Sciweavers

WCRE
2010
IEEE
13 years 11 months ago
Predicting Re-opened Bugs: A Case Study on the Eclipse Project
—Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be...
Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid ...
WCRE
2010
IEEE
13 years 11 months ago
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization
—We present a semi-automated approach for the reverse engineering of UML sequence diagrams. Our approach starts with a set of execution traces that are automatically aligned in o...
Hassen Grati, Houari A. Sahraoui, Pierre Poulin
WCRE
2010
IEEE
13 years 11 months ago
Computer-Aided Extraction of Software Components
—In a software project, outsourcing the development of a particular functionality, reusing a part in another software, or handing-over a part of the code to a new team member req...
Andreas Marx, Fabian Beck, Stephan Diehl
WCRE
2010
IEEE
13 years 11 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle
WCRE
2010
IEEE
13 years 11 months ago
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code
— The paper presents an approach that combines conceptual and evolutionary techniques to support change impact analysis in source code. Information Retrieval (IR) is used to deri...
Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk,...
WCRE
2010
IEEE
13 years 11 months ago
Understanding Feature Evolution in a Family of Product Variants
Existing software product variants, developed by ad hoc reuse such as copy-paste-modify, are often a starting point for building Software Product Line (SPL). Understanding of how ...
Yinxing Xue, Zhenchang Xing, Stan Jarzabek
WCRE
2010
IEEE
13 years 11 months ago
Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs
—Concurrent programming with shared memory in an object-oriented language such as Java is notoriously difficult. Therefore, it is important to study new program understanding te...
Ana Milanova, Yin Liu
WCRE
2010
IEEE
13 years 11 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WCRE
2010
IEEE
13 years 11 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
WCRE
2010
IEEE
13 years 11 months ago
Evaluating the Impact of Software Evolution on Software Clustering
—The evolution of a software project is a rich data source for analyzing and improving the software development process. Recently, several research groups have tried to cluster s...
Fabian Beck, Stephan Diehl