The Community for Technology Leaders
Software Engineering, International Conference on (2010)
Cape Town, South Africa
May 2, 2010 to May 8, 2010
ISBN: 978-1-60558-719-6
TABLE OF CONTENTS
Papers

South Africa and the world beyond 2010: the latest scenarios (Abstract)

Clem Sunter , Scenario Planning, South Africa
pp. 1

Beyond hacking: an SOS! (Abstract)

Fred B. Schneider , Cornell University
pp. 2

Efficient hybrid typestate analysis by determining continuation-equivalent states (Abstract)

Eric Bodden , Technische Universität Darmstadt, Germany
pp. 5-14

Online inference and enforcement of temporal properties (Abstract)

Mark Gabel , University of California at Davis
Zhendong Su , University of California at Davis
pp. 15-24

Quality of service profiling (Abstract)

Sasa Misailovic , MIT CSAIL
Stelios Sidiroglou , MIT CSAIL
Henry Hoffmann , MIT CSAIL
Martin Rinard , MIT CSAIL
pp. 25-34

Collaborative reliability prediction of service-oriented systems (Abstract)

Zibin Zheng , The Chinese University of Hong Kong, Hong Kong, China
Michael R. Lyu , The Chinese University of Hong Kong, Hong Kong, China
pp. 35-44

A discriminative model approach for accurate duplicate bug report retrieval (Abstract)

Chengnian Sun , National University of Singapore
David Lo , Singapore Management University
Xiaoyin Wang , Peking University, Ministry of Education
Jing Jiang , Singapore Management University
Siau-Cheng Khoo , National University of Singapore
pp. 45-54

Has the bug really been fixed? (Abstract)

Zhongxian Gu , University of California at Davis
Earl T. Barr , University of California at Davis
David J. Hamilton , University of California at Davis
Zhendong Su , University of California at Davis
pp. 55-64

An exploratory study of fault-proneness in evolving aspect-oriented programs (Abstract)

Fabiano Ferrari , University of São Paulo - USP, São Carlos, Brazil
Rachel Burrows , Pontifical Catholic University of Rio de Janeiro - PUC-Rio, Rio de Janeiro, Brazil and Lancaster University, Lancaster, United Kingdom
Otávio Lemos , Federal University of São Paulo - UNIFESP, S.J. Campos, Brazil
Alessandro Garcia , Pontifical Catholic University of Rio de Janeiro - PUC-Rio, Rio de Janeiro, Brazil
Eduardo Figueiredo , Lancaster University, Lancaster, United Kingdom
Nelio Cacho , Federal University of Rio Grande do Norte - UFRN, Natal, Brazil
Frederico Lopes , Federal University of Rio Grande do Norte - UFRN, Natal, Brazil
Nathalia Temudo , University of Pernambuco - UPE, Recife, Brazil
Liana Silva , University of Pernambuco - UPE, Recife, Brazil
Sergio Soares , Federal University of Pernambuco - UFPE, Recife, Brazil
Awais Rashid , Lancaster University, Lancaster, United Kingdom
Paulo Masiero , University of São Paulo - USP, São Carlos, Brazil
Thais Batista , Federal University of Rio Grande do Norte - UFRN, Natal, Brazil
José Maldonado , University of São Paulo - USP, São Carlos, Brazil
pp. 65-74

Archface: a contract place where architectural design and code meet together (Abstract)

Naoyasu Ubayashi , Kyushu University, Fukuoka, Japan
Jun Nomura , Kyushu Institute of Technology, Fukuoka, Japan
Tetsuo Tamai , University of Tokyo, Tokyo, Japan
pp. 75-84

Developing next generation ADLs through MDE techniques (Abstract)

Davide Di Ruscio , Università dell'Aquila, Via Vetoio, L'Aquila, Italy
Ivano Malavolta , Università dell'Aquila, Via Vetoio, L'Aquila, Italy
Henry Muccini , Università dell'Aquila, Via Vetoio, L'Aquila, Italy
Patrizio Pelliccione , Università dell'Aquila, Via Vetoio, L'Aquila, Italy
Alfonso Pierantonio , Università dell'Aquila, Via Vetoio, L'Aquila, Italy
pp. 85-94

Software traceability with topic modeling (Abstract)

Hazeline U. Asuncion , University of California, Irvine
Arthur U. Asuncion , University of California, Irvine
Richard N. Taylor , University of California, Irvine
pp. 95-104

An analysis of the variability in forty preprocessor-based software product lines (Abstract)

Jörg Liebig , University of Passau
Sven Apel , University of Passau
Christian Lengauer , University of Passau
Christian Kästner , University of Magdeburg
Michael Schulze , University of Magdeburg
pp. 105-114

A large-scale empirical study of practitioners' use of object-oriented concepts (Abstract)

Tony Gorschek , Blekinge Institute of Technology, Ronneby Sweden
Ewan Tempero , Auckland University, Auckland, New Zealand
Lefteris Angelis , Aristotle University of Thessaloniki, Thessaloniki, Greece
pp. 115-124

Codebook: discovering and exploiting relationships in software repositories (Abstract)

Andrew Begel , Microsoft Research, Redmond, WA
Yit Phang Khoo , University of Maryland, College Park, MD
Thomas Zimmermann , Microsoft Research, Redmond, WA
pp. 125-134

Liability in software engineering: overview of the LISE approach and illustration on a case study (Abstract)

Daniel Le Métayer , LICIT, INRIA Grenoble Rhône-Alpes
Manuel Maarek , LICIT, INRIA Grenoble Rhône-Alpes
Valérie Viet Triem Tong , SSIR, Supélec Rennes
Eduardo Mazza , University of Grenoble
Marie-Laure Potet , University of Grenoble
Nicolas Craipeau , University of Caen, Basse-Normandie
Stéphane Frénot , AMAZONES, INRIA Grenoble Rhône-Alpes, INSA Lyon
Ronan Hardouin , University of Versailles, Saint-Quentin-en-Yvelines
pp. 135-144

An exploratory study of the evolution of software licensing (Abstract)

Massimiliano Di Penta , University of Sannio, Italy
Daniel M. German , University of Victoria, Canada
Yann-Gaël Guéhéneuc , École Polytechnique de Montréal, Canada
Giuliano Antoniol , École Polytechnique de Montréal, Canada
pp. 145-154

A machine learning approach for tracing regulatory codes to product specific requirements (Abstract)

Jane Cleland-Huang , DePaul University, Chicago
Adam Czauderna , DePaul University, Chicago
Marek Gibiec , DePaul University, Chicago
John Emenecker , DePaul University, Chicago
pp. 155-164

Supporting developers with natural language queries (Abstract)

Michael Würsch , University of Zurich, Switzerland
Giacomo Ghezzi , University of Zurich, Switzerland
Gerald Reif , University of Zurich, Switzerland
Harald C. Gall , University of Zurich, Switzerland
pp. 165-174

Using information fragments to answer the questions developers ask (Abstract)

Thomas Fritz , University of British Columbia, Vancouver, BC, Canada
Gail C. Murphy , University of British Columbia, Vancouver, BC, Canada
pp. 175-184

Developers ask reachability questions (Abstract)

Thomas D. LaToza , Carnegie Mellon University
Brad A. Myers , Carnegie Mellon University
pp. 185-194

Mining API mapping for language migration (Abstract)

Hao Zhong , Chinese Academy of Sciences, Beijing, China and Peking University, China
Suresh Thummalapenta , North Carolina State University, Raleigh, NC
Tao Xie , North Carolina State University, Raleigh, NC
Lu Zhang , Peking University, China
Qing Wang , Institute of Software, Beijing, China
pp. 195-204

Using twinning to adapt programs to alternative APIs (Abstract)

Marius Nita , University of Washington
David Notkin , University of Washington
pp. 205-214

Oracle-guided component-based program synthesis (Abstract)

Susmit Jha , UC Berkeley
Sumit Gulwani , Microsoft Research
Sanjit A. Seshia , UC Berkeley
Ashish Tiwari , SRI International
pp. 215-224

Test generation through programming in UDITA (Abstract)

Milos Gligoric , University of Illinois, Urbana, IL
Tihomir Gvero , Ecole Polytechnique Fédérale, Lausanne, Switzerland
Vilas Jagannath , University of Illinois, Urbana, IL
Sarfraz Khurshid , University of Texas, Austin, TX
Viktor Kuncak , Ecole Polytechnique Fédérale, Lausanne, Switzerland
Darko Marinov , University of Illinois, Urbana, IL
pp. 225-234

Detecting atomic-set serializability violations in multithreaded programs through active randomized testing (Abstract)

Zhifeng Lai , Hong Kong University of Science and Technology, Kowloon, Hong Kong
S. C. Cheung , Hong Kong University of Science and Technology, Kowloon, Hong Kong
W. K. Chan , City University of Hong Kong, Tat Chee Avenue, Hong Kong
pp. 235-244

Falcon: fault localization in concurrent programs (Abstract)

Sangmin Park , Georgia Institute of Technology
Richard W. Vuduc , Georgia Institute of Technology
Mary Jean Harrold , Georgia Institute of Technology
pp. 245-254

Adaptive bug isolation (Abstract)

Piramanayagam Arumuga Nainar , University of Wisconsin--Madison
Ben Liblit , University of Wisconsin--Madison
pp. 255-264

Practical fault localization for dynamic web applications (Abstract)

Shay Artzi , IBM T.J. Watson Research Center, Yorktown Heights, NY
Julian Dolby , IBM T.J. Watson Research Center, Yorktown Heights, NY
Frank Tip , IBM T.J. Watson Research Center, Yorktown Heights, NY
Marco Pistoia , IBM T.J. Watson Research Center, Yorktown Heights, NY
pp. 265-274

Moving into a new software project landscape (Abstract)

Barthélémy Dagenais , McGill University, Montréal, QC, Canada
Harold Ossher , IBM T.J. Watson Research Center, Yorktown Heights, NY
Rachel K. E. Bellamy , IBM T.J. Watson Research Center, Yorktown Heights, NY
Martin P. Robillard , McGill University, Montréal, QC, Canada
Jacqueline P. de Vries , IBM T.J. Watson Research Center, Yorktown Heights, NY
pp. 275-284

Organizing self-organizing teams (Abstract)

Rashina Hoda , Victoria University of Wellington, Wellington, New Zealand
James Noble , Victoria University of Wellington, Wellington, New Zealand
Stuart Marshall , Victoria University of Wellington, Wellington, New Zealand
pp. 285-294

StakeNet: using social networks to analyse the stakeholders of large-scale software projects (Abstract)

Soo Ling Lim , University College London, United Kingdom
Daniele Quercia , MIT SENSEable City Lab, Cambridge
Anthony Finkelstein , University College London, United Kingdom
pp. 295-304

Identifying crosscutting concerns using historical code changes (Abstract)

Bram Adams , Queen's University, Canada
Zhen Ming Jiang , Queen's University, Canada
Ahmed E. Hassan , Queen's University, Canada
pp. 305-314

Recurring bug fixes in object-oriented programs (Abstract)

Tung Thanh Nguyen , Iowa State University
Hoan Anh Nguyen , Iowa State University
Nam H. Pham , Iowa State University
Jafar Al-Kofahi , Iowa State University
Tien N. Nguyen , Iowa State University
pp. 315-324

AURA: a hybrid approach to identify framework evolution (Abstract)

Wei Wu , DGIGL, École Polytechnique de Montréal, Canada
Yann-Gaël Guéhéneuc , DGIGL, École Polytechnique de Montréal, Canada
Giuliano Antoniol , DGIGL, École Polytechnique de Montréal, Canada
Miryung Kim , The University of Texas at Austin
pp. 325-334

Model checking lots of systems: efficient verification of temporal properties in software product lines (Abstract)

Andreas Classen , University of Namur, Belgium
Patrick Heymans , University of Namur, Belgium
Pierre-Yves Schobbens , University of Namur, Belgium
Axel Legay , IRISA/INRIA Rennes, France
Jean-François Raskin , Université Libre de Bruxelles, Belgium
pp. 335-344

A cut-off approach for bounded verification of parameterized systems (Abstract)

Qiusong Yang , Institute of Software, Beijing, P.R. China
Mingshu Li , Institute of Software, Beijing, P.R. China
pp. 345-354

An empirical study of optimizations in YOGI (Abstract)

Aditya V. Nori , Microsoft Research India
Sriram K. Rajamani , Microsoft Research India
pp. 355-364

Linking e-mails and source code artifacts (Abstract)

Alberto Bacchelli , University of Lugano
Michele Lanza , University of Lugano
Romain Robbes , University of Chile & University of Lugano
pp. 375-384

A degree-of-knowledge model to capture source code familiarity (Abstract)

Thomas Fritz , University of British Columbia, Vancouver, BC, Canada
Jingwen Ou , University of British Columbia, Vancouver, BC, Canada
Gail C. Murphy , University of British Columbia, Vancouver, BC, Canada
Emerson Murphy-Hill , University of British Columbia, Vancouver, BC, Canada
pp. 385-394

Views: object-inspired concurrency control (Abstract)

Brian Demsky , University of California, Irvine
Patrick Lam , University of Waterloo
pp. 395-404

Engineering parallel applications with tunable architectures (Abstract)

Christoph A. Schaefer , Karlsruhe Institute of Technology, IPD, Karlsruhe, Germany
Victor Pankratius , Karlsruhe Institute of Technology, IPD, Karlsruhe, Germany
Walter F. Tichy , Karlsruhe Institute of Technology, IPD, Karlsruhe, Germany
pp. 405-414

From behaviour preservation to behaviour modification: constraint-based mutant generation (Abstract)

Friedrich Steimann , Lehrgebiet Programmiersysteme, Fakultät für Mathematik und Informatik, Fernuniversität in Hagen, Hagen
Andreas Thies , Lehrgebiet Programmiersysteme, Fakultät für Mathematik und Informatik, Fernuniversität in Hagen, Hagen
pp. 425-434

Is operator-based mutant selection superior to random mutant selection? (Abstract)

Lu Zhang , Peking University, Beijing, China
Shan-Shan Hou , Peking University, Beijing, China
Jun-Jue Hu , Peking University, Beijing, China
Tao Xie , North Carolina State University, Raleigh, NC
Hong Mei , Peking University, Beijing, China
pp. 435-444

Using symbolic evaluation to understand behavior in configurable software systems (Abstract)

Elnatan Reisner , University of Maryland, College Park
Charles Song , University of Maryland, College Park
Kin-Keung Ma , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park
Adam Porter , University of Maryland, College Park
pp. 445-454

Code bubbles: rethinking the user interface paradigm of integrated development environments (Abstract)

Andrew Bragdon , Brown University
Steven P. Reiss , Brown University
Robert Zeleznik , Brown University
Suman Karumuri , Brown University
William Cheung , Brown University
Joshua Kaplan , Brown University
Christopher Coleman , Brown University
Ferdi Adeputra , Brown University
Joseph J. LaViola , University of Central Florida
pp. 455-464

Customized awareness: recommending relevant external change events (Abstract)

Reid Holmes , University of Washington, Seattle, WA
Robert J. Walker , University of Calgary, Calgary, AB, Canada
pp. 465-474

A search engine for finding highly relevant applications (Abstract)

Mark Grechanik , Accenture Technology Labs, Chicago, IL
Chen Fu , Accenture Technology Labs, Chicago, IL
Qing Xie , Accenture Technology Labs, Chicago, IL
Collin McMillan , The College of William and Mary, Williamsburg, VA
Denys Poshyvanyk , The College of William and Mary, Williamsburg, VA
Chad Cumby , Accenture Technology Labs, Chicago, IL
pp. 475-484

An empirical study of reported bugs in server software with implications for automated bug diagnosis (Abstract)

Swarup Kumar Sahoo , University of Illinois, Urbana, IL
John Criswell , University of Illinois, Urbana, IL
Vikram Adve , University of Illinois, Urbana, IL
pp. 485-494

Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows (Abstract)

Philip J. Guo , Stanford University
Thomas Zimmermann , Microsoft Research
Nachiappan Nagappan , Microsoft Research
Brendan Murphy , Microsoft Research
pp. 495-504

Summarizing software artifacts: a case study of bug reports (Abstract)

Sarah Rastkar , University of British Columbia
Gail C. Murphy , University of British Columbia
Gabriel Murray , University of British Columbia
pp. 505-514

LEAKPOINT: pinpointing the causes of memory leaks (Abstract)

James Clause , Georgia Institute of Technology
Alessandro Orso , Georgia Institute of Technology
pp. 515-524

Precise calling context encoding (Abstract)

William N. Sumner , Purdue University
Yunhui Zheng , Purdue University
Dasarath Weeratunge , Purdue University
Xiangyu Zhang , Purdue University
pp. 525-534

Effective interprocedural resource leak detection (Abstract)

Emina Torlak , IBM T.J. Watson Research Center
Satish Chandra , IBM T.J. Watson Research Center
pp. 535-544

Measuring complexity, effectiveness and efficiency in software course projects (Abstract)

Wilson Pádua , Federal University of Minas Gerais, Nova Lima -- MG -- Brazil
pp. 545-554

Advanced hands-on training for distributed and outsourced software engineering (Abstract)

Martin Nordio , ETH Zurich, Zurich, Switzerland
Roman Mitin , ETH Zurich, Zurich, Switzerland
Bertrand Meyer , ETH Zurich, Zurich, Switzerland
pp. 555-558

A HOT --- Human, Organizational and Technological --- framework for a software engineering course (Abstract)

Orit Hazzan , Israel Institute of Technology, Haifa, Israel
Yael Dubinsky , IBM Haifa Research Lab, Mount Carmel, Haifa, Israel
pp. 559-566

An empirical analysis of team review approaches for teaching quality software development (Abstract)

Amna Humayun , National University of Computer and Emerging Sciences, Pakistan
Wafa Basit , National University of Computer and Emerging Sciences, Pakistan
Ghulam A. Farrukh , University of Agriculture Faisalabad, Pakistan
Fakhar Lodhi , National University of Computer and Emerging Sciences, Pakistan
Rabea Aden , National University of Computer and Emerging Sciences, Pakistan
pp. 567-575

An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (Abstract)

Norsaremah Salleh , University of Auckland, New Zealand
Emilia Mendes , University of Auckland, New Zealand
John Grundy , Swinburne University of Technology, Australia
Giles St. J Burch , University of Auckland, New Zealand
pp. 577-586

The educational value of mapping studies of software engineering literature (Abstract)

Barbara Kitchenham , Keele University, Keele, Staffordshire
Pearl Brereton , Keele University, Keele, Staffordshire
David Budgen , Durham University, UK
pp. 589-598
92 ms
(Ver 3.3 (11022016))