-
1
-
-
77949354411
-
-
http://httpd.apache.org
-
Apache HTTP server. http://httpd.apache.org/.
-
Apache
-
-
-
2
-
-
77949388646
-
-
bzip2. http://www.bzip.org/.
-
bzip2. http://www.bzip.org/.
-
-
-
-
3
-
-
77949417212
-
-
doxygen. http://www.doxygen.org/.
-
doxygen. http://www.doxygen.org/.
-
-
-
-
4
-
-
77949414143
-
-
Subversion. http://subversion.tigris.org/.
-
Subversion. http://subversion.tigris.org/.
-
-
-
-
5
-
-
77949382687
-
-
time - time command execution. http://www.manpages.info/freebsd/time.1. html.
-
time - time command execution. http://www.manpages.info/freebsd/time.1. html.
-
-
-
-
7
-
-
84859166305
-
-
Simrank, Query rewriting through link analysis of the click graph
-
I. Antonellis, H. Garcia-Molina, and C.-C. Chang. Simrank++: Query rewriting through link analysis of the click graph. In VLDB, 2008.
-
(2008)
VLDB
-
-
Antonellis, I.1
Garcia-Molina, H.2
Chang, C.-C.3
-
9
-
-
0029734233
-
An improved algorithm for identifying objects in code
-
G. Canfora, A. Cimitile, and M. Munro. An improved algorithm for identifying objects in code. Software - Practice & Experience, 26(1):25-48, 1996.
-
(1996)
Software - Practice & Experience
, vol.26
, Issue.1
, pp. 25-48
-
-
Canfora, G.1
Cimitile, A.2
Munro, M.3
-
10
-
-
0036040277
-
Similarity estimation techniques from rounding algorithms
-
M. S. Charikar. Similarity estimation techniques from rounding algorithms. In STOC, 2002.
-
(2002)
STOC
-
-
Charikar, M.S.1
-
11
-
-
70450092979
-
Secure web applications via automatic partitioning
-
S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. In SOSP, 2007.
-
(2007)
SOSP
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, K.5
Zheng, L.6
Zheng, X.7
-
14
-
-
33244490514
-
Using structural context to recommend source code examples
-
R. Holmes and G. C. Murphy. Using structural context to recommend source code examples. In ICSE, 2005.
-
(2005)
ICSE
-
-
Holmes, R.1
Murphy, G.C.2
-
15
-
-
84956630483
-
Interprocedural slicing using dependence graphs
-
S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. In PLDI, 1988.
-
(1988)
PLDI
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
17
-
-
35348863146
-
-
D. F. Huynh, D. R. Karger, and R. C. Miller. Exhibit: Lightweight structured data publishing. In WWW, 2007.
-
D. F. Huynh, D. R. Karger, and R. C. Miller. Exhibit: Lightweight structured data publishing. In WWW, 2007.
-
-
-
-
18
-
-
0037587640
-
Component rank: Relative significance rank for software component search
-
K. Inoue, R. Yokomori, H. Fujiwara, T. Yamamoto, M. Matsushita, and S. Kusumoto. Component rank: Relative significance rank for software component search. In ICSE, 2003.
-
(2003)
ICSE
-
-
Inoue, K.1
Yokomori, R.2
Fujiwara, H.3
Yamamoto, T.4
Matsushita, M.5
Kusumoto, S.6
-
19
-
-
0242625250
-
-
G. Jeh and J. Widom. SimRank: A measure of structural-context similarity. In KDD, 2002.
-
G. Jeh and J. Widom. SimRank: A measure of structural-context similarity. In KDD, 2002.
-
-
-
-
20
-
-
0000406430
-
Authoritative sources in a hyperlinked environment
-
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. In SODA, 1997.
-
(1997)
SODA
-
-
Kleinberg, J.M.1
-
21
-
-
3042658703
-
-
C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO, 2004.
-
C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO, 2004.
-
-
-
-
22
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, 2005.
-
(2005)
ESEC/FSE
-
-
Li, Z.1
Zhou, Y.2
-
25
-
-
34547367487
-
-
D. Lo and S.-C. Khoo. SMArTIC: Towards building an accurate, robust and scalable specification miner. In FSE, 2006.
-
D. Lo and S.-C. Khoo. SMArTIC: Towards building an accurate, robust and scalable specification miner. In FSE, 2006.
-
-
-
-
26
-
-
53149140743
-
MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
-
S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. A. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In SOSP, 2007.
-
(2007)
SOSP
-
-
Lu, S.1
Park, S.2
Hu, C.3
Ma, X.4
Jiang, W.5
Li, Z.6
Popa, R.A.7
Zhou, Y.8
-
27
-
-
31844436753
-
Jungloid mining: Helping to navigate the API jungle
-
D. Mandelin, L. Xu, R. Bodìk, and D. Kimelman. Jungloid mining: Helping to navigate the API jungle. In PLDI, 2005.
-
(2005)
PLDI
-
-
Mandelin, D.1
Xu, L.2
Bodìk, R.3
Kimelman, D.4
-
28
-
-
35348960950
-
Hierarchical clustering for software architecture recovery
-
O. Maqbool and H. A. Babri. Hierarchical clustering for software architecture recovery. IEEE Transactions on Software Engineering, 33(11):759-780, 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.11
, pp. 759-780
-
-
Maqbool, O.1
Babri, H.A.2
-
29
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, 2008.
-
(2008)
PLDI
-
-
McCamant, S.1
Ernst, M.D.2
-
30
-
-
0033725593
-
Data mining library reuse patterns using generalized association rules
-
A. Michail. Data mining library reuse patterns using generalized association rules. In ICSE, 2000.
-
(2000)
ICSE
-
-
Michail, A.1
-
31
-
-
0041875229
-
On spectral clustering: Analysis and an algorithm
-
A. Y. Ng, M. I. Jordan, and Y. Weiss. On spectral clustering: Analysis and an algorithm. In NIPS, 2001.
-
(2001)
NIPS
-
-
Ng, A.Y.1
Jordan, M.I.2
Weiss, Y.3
-
33
-
-
4544241812
-
Efficient field-sensitive pointer analysis of C
-
D. J. Pearce, P. H. J. Kelly, and C. Hankin. Efficient field-sensitive pointer analysis of C. In PASTE, 2004.
-
(2004)
PASTE
-
-
Pearce, D.J.1
Kelly, P.H.J.2
Hankin, C.3
-
34
-
-
0035695798
-
Identifying candidate objects using hierarchical clustering analysis
-
S. Phattarsukol and P. Muenchaisri. Identifying candidate objects using hierarchical clustering analysis. In APSEC, 2001.
-
(2001)
APSEC
-
-
Phattarsukol, S.1
Muenchaisri, P.2
-
35
-
-
32344452628
-
Automatic generation of suggestions for program investigation
-
M. P. Robillard. Automatic generation of suggestions for program investigation. In ESEC/FSE, 2005.
-
(2005)
ESEC/FSE
-
-
Robillard, M.P.1
-
37
-
-
0030646927
-
Normalized cuts and image segmentation
-
J. Shi and J. Malik. Normalized cuts and image segmentation. In CVPR, 1997.
-
(1997)
CVPR
-
-
Shi, J.1
Malik, J.2
-
38
-
-
0031372523
-
Identifying modules via concept analysis
-
M. Siff and T. Reps. Identifying modules via concept analysis. In ICSM, 1997.
-
(1997)
ICSM
-
-
Siff, M.1
Reps, T.2
-
39
-
-
0015640298
-
Co-citation in the scientific literature: A new measure of the relationship between two documents
-
H. Small. Co-citation in the scientific literature: A new measure of the relationship between two documents. Journal of the American Society for Information Science, 24(4):265-269, 1973.
-
(1973)
Journal of the American Society for Information Science
, vol.24
, Issue.4
, pp. 265-269
-
-
Small, H.1
-
40
-
-
34548319589
-
Modular information hiding and type-safe linking for C
-
S. Srivastava, M. Hicks, and J. S. Foster. Modular information hiding and type-safe linking for C. In TLDI, 2007.
-
(2007)
TLDI
-
-
Srivastava, S.1
Hicks, M.2
Foster, J.S.3
-
41
-
-
34248365238
-
XSnippet: Mining for sample code
-
N. Tansalarak and K. Claypool. XSnippet: Mining for sample code. In OOPSLA, 2006.
-
(2006)
OOPSLA
-
-
Tansalarak, N.1
Claypool, K.2
-
42
-
-
0032688675
-
Identifying objects using cluster and concept analysis
-
A. van Deursen and T. Kuipers. Identifying objects using cluster and concept analysis. In ICSE, 1999.
-
(1999)
ICSE
-
-
van Deursen, A.1
Kuipers, T.2
-
44
-
-
85050273691
-
Program slicing
-
M. Weiser. Program slicing. In ICSE, 1981.
-
(1981)
ICSE
-
-
Weiser, M.1
-
45
-
-
0036983315
-
Automatic extraction of object-oriented component interfaces
-
J. Whaley, M. C. Martin, and M. S. Lam. Automatic extraction of object-oriented component interfaces. In ISSTA, 2002.
-
(2002)
ISSTA
-
-
Whaley, J.1
Martin, M.C.2
Lam, M.S.3
-
47
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining temporal API rules from imperfect traces. In ICSE, 2006.
-
(2006)
ICSE
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
48
-
-
77949371835
-
MAPO: Mining and recommending API usage pattern
-
H. Zhong, T. Xie, L. Zhang, J. Pei, and H. Mei. MAPO: Mining and recommending API usage pattern. In ECOOP, 2009.
-
(2009)
ECOOP
-
-
Zhong, H.1
Xie, T.2
Zhang, L.3
Pei, J.4
Mei, H.5
|