By Topic

Software Maintenance (ICSM), 2012 28th IEEE International Conference on

Date 23-28 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 118
  • [Front cover]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Editors

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (270 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (151 KB) | HTML iconHTML
    Freely Available from IEEE
  • Team

    Publication Year: 2012, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (238 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):xiii - xviii
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From off-Line to continuous on-line maintenance

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB) | HTML iconHTML

    Summary form only given. Software is the cornerstone of the modern society. Many human activities rely on software systems that shall operate seamlessly 24/7, and failures in such systems may cause severe problems and considerable economic loss. To efficiently address a growing variety of increasingly complex activities, software systems rely on sophisticated technologies. Most software systems ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging natural language analysis of software: Achievements, challenges, and opportunities

    Publication Year: 2012, Page(s): 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB) | HTML iconHTML

    Summary form only given. Studies continue to report that more time is spent reading, locating, and comprehending code than actually writing code. The increasing size and complexity of software systems makes it significantly more challenging for humans to perform maintenance tasks on software without automated and semi-automated tools to support them, especially in the error-prone tasks. Thus, soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research track: Session I — Program comprehension

    Publication Year: 2012, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • An industrial case study of Coman's automated task detection algorithm: What Worked, What Didn't, and Why

    Publication Year: 2012, Page(s):6 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Programmers need explicit tool support for software maintenance tasks, and a prerequisite for this is an understanding of where the boundaries between distinct tasks lie. Asking developers to indicate manually when they switch tasks is disruptive to their normal work flow, so researchers have sought ways to infer task boundaries automatically based on the content of the interaction histories with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vasco: A visual approach to explore object churn in framework-intensive applications

    Publication Year: 2012, Page(s):15 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Bloat, and particularly object churn, is a common performance problem in framework-intensive applications. Object churn consists of an excessive use of temporary objects. Identifying and understanding sources of churn is a difficult and labor-intensive task, despite recent advances in automated analysis techniques. We present an interactive visualization approach designed to help developers quickl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What makes a good code example?: A study of programming Q&A in StackOverflow

    Publication Year: 2012, Page(s):25 - 34
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    Programmers learning how to use an API or a programming language often rely on code examples to support their learning activities. However, what makes for an effective ode example remains an open question. Finding the haracteristics of the effective examples is essential in improving the appropriateness of these learning aids. To help answer this question we have onducted a qualitative analysis of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research track: Session II — Testing and maintenance

    Publication Year: 2012, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Testing C++ generic libraries

    Publication Year: 2012, Page(s):36 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    We describe a novel methodology for systematic and rigorous testing of C++ generic libraries: separate testing. The approach is based on separate testing of generic (template) algorithms and data structures and of user-defined types that will be used with the library. Templates are tested against specifications using representative types called prototypes that contain metadata which is used to que... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code coverage-based regression test selection and prioritization in WebKit

    Publication Year: 2012, Page(s):46 - 55
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Automated regression testing is often crucial in order to maintain the quality of a continuously evolving software system. However, in many cases regression test suites tend to grow too large to be suitable for full re-execution at each change of the software. In this case selective retesting can be applied to reduce the testing cost while maintaining similar defect detection capability. One of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical analysis of the distribution of unit test smells and their impact on software maintenance

    Publication Year: 2012, Page(s):56 - 65
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Unit testing represents a key activity in software development and maintenance. Test suites with high internal quality facilitate maintenance activities, such as code comprehension and regression testing. Several guidelines have been proposed to help developers write good test suites. Unfortunately, such rules are not always followed resulting in the presence of bad test code smells (or simply tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research track: Session III — Fault localization

    Publication Year: 2012, Page(s): 66
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Interactive fault localization leveraging simple user feedback

    Publication Year: 2012, Page(s):67 - 76
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Many fault localization methods have been proposed in the literature. These methods take in a set of program execution profiles and output a list of suspicious program elements. The list of program elements ranked by their suspiciousness is then presented to developers for manual inspection. Currently, the suspicious elements are ranked in a batch process where developers' inspection efforts are r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding errors from reverse-engineered equality models using a constraint solver

    Publication Year: 2012, Page(s):77 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Java objects are required to honor an equality contract in order to participate in standard collection data structures such as List, Set, and Map. In practice, the implementation of equality can be error prone, resulting in subtle bugs. We present a checker called EQ that is designed to automatically detect such equality implementation bugs. The key to EQ is the automated extraction of a logical m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research track: Session IV — Maintenance issues in OO systems

    Publication Year: 2012, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • The Order of Things: How developers sort fields and methods

    Publication Year: 2012, Page(s):88 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    In source code files, fields and methods are arranged in linear order. Modern programming languages such as Java do not constrain this order-developers are free to choose any sequence. In this paper we examine the largely unexplored strategies developers apply for ordering fields and methods: First, we use visualization to explore different ordering criteria within two open source Java projects. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rejuvenating C++ programs through demacrofication

    Publication Year: 2012, Page(s):98 - 107
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    We describe how legacy C++ programs can be rejuvenated using C++11 features such as generalized constant expressions, perfect forwarding, and lambda expressions. In general, this work develops a correspondence between different kinds of macros and the C++ declarations to which they should be transformed. We have created a set of demacrofication tools to assist a developer in the rejuvenation of C+... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research track: Session V — Change impact analysis

    Publication Year: 2012, Page(s): 108
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE