-
1
-
-
56249134235
-
Generic patch inference
-
J. Andersen and J. L. Lawall. Generic patch inference. In ASE, pages 337-346, 2008.
-
(2008)
ASE
, pp. 337-346
-
-
Andersen, J.1
Lawall, J.L.2
-
2
-
-
70350343826
-
A foundation for flow-based program matching: Using temporal logic and model checking
-
J. Brunel, D. Doligez, R. R. Hansen, J. L. Lawall, and G. Muller. A foundation for flow-based program matching: using temporal logic and model checking. In POPL, pages 114-126, 2009.
-
(2009)
POPL
, pp. 114-126
-
-
Brunel, J.1
Doligez, D.2
Hansen, R.R.3
Lawall, J.L.4
Muller, G.5
-
3
-
-
52749084585
-
Fast graph pattern matching
-
J. Cheng, J. X. Yu, B. Ding, P. Yu, and H. Wang. Fast graph pattern matching. In ICDE, pages 913-922, 2008.
-
(2008)
ICDE
, pp. 913-922
-
-
Cheng, J.1
Yu, J.X.2
Ding, B.3
Yu, P.4
Wang, H.5
-
5
-
-
57349194546
-
Scalable detection of semantic clones
-
M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In ICSE, pages 321-330, 2008.
-
(2008)
ICSE
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
Su, Z.3
-
6
-
-
77949886473
-
Automatically capturing source code context of NL-queries for software maintenance and reuse
-
E. Hill, L. Pollock, and K. Vijay-Shanker. Automatically capturing source code context of NL-queries for software maintenance and reuse. In ICSE, pages 232-242, 2009.
-
(2009)
ICSE
, pp. 232-242
-
-
Hill, E.1
Pollock, L.2
Vijay-Shanker, K.3
-
7
-
-
33244490514
-
Using structural context to recommend source code examples
-
R. Holmes and G. C. Murphy. Using structural context to recommend source code examples. In ICSE, pages 117-125, 2005.
-
(2005)
ICSE
, pp. 117-125
-
-
Holmes, R.1
Murphy, G.C.2
-
8
-
-
14544301479
-
Finding bugs is easy
-
D. Hovemeyer and W. Pugh. Finding bugs is easy. SIGPLAN Not., 39(12):92-106, 2004.
-
(2004)
SIGPLAN Not.
, vol.39
, Issue.12
, pp. 92-106
-
-
Hovemeyer, D.1
Pugh, W.2
-
9
-
-
0141539417
-
Navigating and querying code without getting lost
-
D. Janzen and K. De Volder. Navigating and querying code without getting lost. In AOSD, pages 178-187, 2003.
-
(2003)
AOSD
, pp. 178-187
-
-
Janzen, D.1
De Volder, K.2
-
10
-
-
34548767669
-
DECKARD: Scalable and accurate tree-based detection of code clones
-
L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96-105, 2007.
-
(2007)
ICSE
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
Su, Z.3
Glondu, S.4
-
11
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7):654-670, 2002.
-
(2002)
TSE
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
12
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, pages 306-315, 2005.
-
(2005)
ESEC/FSE
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
13
-
-
33745230004
-
Jungloid mining: Helping to navigate the API jungle
-
D. Mandelin, L. Xu, R. Bodik, and D. Kimelman. Jungloid mining: Helping to navigate the API jungle. In PLDI, pages 48-61, 2005.
-
(2005)
PLDI
, pp. 48-61
-
-
Mandelin, D.1
Xu, L.2
Bodik, R.3
Kimelman, D.4
-
14
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
M. Martin, B. Livshits, and M. S. Lam. Finding application errors and security flaws using PQL: A program query language. In OOPSLA, pages 365-383, 2005.
-
(2005)
OOPSLA
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
15
-
-
57349146280
-
Impact analysis of database schema changes
-
A. Maule, W. Emmerich, and D. S. Rosenblum. Impact analysis of database schema changes. In ICSE, pages 451-460, 2008.
-
(2008)
ICSE
, pp. 451-460
-
-
Maule, A.1
Emmerich, W.2
Rosenblum, D.S.3
-
16
-
-
0032668896
-
System-dependence-graph-based slicing of programs with arbitrary interprocedural control flow
-
S. Sinha, M. J. Harrold, and G. Rothermel. System-dependence-graph-based slicing of programs with arbitrary interprocedural control flow. In ICSE, pages 432-441, 1999.
-
(1999)
ICSE
, pp. 432-441
-
-
Sinha, S.1
Harrold, M.J.2
Rothermel, G.3
-
17
-
-
34248365238
-
XSnippet: Mining for sample code
-
N. Tansalarak and K. T. Claypool. XSnippet: Mining for sample code. In OOPSLA, pages 413-430, 2006.
-
(2006)
OOPSLA
, pp. 413-430
-
-
Tansalarak, N.1
Claypool, K.T.2
-
18
-
-
51049123306
-
ParseWeb: A programmer assistant for reusing open source code on the web
-
S. Thummalapenta and T. Xie. ParseWeb: a programmer assistant for reusing open source code on the web. In ASE, pages 204-213, 2007.
-
(2007)
ASE
, pp. 204-213
-
-
Thummalapenta, S.1
Xie, T.2
-
19
-
-
77949905854
-
Locating need-to-translate constant strings for software internationalization
-
X. Wang, L. Zhang, T. Xie, H. Mei, and J. Sun. Locating need-to-translate constant strings for software internationalization. In ICSE, pages 353-363, 2009.
-
(2009)
ICSE
, pp. 353-363
-
-
Wang, X.1
Zhang, L.2
Xie, T.3
Mei, H.4
Sun, J.5
-
20
-
-
85050273691
-
Program slicing
-
M. Weiser. Program slicing. In ICSE, pages 439-449, 1981.
-
(1981)
ICSE
, pp. 439-449
-
-
Weiser, M.1
-
21
-
-
33745348653
-
SNIAFL: Towards a static noninteractive approach to feature location
-
W. Zhao, L. Zhang, Y. Liu, J. Sun, and F. Yang. SNIAFL: Towards a static noninteractive approach to feature location. TOSEM, 15(2):195-226, 2006.
-
(2006)
TOSEM
, vol.15
, Issue.2
, pp. 195-226
-
-
Zhao, W.1
Zhang, L.2
Liu, Y.3
Sun, J.4
Yang, F.5
-
22
-
-
69949134981
-
MAPO: Mining and recommending API usage patterns
-
H. Zhong, T. Xie, L. Zhang, J. Pei, and H. Mei. MAPO: Mining and recommending API usage patterns. In ECOOP, pages 318-343, 2009.
-
(2009)
ECOOP
, pp. 318-343
-
-
Zhong, H.1
Xie, T.2
Zhang, L.3
Pei, J.4
Mei, H.5
|