Notice
There is currently an issue with the citation download feature. Learn more

2013 17th European Conference on Software Maintenance and Reengineering

5-8 March 2013

Filter Results

Displaying Results 1 - 25 of 80
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2986 KB)
    Freely Available from IEEE
  • Proceedings of the 2013 17th European Conference on Software Maintenance and Reengineering (CSMR 2013)

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Welcome from the Conference Chairs

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Doctoral Symposium Chairs

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Early Research Achievements Chairs

    Publication Year: 2013, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the European Projects Track Chairs

    Publication Year: 2013, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Tool Demonstrations Chairs

    Publication Year: 2013, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Workshop Chairs

    Publication Year: 2013, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (178 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2013, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Keynote Talk 1

    Publication Year: 2013, Page(s): xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB)

    Summary form only given. One day, when Dr. Chain Mazelle woke from troubled dreams, he found himself transformed in his office into a horrible vermin, a conference keynote speaker. He was leaning in his uncomfortable chair, in front of a keynote slide where someone had written the words “My Name is Nobody”. “What's happened to me?” he thought. It wasn't a dream. His off... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Talk 2

    Publication Year: 2013, Page(s): xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB)

    Summary form only given. In the last 5 years, the availability of Cloud-based Platforms and Infrastructure radically transformed the IT industry in general and Software Engineering practices in particular. The benefits of these technologies are twofold: they improve efficiency of Software Lifecycle Management by reducing time-to-market and total cost of ownership, and they enable the creation of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Widespread Changes: A Taxonomic Study

    Publication Year: 2013, Page(s):5 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    Many active research studies in software engineering, such as detection of recurring bug fixes, detection of copy-and-paste bugs, and automated program transformation tools, are motivated by the assumption that many code changes (e.g., changing an identifier name) in software systems are widespread to many locations and are similar to one another. However, there is no study so far that actually an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study

    Publication Year: 2013, Page(s):15 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Over the years, many researchers have studied the evolution and maintenance of object-oriented source code in order to understand the possibly costly erosion of the software. However, many studies thus far did not link the evolution of classes to faults. Since (1) some classes evolve independently, other classes have to do it together with others (co-evolution), and (2) not all classes are meant t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Exploratory Study of Cloning in Industrial Software Product Lines

    Publication Year: 2013, Page(s):25 - 34
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    Many companies develop software product lines-collections of similar products-by cloning and adapting artifacts of existing product variants. Transforming such cloned product variants into a "single-copy" software product line representation is considered an important software re-engineering activity, as reflected in numerous tools and methodologies available. However, development practices of com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Eclipse API Usage: Putting the Developer in the Loop

    Publication Year: 2013, Page(s):37 - 46
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Eclipse guidelines distinguish between two types of interfaces provided to third-party developers, i.e., APIs and non-APIs. APIs are stable and supported, while non-APIs are unstable, unsupported and discouraged as they are subject to arbitrary change or removal without notice. In our previous work, we found that despite the discouragement of Eclipse, the use of non-APIs in Eclipse third-party plu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Project Outcome Leveraging Socio-Technical Network Patterns

    Publication Year: 2013, Page(s):47 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    There are many software projects started daily, some are successful, while others are not. Successful projects get completed, are used by many people, and bring benefits to users. Failed projects do not bring similar benefits. In this work, we are interested in developing an effective machine learning solution that predicts project outcome (i.e., success or failures) from developer socio-technical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Crowd Knowledge for Software Comprehension and Development

    Publication Year: 2013, Page(s):57 - 66
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    Question and Answer (Q&A) services, such as Stack Overflow, rely on a community of programmers who post questions, provide and rate answers, to create what is termed "crowd knowledge". As a consequence, these services archive voluminous and potentially useful information to help developers to solve programming-specific issues. Programmers tap into this crowd knowledge through web browsers. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Duplicates of Your Yet Unwritten Bug Report

    Publication Year: 2013, Page(s):69 - 78
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Software projects often use bug-tracking tools to keep track of reported bugs and to provide a communication platform to discuss possible solutions or ways to reproduce failures. The goal is to reduce testing efforts for the development team. However, often, multiple bug reports are committed for the same bug, which, if not recognized as duplicates, can result in work done multiple times by the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Networks of Issue Reports

    Publication Year: 2013, Page(s):79 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB) | HTML iconHTML

    Completely analyzed and closed issue reports in software development projects, particularly in the development of safety-critical systems, often carry important information about issue-related change locations. These locations may be in the source code, as well as traces to test cases affected by the issue, and related design and requirements documents. In order to help developers analyze new issu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Evaluation of Bug Linking

    Publication Year: 2013, Page(s):89 - 98
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    To collect software bugs found by users, development teams often set up bug trackers using systems such as Bugzilla. Developers would then fix some of the bugs and commit corresponding code changes into version control systems such as svn or git. Unfortunately, the links between bug reports and code changes are missing for many software projects as the bug tracking and version control systems are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change-Based Test Selection in the Presence of Developer Tests

    Publication Year: 2013, Page(s):101 - 110
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB) | HTML iconHTML

    Regression test selection (i.e., selecting a subset of a given regression test suite) is a problem that has been studied intensely over the last decade. However, with the increasing popularity of developer tests as the driver of the test process, more fine-grained solutions are in order. In this paper we investigate how method-level changes in the base-code can serve as a reliable indicator for id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.