519 - Jeroen van den Bos

, Tijs van der Storm:
TRINITY: An IDE for the Matrix. 520-523
Industry
- Allahbaksh M. Asadullah, Basavaraju M., Nikita Jain:

E-Xplore: Enterprise API Explorer. 524-527 - Nataliia Semenenko, Marlon Dumas

, Tonis Saar:
Browserbite: Accurate Cross-Browser Testing via Machine Learning over Image Features. 528-531 - Ulas Yuksel, Hasan Sözer:

Automated Classification of Static Code Analysis Alerts: A Case Study. 532-535 - Alf Larsson

, Abdelwahab Hamou-Lhadj
:
Mining Telecom System Logs to Facilitate Debugging Tasks. 536-539 - Dusica Marijan, Arnaud Gotlieb, Sagar Sen

:
Test Case Prioritization for Continuous Regression Testing: An Industrial Case Study. 540-543 - Vladimir Sor, Plumbr Ou, Tarvo Treier, Satish Narayana Srirama

:
Improving Statistical Approach for Memory Leak Detection Using Machine Learning. 544-547 - Hyrum K. Wright, Daniel Jasper, Manuel Klimek, Chandler Carruth, Zhanyong Wan:

Large-Scale Automated Refactoring Using ClangMR. 548-551 - William L. Miller, Lawrence B. Compton, Bruce L. Woodmansee:

Assuming Software Maintenance of a Large, Embedded Legacy System from the Original Developer. 552-555 - Clauirton de Siebra, Angélica A. Mascaro, Fabio Q. B. da Silva

, André L. M. Santos
:
The Adventure of Developing a Software Application on a Pre-release Platform: Features and Learned Lessons. 556-559
Doctoral Symposium
- Fabian Beck

:
Analysis of Multi-dimensional Code Couplings. 560-565 - Aiko Yamashita:

How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case Study. 566-571 - Javier Perez:

Refactoring Planning for Design Smell Correction: Summary, Opportunities and Lessons Learned. 572-577 - Péter Hegedüs:

Revealing the Effect of Coding Practices on Software Maintainability. 578-581 - Young-Woo Kwon:

Automated S/W Reengineering for Fault-Tolerant and Energy-Efficient Distributed Execution. 582-585 - Ebrahim Khalil Abbasi:

Reverse Engineering Web Sales Configurators. 586-589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














