


default search action
ICSM 2012: Trento, Italy
- 28th IEEE International Conference on Software Maintenance, ICSM 2012, Trento, Italy, September 23-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2313-0

- Mauro Pezzè

:
From off-Line to continuous on-line maintenance. 2-3 - Lori L. Pollock:

Leveraging natural language analysis of software: Achievements, challenges, and opportunities. 4 - Lijie Zou, Michael W. Godfrey:

An industrial case study of Coman's automated task detection algorithm: What Worked, What Didn't, and Why. 6-14 - Fleur Duseau, Bruno Dufour, Houari A. Sahraoui:

Vasco: A visual approach to explore object churn in framework-intensive applications. 15-24 - Seyed Mehdi Nasehi, Jonathan Sillito, Frank Maurer

, Chris Burns:
What makes a good code example?: A study of programming Q&A in StackOverflow. 25-34 - Andrew Sutton, Marcin Zalewski:

Testing C++ generic libraries. 36-45 - Árpád Beszédes

, Tamás Gergely
, Lajos Schrettner, Judit Jász
, Laszlo Lango, Tibor Gyimóthy
:
Code coverage-based regression test selection and prioritization in WebKit. 46-55 - Gabriele Bavota

, Abdallah Qusef
, Rocco Oliveto, Andrea De Lucia
, David W. Binkley:
An empirical analysis of the distribution of unit test smells and their impact on software maintenance. 56-65 - Liang Gong, David Lo

, Lingxiao Jiang
, Hongyu Zhang
:
Interactive fault localization leveraging simple user feedback. 67-76 - Chandan Raj Rupakheti, Daqing Hou:

Finding errors from reverse-engineered equality models using a constraint solver. 77-86 - Benjamin Biegel, Fabian Beck

, Willi Hornig, Stephan Diehl
:
The Order of Things: How developers sort fields and methods. 88-97 - Aditya Kumar, Andrew Sutton, Bjarne Stroustrup:

Rejuvenating C++ programs through demacrofication. 98-107 - Neha Rungta, Suzette Person, Joshua Branchaud:

A change impact analysis to characterize evolving program behaviors. 109-118 - Amir Reza Yazdanshenas, Leon Moonen

:
Fine-grained change impact analysis for component-based product families. 119-128 - Xiao Qu, Mithun Acharya, Brian Robinson:

Configuration selection using code change impact analysis for regression testing. 129-138 - Andrew Neitsch, Kenny Wong, Michael W. Godfrey:

Build system issues in multilanguage software. 140-149 - Jafar M. Al-Kofahi, Hung Viet Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen

, Tien N. Nguyen:
Detecting semantic changes in Makefile build code. 150-159 - Roman Suvorov, Meiyappan Nagappan, Ahmed E. Hassan, Ying Zou, Bram Adams

:
An empirical study of build system migrations in practice: Case studies on KDE and the Linux kernel. 160-169 - Patrick Mäder, Alexander Egyed:

Assessing the effect of requirements traceability for software maintenance. 171-180 - Hongyu Kuang

, Patrick Mäder, Hao Hu, Achraf Ghabi, LiGuo Huang
, Jian Lv, Alexander Egyed:
Do data dependencies in source code complement call dependencies for understanding requirements traceability? 181-190 - Nasir Ali, Zohreh Sharafi, Yann-Gaël Guéhéneuc, Giuliano Antoniol:

An empirical study on requirements traceability using eye-tracking. 191-200 - Tejinder Dhaliwal, Foutse Khomh, Ying Zou, Ahmed E. Hassan:

Recovering commit dependencies for selective code integration in software product lines. 202-211 - Ameni ben Fadhel, Marouane Kessentini, Philip Langer, Manuel Wimmer:

Search-based detection of high-level model changes. 212-221 - Yoshiki Higo, Shinji Kusumoto:

How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments. 222-231 - Anna Corazza

, Sergio Di Martino
, Valerio Maggio
:
LINSEN: An efficient approach to split identifiers and expand abbreviations. 233-242 - Abram Hindle, Christian Bird, Thomas Zimmermann, Nachiappan Nagappan:

Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? 243-252 - Yuhua Qi, Xiaoguang Mao

, Yan Lei:
Making automatic repair for large-scale programs more efficient using weak recompilation. 254-263 - Masao Ohira, Ahmed E. Hassan, Naoya Osawa, Ken-ichi Matsumoto:

The impact of bug management patterns on bug fixing: A case study of Eclipse projects. 264-273 - Hamid Abdul Basit

, Usman Ali
, Sidra Haque, Stan Jarzabek:
Things structural clones tell that simple clones don't. 275-284 - Gang Zhang, Xin Peng, Zhenchang Xing, Wenyun Zhao:

Cloning practices: Why developers clone and what can be changed. 285-294 - Manar H. Alalfi

, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Models are code too: Near-miss clone detection for Simulink models. 295-304 - Aiko Fallas Yamashita, Leon Moonen

:
Do code smells reflect important maintainability aspects? 306-315 - Tibor Bakota, Péter Hegedüs, Gergely Ladányi, Peter Kortvelyesi, Rudolf Ferenc

, Tibor Gyimóthy
:
A cost model based on software maintainability. 316-325 - Amjed Tahir, Stephen G. MacDonell:

A systematic mapping study on dynamic metrics and software quality. 326-335 - Carlos Noguera, Andy Kellens, Coen De Roover

, Viviane Jonckers:
Refactoring in the presence of annotations. 337-346 - Ali Ouni

, Marouane Kessentini, Houari A. Sahraoui, Mohamed Salah Hamdi:
Search-based refactoring: Towards semantics preservation. 347-356 - Napol Rachatasumrit, Miryung Kim:

An empirical investigation into the impact of refactoring on regression testing. 357-366 - John Businge, Alexander Serebrenik

, Mark van den Brand
:
Survival of Eclipse third-party plug-ins. 368-377 - Steven Raemaekers, Arie van Deursen

, Joost Visser
:
Measuring software library stability through historical version analysis. 378-387 - Hui Song, Gang Huang, Yingfei Xiong

, Yanchun Sun:
Inferring the data access from the clients of generic APIs. 388-397 - Sandro Badame, Danny Dig:

Refactoring meets spreadsheet formulas. 399-409 - Felienne Hermans, Martin Pinzger, Arie van Deursen

:
Detecting code smells in spreadsheet formulas. 409-418 - Ferdian Thung, David Lo

, Lingxiao Jiang
, Lucia, Foyzur Rahman, Premkumar T. Devanbu
:
When would this bug get reported? 420-429 - Rafael Lotufo, Zeeshan Malik, Krzysztof Czarnecki:

Modelling the 'Hurried' bug report reading process to summarize bug reports. 430-439 - André C. Hora

, Nicolas Anquetil
, Stéphane Ducasse, Simon Allier:
Domain specific warnings: Are they any better? 441-450 - Mario Linares Vásquez

, Kamal Hossen, Hoang Dang, Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk
:
Triaging incoming change requests: Bug or commit history, or code authorship? 451-460 - Kenichi Kobayashi

, Manabu Kamimura, Koki Kato, Keisuke Yano
, Akihiko Matsuo:
Feature-gathering dependency-based software clustering using Dedication and Modularity. 462-471 - Mathew Hall

, Neil Walkinshaw
, Phil McMinn:
Supervised software modularisation. 472-481 - Veronika Bauer

, Lars Heinemann, Florian Deissenboeck:
A structured approach to assess third-party library usage. 483-492 - Andreas Thums, Jochen Quante:

Reengineering embedded automotive software. 493-502 - Mario Bernhart, Andreas Mauczka, Michael Fiedler, Stefan Strobl, Thomas Grechenig:

Incremental reengineering and migration of a 40 year old airport operations system. 503-510 - Hidde Boomsma, B. V. Hostnet, Hans-Gerhard Gross:

Dead code elimination for web systems written in PHP: Lessons learned from an industry case. 511-515 - Zoya Durdik, Benjamin Klatt, Heiko Koziolek, Klaus Krogmann, Johannes Stammel, Roland Weiss:

Sustainability guidelines for long-living software systems. 517-526 - Anja Guzzi, Andrew Begel, Jessica K. Miller, Krishna Nareddy:

Facilitating enterprise software developer communication with CARES. 527-536 - Veronika Bauer

, Lars Heinemann, Benjamin Hummel, Elmar Jürgens, Michael Conradt:
A framework for incremental quality analysis of large software systems. 537-546 - Cor-Paul Bezemer

, Andy Zaidman
, Ad van der Hoeven, Andre van de Graaf, Maarten Wiertz, Remko Weijers:
Locating performance improvement opportunities in an industrial software-as-a-service application. 547-556 - Kris De Schutter:

Automated architectural reviews with Semmle. 557-565 - Enyi Tang, Linzhang Wang, Jianhua Zhao, Xuandong Li:

Time-leverage point detection for time sensitive software maintenance. 567-570 - Ju Qian, Xiaoyu Zhou:

Inferring weak references for fixing Java memory leaks. 571-574 - Shuhei Kimura, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:

Move code refactoring with dynamic analysis. 575-578 - James Alexander George Hamilton, Sebastian Danicic:

Dependence communities in source code. 579-582 - Takayuki Omori, Hiroaki Kuwabara, Katsuhisa Maruyama:

A study on repetitiveness of code completion operations. 584-587 - Dave W. Binkley, Dawn J. Lawrie

, Christopher Uehlinger:
Vocabulary normalization improves IR-based concept location. 588-591 - Erik Kouters, Bogdan Vasilescu

, Alexander Serebrenik
, Mark G. J. van den Brand
:
Who's who in Gnome: Using LSA to merge software repository identities. 592-595 - Philips Kokoh Prasetyo, David Lo

, Palakorn Achananuparp
, Yuan Tian, Ee-Peng Lim
:
Automatic classification of software related microblogs. 596-599 - Ferdian Thung, David Lo

, Lingxiao Jiang
:
Detecting similar applications with collaborative tagging. 600-603 - Shaowei Wang, David Lo

, Lingxiao Jiang
:
Inferring semantically related software terms and their taxonomy by leveraging collaborative tagging. 604-607 - Girish Maskeri Rama, Deepthi Karnam, Sree Aurovindh Viswanathan, Srinivas Padmanabhuni:

Version history based source code plagiarism detection in proprietary systems. 609-612 - Aseel Hmood, Mostafa Erfani, Iman Keivanloo, Juergen Rilling:

Applying technical stock market indicators to analyze and predict the evolvability of open source projects. 613-616 - Shinpei Hayashi

, Takayuki Omori, Teruyoshi Zenmyo, Katsuhisa Maruyama, Motoshi Saeki:
Refactoring edit history of source code. 617-620 - Shusi Yu:

Retrieving software maintenance history with topic models. 621-624 - Jerod W. Wilkerson:

A software change impact analysis taxonomy. 625-628 - Foutse Khomh, Hao Yuan, Ying Zou:

Adapting Linux for mobile platforms: An empirical study of Android. 629-632 - Theodoros Chaikalis, George Melas, Alexander Chatzigeorgiou:

SEANets: Software evolution analysis with networks. 634-637 - Timo Kehrer, Udo Kelter, Manuel Ohrndorf, Tim Sollbach:

Understanding model evolution through semantically lifting model differences with SiLift. 638-641 - Gabriele Bavota

, Luigi Colangelo, Andrea De Lucia
, Sabato Fusco, Rocco Oliveto, Annibale Panichella:
TraceME: Traceability Management in Eclipse. 642-645 - Pedro Reales Mateo, Macario Polo Usaola

:
Bacterio: Java mutation testing tool: A framework to evaluate quality of tests cases. 646-649 - Domenico Amalfitano

, Anna Rita Fasolino
, Porfirio Tramontana
, Salvatore De Carmine, Gennaro Imparato:
A toolset for GUI testing of Android applications. 650-653 - Md. Mahfuzul Islam, Alessandro Marchetto

, Angelo Susi, Giuseppe Scanniello
:
MOTCP: A tool for the prioritization of test cases based on a sorting genetic algorithm and Latent Semantic Indexing. 654-657 - Aditya Kumar, Andrew Sutton, Bjarne Stroustrup:

The demacrofier. 658-661 - Isela Macia Bertran, Roberta Arcoverde, Elder Cirilo, Alessandro Garcia, Arndt von Staa:

Supporting the identification of architecturally-relevant code anomalies. 662-665 - Alex Tomasi, Alessandro Marchetto

, Chiara Di Francescomarino, Angelo Susi:
reBPMN: Recovering and reducing business processes. 666-669 - Ricardo Pérez-Castillo

:
MARBLE: Modernization approach for recovering business processes from legacy information systems. 671-676 - Balthasar Weitzel:

Understanding deployment costs of enterprise systems: Towards architecture support in deployment decisions. 677-680

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














