


default search action
32nd ICSE 2010: Cape Town, South Africa
- Jeff Kramer, Judith Bishop, Premkumar T. Devanbu, Sebastián Uchitel:
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010, Cape Town, South Africa, 1-8 May 2010. ACM 2010, ISBN 978-1-60558-719-6
Keynote papers
- Clem Sunter:
South Africa and the world beyond 2010: the latest scenarios. 1 - Fred B. Schneider:
Beyond hacking: an SOS! 2 - David King:
Planning for climate change in the 21st century. 3
Dynamic analysis
- Eric Bodden
:
Efficient hybrid typestate analysis by determining continuation-equivalent states. 5-14 - Mark Gabel, Zhendong Su
:
Online inference and enforcement of temporal properties. 15-24
Performance and reliability
- Sasa Misailovic, Stelios Sidiroglou, Henry Hoffmann, Martin C. Rinard:
Quality of service profiling. 25-34 - Zibin Zheng
, Michael R. Lyu:
Collaborative reliability prediction of service-oriented systems. 35-44
Faults 1
- Chengnian Sun
, David Lo
, Xiaoyin Wang, Jing Jiang, Siau-Cheng Khoo:
A discriminative model approach for accurate duplicate bug report retrieval. 45-54 - Zhongxian Gu, Earl T. Barr
, David J. Hamilton, Zhendong Su
:
Has the bug really been fixed? 55-64 - Fabiano Cutigi Ferrari, Rachel Burrows, Otávio Augusto Lazzarini Lemos
, Alessandro Garcia, Eduardo Figueiredo, Nélio Cacho
, Frederico Lopes
, Nathalia Temudo, Liana Silva, Sérgio Soares
, Awais Rashid
, Paulo César Masiero, Thaís Vasconcelos Batista
, José Carlos Maldonado:
An exploratory study of fault-proneness in evolving aspect-oriented programs. 65-74
Software architecture
- Naoyasu Ubayashi
, Jun Nomura, Tetsuo Tamai:
Archface: a contract place where architectural design and code meet together. 75-84 - Davide Di Ruscio
, Ivano Malavolta
, Henry Muccini
, Patrizio Pelliccione
, Alfonso Pierantonio
:
Developing next generation ADLs through MDE techniques. 85-94 - Hazeline U. Asuncion, Arthur U. Asuncion, Richard N. Taylor:
Software traceability with topic modeling. 95-104
Software archaeology
- Jörg Liebig, Sven Apel, Christian Lengauer, Christian Kästner, Michael Schulze:
An analysis of the variability in forty preprocessor-based software product lines. 105-114 - Tony Gorschek, Ewan D. Tempero, Lefteris Angelis:
A large-scale empirical study of practitioners' use of object-oriented concepts. 115-124 - Andrew Begel, Yit Phang Khoo, Thomas Zimmermann:
Codebook: discovering and exploiting relationships in software repositories. 125-134
Legal issues
- Daniel Le Métayer, Manuel Maarek
, Valérie Viet Triem Tong, Eduardo Mazza, Marie-Laure Potet, Nicolas Craipeau, Stéphane Frénot, Ronan Hardouin:
Liability in software engineering: overview of the LISE approach and illustration on a case study. 135-144 - Massimiliano Di Penta
, Daniel M. Germán, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
An exploratory study of the evolution of software licensing. 145-154 - Jane Cleland-Huang, Adam Czauderna, Marek Gibiec, John Emenecker:
A machine learning approach for tracing regulatory codes to product specific requirements. 155-164
Supporting programmers 1
- Michael Würsch, Giacomo Ghezzi, Gerald Reif, Harald C. Gall
:
Supporting developers with natural language queries. 165-174 - Thomas Fritz, Gail C. Murphy:
Using information fragments to answer the questions developers ask. 175-184 - Thomas D. LaToza, Brad A. Myers:
Developers ask reachability questions. 185-194
Program transformation and synthesis
- Hao Zhong
, Suresh Thummalapenta, Tao Xie, Lu Zhang, Qing Wang:
Mining API mapping for language migration. 195-204 - Marius Nita, David Notkin:
Using twinning to adapt programs to alternative APIs. 205-214 - Susmit Jha
, Sumit Gulwani, Sanjit A. Seshia, Ashish Tiwari:
Oracle-guided component-based program synthesis. 215-224
Testing 1
- Milos Gligoric, Tihomir Gvero, Vilas Jagannath, Sarfraz Khurshid, Viktor Kuncak, Darko Marinov:
Test generation through programming in UDITA. 225-234 - Zhifeng Lai, Shing-Chi Cheung
, Wing Kwong Chan
:
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing. 235-244
Faults 2
- Sangmin Park, Richard W. Vuduc
, Mary Jean Harrold:
Falcon: fault localization in concurrent programs. 245-254 - Piramanayagam Arumuga Nainar, Ben Liblit
:
Adaptive bug isolation. 255-264 - Shay Artzi, Julian Dolby, Frank Tip, Marco Pistoia:
Practical fault localization for dynamic web applications. 265-274
Human factors 1
- Barthélémy Dagenais, Harold Ossher, Rachel K. E. Bellamy, Martin P. Robillard, Jacqueline de Vries:
Moving into a new software project landscape. 275-284 - Rashina Hoda
, James Noble
, Stuart Marshall:
Organizing self-organizing teams. 285-294 - Soo Ling Lim, Daniele Quercia, Anthony Finkelstein:
StakeNet: using social networks to analyse the stakeholders of large-scale software projects. 295-304
Mining software repositories
- Bram Adams
, Zhen Ming Jiang, Ahmed E. Hassan:
Identifying crosscutting concerns using historical code changes. 305-314 - Tung Thanh Nguyen
, Hoan Anh Nguyen, Nam H. Pham, Jafar M. Al-Kofahi, Tien N. Nguyen:
Recurring bug fixes in object-oriented programs. 315-324 - Wei Wu, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Miryung Kim:
AURA: a hybrid approach to identify framework evolution. 325-334
Verification
- Andreas Classen, Patrick Heymans, Pierre-Yves Schobbens
, Axel Legay, Jean-François Raskin:
Model checking lots of systems: efficient verification of temporal properties in software product lines. 335-344 - Qiusong Yang, Mingshu Li:
A cut-off approach for bounded verification of parameterized systems. 345-354 - Aditya V. Nori, Sriram K. Rajamani:
An empirical study of optimizations in YOGI. 355-364
Human factors 2
- Christoph Treude
, Margaret-Anne D. Storey:
Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds. 365-374 - Alberto Bacchelli, Michele Lanza, Romain Robbes
:
Linking e-mails and source code artifacts. 375-384 - Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson R. Murphy-Hill:
A degree-of-knowledge model to capture source code familiarity. 385-394
Parallelism & concurrency
- Brian Demsky, Patrick Lam:
Views: object-inspired concurrency control. 395-404 - Christoph A. Schaefer, Victor Pankratius, Walter F. Tichy:
Engineering parallel applications with tunable architectures. 405-414 - Jacob Burnim, Koushik Sen:
DETERMIN: inferring likely deterministic specifications of multithreaded programs. 415-424
Testing 2
- Friedrich Steimann
, Andreas Thies
:
From behaviour preservation to behaviour modification: constraint-based mutant generation. 425-434 - Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, Hong Mei:
Is operator-based mutant selection superior to random mutant selection? 435-444 - Elnatan Reisner, Charles Song, Kin-Keung Ma, Jeffrey S. Foster, Adam A. Porter:
Using symbolic evaluation to understand behavior in configurable software systems. 445-454
Supporting programmers 2
- Andrew Bragdon, Steven P. Reiss, Robert C. Zeleznik, Suman Karumuri, William Cheung, Joshua Kaplan, Christopher Coleman, Ferdi Adeputra, Joseph J. LaViola Jr.:
Code bubbles: rethinking the user interface paradigm of integrated development environments. 455-464 - Reid Holmes, Robert J. Walker
:
Customized awareness: recommending relevant external change events. 465-474 - Mark Grechanik
, Chen Fu, Qing Xie, Collin McMillan, Denys Poshyvanyk
, Chad M. Cumby:
A search engine for finding highly relevant applications. 475-484
Faults 3
- Swarup Kumar Sahoo, John Criswell
, Vikram S. Adve:
An empirical study of reported bugs in server software with implications for automated bug diagnosis. 485-494 - Philip J. Guo, Thomas Zimmermann, Nachiappan Nagappan, Brendan Murphy:
Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows. 495-504 - Sarah Rastkar, Gail C. Murphy, Gabriel Murray:
Summarizing software artifacts: a case study of bug reports. 505-514
Program analysis
- James A. Clause, Alessandro Orso:
LEAKPOINT: pinpointing the causes of memory leaks. 515-524 - William N. Sumner
, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang:
Precise calling context encoding. 525-534 - Emina Torlak, Satish Chandra:
Effective interprocedural resource leak detection. 535-544
Software engineering in education: Evaluating software engineering courses
- Wilson Pádua:
Measuring complexity, effectiveness and efficiency in software course projects. 545-554 - Martin Nordio, Roman Mitin, Bertrand Meyer
:
Advanced hands-on training for distributed and outsourced software engineering. 555-558 - Orit Hazzan, Yael Dubinsky:
A HOT --- Human, Organizational and Technological --- framework for a software engineering course. 559-566
Software engineering in education: Team orientation
- Amna Humayun, Wafa Basit, Ghulam A. Farrukh, Fakhar Lodhi, Rabea Aden:
An empirical analysis of team review approaches for teaching quality software development. 567-575 - Norsaremah Salleh
, Emilia Mendes, John C. Grundy
, Giles St. J. Burch:
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. 577-586
Software engineering in education: panel: master's programs in software engineering
- Mehdi Jazayeri:
Panel on master's degree programs in software engineering. 587
Software engineering in education: Effect of context in software engineering education
- Barbara A. Kitchenham
, Pearl Brereton, David Budgen
:
The educational value of mapping studies of software engineering literature. 589-598 - Jens Fendler, Heike Winschiers-Theophilus
:
Towards contextualised software engineering education: an African perspective. 599-607

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.