By Topic

15th IEEE International Conference on Program Comprehension (ICPC '07)

26-29 June 2007

Filter Results

Displaying Results 1 - 25 of 43
  • 15th IEEE International Conference on Program Comprehension - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2672 KB)
    Freely Available from IEEE
  • 15th IEEE International Conference on Program Comprehension - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • 15th IEEE International Conference on Program Comprehension - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • 15th IEEE International Conference on Program Comprehension - Table of Contents

    Publication Year: 2007, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Search Based Software Engineering for Program Comprehension

    Publication Year: 2007, Page(s):3 - 13
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Search based software engineering (SBSE) is an approach to software engineering in which search based optimization algorithms are used to identify optimal or near optimal solutions and to yield insight. SBSE techniques can cater for multiple, possibly competing objectives and/or constraints and applications where the potential solution space is large and complex. Such situations are common in soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making the Code Look Like the Design - Aspects and Other Recent Work

    Publication Year: 2007, Page(s): 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB) | HTML iconHTML

    Summary form only given. The idea that programs should clearly reflect the design decisions they embody has a long history. Higher-level languages, syntactic macros, domain-specific languages, and intentional programming are different approaches to this common goal. Recent work from several areas, including aspect-oriented programming, has significantly advanced our ability to make code expressive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence

    Publication Year: 2007, Page(s):17 - 26
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    The implementations of software features evolve as an application matures. We define a measure of feature implementation overlap that determines how similar features are in their execution by examining their call graphs. We consider how this measure changes over time, and evaluate the hypothesis that over time and subsequent versions of a software application, the implementations of semantically s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering Concepts from Source Code with Automated Concept Identification

    Publication Year: 2007, Page(s):27 - 36
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    The complexity of the systems that software engineers build has continuously grown since the inception of the field. What has not changed is the engineers' mental capacity to operate on about seven distinct pieces of information at a time. Improvements like the widespread use of UML have led to more abstract software design activities, however the same cannot be said for reverse engineering activi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code

    Publication Year: 2007, Page(s):37 - 48
    Cited by:  Papers (73)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    The paper addresses the problem of concept location in source code by presenting an approach which combines formal concept analysis (FCA) and latent semantic indexing (LSI). In the proposed approach, LSI is used to map the concepts expressed in queries written by the programmer to relevant parts of the source code, presented as a ranked list of search results. Given the ranked list of source code ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Execution Traces Using Massive Sequence and Circular Bundle Views

    Publication Year: 2007, Page(s):49 - 58
    Cited by:  Papers (36)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3014 KB) | HTML iconHTML

    The use of dynamic information to aid in software understanding is a common practice nowadays. One of the many approaches concerns the comprehension of execution traces. A major issue in this context is scalability: due to the vast amounts of information, it is a very difficult task to successfully find your way through such traces without getting lost. In this paper, we propose the use of a novel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking Objects to Detect Feature Dependencies

    Publication Year: 2007, Page(s):59 - 68
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1633 KB) | HTML iconHTML

    The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been widely studied, runtime dependencies between features are less well understood. Features cannot be understood in isolation, since their behavior often depends on objects created and referenced in previously exercised featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WAD: A Feasibility study using the Wicked Audio Debugger

    Publication Year: 2007, Page(s):69 - 80
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Contemporary programmers have a predominately visual experience. Computer code is read from sophisticated text editors, analyzed using visual tools, designed using UML, and debugged using a watch window. Little research has attempted to create tools for the non-sighted programmer, using either haptic or aural feedback. In this paper, we present WAD, the wicked audio debugger, a new debugger for Mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Program Model for Object-Oriented Reverse Engineering

    Publication Year: 2007, Page(s):81 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    A commonly used strategy to address the scalability challenge in object-oriented reverse engineering is to synthesize coarse-grained representations, such as package diagrams. However, the traditional coarse-grained representations are poorly suited to object-oriented program comprehension as they can be difficult to map to the domain object models, contain little real detail, and provide few clue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Reality to Programs and (Not Quite) Back Again

    Publication Year: 2007, Page(s):91 - 102
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Making explicit the mappings between real-world concepts and program elements that implement them is an essential step in understanding, using or evaluating the public interface of programs, libraries and other collections of classes that model core domain concepts. Unfortunately, due to the big abstraction gap between the modeled domain and today's programming languages, the mapping is most of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of Three Program Exploration Tools

    Publication Year: 2007, Page(s):103 - 112
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Programmers need tools to help explore large software systems when performing software evolution tasks. A variety of tools have been created to improve the effectiveness of such exploration. The usefulness of these tools has been argued largely on the basis of case studies, small narrowly-focussed experiments, or non-human-based experiments. In this paper, we report on a more rigorously controlled... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the Comprehension of UML Class Diagrams via Eye Tracking

    Publication Year: 2007, Page(s):113 - 122
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtrusive manner as users performed various comprehension tasks on UML class diagrams. The goal of the study is to identify specific characteristics of UML class diagrams, such as layout, color, and stereotype usage that are m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions

    Publication Year: 2007, Page(s):123 - 134
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Programs that use multithreaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization concepts are generally difficult to master. It stands to reason that comprehension tasks may be more complex for programs that employ concurrency than for sequential programs. We believe that external representations, specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Interaction Coupling from Task Interaction Histories

    Publication Year: 2007, Page(s):135 - 144
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    A repository of task structures can reveal important latent knowledge about the development of a software system. Although approaches have been proposed to recover artifacts within a task structure, identifying relations that are relevant to a task remains a problem. In this work, we propose to detect "interaction coupling" from task interaction histories (i.e., records of when the artifacts were ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining software repositories for traceability links

    Publication Year: 2007, Page(s):145 - 154
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    An approach to recover/discover traceability links between software artifacts via the examination of a software system's version history is presented. A heuristic-based approach that uses sequential-pattern mining is applied to the commits in software repositories for uncovering highly frequent co-changing sets of artifacts (e.g., source code and documentation). If different types of files are com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing and Understanding Development Sessions

    Publication Year: 2007, Page(s):155 - 166
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    The understanding of development sessions, the phases during which a developer actively modifies a software system, is a valuable asset for program comprehension, since the sessions directly impact the current state and future evolution of a software system. Such information is usually lost by state-of-the-art versioning systems, because of the checkin/checkout model they rely on: a developer must... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.