Accepted Papers

Research papers

Clustering Static Analysis Defect Reports to Reduce Maintenance Costs
Zachary P. Fry and Westley Weimer

Automatic Discovery of Function Mappings Between Similar Libraries
Cédric Teyton, Jean-Rémy Falleri, and Xavier Blanc

Understanding project dissemination on a social coding site
Jing Jiang, Li Zhang, and Lei Li

Using Relationships for Matching Textual Domain Models with Existing Code
Raghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, and Sachin Kale

Empirical Evidence of Code Decay: A Systematic Mapping Study
Ajay Bandi, Byron Williams, and Edward Allen

Do Developers Care About Code Smells? - An Exploratory Survey
Aiko Yamashita and Leon Moonen

LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection
Fabien Duchène, Sanjay Rawat, Jean-Luc Richier, and Roland Groz

An Incremental Update Framework for Efficient Retrieval from Software Libraries for Bug Localization
Shivani Rao, Henry Medeiros, Avinash Kak

Find your Library Experts
Cédric Teyton, Jean-Rémy Falleri, Floréal Morandat, and Xavier Blanc

Mining System Specific Rules from Change Patterns
Andre Hora, Nicolas Anquetil, Stéphane Ducasse, and Marco Tulio Valente

Leveraging Specifications of Subcomponents to Mine Precise Specifications of Composite Components
Ziying Dai, Xiaoguang Mao, Yan Lei, and Liqian Chen

Heuristics for Discovering Architectural Violations
Cristiano Maffort, Marco Tulio Valente, Nicolas Anquetil, Andre Hora, and Mariza Bigonha

Towards Automatically Improving Package Structure While Respecting Original Design Decisions
Hani Abdeen, Houari Sahraoui, Osama Shata, Nicolas Anquetil, and Stéphane Ducasse

Automated Library Recommendation
Ferdian Thung, David Lo, and Julia Lawall

Accurate Developer Recommendation for Bug Resolution
Xin Xia, David Lo, Xinyu Wang, and Bo Zhou

What Help do Developers Seek, When and How?
Hongwei Li, Zhenchang Xing, Xin Peng, and Wenyun Zhao

Comparing and Combining Evolutionary Couplings from Interactions and Commits
Fasil Bantelay, Motahareh Bahrami Zanjani, and Huzefa Kagdi

Recommending Move Method Refactorings Using Dependency Sets
Vitor Sales, Ricardo Terra, Luis Miranda, and Marco Tulio Valente

Has this Bug Been Reported?
Kaiping Liu, Hee Beng Kuan Tan, and Hongyu Zhang

A Model-Based Graph-Matching Approach for Design Patterns Detection
Mario Luca Bernardi, Marta Cimitile, and Giuseppe Di Lucca

Who allocated my memory? Detecting custom memory allocators in C binaries
Xi Chen, Asia Slowinska, and Herbert Bos

Static Binary Rewriting without Supplemental Information : Overcoming the tradeoff between coverage and correctness
Matthew Smithson, Khaled Elwazeer, Kapil Anand, Aparna Kotha, and Rajeev Barua

Lehman's Laws in Agile and Non-Agile Projects
Kelley Duran, Gabrielle Burns, and Paul Snell

The Influence of Non-Technical Factors on Code Review
Olga Baysal, Oleksii Kononenko, Reid Holmes, and Mike Godfrey

On the Effectiveness of Accuracy of Automated Feature Location Technique
Takashi Ishio, Shinpei Hayashi, Hiroshi Kazato, and Tsuyoshi Oshima

Automatic Recovery of Root Causes from Bug-Fixing Changes
Ferdian Thung, David Lo, and Lingxiao Jiang

Circe: A Grammar-Based Oracle for Testing Cross-Site Scripting in Web Applications
Andrea Avancini and Mariano Ceccato

Inferring Extended Finite State Machine Models from Software Executions
Neil Walkinshaw, Ramsay Taylor, and John Derrick

MemPick: High-level data structure detection in C/C++ binaries
Istvan Haller, Asia Slowinska, and Herbert Bos

Effects of Cloned Code on Software Maintainability: A Replicated Developer Study
Debarshi Chatterji, Jeffrey Carver, Nicholas A. Kraft, and Jan Harder

Improving SOA Antipattern Detection in Service Based Systems by Mining Execution Traces
Mathieu Nayrolles, Naouel Moha, and Petko Valtchev

Capture-Replay vs. Programmable Web Testing: An Empirical Assessment During Test Case Evolution
Maurizio Leotta, Diego Clerissi, Filippo Ricca, and Paolo Tonella

Reconstructing Program Memory State from Multi-Gigabyte Instruction Traces to Support Interactive Analysis
Brendan Cleary, Patrick Gorman, Eric Verbeek, Margaret-Anne Storey, Martin Salois, and Frédéric Painchaud

Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness
Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh

On the Effect of Program Exploration on Maintenance Tasks
Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Bram Adams

Towards Understanding How Developers Spend Their Effort During Maintenance Activities
Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, and Giuliano Antoniol

Leveraging Historical Co-Change Information for Requirements Traceability
Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan

Distilling Useful Clones by Contextual Differencing
Zhenchang Xing, Yinxing Xue, and Stanislaw Jarzabek

Practice papers

Assessing the Complexity of Upgrading Software Modules
Bram Schoenmakers, Niels van Den Broek, Istvan Nagy, Bogdan Vasilescu, and Alexander Serebrenik

Extracting Business Rules from COBOL: A Model-Based Framework
Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, and Jacques Perronnet

Documenting APIs with Examples: Lessons Learned with the APIMiner Platform
Joao Eduardo Montandon, Hudson Borges, Daniel Félix, and Marco Tulio Valente

Psyb0t Malware: A Step-By-Step Decompilation Case Study
Lukáš Durfina, Jakub Kroustek, and Petr Zemek

Analyzing PL/1 Legacy Ecosystems - An Experience Report
Erik Aeschlimann, Mircea Lungu, Oscar Nierstrasz, and Carl Worms

Evaluating Architecture Stability of Software Projects
Lerina Aversano and Maria Tortorella

Migrating a Large Scale Legacy Application to SOA: Challenges and Lessons Learned
Ravi Khadka, Amir Saeidi, Slinger Jansen, Jurriaan Hage, and Geer P. Haas

ERA papers

Reusing reused code
Tomoya Ishihara, Yoshiki Higo, and Shinji Kusumoto

Specification Extraction by Symbolic Execution
Josef Pichler

An IDE Based Context-Aware Meta Search Engine
Mohammad Masudur Rahman, Shamima Yeasmin, and Chanchal Roy

An Approach to Clone Detection in Behavioural Models
Elizabeth P. Antony, Manar H. Alalfi, and James R. Cordy

Tool demo papers

CCCD: Concolic Code Clone Detection
Daniel Krutz and Emad Shihab

Extracting Business Rules from COBOL: A Model-Based Tool
Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, and Jacques Perronnet

MemPick: data structure detection in C/C++ binaries
Istvan Haller, Asia Slowinska, and Herbert Bos

Detecting Dependencies in Enterprise JavaBeans with SQuAVisiT
Alexandru Sutii, Serguei Roubtsov, and Alexander Serebrenik

Who allocated my memory? Detecting custom memory allocators in C binaries
Xi Chen, Asia Slowinska, and Herbert Bos

Gelato: GEneric LAnguage TOols for Model-Driven Analysis of Legacy Software Systems
Amir Saeidi, Jurriaan Hage, Ravi Khadka, and Slinger Jansen

REdiffs: Refactoring-aware Difference Viewer for Java
Shinpei Hayashi, Sirinut Thangthumachit, and Motoshi Saeki

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License