The Community for Technology Leaders
2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (2015)
Bremen, Germany
Sept. 27, 2015 to Sept. 28, 2015
ISBN: 978-1-4673-7528-3
TABLE OF CONTENTS

Title page (PDF)

pp. 1-2

Author index (PDF)

pp. 277

Contents (PDF)

pp. vii-viii

ORBS and the limits of static slicing (Abstract)

David Binkley , Loyola University Maryland, 4501 N. Charles St., Baltimore, MD 21210-2699, USA
Nicolas Gold , University College London, Gower Street, London, WC1E 6BT, UK
Mark Harman , University College London, Gower Street, London, WC1E 6BT, UK
Syed Islam , University of East London, University Way, London E16 2RD
Jens Krinke , University College London, Gower Street, London, WC1E 6BT, UK
Shin Yoo , KAIST, 291 Daehak-ro, Yuseong-gu, Daejeon, 305-701, Republic of Korea
pp. 1-10

Intent, tests, and release dependencies: Pragmatic recipes for source code integration (Abstract)

Martin Brandtner , University of Zurich, Department of Informatics, Switzerland
Philipp Leitner , University of Zurich, Department of Informatics, Switzerland
Harald C. Gall , University of Zurich, Department of Informatics, Switzerland
pp. 11-20

The use of C++ exception handling constructs: A comprehensive study (Abstract)

Rodrigo Bonifacio , Computer Science Department, University of Brasília, Brazil
Fausto Carvalho , Computer Science Department, University of Brasília, Brazil
Guilherme N. Ramos , Computer Science Department, University of Brasília, Brazil
Uira Kulesza , Informatics and Applied Mathematics Department, Federal University of Rio Grande do Norte, Brazil
Roberta Coelho , Informatics and Applied Mathematics Department, Federal University of Rio Grande do Norte, Brazil
pp. 21-30

Multi-layer software configuration: Empirical study on wordpress (Abstract)

Mohammed Sayagh , Polytechnique Montreal, Canada
Bram Adams , Polytechnique Montreal, Canada
pp. 31-40

Can the use of types and query expansion help improve large-scale code search? (Abstract)

Otavio Augusto Lazzarini Lemos , Science and Technology Department - Federal University of São Paulo at S. J. dos Campos - Brazil
Adriano Carvalho de Paula , Science and Technology Department - Federal University of São Paulo at S. J. dos Campos - Brazil
Hitesh Sajnani , Donald Bren School of Information and Computer Sciences - University of California, Irvine - USA
Cristina V. Lopes , Donald Bren School of Information and Computer Sciences - University of California, Irvine - USA
pp. 41-50

Using changeset descriptions as a data source to assist feature location (Abstract)

Muslim Chochlov , Department of Computer Science and Information Systems, University of Limerick, Limerick, Ireland
Michael English , Department of Computer Science and Information Systems, University of Limerick, Limerick, Ireland
Jim Buckley , Department of Computer Science and Information Systems, University of Limerick, Limerick, Ireland
pp. 51-60

Automatically identifying focal methods under test in unit test cases (Abstract)

Mohammad Ghafari , DeepSE Group at DEIB, Politecnico di Milano, Italy
Carlo Ghezzi , DeepSE Group at DEIB, Politecnico di Milano, Italy
Konstantin Rubinov , School of Computing, National University of Singapore
pp. 61-70

Navigating source code with words (Abstract)

Dawn Lawrie , Loyola University Maryland, Baltimore, MD, USA
Dave Binkley , Loyola University Maryland, Baltimore, MD, USA
pp. 71-80

Recommending insightful comments for source code using crowdsourced knowledge (Abstract)

Mohammad Masudur Rahman , University of Saskatchewan, Canada
Chanchal K. Roy , University of Saskatchewan, Canada
Iman Keivanloo , Queen's University, Canada
pp. 81-90

Checking C++ codes for compatibility with operator overloading (Abstract)

Alexander Huck , Institute of Scientific Computing, Technische Universität Darmstadt, Germany
Christian Bischof , Institute of Scientific Computing, Technische Universität Darmstadt, Germany
Jean Utke , Quantitative Research & Analytics, Allstate Insurance Company, USA
pp. 91-100

Detecting function purity in JavaScript (Abstract)

Jens Nicolay , Software Languages Lab, Vrije Universiteit Brussel, Brussels, Belgium
Carlos Noguera , Software Languages Lab, Vrije Universiteit Brussel, Brussels, Belgium
Coen De Roover , Software Languages Lab, Vrije Universiteit Brussel, Brussels, Belgium
Wolfgang De Meuter , Software Languages Lab, Vrije Universiteit Brussel, Brussels, Belgium
pp. 101-110

Data tainting and obfuscation: Improving plausibility of incorrect taint (Abstract)

Sandrine Blazy , Université de Rennes 1, IRISA, France
Stephanie Riaud , DGA Maítrise de l'Information, Inria, France
Thomas Sirvent , DGA Maîtrise de l'Information, IRISA, France
pp. 111-120

A grammar for spreadsheet formulas evaluated on two large datasets (Abstract)

Efthimia Aivaloglou , Software Engineering Research Group, Delft University of Technology, Mekelweg 4, 2628 CD Delft, the Netherlands
David Hoepelman , Software Engineering Research Group, Delft University of Technology, Mekelweg 4, 2628 CD Delft, the Netherlands
Felienne Hermans , Software Engineering Research Group, Delft University of Technology, Mekelweg 4, 2628 CD Delft, the Netherlands
pp. 121-130

The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu (Abstract)

Vincent Boisselle , MCIS, Polytechnique Montréal, Québec, Canada
Bram Adams , MCIS, Polytechnique Montréal, Québec, Canada
pp. 131-140

Cumulative code churn: Impact on maintainability (Abstract)

Csaba Farago , Department of Software Engineering, University of Szeged, Hungary
Peter Hegedus , Department of Software Engineering, University of Szeged, Hungary
Rudolf Ferenc , Department of Software Engineering, University of Szeged, Hungary
pp. 141-150

How do Java methods grow? (Abstract)

Daniela Steidl , CQSE GmbH, Garching b. München, Germany
Florian Deissenboeck , CQSE GmbH, Garching b. München, Germany
pp. 151-160

On the comprehension of code clone visualizations: A controlled study using eye tracking (Abstract)

Md Sami Uddin , Department of Computer Science, University of Saskatchewan, Saskatoon, Canada
Varun Gaur , Department of Computer Science, University of Saskatchewan, Saskatoon, Canada
Carl Gutwin , Department of Computer Science, University of Saskatchewan, Saskatoon, Canada
Chanchal K. Roy , Department of Computer Science, University of Saskatchewan, Saskatoon, Canada
pp. 161-170

When code smells twice as much: Metric-based detection of variability-aware code smells (Abstract)

Wolfram Fenske , University of Magdeburg, Germany
Sandro Schulze , TU Braunschweig, Germany
Daniel Meyer , University of Magdeburg, Germany
Gunter Saake , University of Magdeburg, Germany
pp. 171-180

LeakTracer: Tracing leaks along the way (Abstract)

Hengyang Yu , School of Computer Science and Engineering, Beihang University, Beijing, China
Xiaohua Shi , School of Computer Science and Engineering, Beihang University, Beijing, China
Wei Feng , School of Computer Science and Engineering, Beihang University, Beijing, China
pp. 181-190

Automated memory leak diagnosis by regression testing (Abstract)

Mohammadreza Ghanavati , Institute of Computer Science, Heidelberg University, Germany
Artur Andrzejak , Institute of Computer Science, Heidelberg University, Germany
pp. 191-200

Automating the performance deviation analysis for multiple system releases: An evolutionary study (Abstract)

Felipe Pinto , Federal University of Rio Grande do Norte, Natal, Brazil
Uira Kulesza , Federal University of Rio Grande do Norte, Natal, Brazil
Christoph Treude , Federal University of Rio Grande do Norte, Natal, Brazil
pp. 201-210

From preprocessor-constrained parse graphs to preprocessor-constrained control flow (Abstract)

Dierk Ludemann , Universität Bremen, Germany
Rainer Koschke , Universität Bremen, Germany
pp. 211-220

Recording and replaying system specific, source code transformations (Abstract)

Gustavo Santos , RMoD Team, INRIA Lille Nord Europe, University of Lille, CRIStAL, UMR 9189, France
Anne Etien , RMoD Team, INRIA Lille Nord Europe, University of Lille, CRIStAL, UMR 9189, France
Nicolas Anquetil , RMoD Team, INRIA Lille Nord Europe, University of Lille, CRIStAL, UMR 9189, France
Stephane Ducasse , RMoD Team, INRIA Lille Nord Europe, University of Lille, CRIStAL, UMR 9189, France
Marco Tulio Valente , Department of Computer Science, Federal University of Minas Gerais, Brazil
pp. 221-230

Discovering likely mappings between APIs using text mining (Abstract)

Rahul Pandita , North Carolina State University, USA
Raoul Praful Jetley , ABB Corporate Research, India
Sithu D Sudarsan , ABB Corporate Research, India
Laurie Williams , North Carolina State University, USA
pp. 231-240

SimNav: Simulink navigation of model clone classes (Abstract)

Eric J. Rapos , School of Computing, Queen's University, Kingston, Ontario, Canada
Andrew Stevenson , School of Computing, Queen's University, Kingston, Ontario, Canada
Manar H. Alalfi , School of Computing, Queen's University, Kingston, Ontario, Canada
James R. Cordy , School of Computing, Queen's University, Kingston, Ontario, Canada
pp. 241-246

A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs (Abstract)

Kunal Banerjee , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India 721302
Chittaranjan Mandal , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India 721302
Dipankar Sarkar , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India 721302
pp. 247-252

FaultBuster: An automatic code smell refactoring toolset (Abstract)

Gabor Szoke , Department of Software Engineering, University of Szeged, Hungary
Csaba Nagy , Department of Software Engineering, University of Szeged, Hungary
Lajos Jeno Fulop , Department of Software Engineering, University of Szeged, Hungary
Rudolf Ferenc , Department of Software Engineering, University of Szeged, Hungary
Tibor Gyimothy , Department of Software Engineering, University of Szeged, Hungary
pp. 253-258

Improving prioritization of software weaknesses using security models with AVUS (Abstract)

Stephan Renatus , Fraunhofer Institute for Applied and Integrated Security AISEC, Germany
Corrie Bartelheimer , Fraunhofer Institute for Applied and Integrated Security AISEC, Germany
Jorn Eichler , Fraunhofer Institute for Applied and Integrated Security AISEC, Germany
pp. 259-264

A static microcode analysis tool for programmable load drivers (Abstract)

Luca Dariz , Institute for Agricultural and Earthmoving Machines (IMAMOTER), Italian National Council of Research (CNR), Via Canal Bianco 28, 44124, Ferrara, Italy
Massimiliano Ruggeri , Institute for Agricultural and Earthmoving Machines (IMAMOTER), Italian National Council of Research (CNR), Via Canal Bianco 28, 44124, Ferrara, Italy
Michele Selvatici , Institute for Agricultural and Earthmoving Machines (IMAMOTER), Italian National Council of Research (CNR), Via Canal Bianco 28, 44124, Ferrara, Italy
pp. 265-270

CodeMetropolis: Eclipse over the city of source code (Abstract)

Gergo Balogh , Department of Software Engineering, University of Szeged, Hungary
Attila Szabolics , Department of Software Engineering, University of Szeged, Hungary
Arpad Beszedes , Department of Software Engineering, University of Szeged, Hungary
pp. 271-276
92 ms
(Ver 3.3 (11022016))