Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
ORBS and the limits of static slicing
Binkley, David, Gold, Nicolas, Harman, Mark, Islam, Syed, Krinke, Jens, Shin Yoo
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
FaultBuster: An automatic code smell refactoring toolset
Szoke, Gabor, Nagy, Csaba, Fulop, Lajos Jeno, Ferenc, Rudolf, Gyimothy, Tibor
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
When code smells twice as much: Metric-based detection of variability-aware code smells
Fenske, Wolfram, Schulze, Sandro, Meyer, Daniel, Saake, Gunter
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Can the use of types and query expansion help improve large-scale code search?
Lazzarini Lemos, Otavio Augusto, de Paula, Adriano Carvalho, Sajnani, Hitesh, Lopes, Cristina V.
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
CodeMetropolis: Eclipse over the city of source code
Balogh, Gergo, Szabolics, Attila, Beszedes, Arpad
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Detecting function purity in JavaScript
Nicolay, Jens, Noguera, Carlos, De Roover, Coen, De Meuter, Wolfgang
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Automated memory leak diagnosis by regression testing
Ghanavati, Mohammadreza, Andrzejak, Artur
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Multi-layer software configuration: Empirical study on wordpress
Sayagh, Mohammed, Adams, Bram
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
The use of C++ exception handling constructs: A comprehensive study
Bonifacio, Rodrigo, Carvalho, Fausto, Ramos, Guilherme N., Kulesza, Uira, Coelho, Roberta
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Checking C++ codes for compatibility with operator overloading
Huck, Alexander, Bischof, Christian, Utke, Jean
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
Cumulative code churn: Impact on maintainability
Farago, Csaba, Hegedus, Peter, Ferenc, Rudolf
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
On the comprehension of code clone visualizations: A controlled study using eye tracking
Sami Uddin, Md, Gaur, Varun, Gutwin, Carl, Roy, Chanchal K.
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
LeakTracer: Tracing leaks along the way
Hengyang Yu, Xiaohua Shi, Wei Feng
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding
SimNav: Simulink navigation of model clone classes
Rapos, Eric J., Stevenson, Andrew, Alalfi, Manar H., Cordy, James R.
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01.09.2015)
Get full text
Conference Proceeding