By Topic

2010 IEEE 18th International Conference on Program Comprehension

June 30 2010-July 2 2010

Filter Results

Displaying Results 1 - 25 of 56
  • 18th IEEE International Conference on Program Comprehension [Cover art]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1329 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Copyright (c) 2010 by the institute of electrical and electronics engineers, inc. all rights reserved. [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • ICPC 2010 welcome message

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Steering and Organizing Committees

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Creativity in software engineering: a new research agenda?

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Summary form only given. There has been relatively little research interest in software engineering as a creative process, in spite of the widespread anecdotal evidence that many software engineering problems necessitate creative thinking to be solved effectively. This keynote talk will present established creativity theories from disciplines outside of software engineering, then put forward argum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context as an Antidote to Information Overload

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Summary form only given. Software developers who perform evolution tasks on a software system face an avalanche of information daily. These developers must deal with multiple source code elements, bug reports, system test data, questions from team members, and so on. Information mined from the historical archives of a development can provide helpful cues to developers as they perform their work, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case Study of Feature Location Using Dependence Graph, after 10 Years

    Publication Year: 2010, Page(s):1 - 3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    This retrospective briefly recapitulates the original paper that was published at IWPC 2000, overviews selected papers that were published in its wake, presents recent clarifications and updates of the topic, and mentions the still unfinished agenda and future work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Extraction of a WordNet-Like Identifier Network from Software

    Publication Year: 2010, Page(s):4 - 13
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    A large part of the time allocated to software maintenance is dedicated to the program comprehension. Many approaches that uses the program structure or the external documentation have been created to assist program comprehension. However, the identifiers of the program are an important source of information that is still not widely used for this purpose. In this article, we propose an approach, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Data Fusion and Web Mining to Support Feature Location in Software

    Publication Year: 2010, Page(s):14 - 23
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Data fusion is the process of integrating multiple sources of information such that their combination yields better results than if the data sources are used individually. This paper applies the idea of data fusion to feature location, the process of identifying the source code that implements specific functionality in software. A data fusion model for feature location is presented which defines n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Source Code from E-Mails

    Publication Year: 2010, Page(s):24 - 33
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1459 KB) | HTML iconHTML

    E-mails, used by developers and system users to communicate over a broad range of topics, offer a valuable source of information. If archived, e-mails can be mined to support program comprehension activities and to provide views of a software system that are alternative and complementary to those offered by the source code. However, e-mails are written in natural language, and therefore contain no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual Support for Understanding Product Lines

    Publication Year: 2010, Page(s):34 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    The C preprocessor is often used in practice to implement variability in software product lines. Using #ifdef statements provokes problems such as obfuscated source code, yet they will still be used in practice at least in the medium-term future. With CIDE, we demonstrate a tool to improve understanding and maintaining code that contains #ifdef statements by visualizing them with colors and provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patrools: Visualizing the Polymorphic Usage of Class Hierarchies

    Publication Year: 2010, Page(s):36 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Class hierarchies are key to flexible object-oriented design, but can also burden program comprehension activities when improperly designed or documented. This tool demo presents an Eclipse plug in called PATROOLS. It implements two software visualizations that capture the polymorphic usage of a class hierarchy by its clients, and can support understanding and quality assessment tasks related to c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Renaming Parts of Identifiers Consistently within Code Clones

    Publication Year: 2010, Page(s):38 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    Copying and pasting source code results in code duplication. A common form of software reuse involves modifying the new duplicate to fit a current task. The similar code fragments (code clones) may be edited inconsistently by the programmer, for various reasons, leaving a bug in the software that may remain undetected by both the programmer and the compiler. A previously published tool, CReN, help... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DepDigger: A Tool for Detecting Complex Low-Level Dependencies

    Publication Year: 2010, Page(s):40 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    We present a tool that identifies complex data-flow dependencies on code-level, based on the measure dep-degree. Low-level dependencies between program operations are modeled by the use-def graph, which is generated from reaching definitions of variables. The tool annotates program operations with their dep-degree values, such that 'difficult' program operations are easy to locate. We hope that th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CheckDep: A Tool for Tracking Software Dependencies

    Publication Year: 2010, Page(s):42 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Many software developers use a syntactical `diff' in order to performa quick review before committing changes to the repository. Others are notified of the change by e-mail (containing diffs or change logs), and they review the received information to determine if their work is affected. We lift this simple process from the code level to the more abstract level of dependencies: a software develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Featureous: A Tool for Feature-Centric Analysis of Java Software

    Publication Year: 2010, Page(s):44 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Feature-centric comprehension of source code is necessary for incorporating user-requested modifications during software evolution and maintenance. However, such comprehension is difficult to achieve in case of large object-oriented programs due to the size, complexity, and implicit character of mappings between features and source code. To support programmers in overcoming these difficulties, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DynaRIA: A Tool for Ajax Web Application Comprehension

    Publication Year: 2010, Page(s):46 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    Thanks to Rich Internet Applications (RIAs) with their enhanced interactivity, responsiveness and dynamicity, the user experience in the Web 2.0 is becoming more and more appealing and user-friendly. At the same time, the dynamic nature of RIAs, and the heterogeneous technologies, frameworks, communication models used for implementing them negatively affect their analyzability and understandabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ConAn Tool to Identify Crosscutting Concerns in Object Oriented Systems

    Publication Year: 2010, Page(s):48 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    This paper presents the main features of ConAn, a tool supporting an approach to find scattered and tangled class members in OO systems and to group them in concerns. The recovered information is useful for refactoring/migration tasks, such as towards Aspect Oriented Programming (AOP). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unibench: A Tool for Automated and Collaborative Benchmarking

    Publication Year: 2010, Page(s):50 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    We have identified the need for a universal benchmarking tool that enforces consistency as well as proper documentation. Enforcing these aspects without restricting the tool's applicability poses a major challenge. This paper introduces a tool for coordinating the running of experiments on remote machines. A simple web interface allows for source code to be submitted. Experiments are run and resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.