SCAM C

31 papers

YearTitle / Authors
201515th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015
Michael W. Godfrey, David Lo, Foutse Khomh
2015A grammar for spreadsheet formulas evaluated on two large datasets.
Efthimia Aivaloglou, David Hoepelman, Felienne Hermans
2015A static microcode analysis tool for programmable load drivers.
Luca Dariz, Massimiliano Ruggeri, Michele Selvatici
2015A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs.
Kunal Banerjee, Chittaranjan A. Mandal, Dipankar Sarkar
2015Automated memory leak diagnosis by regression testing.
Mohammadreza Ghanavati, Artur Andrzejak
2015Automatically identifying focal methods under test in unit test cases.
Mohammad Ghafari, Carlo Ghezzi, Konstantin Rubinov
2015Automating the performance deviation analysis for multiple system releases: An evolutionary study.
Felipe Pinto, Uirá Kulesza, Christoph Treude
2015Can the use of types and query expansion help improve large-scale code search?
Otávio Augusto Lazzarini Lemos, Adriano Carvalho de Paula, Hitesh Sajnani, Cristina V. Lopes
2015Checking C++ codes for compatibility with operator overloading.
Alexander Hück, Christian H. Bischof, Jean Utke
2015CodeMetropolis: Eclipse over the city of source code.
Gergö Balogh, Attila Szabolics, Árpád Beszédes
2015Cumulative code churn: Impact on maintainability.
Csaba Faragó, Péter Hegedüs, Rudolf Ferenc
2015Data tainting and obfuscation: Improving plausibility of incorrect taint.
Sandrine Blazy, Stéphanie Riaud, Thomas Sirvent
2015Detecting function purity in JavaScript.
Jens Nicolay, Carlos Noguera, Coen De Roover, Wolfgang De Meuter
2015Discovering likely mappings between APIs using text mining.
Rahul Pandita, Raoul Praful Jetley, Sithu D. Sudarsan, Laurie A. Williams
2015FaultBuster: An automatic code smell refactoring toolset.
Gábor Szoke, Csaba Nagy, Lajos Jeno Fülöp, Rudolf Ferenc, Tibor Gyimóthy
2015From preprocessor-constrained parse graphs to preprocessor-constrained control flow.
Dierk Lüdemann, Rainer Koschke
2015How do Java methods grow?
Daniela Steidl, Florian Deissenboeck
2015Improving prioritization of software weaknesses using security models with AVUS.
Stephan Renatus, Corrie Bartelheimer, Jörn Eichler
2015Intent, tests, and release dependencies: Pragmatic recipes for source code integration.
Martin Brandtner, Philipp Leitner, Harald C. Gall
2015LeakTracer: Tracing leaks along the way.
Hengyang Yu, Xiaohua Shi, Wei Feng
2015Multi-layer software configuration: Empirical study on wordpress.
Mohammed Sayagh, Bram Adams
2015Navigating source code with words.
Dawn J. Lawrie, Dave W. Binkley
2015ORBS and the limits of static slicing.
David W. Binkley, Nicolas E. Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo
2015On the comprehension of code clone visualizations: A controlled study using eye tracking.
Md. Sami Uddin, Varun Gaur, Carl Gutwin, Chanchal K. Roy
2015Recommending insightful comments for source code using crowdsourced knowledge.
Mohammad Masudur Rahman, Chanchal K. Roy, Iman Keivanloo
2015Recording and replaying system specific, source code transformations.
Gustavo Santos, Anne Etien, Nicolas Anquetil, Stéphane Ducasse, Marco Túlio Valente
2015SimNav: Simulink navigation of model clone classes.
Eric J. Rapos, Andrew Stevenson, Manar H. Alalfi, James R. Cordy
2015The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu.
Vincent Boisselle, Bram Adams
2015The use of C++ exception handling constructs: A comprehensive study.
Rodrigo Bonifácio, Fausto Carvalho, Guilherme Novaes Ramos, Uirá Kulesza, Roberta Coelho
2015Using changeset descriptions as a data source to assist feature location.
Muslim Chochlov, Michael English, Jim Buckley
2015When code smells twice as much: Metric-based detection of variability-aware code smells.
Wolfram Fenske, Sandro Schulze, Daniel Meyer, Gunter Saake