default search action
17th WCRE 2010: Beverly, MA, USA
- Giuliano Antoniol, Martin Pinzger, Elliot J. Chikofsky:
17th Working Conference on Reverse Engineering, WCRE 2010, 13-16 October 2010, Beverly, MA, USA. IEEE Computer Society 2010, ISBN 978-0-7695-4123-5
Mining Software Repositories I
- Dawn J. Lawrie, David W. Binkley, Christopher Morrell:
Normalizing Source Code Vocabulary. 3-12 - Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, Bram Adams, Ahmed E. Hassan, Ying Zou:
Studying the Impact of Clones on Software Defects. 13-21 - Angela Lozano, Andy Kellens, Kim Mens, Gabriela Arévalo:
Mining Source Code for Structural Regularities. 22-31
Program Comprehension
- Sonia Haiduc, Jairo Aponte, Laura Moreno, Andrian Marcus:
On the Use of Automated Text Summarization Techniques for Summarizing Source Code. 35-44 - Ana L. Milanova, Yin Liu:
Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs. 45-54 - Verónica Uquillas Gómez, Stéphane Ducasse, Theo D'Hondt:
Visually Supporting Source Code Changes Integration: The Torch Dashboard. 55-64
Dynamic Analysis
- Michaela Greiler, Hans-Gerhard Groß, Arie van Deursen:
Understanding Plug-in Test Suites from an Extensibility Perspective. 67-76 - Michael Perscheid, Bastian Steinert, Robert Hirschfeld, Felix Geller, Michael Haupt:
Immediacy through Interactivity: Online Analysis of Run-time Behavior. 77-86 - Hassen Grati, Houari A. Sahraoui, Pierre Poulin:
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization. 87-96
Software Evoluation
- Fabian Beck, Stephan Diehl:
Evaluating the Impact of Software Evolution on Software Clustering. 99-108 - Yinxing Xue, Zhenchang Xing, Stan Jarzabek:
Understanding Feature Evolution in a Family of Product Variants. 109-118 - Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk, Michael L. Collard:
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code. 119-128
Reverse Engineering and Security
- Saumya K. Debray, Jay Patel:
Reverse Engineering Self-Modifying Code: Unpacker Extraction. 131-140 - Sunny Wong, Melissa Aaron, Jeffrey Segall, Kevin Lynch, Spiros Mancoridis:
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software. 141-149 - Gengbiao Chen, Zhuo Wang, Ruoyu Zhang, Kan Zhou, Shiqiu Huang, Kangqi Ni, Zhengwei Qi, Kai Chen, Haibing Guan:
A Refined Decompiler to Generate C Code with High Readability. 150-154 - Filippo Ricca, Alessandro Marchetto:
Heroes in FLOSS Projects: An Explorative Study. 155-159
Architecture Recovery
- Roberto Almeida Bittencourt, Gustavo Jansen de Souza Santos, Dalton Dario Serey Guerrero, Gail C. Murphy:
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques. 163-172 - Dharmalingam Ganesan, Mikael Lindvall, Lamont Ruley, Robert Wiegand, Vuong Ly, Tina Tsui:
Architectural Analysis of Systems Based on the Publisher-Subscriber Style. 173-182 - Andreas Marx, Fabian Beck, Stephan Diehl:
Computer-Aided Extraction of Software Components. 183-192
Remodularization and Reengineering
- Gabriele Bavota, Andrea De Lucia, Andrian Marcus, Rocco Oliveto:
Software Re-Modularization Based on Structural and Semantic Metrics. 195-204 - Chandan Raj Rupakheti, Daqing Hou:
An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java. 205-214 - Michael Athanasopoulos, Kostas Kontogiannis:
Identification of REST-like Resources from Legacy Service Descriptions. 215-219 - Timothy C. Lethbridge, Andrew Forward, Omar Bahy Badreddin:
Umplification: Refactoring to Incrementally Add Abstraction to a Program. 220-224
Code Clone Detection
- Gehan M. K. Selim, King Chun Foo, Ying Zou:
Enhancing Source-Based Clone Detection Using Intermediate Representation. 227-236 - Benjamin Biegel, Stephan Diehl:
Highly Configurable and Extensible Code Clone Detection. 237-241 - Ian J. Davis, Michael W. Godfrey:
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler. 242-246
Mining Software Repositories 2
- Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, Ken-ichi Matsumoto:
Predicting Re-opened Bugs: A Case Study on the Eclipse Project. 249-258 - Thanh H. D. Nguyen, Bram Adams, Ahmed E. Hassan:
A Case Study of Bias in Bug-Fix Datasets. 259-268 - Didi Surian, David Lo, Ee-Peng Lim:
Mining Collaboration Patterns from a Large Developer Network. 269-273
Workshop
- Nicolas Bettenburg, Bram Adams:
Workshop on Mining Unstructured Data (MUD) because "Mining Unstructured Data is Like Fishing in Muddy Waters"! 277-278 - Abdelwahab Hamou-Lhadj, David Röthlisberger, Andy Zaidman, Orla Greevy:
Workshop on Program Comprehension through Dynamic Analysis (PCODA10). 279-280 - Mira Kajko-Mattsson, Alain April:
International Workshop on Processes for Software Evolution and Maintenance (WoSEMP 2010). 281-282
Doctoral Symposium
- Venera Arnaoudova:
Improving Source Code Quality through the Definition of Linguistic Antipatterns. 285-288 - Roberto Almeida Bittencourt:
Conformance Checking during Software Evolution. 289-292 - Ferdaous Boughanmi:
Multi-Language and Heterogeneously-licensed Software Analysis. 293-296 - Laleh Mousavi Eshkevari:
Linguistic Driven Refactoring of Source Code Identifiers. 297-300 - Latifa Guerrouj:
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers. 301-304 - Abram Hindle:
Software Process Recovery: Recovering Process from Artifacts. 305-308 - Aminata Sabane:
Improving System Testability and Testing with Microarchitectures. 309-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.