


default search action
19th SCAM 2019: Cleveland, OH, USA
- 19th International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, Cleveland, OH, USA, September 30 - October 1, 2019. IEEE 2019, ISBN 978-1-7281-4937-0
Program Analysis
- Kirsten Bradley, Michael Godfrey:
A Study on the Effects of Exception Usage in Open-Source C++ Systems. 1-11 - Seongmin Lee
, David W. Binkley, Robert Feldt, Nicolas Gold, Shin Yoo:
MOAD: Modeling Observation-Based Approximate Dependency. 12-22 - Abu Naser Masud
, Federico Ciccozzi:
Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers. 23-33 - Diego Marcilio, Carlo A. Furia, Rodrigo Bonifácio
, Gustavo Pinto:
Automatically Generating Fix Suggestions in Response to Static Code Analysis Warnings. 34-44
Mining Software Repositories
- Matheus Paixão
, Paulo Henrique M. Maia:
Rebasing in Code Review Considered Harmful: A Large-Scale Empirical Investigation. 45-55 - Marcus Kessel
, Colin Atkinson:
Automatically Curated Data Sets. 56-61 - Amit Kumar Mondal, Banani Roy, Kevin A. Schneider:
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques. 62-73 - Anthony Peruma
, Mohamed Wiem Mkaouer
, Michael John Decker, Christian Donald Newman
:
Contextualizing Rename Decisions using Refactorings and Commit Messages. 74-85 - Isaac Moreira Medeiros Gomes, Daniel Coutinho
, Marcelo Schots:
No Accounting for Taste: Supporting Developers' Individual Choices of Coding Styles. 86-91
Software Bugs
- Nicolas Harrand, César Soto-Valero, Martin Monperrus
, Benoit Baudry:
The Strengths and Behavioral Quirks of Java Bytecode Decompilers. 92-102 - Vineeth Kashyap, Jason Ruchti, Lucja Kot, Emma Turetsky, Rebecca Swords, Shih An Pan, Julien Henry, David Melski, Eric M. Schulte:
Automated Customized Bug-Benchmark Generation. 103-114 - Tim A. D. Henderson, Andy Podgurski, Yigit Küçük:
Evaluating Automatic Fault Localization Using Markov Processes. 115-126 - Md. Masudur Rahman, Saikat Chakraborty
, Gail E. Kaiser
, Baishakhi Ray:
Toward Optimal Selection of Information Retrieval Models for Software Engineering Tasks. 127-138
Most Influential Papers
- Paul Klint, Tijs van der Storm, Jurgen J. Vinju:
Rascal, 10 Years Later. 139 - James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001). 140
Human Aspects
- Salvatore Geremia, Gabriele Bavota
, Rocco Oliveto, Michele Lanza, Massimiliano Di Penta:
Characterizing Leveraged Stack Overflow Posts. 141-151 - Soumaya Rebai, Oussama Ben Sghaier, Vahid Alizadeh
, Marouane Kessentini, Meriem Chater:
Interactive Refactoring Documentation Bot. 152-162 - Marcel Steinbeck, Rainer Koschke, Marc O. Rüdel:
Movement Patterns and Trajectories in Three-Dimensional Software Visualization. 163-174 - Wanessa Teotônio, Pablo Gonzalez, Paulo Maia, Pedro Muniz:
WAL: A Tool for Diagnosing Accessibility Issues and Evolving Legacy Web Systems at Runtime. 175-180 - Vahid Alizadeh
, Houcem Fehri, Marouane Kessentini:
Less is More: From Multi-objective to Mono-objective Refactoring via Developer's Knowledge Extraction. 181-192
Software Testing
- Marcus Kessel
, Colin Atkinson
:
On the Efficacy of Dynamic Behavior Comparison for Judging Functional Equivalence. 193-203 - Bin Lin
, Csaba Nagy, Gabriele Bavota
, Andrian Marcus
, Michele Lanza:
On the Quality of Identifiers in Test Code. 204-215 - Jeffrey J. Yackley
, Marouane Kessentini, Gabriele Bavota
, Vahid Alizadeh
, Bruce R. Maxim
:
Simultaneous Refactoring and Regression Testing. 216-227 - Tim Storer, Ruxandra Bob:
Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. 228-237
Security
- Gian Luca Scoccia
, Anthony Peruma
, Virginia Pujols, Ivano Malavolta
, Daniel E. Krutz:
Permission Issues in Open-Source Android Apps: An Exploratory Study. 238-249 - Bernhard J. Berger
, Karsten Sohr
, Rainer Koschke:
The Architectural Security Tool Suite - ARCHSEC. 250-255 - Abhishek Tiwari
, Jyoti Prakash
, Sascha Groß, Christian Hammer
:
LUDroid: A Large Scale Analysis of Android - Web Hybridization. 256-267 - Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev:
Introducing Privacy in Screen Event Frequency Analysis for Android Apps. 268-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.