Research papers
Clustering Static Analysis Defect Reports to Reduce Maintenance Costs
Zachary P. Fry and Westley Weimer
Automatic Discovery of Function Mappings Between Similar Libraries
Cédric Teyton, Jean-Rémy Falleri, and Xavier Blanc
Understanding project dissemination on a social coding site
Jing Jiang, Li Zhang, and Lei Li
Using Relationships for Matching Textual Domain Models with Existing Code
Raghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, and Sachin Kale
Empirical Evidence of Code Decay: A Systematic Mapping Study
Ajay Bandi, Byron Williams, and Edward Allen
Do Developers Care About Code Smells? - An Exploratory Survey
Aiko Yamashita and Leon Moonen
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection
Fabien Duchène, Sanjay Rawat, Jean-Luc Richier, and Roland Groz
An Incremental Update Framework for Efficient Retrieval from Software Libraries for Bug Localization
Shivani Rao, Henry Medeiros, Avinash Kak
Find your Library Experts
Cédric Teyton, Jean-Rémy Falleri, Floréal Morandat, and Xavier Blanc
Mining System Specific Rules from Change Patterns
Andre Hora, Nicolas Anquetil, Stéphane Ducasse, and Marco Tulio Valente
Leveraging Specifications of Subcomponents to Mine Precise Specifications of Composite Components
Ziying Dai, Xiaoguang Mao, Yan Lei, and Liqian Chen
Heuristics for Discovering Architectural Violations
Cristiano Maffort, Marco Tulio Valente, Nicolas Anquetil, Andre Hora, and Mariza Bigonha
Towards Automatically Improving Package Structure While Respecting Original Design Decisions
Hani Abdeen, Houari Sahraoui, Osama Shata, Nicolas Anquetil, and Stéphane Ducasse
Automated Library Recommendation
Ferdian Thung, David Lo, and Julia Lawall
Accurate Developer Recommendation for Bug Resolution
Xin Xia, David Lo, Xinyu Wang, and Bo Zhou
What Help do Developers Seek, When and How?
Hongwei Li, Zhenchang Xing, Xin Peng, and Wenyun Zhao
Comparing and Combining Evolutionary Couplings from Interactions and Commits
Fasil Bantelay, Motahareh Bahrami Zanjani, and Huzefa Kagdi
Recommending Move Method Refactorings Using Dependency Sets
Vitor Sales, Ricardo Terra, Luis Miranda, and Marco Tulio Valente
Has this Bug Been Reported?
Kaiping Liu, Hee Beng Kuan Tan, and Hongyu Zhang
A Model-Based Graph-Matching Approach for Design Patterns Detection
Mario Luca Bernardi, Marta Cimitile, and Giuseppe Di Lucca
Who allocated my memory? Detecting custom memory allocators in C binaries
Xi Chen, Asia Slowinska, and Herbert Bos
Static Binary Rewriting without Supplemental Information : Overcoming the tradeoff between coverage and correctness
Matthew Smithson, Khaled Elwazeer, Kapil Anand, Aparna Kotha, and Rajeev Barua
Lehman's Laws in Agile and Non-Agile Projects
Kelley Duran, Gabrielle Burns, and Paul Snell
The Influence of Non-Technical Factors on Code Review
Olga Baysal, Oleksii Kononenko, Reid Holmes, and Mike Godfrey
On the Effectiveness of Accuracy of Automated Feature Location Technique
Takashi Ishio, Shinpei Hayashi, Hiroshi Kazato, and Tsuyoshi Oshima
Automatic Recovery of Root Causes from Bug-Fixing Changes
Ferdian Thung, David Lo, and Lingxiao Jiang
Circe: A Grammar-Based Oracle for Testing Cross-Site Scripting in Web Applications
Andrea Avancini and Mariano Ceccato
Inferring Extended Finite State Machine Models from Software Executions
Neil Walkinshaw, Ramsay Taylor, and John Derrick
MemPick: High-level data structure detection in C/C++ binaries
Istvan Haller, Asia Slowinska, and Herbert Bos
Effects of Cloned Code on Software Maintainability: A Replicated Developer Study
Debarshi Chatterji, Jeffrey Carver, Nicholas A. Kraft, and Jan Harder
Improving SOA Antipattern Detection in Service Based Systems by Mining Execution Traces
Mathieu Nayrolles, Naouel Moha, and Petko Valtchev
Capture-Replay vs. Programmable Web Testing: An Empirical Assessment During Test Case Evolution
Maurizio Leotta, Diego Clerissi, Filippo Ricca, and Paolo Tonella
Reconstructing Program Memory State from Multi-Gigabyte Instruction Traces to Support Interactive Analysis
Brendan Cleary, Patrick Gorman, Eric Verbeek, Margaret-Anne Storey, Martin Salois, and Frédéric Painchaud
Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness
Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh
On the Effect of Program Exploration on Maintenance Tasks
Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Bram Adams
Towards Understanding How Developers Spend Their Effort During Maintenance Activities
Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, and Giuliano Antoniol
Leveraging Historical Co-Change Information for Requirements Traceability
Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan
Distilling Useful Clones by Contextual Differencing
Zhenchang Xing, Yinxing Xue, and Stanislaw Jarzabek
Practice papers
Assessing the Complexity of Upgrading Software Modules
Bram Schoenmakers, Niels van Den Broek, Istvan Nagy, Bogdan Vasilescu, and Alexander Serebrenik
Extracting Business Rules from COBOL: A Model-Based Framework
Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, and Jacques Perronnet
Documenting APIs with Examples: Lessons Learned with the APIMiner Platform
Joao Eduardo Montandon, Hudson Borges, Daniel Félix, and Marco Tulio Valente
Psyb0t Malware: A Step-By-Step Decompilation Case Study
Lukáš Durfina, Jakub Kroustek, and Petr Zemek
Analyzing PL/1 Legacy Ecosystems - An Experience Report
Erik Aeschlimann, Mircea Lungu, Oscar Nierstrasz, and Carl Worms
Evaluating Architecture Stability of Software Projects
Lerina Aversano and Maria Tortorella
Migrating a Large Scale Legacy Application to SOA: Challenges and Lessons Learned
Ravi Khadka, Amir Saeidi, Slinger Jansen, Jurriaan Hage, and Geer P. Haas
ERA papers
Reusing reused code
Tomoya Ishihara, Yoshiki Higo, and Shinji Kusumoto
Specification Extraction by Symbolic Execution
Josef Pichler
An IDE Based Context-Aware Meta Search Engine
Mohammad Masudur Rahman, Shamima Yeasmin, and Chanchal Roy
An Approach to Clone Detection in Behavioural Models
Elizabeth P. Antony, Manar H. Alalfi, and James R. Cordy
Tool demo papers
CCCD: Concolic Code Clone Detection
Daniel Krutz and Emad Shihab
Extracting Business Rules from COBOL: A Model-Based Tool
Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, and Jacques Perronnet
MemPick: data structure detection in C/C++ binaries
Istvan Haller, Asia Slowinska, and Herbert Bos
Detecting Dependencies in Enterprise JavaBeans with SQuAVisiT
Alexandru Sutii, Serguei Roubtsov, and Alexander Serebrenik
Who allocated my memory? Detecting custom memory allocators in C binaries
Xi Chen, Asia Slowinska, and Herbert Bos
Gelato: GEneric LAnguage TOols for Model-Driven Analysis of Legacy Software Systems
Amir Saeidi, Jurriaan Hage, Ravi Khadka, and Slinger Jansen
REdiffs: Refactoring-aware Difference Viewer for Java
Shinpei Hayashi, Sirinut Thangthumachit, and Motoshi Saeki