The Community for Technology Leaders
2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER) (2015)
Montreal, QC, Canada
March 2, 2015 to March 6, 2015
ISBN: 978-1-4799-8469-5
TABLE OF CONTENTS

[Front cover] (PDF)

pp. c1

[Title pages] (PDF)

pp. i-ii

Contents (PDF)

pp. 1-6

Message from the chairs (PDF)

Yann-Gael Gueheneuc , Polytechnique Montreal, Canada
Alexander Serebrenik , Eindhoven University of Technology, The Netherlands
Bram Adams , Polytechnique Montreal, Canada
Naouel Moha , UQÀM, Canada
Nikolaos Tsantalis , Concordia U., Canada
Ralf Lammel , University of Koblenz-Landau, Germany
Peter C. Rigby , Concordia University, Canada
Jens Krinke , University College London, UK
Bonita Sharif , Youngstown State University, USA
Jane Huffman Hayes , University of Kentucky, USA
Marianne Huchard , University of Montpellier 2, France
Foutse Khomh , Polytechnique Montreal, Canada
Wahab Hamou-Lhadj , Concordia University, Canada
Francesca Arcelli Fontana , University of Milano Bicocca, Italy
Emily Hill , Drew University, USA
pp. iii-vii

SANER 2015 committees (PDF)

pp. viii-xiv

On whose shoulders? (Keynote) (PDF)

Jane Cleland-Huang , DePaul University, USA
pp. 1

Modeling the evolution of development topics using Dynamic Topic Models (Abstract)

Jiajun Hu , School of Information Engineering, Yangzhou University, China
Xiaobing Sun , School of Information Engineering, Yangzhou University, China
David Lo , School of Information Systems, Singapore Management University, Singapore
Bin Li , School of Information Engineering, Yangzhou University, China
pp. 3-12

Understanding developers' natural language queries with interactive clarification (Abstract)

Shihai Jiang , Software School, Fudan University, Shanghai, China
Liwei Shen , Software School, Fudan University, Shanghai, China
Xin Peng , Software School, Fudan University, Shanghai, China
Zhaojin Lv , Software School, Fudan University, Shanghai, China
Wenyun Zhao , Software School, Fudan University, Shanghai, China
pp. 13-22

Mining Multi-level API Usage Patterns (Abstract)

Mohamed Aymen Saied , DIRO, Université de Montréal, Canada
Omar Benomar , DIRO, Université de Montréal, Canada
Hani Abdeen , DIRO, Université de Montréal, Canada
Houari Sahraoui , DIRO, Université de Montréal, Canada
pp. 23-32

An observational study on API usage constraints and their documentation (Abstract)

Mohamed Aymen Saied , DIRO, Université de Montréal, Canada
Houari Sahraoui , DIRO, Université de Montréal, Canada
Bruno Dufour , DIRO, Université de Montréal, Canada
pp. 33-42

Improving pattern tracking with a language-aware tree differencing algorithm (Abstract)

Nicolas Palix , Grenoble - Alps University/UJF, LIG-Erods, France
Jean-Remy Falleri , Univ. Bordeaux, LaBRI, UMR 5800, France
Julia Lawall , Inria/LIP6/UPMC/Sorbonne University, France
pp. 43-52

Measuring the quality of design pattern detection results (Abstract)

Shouzheng Yang , York University, Toronto, Ontario, Canada
Ayesha Manzer , York University, Toronto, Ontario, Canada
Vassilios Tzerpos , York University, Toronto, Ontario, Canada
pp. 53-62

Are PHP applications ready for Hack? (Abstract)

Laleh Eshkevari , Department of Génie Informatique et Génie Logiciel, Ecole Polytechnique de Montréal, Canada
Fabien Dos Santos , Departement Informatique et Gestion, Ecole Polytechnique Universitaire de Montpellier, France
James R. Cordy , School of Computing, Queen's University, Canada
Giuliano Antoniol , Department of Génie Informatique et Génie Logiciel, Ecole Polytechnique de Montréal, Canada
pp. 63-72

Does JavaScript software embrace classes? (Abstract)

Leonardo Humberto Silva , Federal Institute of Northern Minas Gerais, Brazil
Miguel Ramos , Federal University of Minas Gerais, Brazil
Marco Tulio Valente , Federal University of Minas Gerais, Brazil
Alexandre Bergel , Department of Computer Science, DCC - Pleiad Lab, University of Chile, Chile
Nicolas Anquetil , RMoD Project-Team, INRIA Lille Nord Europe, France
pp. 73-82

Evolution analysis for Accessibility Excessiveness in Java (Abstract)

Kazuo Kobori , NTT DATA Corporation, 3-3-3, Toyosu, Koto, Tokyo 135-6033, Japan
Makoto Matsushita , Osaka University, 1-5 Yamadaoka, Suita, 565-0871, Japan
Katsuro Inoue , Osaka University, 1-5 Yamadaoka, Suita, 565-0871, Japan
pp. 83-90

A software quality model for RPG (Abstract)

Gergely Ladanyi , University of Szeged, Department of Software Engineering, Dugonics tér 13. H-6720, Hungary
Zoltan Toth , University of Szeged, Department of Software Engineering, Dugonics tér 13. H-6720, Hungary
Rudolf Ferenc , University of Szeged, Department of Software Engineering, Dugonics tér 13. H-6720, Hungary
Tibor Keresztesi , R&R Software, H-1038 Budapest, Ráby Mátyás utca 7, Hungary
pp. 91-100

JCHARMING: A bug reproduction approach using crash traces and directed model checking (Abstract)

Mathieu Nayrolles , SBA Research Lab, ECE, Concordia University, Montréal, Canada
Abdelwahab Hamou-Lhadj , SBA Research Lab, ECE, Concordia University, Montréal, Canada
Sofiene Tahar , ECE Department, Concordia University, Montréal, Canada
Alf Larsson , PLF System Management, Ericsson, R & D, Stockholm, Sweden
pp. 101-110

Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (Abstract)

Luay Alawneh , Department of Software Engineering, Jordan University of Science & Technology, Irbid, Jordan
Abdelwahab Hamou-Lhadj , SBA Research Lab, Electrical and Computer Engineering, Concordia University, Montreal, QC, Canada
Jameleddine Hassine , Department of Information and Computer Science, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
pp. 111-120

Automated extraction of failure reproduction steps from user interaction traces (Abstract)

Tobias Roehm , Technische Universität München, Munich, Germany
Stefan Nosovic , Technische Universität München, Munich, Germany
Bernd Bruegge , Technische Universität München, Munich, Germany
pp. 121-130

Misery loves company: CrowdStacking traces to aid problem detection (Abstract)

Tommaso Dal Sasso , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Andrea Mocci , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Michele Lanza , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
pp. 131-140

Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (Abstract)

Patanamon Thongtanunam , Nara Institute of Science and Technology, Japan
Chakkrit Tantithamthavorn , Nara Institute of Science and Technology, Japan
Raula Gaikovina Kula , Osaka University, Japan
Norihiro Yoshida , Nagoya University, Japan
Hajimu Iida , Nara Institute of Science and Technology, Japan
Ken-ichi Matsumoto , Nara Institute of Science and Technology, Japan
pp. 141-150

Code review: Veni, ViDI, vici (Abstract)

Yuriy Tymchuk , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Andrea Mocci , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Michele Lanza , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
pp. 151-160

Would static analysis tools help developers with code reviews? (Abstract)

Sebastiano Panichella , University of Zurich, Department of Informatics, Switzerland
Venera Arnaoudova , Polytechnique Montréal, Canada
Massimiliano Di Penta , Dept. of Engineering, University of Sannio, Italy
Giuliano Antoniol , Polytechnique Montréal, Canada
pp. 161-170

Do code review practices impact design quality? A case study of the Qt, VTK, and ITK projects (Abstract)

Rodrigo Morales , SWAT, Polytechnique Montréal, Canada
Shane McIntosh , School of Computing, Queen's University, Canada
Foutse Khomh , SWAT, Polytechnique Montréal, Canada
pp. 171-180

Scaling up evaluation of code search tools through developer usage metrics (Abstract)

Kostadin Damevski , Virginia State University, Petersburg, 23806, U.S.A.
David C. Shepherd , ABB, Inc., Raleigh, NC 27606, U.S.A.
Lori Pollock , University of Delaware, Newark, 19350, U.S.A.
pp. 181-190

Threshold-free code clone detection for a large-scale heterogeneous Java repository (Abstract)

Iman Keivanloo , Department of Electrical and Computer Engineering, Queen's University, Kingston, Ontario, Canada
Feng Zhang , School of Computing, Queen's University, Kingston, Ontario, Canada
Ying Zou , Department of Electrical and Computer Engineering, Queen's University, Kingston, Ontario, Canada
pp. 201-210

Detecting duplicate bug reports with software engineering domain knowledge (Abstract)

Karan Aggarwal , Department of Computing Science, University of Alberta, Edmonton, Canada
Tanner Rutgers , Department of Computing Science, University of Alberta, Edmonton, Canada
Finbarr Timbers , Department of Computing Science, University of Alberta, Edmonton, Canada
Abram Hindle , Department of Computing Science, University of Alberta, Edmonton, Canada
Russ Greiner , Department of Computing Science, University of Alberta, Edmonton, Canada
Eleni Stroulia , Department of Computing Science, University of Alberta, Edmonton, Canada
pp. 211-220

Impact analysis based on a global hierarchical Object Graph (Abstract)

Marwan Abi-Antoun , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
Yibin Wang , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
Ebrahim Khalaj , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
Andrew Giang , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
Vaclav Rajlich , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
pp. 221-230

A framework for cost-effective dependence-based dynamic impact analysis (Abstract)

Haipeng Cai , University of Notre Dame, Indiana, USA
Raul Santelices , University of Notre Dame, Indiana, USA
pp. 231-240

Circular dependencies and change-proneness: An empirical study (Abstract)

Tosin Daniel Oyetoyan , Department of Computer and Information Systems, Norwegian University of Science and Technology, Trondheim, Norway
Jean-Remy Falleri , LaBRI, University of Bordeaux, France
Jens Dietrich , School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand
Kamil Jezek , Department of Computer Science and Engineering, University of West Bohemia, Pilsen, Czech Republic
pp. 241-250

An empirical study of work fragmentation in software evolution tasks (Abstract)

Heider Sanchez , Computer Science Department (DCC), University of Chile, Chile
Romain Robbes , Computer Science Department (DCC), University of Chile, Chile
Victor M. Gonzalez , Department of Computer Science, Instituto Tecnologico Autonomo de Mexico, Mexico
pp. 251-260

Library functions identification in binary code by using graph isomorphism testings (Abstract)

Jing Qiu , School of Computer Science and Technology, Harbin Institute of Technology, China
Xiaohong Su , School of Computer Science and Technology, Harbin Institute of Technology, China
Peijun Ma , School of Computer Science and Technology, Harbin Institute of Technology, China
pp. 261-270

A non-convex abstract domain for the value analysis of binaries (Abstract)

Sven Mattsen , Hamburg University of Technology, Germany
Arne Wichmann , Hamburg University of Technology, Germany
Sibylle Schupp , Hamburg University of Technology, Germany
pp. 271-280

Precision vs. scalability: Context sensitive analysis with prefix approximation (Abstract)

Raveendra Kumar Medicherla , TCS Limited, Bangalore, India
Raghavan Komondoor , Indian Institute of Science, Bangalore, India
pp. 281-290

MG++: Memory graphs for analyzing dynamic data structures (Abstract)

Vineet Singh , University of California, Riverside, USA
Rajiv Gupta , University of California, Riverside, USA
Iulian Neamtiu , University of California, Riverside, USA
pp. 291-300

SQA-Profiles: Rule-based activity profiles for Continuous Integration environments (Abstract)

Martin Brandtner , University of Zurich, Department of Informatics, Switzerland
Sebastian C. Muller , University of Zurich, Department of Informatics, Switzerland
Philipp Leitner , University of Zurich, Department of Informatics, Switzerland
Harald C. Gall , University of Zurich, Department of Informatics, Switzerland
pp. 301-310

Cross-project build co-change prediction (Abstract)

Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
David Lo , School of Information Systems, Singapore Management University, Singapore
Shane McIntosh , School of Computing, Queen's University, Kingston, Canada
Emad Shihab , Department of Computer Science and Software Engineering, Concordia University, Montreal, Canada
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Canada
pp. 311-320

The influence of App churn on App success and StackOverflow discussions (Abstract)

Latifa Guerrouj , Department of Software Engineering, Concordia University, Montréal, Canada
Shams Azad , Department of Software Engineering, Concordia University, Montréal, Canada
Peter C. Rigby , Department of Software Engineering, Concordia University, Montréal, Canada
pp. 321-330

Beyond support and confidence: Exploring interestingness measures for rule-based specification mining (Abstract)

Tien-Duy B. Le , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
pp. 331-340

Untangling fine-grained code changes (Abstract)

Martin Dias , RMoD Inria Lille-Nord Europe, University of Lille ? CRIStAL, France
Alberto Bacchelli , SORCERERS @ Software Engineering Research Group, Delft University of Technology, The Netherlands
Georgios Gousios , Digital Security Group, Radboud Universiteit Nijmegen, The Netherlands
Damien Cassou , RMoD Inria Lille-Nord Europe, University of Lille ? CRIStAL, France
Stephane Ducasse , RMoD Inria Lille-Nord Europe, University of Lille ? CRIStAL, France
pp. 341-350

A comprehensive and scalable method for analyzing fine-grained source code change patterns (Abstract)

Masatomo Hashimoto , RIKEN Advanced Institute for Computational Science, Japan
Akira Mori , National Institute of Advanced Industrial Science and Technology, Japan
Tomonori Izumida , National Institute of Advanced Industrial Science and Technology, Japan
pp. 351-360

Summarizing Evolutionary Trajectory by Grouping and Aggregating relevant code changes (Abstract)

Qingtao Jiang , Software School, Fudan University, Shanghai, China
Xin Peng , Software School, Fudan University, Shanghai, China
Hai Wang , Software School, Fudan University, Shanghai, China
Zhenchang Xing , School of Computer Engineering, Nanyang Technological University, Singapore
Wenyun Zhao , Software School, Fudan University, Shanghai, China
pp. 361-370

Identifying the exact fixing actions of static rule violation (Abstract)

Hayatou Oumarou , University of Maroua, Cameroun
Nicolas Anquetil , RMoD Team, Inria, Lille, France
Anne Etien , RMoD Team, Inria, Lille, France
Stephane Ducasse , RMoD Team, Inria, Lille, France
Kolyang Dina Taiwe , University of Maroua, Cameroun
pp. 371-379

CloCom: Mining existing source code for automatic comment generation (Abstract)

Edmund Wong , Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada
Taiyue Liu , Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada
Lin Tan , Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada
pp. 380-389

amAssist: In-IDE ambient search of online programming resources (Abstract)

Hongwei Li , School of Computer Science, Fudan University, Shanghai, China
Xuejiao Zhao , School of Computer Engineering, Nanyang Technological University, Singapore
Zhenchang Xing , School of Computer Engineering, Nanyang Technological University, Singapore
Lingfeng Bao , College of Computer Science, Zhejiang University, Hangzhou, China
Xin Peng , School of Computer Science, Fudan University, Shanghai, China
Dongjing Gao , School of Computer Science, Fudan University, Shanghai, China
Wenyun Zhao , School of Computer Science, Fudan University, Shanghai, China
pp. 390-398

Reverse engineering time-series interaction data from screen-captured videos (Abstract)

Lingfeng Bao , College of Computer Science, Zhejiang University, Hangzhou, China
Jing Li , School of Computer Engineering, Nanyang Technological University, Singapore
Zhenchang Xing , School of Computer Engineering, Nanyang Technological University, Singapore
Xinyu Wang , College of Computer Science, Zhejiang University, Hangzhou, China
Bo Zhou , College of Computer Science, Zhejiang University, Hangzhou, China
pp. 399-408

Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (Abstract)

Jose Ricardo da Silva , Universidade Federal Fluminense, Niterói, Brazil
Esteban Clua , Universidade Federal Fluminense, Niterói, Brazil
Leonardo Murta , Universidade Federal Fluminense, Niterói, Brazil
Anita Sarma , Computer Science and Engineering Department, University of Nebraska, Lincoln, United States
pp. 409-418

Protecting web applications via Unicode extension (Abstract)

Boze Zekan , Electrical Engineering and Computer Science, York University, Toronto, Canada
Mark Shtern , Electrical Engineering and Computer Science, York University, Toronto, Canada
Vassilios Tzerpos , Electrical Engineering and Computer Science, York University, Toronto, Canada
pp. 419-428

A search-based approach to multi-view clustering of software systems (Abstract)

Amir M. Saeidi , Department of Information and Computing Sciences, Utrecht University, The Netherlands
Jurriaan Hage , Department of Information and Computing Sciences, Utrecht University, The Netherlands
Ravi Khadka , Department of Information and Computing Sciences, Utrecht University, The Netherlands
Slinger Jansen , Department of Information and Computing Sciences, Utrecht University, The Netherlands
pp. 429-438

CEL: Touching software modeling in essence (Abstract)

Remo Lemma , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Michele Lanza , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
Andrea Mocci , REVEAL @ Faculty of Informatics - University of Lugano, Switzerland
pp. 439-448

NIRMAL: Automatic identification of software relevant tweets leveraging language model (Abstract)

Abhishek Sharma , School of Information Systems, Singapore Management University, Singapore
Yuan Tian , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
pp. 449-458

A static code analysis tool for control system software (Abstract)

Sreeja Nair , ABB Corporate Research, Bangalore, India
Raoul Jetley , ABB Corporate Research, Bangalore, India
Anil Nair , ABB Corporate Research, Bangalore, India
Stefan Hauck-Stattelmann , ABB Corporate Research, Ladenburg, Germany
pp. 459-463

RbG: A documentation generator for scientific and engineering software (Abstract)

Michael Moser , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Josef Pichler , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Gunther Fleck , Siemens Transformers Austria, 8160 Weiz, Austria
Michael Witlatschil , Siemens Transformers Austria, 8160 Weiz, Austria
pp. 464-468

Historef: A tool for edit history refactoring (Abstract)

Shinpei Hayashi , Department of Computer Science, Tokyo Institute of Technology, Ookayama 2-12-1-W8-83, Meguro-ku, 152-8552, Japan
Daiki Hoshino , Department of Computer Science, Tokyo Institute of Technology, Ookayama 2-12-1-W8-83, Meguro-ku, 152-8552, Japan
Jumpei Matsuda , Department of Computer Science, Tokyo Institute of Technology, Ookayama 2-12-1-W8-83, Meguro-ku, 152-8552, Japan
Motoshi Saeki , Department of Computer Science, Tokyo Institute of Technology, Ookayama 2-12-1-W8-83, Meguro-ku, 152-8552, Japan
Takayuki Omori , Department of Computer Science, Ritsumeikan University, Nojihigashi 1-1-1, Kusatsu-shi, Shiga 525-8577, Japan
Katsuhisa Maruyama , Department of Computer Science, Ritsumeikan University, Nojihigashi 1-1-1, Kusatsu-shi, Shiga 525-8577, Japan
pp. 469-473

ClonePacker: A tool for clone set visualization (Abstract)

Hiroaki Murakami , Graduate School of Information Science and Technology, Osaka University, Japan
Yoshiki Higo , Graduate School of Information Science and Technology, Osaka University, Japan
Shinji Kusumoto , Graduate School of Information Science and Technology, Osaka University, Japan
pp. 474-478

GiLA: GitHub label analyzer (Abstract)

Javier Luis Canovas Izquierdo , AtlanMod team (Inria, Mines Nantes, LINA), France
Valerio Cosentino , AtlanMod team (Inria, Mines Nantes, LINA), France
Belen Rolandi , AtlanMod team (Inria, Mines Nantes, LINA), France
Alexandre Bergel , Department of Computer Science (DCC), University of Chile, Chile
Jordi Cabot , AtlanMod team (Inria, Mines Nantes, LINA), France
pp. 479-483

SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking (Abstract)

Manishankar Mondal , Department of Computer Science, University of Saskatchewan, Canada
Chanchal K. Roy , Department of Computer Science, University of Saskatchewan, Canada
Kevin A. Schneider , Department of Computer Science, University of Saskatchewan, Canada
pp. 484-488

TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (Abstract)

Haipeng Cai , University of Notre Dame, Indiana, USA
Raul Santelices , University of Notre Dame, Indiana, USA
pp. 489-493

Umple: A framework for Model Driven Development of Object-Oriented Systems (Abstract)

Miguel A. Garzon , School of Electrical Engineering and Computer Science University of Ottawa, Canada
Hamoud Aljamaan , School of Electrical Engineering and Computer Science University of Ottawa, Canada
Timothy C. Lethbridge , School of Electrical Engineering and Computer Science University of Ottawa, Canada
pp. 494-498

Assessing the bus factor of Git repositories (Abstract)

Valerio Cosentino , AtlanMod team (Inria, Mines Nantes, LINA), France
Javier Luis Canovas Izquierdo , AtlanMod team (Inria, Mines Nantes, LINA), France
Jordi Cabot , AtlanMod team (Inria, Mines Nantes, LINA), France
pp. 499-503

Old habits die hard: Why refactoring for understandability does not give immediate benefits (Abstract)

Erik Ammerlaan , Exact International Development, The Netherlands
Wim Veninga , Exact International Development, The Netherlands
Andy Zaidman , Delft University of Technology, The Netherlands
pp. 504-507

Bash2py: A bash to Python translator (Abstract)

Ian J. Davis , David Cheriton School of Computer Science, University of Waterloo, Ontario, Canada
Mike Wexler , David Cheriton School of Computer Science, University of Waterloo, Ontario, Canada
Cheng Zhang , David Cheriton School of Computer Science, University of Waterloo, Ontario, Canada
Richard C. Holt , David Cheriton School of Computer Science, University of Waterloo, Ontario, Canada
Theresa Weber , Owl Computing Technologies, Inc., 38A Grove Street, Suite 101, Ridgefield, Connecticut, USA
pp. 508-511

On implementational variations in static analysis tools (Abstract)

Tukaram Muske , Tata Research Development and Design Center, 54-B, Hadapsar I.E., Pune, India
Prasad Bokil , Tata Research Development and Design Center, 54-B, Hadapsar I.E., Pune, India
pp. 512-515

Tracking known security vulnerabilities in proprietary software systems (Abstract)

Mircea Cadariu , Software Improvement Group, The Netherlands
Eric Bouwers , Software Improvement Group, The Netherlands
Joost Visser , Software Improvement Group, The Netherlands
Arie van Deursen , Delft University of Technology, The Netherlands
pp. 516-519

Trusting a library: A study of the latency to adopt the latest Maven release (Abstract)

Raula Gaikovina Kula , Osaka University, Japan
Daniel M. German , Osaka University, Japan
Takashi Ishio , Osaka University, Japan
Katsuro Inoue , Osaka University, Japan
pp. 520-524

Evolution of dynamic feature usage in PHP (Abstract)

Mark Hills , East Carolina University, Greenville, NC, USA
pp. 525-529

Towards incremental model slicing for delta-oriented software product lines (Abstract)

Sascha Lity , Institute for Programming and Reactive Systems, TU Braunschweig, Germany
Hauke Baller , Institute for Programming and Reactive Systems, TU Braunschweig, Germany
Ina Schaefer , Institute of Software Engineering and Automotive Informatics, TU Braunschweig, Germany
pp. 530-534

Understanding software performance regressions using differential flame graphs (Abstract)

Cor-Paul Bezemer , Delft University of Technology, the Netherlands
Johan Pouwelse , Delft University of Technology, the Netherlands
Brendan Gregg , Netflix, USA
pp. 535-539

TextRank based search term identification for software change tasks (Abstract)

Mohammad Masudur Rahman , University of Saskatchewan, Canada
Chanchal K. Roy , University of Saskatchewan, Canada
pp. 540-544

Query expansion via WordNet for effective code search (Abstract)

Meili Lu , School of Information Engineering, Yangzhou University, China
Xiaobing Sun , School of Information Engineering, Yangzhou University, China
Shaowei Wang , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
Yucong Duan , School of Information Science and Technology, Hainan University, Haikou, China
pp. 545-549

Exploring the use of labels to categorize issues in Open-Source Software projects (Abstract)

Jordi Cabot , AtlanMod team (Inria, Mines Nantes, LINA), France
Javier Luis Canovas Izquierdo , AtlanMod team (Inria, Mines Nantes, LINA), France
Valerio Cosentino , AtlanMod team (Inria, Mines Nantes, LINA), France
Belen Rolandi , AtlanMod team (Inria, Mines Nantes, LINA), France
pp. 550-554

Explore the evolution of development topics via on-line LDA (Abstract)

Jiajun Hu , School of Information Engineering, Yangzhou University, China
Xiaobing Sun , School of Information Engineering, Yangzhou University, China
Bin Li , School of Information Engineering, Yangzhou University, China
pp. 555-559

Code coverage and test suite effectiveness: Empirical study with real bugs in large systems (Abstract)

Pavneet Singh Kochhar , Singapore Management University, Singapore
Ferdian Thung , Singapore Management University, Singapore
David Lo , Singapore Management University, Singapore
pp. 560-564

Detection of violation causes in reflexion models (Abstract)

Sebastian Herold , Lero - The Irish Software Engineering Research Centre, University of Limerick, Ireland
Michael English , Lero - The Irish Software Engineering Research Centre, University of Limerick, Ireland
Jim Buckley , Lero - The Irish Software Engineering Research Centre, University of Limerick, Ireland
Steve Counsell , Department of Computer Science, Brunel University London, UK
Mel O Cinneide , School of Computer Science and Informatics, University College Dublin, Ireland
pp. 565-569

A comparative study on the effectiveness of part-of-speech tagging techniques on bug reports (Abstract)

Yuan Tian , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
pp. 570-574

Efficiently identifying object production sites (Abstract)

Alejandro Infante , Pleiad Lab, Department of Computer Science (DCC), University of Chile, Chile
Alexandre Bergel , Pleiad Lab, Department of Computer Science (DCC), University of Chile, Chile
pp. 575-579

Where was this SQL query executed? a static concept location approach (Abstract)

Csaba Nagy , PReCISE Research Center, University of Namur, Belgium
Loup Meurice , PReCISE Research Center, University of Namur, Belgium
Anthony Cleve , PReCISE Research Center, University of Namur, Belgium
pp. 580-584

Taint analysis of manual service compositions using Cross-Application Call Graphs (Abstract)

Marc-Andre Laverdiere , TCS Innovation Labs, Tata Consultancy Services, Canada
Bernhard J. Berger , TZI, Universität Bremenm, Germany
Ettore Merloz , École Polytechnique de Montréal, Canada
pp. 585-589

TXL source transformation in practice (Abstract)

James R. Cordy , School of Computing, Queen's University, Kingston, Ontario, Canada K7L 2N8
pp. 590-591

Software risk management in practice: Shed light on your software product (Abstract)

Jens Knodel , Fraunhofer Institute for Experimental Software Engineering (IESE), Kaiserslautern, Germany
Matthias Naab , Fraunhofer Institute for Experimental Software Engineering (IESE), Kaiserslautern, Germany
Eric Bouwers , Software Improvement Group (SIG), Amsterdam, The Netherlands
Joost Visser , Software Improvement Group (SIG), Amsterdam, The Netherlands
pp. 592-594

Software architecture reconstruction: Why? What? How? (Abstract)

Mehdi Mirakhorli , Software Engineering Department, Rochester Institute of Technology, USA
pp. 595

SKilLed communication for toolchains (Abstract)

Timm Felden , University of Stuttgart, Germany
pp. 596

The impact of column-orientation on the quality of class inheritance mapping specifications (Abstract)

Martin Lorenz , Hasso Plattner Institut at the University of Potsdam, Germany
pp. 597

Improving the integration process of large software systems (Abstract)

Yujuan Jiang , MCIS lab, Polytechnique Montreal, Canada
pp. 598

Handling the differential evolution of software artefacts: A framework for consistency management (Abstract)

Ildiko Pete , School of Computer Science, University of St Andrews, UK
Dharini Balasubramaniam , School of Computer Science, University of St Andrews, UK
pp. 599-600

Towards a framework for analysis, transformation, and manipulation of Makefiles (Abstract)

Douglas Martin , School of Computing, Queen's University, Kingston, Ontario, Canada
pp. 601-602

Towards a framework for automatic correction of anti-patterns (Abstract)

Rodrigo Morales , SWAT, Polytechnique Montréal, Canada
pp. 603-604

Towards an ontology-based context-aware meta-model for the software domain (Abstract)

Mostafa Erfani , Concordia University, Montreal, Canada
pp. 605-606

Investigating modern release engineering practices (Abstract)

Md Tajmilur Rahman , Concordia University, Montreal, QC, Canada
pp. 607-608
102 ms
(Ver 3.3 (11022016))