


default search action
24th SANER 2017: Klagenfurt, Austria
- Martin Pinzger, Gabriele Bavota, Andrian Marcus:
IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, Klagenfurt, Austria, February 20-24, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5501-2
Keynote
- Engin Kirda:
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote). 1
Main Research
MSR and Open Source
- Alexandre Decan, Tom Mens, Maëlick Claes
:
An empirical comparison of dependency issues in OSS packaging ecosystems. 2-12 - Yun Zhang, David Lo
, Pavneet Singh Kochhar, Xin Xia
, Quanlai Li, Jianling Sun:
Detecting similar repositories on GitHub. 13-23 - Parastou Tourani, Bram Adams
, Alexander Serebrenik
:
Code of conduct in open source projects. 24-33 - Eleni Constantinou, Tom Mens:
Socio-technical evolution of the Ruby ecosystem in GitHub. 34-44
Features and Knowledge
- Yutian Tang
, Hareton Leung:
StiCProb: A novel feature mining approach using conditional probability. 45-55 - Xuejiao Zhao, Zhenchang Xing, Muhammad Ashad Kabir
, Naoya Sawada, Jing Li, Shang-Wei Lin
:
HDSKG: Harvesting domain specific knowledge graph from content of webpages. 56-67 - Hongyu Kuang
, Jia Nie, Hao Hu, Patrick Rempel, Jian Lu, Alexander Egyed, Patrick Mäder:
Analyzing closeness of code dependencies for improving IR-based Traceability Recovery. 68-78 - Mohammad Masudur Rahman
, Chanchal K. Roy:
STRICT: Information retrieval based search term identification for concept location. 79-90
Apps and Energy
- Adelina Ciurumelea, Andreas Schaufelbühl, Sebastiano Panichella
, Harald C. Gall
:
Analyzing reviews and code of mobile apps for better release planning. 91-102 - Dario Di Nucci
, Fabio Palomba
, Antonio Prota, Annibale Panichella, Andy Zaidman
, Andrea De Lucia
:
Software-based energy profiling of Android apps: Simple, efficient and reliable? 103-114 - Antonin Carette, Mehdi Adel Ait Younes, Geoffrey Hecht
, Naouel Moha, Romain Rouvoy
:
Investigating the energy impact of Android smells. 115-126
Software and Model Analysis
- Patrick Neubauer, Robert Bill, Tanja Mayerhofer
, Manuel Wimmer:
Automated generation of consistency-achieving model editors. 127-137 - Laerte Xavier, Aline Brito, André C. Hora
, Marco Túlio Valente
:
Historical and impact analysis of API breaking changes: A large-scale study. 138-147 - Carol V. Alexandru, Sebastiano Panichella
, Harald C. Gall
:
Reducing redundancies in multi-revision code analysis. 148-159
Code and Data Transformations
- Gustavo Santos, Klérisson Vinícius Ribeiro Paixão, Nicolas Anquetil
, Anne Etien
, Marcelo de Almeida Maia, Stéphane Ducasse:
Recommending source code locations for system specific transformations. 160-170 - Reinout Stevens, Coen De Roover
:
Extracting executable transformations from distilled code changes. 171-181 - Roberto Tiella, Mariano Ceccato
:
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation. 182-192 - Michiel Overeem, Marten Spoor, Slinger Jansen
:
The dark side of event sourcing: Managing data conversion. 193-204
Program Comprehension
- Xiaoran Wang, Lori L. Pollock, K. Vijay-Shanker:
Automatically generating natural language descriptions for object-related statement sequences. 205-216 - Johannes C. Hofmeister, Janet Siegmund, Daniel V. Holt:
Shorter identifier names take longer to comprehend. 217-227 - Christian D. Newman
, Reem S. Alsuhaibani, Michael L. Collard, Jonathan I. Maletic:
Lexical categories for source code identifiers. 228-239 - Marc-André Laverdière, Ettore Merlo:
Computing counter-examples for privilege protection losses using security models. 240-249
Software Development Support
- Sebastian Proksch, Sarah Nadi, Sven Amann, Mira Mezini:
Enriching in-IDE process information with fine-grained source code history. 250-260 - Tommaso Dal Sasso, Andrea Mocci
, Michele Lanza, Ebrisa Mastrodicasa:
How to gamify software engineering. 261-271 - Pingyi Zhou, Jin Liu, Zijiang Yang, Guangyou Zhou:
Scalable tag recommendation for software information sites. 272-282 - Le An, Ons Mlouki, Foutse Khomh, Giuliano Antoniol:
Stack Overflow: A code laundering platform? 283-293
Code Smells and Refactoring
- Amir Saboury, Pooya Musavi, Foutse Khomh, Giulio Antoniol:
An empirical study of code smells in JavaScript projects. 294-305 - Kamil Jezek, Richard Lipka:
Antipatterns causing memory bloat: A case study. 306-315 - Wolfram Fenske, Jens Meinicke, Sandro Schulze
, Steffen Schulze, Gunter Saake:
Variant-preserving refactorings for migrating cloned products to a product line. 316-326 - Ran Ettinger, Shmuel S. Tyszberowicz, Shay Menaia:
Efficient method extraction for automatic elimination of type-3 clones. 327-337
Testing and Fault Localization
- Sohon Roy, Felienne Hermans, Arie van Deursen
:
Spreadsheet testing in practice. 338-348 - Thomas Durieux
, Benoit Cornu, Lionel Seinturier
, Martin Monperrus
:
Dynamic patch generation for null pointer exceptions using metaprogramming. 349-358 - Bing Liu, Lucia, Shiva Nejati
, Lionel C. Briand:
Improving fault localization for Simulink models using search-based testing and prediction models. 359-370 - Yiyang Feng, Wanwangying Ma, Yibiao Yang
, Hongmin Lu, Yuming Zhou, Baowen Xu
:
An empirical investigation into the cost-effectiveness of test effort allocation strategies for finding faults. 371-381
Early Research Achievements
Learning from and Providing Help to Developers
- Preetha Chatterjee
, Manziba Akanda Nishi, Kostadin Damevski
, Vinay Augustine, Lori L. Pollock, Nicholas A. Kraft:
What information about code snippets is available in different software-related documents? An exploratory study. 382-386 - Abhishek Sharma, Yuan Tian, Agus Sulistya, David Lo
, Aiko Fallas Yamashita:
Harnessing Twitter to support serendipitous learning of developers. 387-391 - Laerte Xavier, André C. Hora
, Marco Túlio Valente
:
Why do we break APIs? First answers from developers. 392-396 - Marcel Steinbeck:
An arc-based approach for visualization of code smells. 397-401 - David Ameller, Carles Farré
, Xavier Franch, Danilo Valerio, Antonino Cassarino:
Towards continuous software release planning. 402-406
Evolution of Open Source Systems
- Raula Gaikovina Kula
, Daniel M. Germán, Takashi Ishio
, Ali Ouni
, Katsuro Inoue:
An exploratory study on library aging by monitoring client usage in a software ecosystem. 407-411 - Ana Filipa Nogueira
, José Carlos Bregieiro Ribeiro
, Mário Alberto Zenha-Rela
:
Trends on empty exception handlers for Java open source libraries. 412-416 - Ahmed Zerouali, Tom Mens:
Analyzing the evolution of testing library usage in open source Java projects. 417-421 - Haidar Osman, Andrei Chis, Jakob Schaerer, Mohammad Ghafari, Oscar Nierstrasz:
On the evolution of exception usage in Java projects. 422-426 - Leonardo Humberto Silva, Marco Túlio Valente
, Alexandre Bergel:
Statically identifying class dependencies in legacy JavaScript systems: First results. 427-431 - Julien Delplanque, Anne Etien
, Olivier Auverlot, Tom Mens, Nicolas Anquetil
, Stéphane Ducasse:
CodeCritics applied to database schema: Challenges and first results. 432-436
Patterns and Optimization
- Ting Chen, Youzheng Feng, Xiapu Luo
, Xiaodong Lin, Xiaosong Zhang:
Cloud-based parallel concolic execution. 437-441 - Ting Chen, Xiaoqi Li
, Xiapu Luo
, Xiaosong Zhang:
Under-optimized smart contracts devour your money. 442-446 - Yossi Gil, Ori Marcovitch, Matteo Orrù:
Pluggable Controllers and Nano-Patterns. 447-451 - David Anderson, Mark Hills
:
Query Construction Patterns in PHP. 452-456 - Loup Meurice, Anthony Cleve:
Supporting schema evolution in schema-less NoSQL data stores. 457-461
Tool Demonstrations
Static Analysis and Refactoring
- Alexandru Stefanica, Petru Florin Mihancea:
XCORE: Support for developing program analysis tools. 462-466 - Brian Bartman, Christian D. Newman
, Michael L. Collard, Jonathan I. Maletic:
srcQL: A syntax-aware query language for source code. 467-471 - Tim Buckers, Clinton Cao, Michiel Doesburg, Boning Gong, Sunwei Wang, Moritz Beller
, Andy Zaidman
:
UAV: Warnings from multiple Automated Static Analysis Tools at a glance. 472-476 - Yossi Gil, Matteo Orrù:
The Spartanizer: Massive automatic refactoring. 477-481 - Naoya Ujihara, Ali Ouni
, Takashi Ishio
, Katsuro Inoue:
c-JRefRec: Change-based identification of Move Method refactoring opportunities. 482-486 - Fabio Palomba
, Dario Di Nucci
, Annibale Panichella, Andy Zaidman
, Andrea De Lucia
:
Lightweight detection of Android-specific code smells: The aDoctor project. 487-491
Binaries and Evolution
- Franck de Goër, Christopher Ferreira, Laurent Mounier:
scat: Learning from a single execution of a binary. 492-496 - Daniel Mercier, Aziem Chawdhary, Richard Jones:
dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis. 497-501 - Jierui Liu, Tianyong Wu, Xi Deng, Jun Yan, Jian Zhang:
InsDal: A safe and extensible instrumentation tool on Dalvik byte-code for Android applications. 502-506 - Jason Raber:
Columbo: High perfomance unpacking. 507-510 - George Ganea:
Hindsight: Revealing the evolution of dependencies to developers. 511-515 - David Ameller, Carles Farré
, Xavier Franch, Antonino Cassarino, Danilo Valerio, Valentin Elvassore:
Replan: A Release Planning Tool. 516-520
Industrial Research
- Arian Treffer, Michael Perscheid, Matthias Uflacker:
Bringing back-in-time debugging down to the database. 521-525 - Harald Altinger, Steffen Herbold
, Friederike Schneemann, Jens Grabowski, Franz Wotawa:
Performance tuning for automotive Software Fault Prediction. 526-530 - Ryota Mibe, Tadashi Tanaka, Takashi Kobayashi, Shingo Kobayashi:
Business process recovery based on system log and information of organizational structure. 531-535 - Bernhard Dorninger, Michael Moser, Josef Pichler:
Multi-language re-documentation to support a COBOL to Java migration project. 536-540 - Vard Antinyan, Miroslaw Staron:
Proactive reviews of textual requirements. 541-545 - Keisuke Yano
, Akihiko Matsuo:
Data access visualization for legacy application maintenance. 546-550
Posters
- Brent van Bladel, Alessandro Murgia, Serge Demeyer
:
An empirical study of clone density evolution and developer cloning tendency. 551-552 - Michael Moser, Michael Pfeiffer, Josef Pichler:
Towards reverse engineering of intermediate code for documentation generators. 553-554 - Mohammad Ghafari, Hamidreza Moradi
:
A framework for classifying and comparing source code recommendation systems. 555-556 - Liu He, Qingshan Li, Lu Wang, Jiewen Wan:
Self-adaptive systems framework based on agent and search-based optimization. 557-558 - Viggo Holmstedt, Shegaw Anagaw Mengiste:
The importance of program Design Patterns training. 559-560 - Astrid Younang, Lunjin Lu:
Conventionality analysis of array objects in JavaScript. 561-562 - Yuji Mizobuchi, Kuniharu Takayama:
Two improvements to detect duplicates in Stack Overflow. 563-564 - Patrick Neubauer, Robert Bill, Manuel Wimmer:
Modernizing domain-specific languages with XMLText and IntellEdit. 565-566 - Takayuki Omori:
Lost comments support program comprehension. 567-568 - Daiki Fujibayashi, Akinori Ihara, Hirohiko Suwa
, Raula Gaikovina Kula
, Ken-ichi Matsumoto:
Does the release cycle of a library project influence when it is adopted by a client project? 569-570 - Takuto Norikane, Akinori Ihara, Kenichi Matsumoto:
Which review feedback did long-term contributors get on OSS projects? 571-572 - Katsuhisa Maruyama, Shinpei Hayashi
, Norihiro Yoshida, Eunjong Choi:
Frame-based behavior preservation in refactoring. 573-574 - Ra-Jeong Moon, Kyu-Min Shim, Hae Young Lee, Hyung-Jong Kim:
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding. 575-576 - Tetsuya Kanda, Mingyu Guo, Hideaki Hata
, Ken-ichi Matsumoto:
Towards understanding an open-source bounty: Analysis of Bountysource. 577-578

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.