Scheduled System Maintenance
IEEE Xplore is currently undergoing scheduled maintenance.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2013 IEEE International Conference on Software Maintenance

22-28 Sept. 2013

Filter Results

Displaying Results 1 - 25 of 104
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1426 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (463 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organising Committee

    Publication Year: 2013, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2013, Page(s):xvi - xix
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Sub-Reviewers

    Publication Year: 2013, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2013, Page(s):xxii - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB)

    Incremental change is an integral part of both the initial development and the subsequent evolution and maintenance of large complex software systems. The talk discusses both, the requirements for and the design of, an approach that captures this incremental change in the definition of software architecture. The predominate advantage in making the definition of evolution intrinsic to architecture ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Expert System for Cost-Effective Regression Testing Strategies

    Publication Year: 2013, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Different testing environments and software change characteristics can affect the choice of regression testing techniques. In our prior work, we developed adaptive regression testing (ART) strategies to investigate this problem. While the ART strategies showed promising results, we also found that the multiple criteria decision making processes required for the ART strategies are time-consuming, o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Process Improvement Targets in Test Processes: A Case Study

    Publication Year: 2013, Page(s):11 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    In this paper, we present the results of case studies conducted in three software companies in order to identify the improvement targets in their test processes. The test processes were modeled using the LAPPI (A Light-weight Technique to Practical Process Modeling and Improvement Target Identification) technique. Identifying improvement targets quickly and in a cost-effective way is important to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Rapid Releases and Software Testing

    Publication Year: 2013, Page(s):20 - 29
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time for testing and bug fixing. Since initial research results indeed show that rapid releases fix proportionally less reported bugs than traditional releases, this paper investigates the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Multiple Developers Affect the Evolution of Code Clones

    Publication Year: 2013, Page(s):30 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    The use of copy and paste in programming causes redundant passages of source code. The effect such clones have on software quality and maintainability in particular has been subject to various studies in the recent past. Although negative effects could not be confirmed in general, a non-negligible number of situations where clones did cause problems has been found. Hence, there may be yet unknown ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Logical Clones in Software: Revealing High-Level Business and Programming Rules

    Publication Year: 2013, Page(s):40 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1853 KB) | HTML iconHTML

    Software systems contain many implicit application-specific business and programming rules. These rules represent high-level logical structures and processes for application-specific business and programming concerns. They are crucial for program understanding, consistent evolution, and systematic reuse. However, existing pattern mining and analysis approaches cannot effectively mine such applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Clone Removals

    Publication Year: 2013, Page(s):50 - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    It is often claimed that duplicated source code is a threat to the maintainability of a software system and that developers should manage code duplication. A previous study analyzed the evolution of four software systems and found a remarkable discrepancy between code clones detected by a state-of-the-art clone detector and those deliberately removed by developers as the scope of the clones hardly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content Categorization of API Discussions

    Publication Year: 2013, Page(s):60 - 69
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    Text categorization, automatically labeling natural language text with pre-defined semantic categories, is an essential task for managing the abundant online data. An example of such data in Software Engineering is the large, ever-growing volume of forum discussions on how to use particular APIs. We have conducted a study to explore the question as to how well machine learning algorithms can be ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of API Stability and Adoption in the Android Ecosystem

    Publication Year: 2013, Page(s):70 - 79
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    When APIs evolve, clients make corresponding changes to their applications to utilize new or updated APIs. Despite the benefits of new or updated APIs, developers are often slow to adopt the new APIs. As a first step toward understanding the impact of API evolution on software ecosystems, we conduct an in-depth case study of the co-evolution behavior of Android API and dependent applications using... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How We Design Interfaces, and How to Assess It

    Publication Year: 2013, Page(s):80 - 89
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Interfaces are widely used in Java applications as central design elements for modular programming to increase program reusability and to ease maintainability of software systems. Despite the importance of interfaces and a considerable research effort that has investigated code quality and concrete classes' design, few works have investigated interfaces' design. In this paper, we empirically study... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables

    Publication Year: 2013, Page(s):90 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    This paper makes two contributions regarding reverse engineering of executables. First, techniques are presented for recovering a precise and correct stack memory model in executables in presence of executable-specific artifacts such as indirect control transfers. Next, the enhanced memory model is employed to define a novel symbolic analysis framework for executables that can perform the same typ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automation-Assisted Empirical Study on Lock Usage for Concurrent Programs

    Publication Year: 2013, Page(s):100 - 109
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Nowadays concurrent programs are becoming more and more important with the development of hardware and network technologies. However, it is not easy for programmers to write reliable concurrent programs. Concurrency characteristics such as thread-interleaving make it difficult to debug or maintain concurrent programs. Although there are lots of research work on concurrency such as multi-thread tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues

    Publication Year: 2013, Page(s):110 - 119
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Load tests ensure that software systems are able to perform under the expected workloads. The current state of load test analysis requires significant manual review of performance counters and execution logs, and a high degree of system-specific expertise. In particular, memory-related issues (e.g., memory leaks or spikes), which may degrade performance and cause crashes, are difficult to diagnose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the Limits of Domain Model Recovery

    Publication Year: 2013, Page(s):120 - 129
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (607 KB) | HTML iconHTML

    We are interested in re-engineering families of legacy applications towards using Domain-Specific Languages (DSLs). Is it worth to invest in harvesting domain knowledge from the source code of legacy applications? Reverse engineering domain knowledge from source code is sometimes considered very hard or even impossible. Is it also difficult for "modern legacy systems"? In this paper we select two ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Static and Dynamic Analyses to Reverse-Engineer Scenario Diagrams

    Publication Year: 2013, Page(s):130 - 139
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    This paper discusses a step towards reverse engineering source code to produce UML sequence diagrams, with the aim to aid program comprehension and other activities (e.g., verification). Specifically, our objective being to obtain a lightweight instrumentation and therefore disturb the software behaviour as little as possible in order to eventually produce accurate sequence diagrams. To achieve th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams

    Publication Year: 2013, Page(s):140 - 149
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    There is a range of techniques available to reverse engineer software designs from source code. However, these approaches generate highly detailed representations. The condensing of reverse engineered representations into more high-level design information would enhance the understandability of reverse engineered diagrams. This paper describes an automated approach for condensing reverse engineere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.