The Community for Technology Leaders
2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER) (2017)
Klagenfurt, Austria
Feb. 20, 2017 to Feb. 24, 2017
ISBN: 978-1-5090-5502-9
TABLE OF CONTENTS

[Front cover] (PDF)

pp. c1

Author index (PDF)

pp. 579-580

Contents (PDF)

pp. xi-xvi

Message from the chairs (PDF)

Martin Pinzger , University of Klagenfurt, Austria
Gabriele Bavota , University of Lugano, Switzerland
Andrian Marcus , University of Texas at Dallas, United States of America
pp. iii

UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (PDF)

Engin Kirda , Secure Systems Lab, Northeastern University, USA
pp. 1

An empirical comparison of dependency issues in OSS packaging ecosystems (Abstract)

Alexandre Decan , COMPLEXYS Research Institute, University of Mons, Belgium
Tom Mens , COMPLEXYS Research Institute, University of Mons, Belgium
Maelick Claes , COMPLEXYS Research Institute, University of Mons, Belgium
pp. 2-12

Detecting similar repositories on GitHub (Abstract)

Yun Zhang , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
David Lo , School of Information Systems, Singapore Management University, Singapore
Pavneet Singh Kochhar , School of Information Systems, Singapore Management University, Singapore
Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
Quanlai Li , University of California, Berkeley, USA
Jianling Sun , College of Computer Science and Technology, Zhejiang University, Hangzhou, China
pp. 13-23

Code of conduct in open source projects (Abstract)

Parastou Tourani , Polytechnique Montréal, Canada
Bram Adams , Polytechnique Montréal, Canada
Alexander Serebrenik , Eindhoven University of Technology, The Netherlands
pp. 24-33

Socio-technical evolution of the Ruby ecosystem in GitHub (Abstract)

Eleni Constantinou , Software Engineering Lab, COMPLEXYS Research Institute, University of Mons, 7000, Belgium
Tom Mens , Software Engineering Lab, COMPLEXYS Research Institute, University of Mons, 7000, Belgium
pp. 34-44

StiCProb: A novel feature mining approach using conditional probability (Abstract)

Yutian Tang , Department of Computing, The Hong Kong Polytechnic University, Hong Kong
Hareton Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong
pp. 45-55

HDSKG: Harvesting domain specific knowledge graph from content of webpages (Abstract)

Xuejiao Zhao , Rolls-Royce@NTU Corporate Lab, Nanyang Technological University (NTU), Singapore
Zhenchang Xing , Research School of Computer Science, Australian National University, Australia
Muhammad Ashad Kabir , School of Computing and Mathematics, Charles Stuart University, Bathurst, NSW, Australia
Naoya Sawada , Cloud Service Division, NTT Communications Corporation, Japan
Jing Li , School of Computer Science and Engineering, NTU, Singapore
Shang-Wei Lin , Rolls-Royce@NTU Corporate Lab, Nanyang Technological University (NTU), Singapore
pp. 56-67

Analyzing closeness of code dependencies for improving IR-based Traceability Recovery (Abstract)

Hongyu Kuang , State Key Lab for Novel Software Technology, Nanjing University, Jiangsu, China
Jia Nie , State Key Lab for Novel Software Technology, Nanjing University, Jiangsu, China
Hao Hu , State Key Lab for Novel Software Technology, Nanjing University, Jiangsu, China
Patrick Rempel , Institute for Software Systems Engineering, Johannes Kepler University, Linz, Austria
Jian Lu , State Key Lab for Novel Software Technology, Nanjing University, Jiangsu, China
Alexander Egyed , Institute for Software Systems Engineering, Johannes Kepler University, Linz, Austria
Patrick Mader , Fakultät für Informatik und Automatisierung, Technische Universität, Ilmenau, Germany
pp. 68-78

STRICT: Information retrieval based search term identification for concept location (Abstract)

Mohammad Masudur Rahman , Department of Computer Science, University of Saskatchewan, Canada
Chanchal K. Roy , Department of Computer Science, University of Saskatchewan, Canada
pp. 79-90

Analyzing reviews and code of mobile apps for better release planning (Abstract)

Adelina Ciurumelea , University of Zurich, Department of Informatics, Switzerland
Andreas Schaufelbuhl , University of Zurich, Department of Informatics, Switzerland
Sebastiano Panichella , University of Zurich, Department of Informatics, Switzerland
Harald C. Gall , University of Zurich, Department of Informatics, Switzerland
pp. 91-102

Software-based energy profiling of Android apps: Simple, efficient and reliable? (Abstract)

Dario Di Nucci , University of Salerno, Italy
Fabio Palomba , Delft University of Technology, The Netherlands
Antonio Prota , University of Salerno, Italy
Annibale Panichella , SnT Centre, University of Luxembourg, Luxembourg
Andy Zaidman , Delft University of Technology, The Netherlands
Andrea De Lucia , University of Salerno, Italy
pp. 103-114

Investigating the energy impact of Android smells (Abstract)

Antonin Carette , Université du Québec à Montréal, Canada
Mehdi Adel Ait Younes , Université du Québec à Montréal, Canada
Geoffrey Hecht , Université du Québec à Montréal, Canada
Naouel Moha , Université du Québec à Montréal, Canada
Romain Rouvoy , University of Lille / Inria, France
pp. 115-126

Automated generation of consistency-achieving model editors (Abstract)

Patrick Neubauer , Business Informatics Group, TU Wien, Austria
Robert Bill , Business Informatics Group, TU Wien, Austria
Tanja Mayerhofer , Business Informatics Group, TU Wien, Austria
Manuel Wimmer , Business Informatics Group, TU Wien, Austria
pp. 127-137

Historical and impact analysis of API breaking changes: A large-scale study (Abstract)

Laerte Xavier , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais, Brazil
Aline Brito , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais, Brazil
Andre Hora , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais, Brazil
Marco Tulio Valente , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais, Brazil
pp. 138-147

Reducing redundancies in multi-revision code analysis (Abstract)

Carol V. Alexandru , Software Evolution and Architecture Lab, University of Zurich, Switzerland
Sebastiano Panichella , Software Evolution and Architecture Lab, University of Zurich, Switzerland
Harald C. Gall , Software Evolution and Architecture Lab, University of Zurich, Switzerland
pp. 148-159

Recommending source code locations for system specific transformations (Abstract)

Gustavo Santos , Université de Lille, CNRS, Centrale Lille, INRIA, UMR 9189 - CRIStAL, France
Klerisson V. R. Paixao , Federal University of Uberlândia, Brazil
Nicolas Anquetil , Université de Lille, CNRS, Centrale Lille, INRIA, UMR 9189 - CRIStAL, France
Anne Etien , Université de Lille, CNRS, Centrale Lille, INRIA, UMR 9189 - CRIStAL, France
Marcelo de Almeida Maia , Federal University of Uberlândia, Brazil
Stephane Ducasse , Université de Lille, CNRS, Centrale Lille, INRIA, UMR 9189 - CRIStAL, France
pp. 160-170

Extracting executable transformations from distilled code changes (Abstract)

Reinout Stevens , Software Languages Lab, Vrije Universiteit Brussel, Belgium
Coen De Roover , Software Languages Lab, Vrije Universiteit Brussel, Belgium
pp. 171-181

The dark side of event sourcing: Managing data conversion (Abstract)

Michiel Overeem , Department Architecture and Innovation, AFAS Software, The Netherlands
Marten Spoor , Department Architecture and Innovation, AFAS Software, The Netherlands
Slinger Jansen , Department of Information and Computing Sciences, Utrecht University, The Netherlands
pp. 193-204

Automatically generating natural language descriptions for object-related statement sequences (Abstract)

Xiaoran Wang , Computer and Information Sciences, University of Delaware, Newark, 19716 USA
Lori Pollock , Computer and Information Sciences, University of Delaware, Newark, 19716 USA
K. Vijay-Shanker , Computer and Information Sciences, University of Delaware, Newark, 19716 USA
pp. 205-216

Shorter identifier names take longer to comprehend (Abstract)

Johannes Hofmeister , University of Passau, Germany
Janet Siegmund , University of Passau, Germany
Daniel V. Holt , Heidelberg University, Germany
pp. 217-227

Lexical categories for source code identifiers (Abstract)

Christian D. Newman , Computer Science, Kent State University, OH 44240 USA
Reem S. AlSuhaibani , Computer Science, Kent State University, OH 44240 USA
Michael L. Collard , Computer Science, The University of Akron, Ohio, USA
Jonathan I. Maletic , Computer Science, Kent State University, Ohio, 44240 USA
pp. 228-239

Computing counter-examples for privilege protection losses using security models (Abstract)

Marc-Andre Laverdiere , TCS Innovation Labs, Tata Consultancy Services & École Polytechnique de Montréal, Canada
Ettore Merlo , École Polytechnique de Montréal, Canada
pp. 240-249

Enriching in-IDE process information with fine-grained source code history (Abstract)

Sebastian Proksch , Technische Universität Darmstadt, Germany
Sarah Nadi , University of Alberta, Canada
Sven Amann , Technische Universität Darmstadt, Germany
Mira Mezini , Technische Universität Darmstadt, Germany
pp. 250-260

How to gamify software engineering (Abstract)

Tommaso Dal Sasso , REVEAL @ Faculty of Informatics ? University of Lugano, Switzerland
Andrea Mocci , REVEAL @ Faculty of Informatics ? University of Lugano, Switzerland
Michele Lanza , REVEAL @ Faculty of Informatics ? University of Lugano, Switzerland
Ebrisa Mastrodicasa , REVEAL @ Faculty of Informatics ? University of Lugano, Switzerland
pp. 261-271

Scalable tag recommendation for software information sites (Abstract)

Pingyi Zhou , State Key Lab. of Software Engineering, Computer School, Wuhan University, China
Jin Liu , State Key Lab. of Software Engineering, Computer School, Wuhan University, China
Zijiang Yang , Department of Computer Science, Western Michigan University, Kalamazoo, USA
Guangyou Zhou , School of Computer, Central China Normal University, Wuhan, China
pp. 272-282

Stack Overflow: A code laundering platform? (Abstract)

Le An , SWAT-SOCCER Labs, Polytechnique Montréal, Québec, Canada
Ons Mlouki , SWAT-SOCCER Labs, Polytechnique Montréal, Québec, Canada
Foutse Khomh , SWAT-SOCCER Labs, Polytechnique Montréal, Québec, Canada
Giuliano Antoniol , SWAT-SOCCER Labs, Polytechnique Montréal, Québec, Canada
pp. 283-293

An empirical study of code smells in JavaScript projects (Abstract)

Amir Saboury , Polytechnique Montreal, Quebec, Canada
Pooya Musavi , Polytechnique Montreal, Quebec, Canada
Foutse Khomh , Polytechnique Montreal, Quebec, Canada
Giulio Antoniol , Polytechnique Montreal, Quebec, Canada
pp. 294-305

Antipatterns causing memory bloat: A case study (Abstract)

Kamil Jezek , NTIS - New Technologies for the Information Society, Department of Computer Sciences and Engineering, Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic
Richard Lipka , NTIS - New Technologies for the Information Society, Department of Computer Sciences and Engineering, Faculty of Applied Sciences, University of West Bohemia, Pilsen, Czech Republic
pp. 306-315

Variant-preserving refactorings for migrating cloned products to a product line (Abstract)

Wolfram Fenske , University of Magdeburg, Germany
Jens Meinicke , University of Magdeburg, Germany
Sandro Schulze , University of Magdeburg, Germany
Steffen Schulze , University of Magdeburg, Germany
Gunter Saake , University of Magdeburg, Germany
pp. 316-326

Efficient method extraction for automatic elimination of type-3 clones (Abstract)

Ran Ettinger , Ben-Gurion University of the Negev, Israel
Shmuel Tyszberowicz , The Academic College of Tel Aviv-Yaffo, Israel
Shay Menaia , The Academic College of Tel Aviv-Yaffo, Israel
pp. 327-337

Spreadsheet testing in practice (Abstract)

Sohon Roy , Dept. of Software and Computer Technology, Delft University of Technology, The Netherlands
Felienne Hermans , Dept. of Software and Computer Technology, Delft University of Technology, The Netherlands
Arie van Deursen , Dept. of Software and Computer Technology, Delft University of Technology, The Netherlands
pp. 338-348

Dynamic patch generation for null pointer exceptions using metaprogramming (Abstract)

Thomas Durieux , University of Lille & Inria, France
Benoit Cornu , University of Lille & Inria, France
Lionel Seinturier , University of Lille & Inria, France
Martin Monperrus , University of Lille & Inria, France
pp. 349-358

Improving fault localization for Simulink models using search-based testing and prediction models (Abstract)

Bing Liu , SnT Centre, University of Luxembourg, Luxembourg
Lucia , SnT Centre, University of Luxembourg, Luxembourg
Shiva Nejati , SnT Centre, University of Luxembourg, Luxembourg
Lionel C. Briand , SnT Centre, University of Luxembourg, Luxembourg
pp. 359-370

An empirical investigation into the cost-effectiveness of test effort allocation strategies for finding faults (Abstract)

Yiyang Feng , State Key Laboratory for Novel Software Technology, Nanjing University, China
Wanwangying Ma , State Key Laboratory for Novel Software Technology, Nanjing University, China
Yibiao Yang , State Key Laboratory for Novel Software Technology, Nanjing University, China
Hongmin Lu , State Key Laboratory for Novel Software Technology, Nanjing University, China
Yuming Zhou , State Key Laboratory for Novel Software Technology, Nanjing University, China
Baowen Xu , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 371-381

What information about code snippets is available in different software-related documents? An exploratory study (Abstract)

Preetha Chatterjee , University of Delaware, Newark, USA
Manziba Akanda Nishi , Virginia Commonwealth University, Richmond, USA
Kostadin Damevski , Virginia Commonwealth University, Richmond, USA
Vinay Augustine , ABB Corporate Research, Raleigh, NC, USA
Lori Pollock , University of Delaware, Newark, USA
Nicholas A. Kraft , ABB Corporate Research, Raleigh, NC, USA
pp. 382-386

Harnessing Twitter to support serendipitous learning of developers (Abstract)

Abhishek Sharma , School of Information Systems, Singapore Management University, Singapore
Yuan Tian , School of Information Systems, Singapore Management University, Singapore
Agus Sulistya , School of Information Systems, Singapore Management University, Singapore
David Lo , School of Information Systems, Singapore Management University, Singapore
Aiko Fallas Yamashita , Oslo and Akershus University College of Applied Sciences, Norway
pp. 387-391

Why do we break APIs? First answers from developers (Abstract)

Laerte Xavier , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais (UFMG), Brazil
Andre Hora , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais (UFMG), Brazil
Marco Tulio Valente , ASERG Group, Department of Computer Science (DCC), Federal University of Minas Gerais (UFMG), Brazil
pp. 392-396

An arc-based approach for visualization of code smells (Abstract)

Marcel Steinbeck , University of Bremen, Germany
pp. 397-401

Towards continuous software release planning (Abstract)

David Ameller , Universitat Politècnica de Catalunya, Barcelona, Spain
Carles Farre , Universitat Politècnica de Catalunya, Barcelona, Spain
Xavier Franch , Universitat Politècnica de Catalunya, Barcelona, Spain
Danilo Valerio , Siemens AG Österreich, Vienna, Austria
Antonino Cassarino , Siemens AG Österreich, Vienna, Austria
pp. 402-406

An exploratory study on library aging by monitoring client usage in a software ecosystem (Abstract)

Raula Gaikovina Kula , Osaka University, Japan
Daniel M. German , University of Victoria, Canada
Takashi Ishio , Osaka University, Japan
Ali Ouni , Osaka University, Japan
Katsuro Inoue , Osaka University, Japan
pp. 407-411

Trends on empty exception handlers for Java open source libraries (Abstract)

Ana Filipa Nogueira , CISUC, University of Coimbra, Portugal
Jose C. B. Ribeiro , Polytechnic Institute of Leiria, Portugal
Mario A. Zenha-Rela , CISUC, University of Coimbra, Portugal
pp. 412-416

Analyzing the evolution of testing library usage in open source Java projects (Abstract)

Ahmed Zerouali , Software Engineering Lab, University of Mons, Belgium
Tom Mens , Software Engineering Lab, University of Mons, Belgium
pp. 417-421

On the evolution of exception usage in Java projects (Abstract)

Haidar Osman , Software Composition Group, University of Bern, Switzerland
Andrei Chis , Feenk GmbH, Switzerland
Jakob Schaerer , Software Composition Group, University of Bern, Switzerland
Mohammad Ghafari , Software Composition Group, University of Bern, Switzerland
Oscar Nierstrasz , Software Composition Group, University of Bern, Switzerland
pp. 422-426

Statically identifying class dependencies in legacy JavaScript systems: First results (Abstract)

Leonardo Humberto Silva , Federal Institute of Northern, Minas Gerais, Brazil
Marco Tulio Valente , Federal University of Minas Gerais, Brazil
Alexandre Bergel , Pleiad Lab, DCC, University of Chile, Chile
pp. 427-431

CodeCritics applied to database schema: Challenges and first results (Abstract)

Julien Delplanque , Université de Lille, CRIStAL, CNRS, UMR 9189, France, RMoD Team, Inria Lille Nord Europe
Anne Etien , Université de Lille, CRIStAL, CNRS, UMR 9189, France, RMoD Team, Inria Lille Nord Europe
Olivier Auverlot , Université de Lille, CRIStAL, CNRS, UMR 9189, France, RMoD Team, Inria Lille Nord Europe
Tom Mens , Software Engineering Lab, Université de Mons, Belgium
Nicolas Anquetil , Université de Lille, CRIStAL, CNRS, UMR 9189, France, RMoD Team, Inria Lille Nord Europe
Stephane Ducasse , Université de Lille, CRIStAL, CNRS, UMR 9189, France, RMoD Team, Inria Lille Nord Europe
pp. 432-436

Cloud-based parallel concolic execution (Abstract)

Ting Chen , Center for Cybersecurity, University of Electronic Science and Technology of China, China
Youzheng Feng , Center for Cybersecurity, University of Electronic Science and Technology of China, China
Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University, China
Xiaodong Lin , Faculty of Business and Information Technology, University of Ontario Institute of Technology, Canada
Xiaosong Zhang , Center for Cybersecurity, University of Electronic Science and Technology of China, China
pp. 437-441

Under-optimized smart contracts devour your money (Abstract)

Ting Chen , Center for Cybersecurity, University of Electronic Science and Technology of China, China
Xiaoqi Li , Department of Computing, The Hong Kong Polytechnic University, China
Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University, China
Xiaosong Zhang , Center for Cybersecurity, University of Electronic Science and Technology of China, China
pp. 442-446

Pluggable Controllers and Nano-Patterns (Abstract)

Yossi Gil , Computer Science Dept., Technion I.I.T, Haifa, Israel
Ori Marcovitch , Computer Science Dept., Technion I.I.T, Haifa, Israel
Matteo Orru , Computer Science Dept., Technion I.I.T, Haifa, Israel
pp. 447-451

Query Construction Patterns in PHP (Abstract)

David Anderson , East Carolina University, Greenville, NC, USA
Mark Hills , East Carolina University, Greenville, NC, USA
pp. 452-456

Supporting schema evolution in schema-less NoSQL data stores (Abstract)

Loup Meurice , PReCISE Research Center, University of Namur, Belgium
Anthony Cleve , PReCISE Research Center, University of Namur, Belgium
pp. 457-461

XCORE: Support for developing program analysis tools (Abstract)

Alexandru Stefanica , LOOSE Research Group, Politehnica University of Timişoara, Romania
Petru Florin Mihancea , LOOSE Research Group, Politehnica University of Timişoara, Romania
pp. 462-466

srcQL: A syntax-aware query language for source code (Abstract)

Brian Bartman , Computer Science, Kent State University, Ohio, USA
Christian D. Newman , Computer Science, Kent State University, Ohio, USA
Michael L. Collard , Computer Science, The University of Akron, Ohio, USA
Jonathan I. Maletic , Computer Science, Kent State University, Ohio, USA
pp. 467-471

UAV: Warnings from multiple Automated Static Analysis Tools at a glance (Abstract)

Tim Buckers , Delft University of Technology, The Netherlands
Clinton Cao , Delft University of Technology, The Netherlands
Michiel Doesburg , Delft University of Technology, The Netherlands
Boning Gong , Delft University of Technology, The Netherlands
Sunwei Wang , Delft University of Technology, The Netherlands
Moritz Beller , Delft University of Technology, The Netherlands
Andy Zaidman , Delft University of Technology, The Netherlands
pp. 472-476

The Spartanizer: Massive automatic refactoring (Abstract)

Yossi Gil , Computer Science Dept. The Technion-I.I.T, Taub Building, Haifa 3200003, Israel
Matteo Orru , Computer Science Dept. The Technion-I.I.T, Taub Building, Haifa 3200003, Israel
pp. 477-481

c-JRefRec: Change-based identification of Move Method refactoring opportunities (Abstract)

Naoya Ujihara , Graduate School of Information Science and Technology, Osaka University, Japan
Ali Ouni , Department of Computer Science and Software Engineering, CIT, UAE University, UAE
Takashi Ishio , Graduate School of Information Science and Technology, Osaka University, Japan
Katsuro Inoue , Graduate School of Information Science and Technology, Osaka University, Japan
pp. 482-486

Lightweight detection of Android-specific code smells: The aDoctor project (Abstract)

Fabio Palomba , Delft University of Technology, The Netherlands
Dario Di Nucci , University of Salerno, Italy
Annibale Panichella , University of Luxembourg, Luxembourg
Andy Zaidman , Delft University of Technology, The Netherlands
Andrea De Lucia , University of Salerno, Italy
pp. 487-491

scat: Learning from a single execution of a binary (Abstract)

Franck de Goer , Laboratoire Informatique de Grenoble, Univ. Grenoble Alpes, France
Christopher Ferreira , Verimag, Univ. Grenoble Alpes, France
Laurent Mounier , Verimag, Univ. Grenoble Alpes, France
pp. 492-496

dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis (Abstract)

Daniel Mercier , University of Kent, UK
Aziem Chawdhary , University of Kent, UK
Richard Jones , University of Kent, UK
pp. 497-501

InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications (Abstract)

Jierui Liu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China
Tianyong Wu , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China
Xi Deng , Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, China
Jun Yan , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China
Jian Zhang , State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, China
pp. 502-506

Columbo: High perfomance unpacking (Abstract)

Jason Raber , New Technologies, Malwarebytes, Santa Carla, USA
pp. 507-510

Hindsight: Revealing the evolution of dependencies to developers (Abstract)

George Ganea , LOOSE Research Group, Politehnica University of Timisoara, Romania
pp. 511-515

Replan: A Release Planning Tool (Abstract)

David Ameller , Universitat Politècnica de Catalunya, Barcelona, Spain
Carles Farre , Universitat Politècnica de Catalunya, Barcelona, Spain
Xavier Franch , Universitat Politècnica de Catalunya, Barcelona, Spain
Antonino Cassarino , Siemens AG Österreich, Vienna, Austria
Danilo Valerio , Siemens AG Österreich, Vienna, Austria
Valentin Elvassore , Universitat Politècnica de Catalunya, Barcelona, Spain
pp. 516-520

Bringing back-in-time debugging down to the database (Abstract)

Arian Treffer , Hasso-Plattner-Institut, Potsdam, Germany
Michael Perscheid , SAP Innovation Center, Potsdam, Germany
Matthias Uflacker , Hasso-Plattner-Institut, Potsdam, Germany
pp. 521-525

Performance tuning for automotive Software Fault Prediction (Abstract)

Harald Altinger , Audi Electronics Venture GmbH, 85080 Gaimersheim, Germany
Steffen Herbold , Institute of Computer Science, University of Göttingen, 37077, Germany
Friederike Schneemann , Audi Electronics Venture GmbH, 85080 Gaimersheim, Germany
Jens Grabowski , Institute of Computer Science, University of Göttingen, 37077, Germany
Franz Wotawa , Institute for Software Technology, Graz University of Technology, 8010, Austria
pp. 526-530

Business process recovery based on system log and information of organizational structure (Abstract)

Ryota Mibe , Center for Technology Innovation Systems Engineering, Research & Development Group Hitachi,Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama-shi, 244-0817 Japan
Tadashi Tanaka , Center for Technology Innovation Systems Engineering, Research & Development Group Hitachi,Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama-shi, 244-0817 Japan
Takashi Kobayashi , School of Computing, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku 152-8550 Japan
Shingo Kobayashi , Japan EXpert Clone Corporation, KDX Shinjuku286 bldg. 9F, 2-8-6 Shinjuku, Shinjuku-ku, Tokyo 160-0022 Japan
pp. 531-535

Multi-language re-documentation to support a COBOL to Java migration project (Abstract)

Bernhard Dorninger , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Michael Moser , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Josef Pichler , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
pp. 536-540

Proactive reviews of textual requirements (Abstract)

Vard Antinyan , Computer Science and Engineering, University of Gothenburg, Sweden
Miroslaw Staron , Computer Science and Engineering, University of Gothenburg, Sweden
pp. 541-545

Data access visualization for legacy application maintenance (Abstract)

Keisuke Yano , Information Systems Technologies Laboratory, Fujitsu Laboratories, Kawasaki, Japan
Akihiko Matsuo , Information Systems Technologies Laboratory, Fujitsu Laboratories, Kawasaki, Japan
pp. 546-550

An empirical study of clone density evolution and developer cloning tendency (Abstract)

Brent van Bladel , University of Antwerp, Belgium
Alessandro Murgia , University of Antwerp, Belgium
Serge Demeyer , University of Antwerp, Belgium
pp. 551-552

Towards reverse engineering of intermediate code for documentation generators (Abstract)

Michael Moser , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Michael Pfeiffer , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
Josef Pichler , Software Analytics and Evolution, Software Competence Center Hagenberg, 4232, Austria
pp. 553-554

A framework for classifying and comparing source code recommendation systems (Abstract)

Mohammad Ghafari , Software Composition Group, University of Bern, Switzerland
Hamidreza Moradi , University of Texas at San Antonio, USA
pp. 555-556

Self-adaptive systems framework based on agent and search-based optimization (Abstract)

Liu He , Software Engineering Institute, Xidian University, Xi'an, China
Qingshan Li , Software Engineering Institute, Xidian University, Xi'an, China
Lu Wang , Software Engineering Institute, Xidian University, Xi'an, China
Jiewen Wan , Software Engineering Institute, Xidian University, Xi'an, China
pp. 557-558

The importance of program Design Patterns training (Abstract)

Viggo Holmstedt , University College of South-East Norway, School of Business, Department of Business and IT, Horten, Norway
Shegaw A. Mengiste , University College of South-East Norway, School of Business, Department of Business and IT, Horten, Norway
pp. 559-560

Conventionality analysis of array objects in JavaScript (Abstract)

Astrid Younang , Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA, 48309
Lunjin Lu , Department of Computer Science and Engineering, Oakland University, Rochester, Michigan, USA, 48309
pp. 561-562

Two improvements to detect duplicates in Stack Overflow (Abstract)

Yuji Mizobuchi , Fujitsu Laboratories LTD., Kawasaki, Japan
Kuniharu Takayama , Fujitsu Laboratories LTD., Kawasaki, Japan
pp. 563-564

Modernizing domain-specific languages with XMLText and IntellEdit (Abstract)

Patrick Neubauer , Business Informatics Group, TU Wien, Austria
Robert Bill , Business Informatics Group, TU Wien, Austria
Manuel Wimmer , Business Informatics Group, TU Wien, Austria
pp. 565-566

Lost comments support program comprehension (Abstract)

Takayuki Omori , Department of Computer Science, Ritsumeikan University, Kusatsu, Shiga, Japan
pp. 567-568

Does the release cycle of a library project influence when it is adopted by a client project? (Abstract)

Daiki Fujibayashi , Nara Institute of Science and Technology, Japan
Akinori Ihara , Nara Institute of Science and Technology, Japan
Hirohiko Suwa , Nara Institute of Science and Technology, Japan
Raula Gaikovina Kula , Osaka University, Japan
Kenichi Matsumoto , Nara Institute of Science and Technology, Japan
pp. 569-570

Which review feedback did long-term contributors get on OSS projects? (Abstract)

Takuto Norikane , Graduate School of Information Science, Nara Institute of Science and Technology, JAPAN
Akinori Ihara , Graduate School of Information Science, Nara Institute of Science and Technology, JAPAN
Kenichi Matsumoto , Graduate School of Information Science, Nara Institute of Science and Technology, JAPAN
pp. 571-572

Frame-based behavior preservation in refactoring (Abstract)

Katsuhisa Maruyama , Department of Computer Science, Ritsumeikan University, Japan
Shinpei Hayashi , Department of Computer Science, Tokyo Institute of Technology, Japan
Norihiro Yoshida , Center for Embedded Computing Systems, Nagoya University, Japan
Eunjong Choi , Graduate School of Information Science, Nara Institute of Science and Technology, Japan
pp. 573-574

Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (Abstract)

Ra-Jeong Moon , Department of Information Security, Seoul Women's University, Republic of Korea
Kyu-Min Shim , Entry Labs, Seoul, Republic of Korea
Hae-Young Lee , Department of Information Security, Seoul Women's University, Republic of Korea
Hyung-Jong Kim , Department of Information Security, Seoul Women's University, Republic of Korea
pp. 575-576

Towards understanding an open-source bounty: Analysis of Bountysource (Abstract)

Tetsuya Kanda , Graduate School of Information Science, Nara Institute of Science and Technology, Japan
Mingyu Guo , School of Computer Science, University of Adelaide, Australia
Hideaki Hata , Graduate School of Information Science, Nara Institute of Science and Technology, Japan
Kenichi Matsumoto , Graduate School of Information Science, Nara Institute of Science and Technology, Japan
pp. 577-578
97 ms
(Ver 3.3 (11022016))