-
1
-
-
37849002654
-
Mining API patterns as partial orders from source code: From usage scenarios to specifications
-
ACHARYA, M., XIE, T., PEI, J., AND XU, J. Mining API patterns as partial orders from source code: from usage scenarios to specifications. In ESEC-FSE '07, pp. 25-34.
-
ESEC-FSE '07
, pp. 25-34
-
-
Acharya, M.1
Xie, T.2
Pei, J.3
X, U.J.4
-
2
-
-
77957986734
-
Effective API navigation and reuse
-
aug
-
ALNUSAIR, A., ZHAO, T., AND BODDEN, E. Effective API navigation and reuse. In IRI (aug. 2010), pp. 7 -12.
-
(2010)
IRI
, pp. 7-12
-
-
Alnusair, A.1
Zhao, T.2
Bodden, E.3
-
3
-
-
26444455136
-
Synthesis of interface specifications for Java classes
-
ALUR, R., CERNY, P., MADHUSUDAN, P., AND NAM, W. Synthesis of interface specifications for Java classes. In POPL (2005).
-
(2005)
POPL
-
-
Alur, R.1
Cerny, P.2
Madhusudan, P.3
Nam, W.4
-
4
-
-
0036038253
-
Mining specifications
-
AMMONS, G., BODIK, R., AND LARUS, J. R. Mining specifications. In POPL'02, pp. 4-16.
-
POPL'02
, pp. 4-16
-
-
Ammons, G.1
Bodik, R.2
Larus, J.R.3
-
5
-
-
0032311601
-
Clone detection using abstract syntax trees
-
BAXTER, I. D., YAHIN, A., MOURA, L., SANT'ANNA, M., AND BIER, L. Clone detection using abstract syntax trees. In ICSM '98.
-
ICSM '98
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
6
-
-
84870476768
-
An empirical study of object protocols in the wild
-
BECKMAN, N., KIM, D., AND ALDRICH, J. An empirical study of object protocols in the wild. In ECOOP'11.
-
ECOOP'11
-
-
Beckman, N.1
Kim, D.2
Aldrich, J.3
-
7
-
-
0032108294
-
Discovering models of software processes from event-based data
-
COOK, J. E., AND WOLF, A. L. Discovering models of software processes from event-based data. ACM Trans. Softw. Eng. Methodol. 7, 3 (1998), 215-249.
-
(1998)
ACM Trans. Softw. Eng. Methodol
, vol.7
, Issue.3
, pp. 215-249
-
-
Cook, J.E.1
Wolf, A.L.2
-
9
-
-
63549093081
-
Enabling static analysis for partial Java programs
-
DAGENAIS, B., AND HENDREN, L. J. Enabling static analysis for partial Java programs. In OOPSLA'08, pp. 313-328.
-
OOPSLA'08
, pp. 313-328
-
-
Dagenais, B.1
Hendren, L.J.2
-
10
-
-
84870474867
-
Mining object behavior with ADABU
-
DALLMEIER, V., LINDIG, C., WASYLKOWSKI, A., AND ZELLER, A. Mining object behavior with ADABU. In WODA '06.
-
WODA '06
-
-
Dallmeier, V.1
Lindig, C.2
Wasylkowski, A.3
Zeller, A.4
-
11
-
-
0033308732
-
A language independent approach for detecting duplicated code
-
DUCASSE, S., RIEGER, M., AND DEMEYER, S. A language independent approach for detecting duplicated code. In ICSM '99.
-
ICSM '99
-
-
Ducasse, S.1
Rieger, M.2
Demeyer, S.3
-
12
-
-
34247362881
-
Effective typestate verification in the presence of aliasing
-
FINK, S., YAHAV, E., DOR, N., RAMALINGAM, G., AND GEAY, E. Effective typestate verification in the presence of aliasing. In ISSTA'06, pp. 133-144.
-
ISSTA'06
, pp. 133-144
-
-
Fink, S.1
Yahav, E.2
Dor, N.3
Ramalingam, G.4
Geay, E.5
-
13
-
-
57349194546
-
Scalable detection of semantic clones
-
GABEL, M., JIANG, L., AND SU, Z. Scalable detection of semantic clones. In ICSE '08, pp. 321-330.
-
ICSE '08
, pp. 321-330
-
-
Gabel, M.1
Jiang, L.2
S, U.Z.3
-
14
-
-
84870403911
-
Javert: Fully automatic mining of general temporal properties from dynamic traces
-
GABEL, M., AND SU, Z. Javert: fully automatic mining of general temporal properties from dynamic traces. In FSE'08.
-
FSE'08
-
-
Gabel, M.1
S, U.Z.2
-
16
-
-
77955903017
-
Learning from 6,000 projects: Lightweight cross-project anomaly detection
-
GRUSKA, N., WASYLKOWSKI, A., AND ZELLER, A. Learning from 6,000 projects: Lightweight cross-project anomaly detection. In ISSTA '10.
-
ISSTA '10
-
-
Gruska, N.1
Wasylkowski, A.2
Zeller, A.3
-
17
-
-
33244490514
-
Using structural context to recommend source code examples
-
HOLMES, R., AND MURPHY, G. C. Using structural context to recommend source code examples. In ICSE '05.
-
ICSE '05
-
-
Holmes, R.1
Murphy, G.C.2
-
18
-
-
32344434539
-
Strathcona example recommendation tool
-
HOLMES, R., WALKER, R. J., AND MURPHY, G. C. Strathcona example recommendation tool. In FSE'05, pp. 237-240.
-
FSE'05
, pp. 237-240
-
-
Holmes, R.1
Walker, R.J.2
Murphy, G.C.3
-
19
-
-
34548767669
-
Deckard: Scalable and accurate tree-based detection of code clones
-
JIANG, L., MISHERGHI, G., SU, Z., AND GLONDU, S. Deckard: Scalable and accurate tree-based detection of code clones. IEEE Computer Society, pp. 96-105.
-
IEEE Computer Society
, pp. 96-105
-
-
Jiang, L.1
Misherghi, G.2
S, U.Z.3
Glondu, S.4
-
20
-
-
0036648690
-
CCFinder: A multilinguistic token-based code clone detection system for large scale source code
-
July
-
KAMIYA, T., KUSUMOTO, S., AND INOUE, K. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28, 7 (July 2002), 654-670.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
21
-
-
84870409606
-
Towards an intelligent code search engine
-
KIM, J., LEE, S., WON HWANG, S., AND KIM, S. Towards an intelligent code search engine. In AAAI'10.
-
AAAI'10
-
-
Kim, J.1
Lee, S.2
Won Hwang, S.3
Kim, S.4
-
22
-
-
84870669209
-
-
Koders. http://www.koders.com/.
-
-
-
-
23
-
-
84890052317
-
Using slicing to identify duplication in source code
-
KOMONDOOR, R., AND HORWITZ, S. Using slicing to identify duplication in source code. In SAS '01, pp. 40-56.
-
SAS '01
, pp. 40-56
-
-
Komondoor, R.1
Horwitz, S.2
-
24
-
-
0034770139
-
Identifying similar code with program dependence graphs
-
KRINKE, J. Identifying similar code with program dependence graphs. In WCRE (2001), pp. 301-309.
-
(2001)
WCRE
, pp. 301-309
-
-
Krinke, J.1
-
25
-
-
34548789572
-
Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder
-
LIVIERI, S., HIGO, Y., MATUSHITA, M., AND INOUE, K. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In ICSE'07.
-
ICSE'07
-
-
Livieri, S.1
Higo, Y.2
Matushita, M.3
Inoue, K.4
-
26
-
-
84870435343
-
SMArTIC: Towards building an accurate, robust and scalable specification miner
-
LO, D., AND KHOO, S.-C. SMArTIC: towards building an accurate, robust and scalable specification miner. In FSE'06.
-
FSE'06
-
-
L, O.D.1
Khoo, S.-C.2
-
27
-
-
31844436753
-
Jungloid mining: Helping to navigate the API jungle
-
MANDELIN, D., XU, L., BODIK, R., AND KIMELMAN, D. Jungloid mining: helping to navigate the API jungle. In PLDI '05, pp. 48-61.
-
PLDI '05
, pp. 48-61
-
-
Mandelin, D.1
X, U.L.2
Bodik, R.3
Kimelman, D.4
-
29
-
-
77955041046
-
Detecting missing method calls in object-oriented software
-
T. D'Hondt, Ed.
-
MONPERRUS, M., BRUCH, M., AND MEZINI, M. Detecting missing method calls in object-oriented software. In ECOOP (2010), T. D'Hondt, Ed., vol. 6183 of Lecture Notes in Computer Science, Springer, pp. 2-25.
-
(2010)
ECOOP
, vol.6183
, pp. 2-25
-
-
Monperrus, M.1
Bruch, M.2
Mezini, M.3
-
30
-
-
77949894379
-
Semantics-based code search
-
REISS, S. P. Semantics-based code search. In ICSE'09.
-
ICSE'09
-
-
Reiss, S.P.1
-
32
-
-
34548219459
-
Static specification mining using automata-based abstractions
-
SHOHAM, S., YAHAV, E., FINK, S., AND PISTOIA, M. Static specification mining using automata-based abstractions. In ISSTA '07.
-
ISSTA '07
-
-
Shoham, S.1
Yahav, E.2
Fink, S.3
Pistoia, M.4
-
33
-
-
31844442829
-
Programming by sketching for bit-streaming programs
-
SOLAR-LEZAMA, A., RABBAH, R., BODÍK, R., AND EBCIO?GLU, K. Programming by sketching for bit-streaming programs. In PLDI '05.
-
PLDI '05
-
-
Solar-Lezama, A.1
Rabbah, R.2
Bodík, R.3
Ebcioglu, K.4
-
34
-
-
84870678427
-
-
stackoverflow. http://stackoverflow.com/.
-
-
-
-
35
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
STROM, R. E., AND YEMINI, S. Typestate: A programming language concept for enhancing software reliability. IEEE Trans. Software Eng. 12, 1 (1986), 157-171.
-
(1986)
IEEE Trans. Software Eng.
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.2
-
36
-
-
51049123306
-
PARSEWeb: A programmer assistant for reusing open source code on the web
-
THUMMALAPENTA, S., AND XIE, T. PARSEWeb: a programmer assistant for reusing open source code on the web. In ASE'07, pp. 204-213.
-
ASE'07
, pp. 204-213
-
-
Thummalapenta, S.1
Xie, T.2
-
37
-
-
0001956132
-
Soot - A Java bytecode optimization framework
-
VALLÉE-RAI, R., CO, P., GAGNON, E., HENDREN, L., LAM, P., AND SUNDARESAN, V. Soot - a Java bytecode optimization framework. In CASCON '99, IBM Press, pp. 13-.
-
CASCON '99, IBM Press
-
-
Vallée-Rai, R.1
C, O.P.2
Gagnon, E.3
Hendren, L.4
Lam, P.5
Sundaresan, V.6
-
38
-
-
14344258876
-
Clone detection in source code by frequent itemset techniques
-
WAHLER, V., SEIPEL, D., WOLFF, J., AND FISCHER, G. Clone detection in source code by frequent itemset techniques. In Source Code Analysis and Manipulation (2004).
-
(2004)
Source Code Analysis and Manipulation
-
-
Wahler, V.1
Seipel, D.2
Wolff, J.3
Fischer, G.4
-
39
-
-
80052962441
-
Mining temporal specifications from object usage
-
WASYLKOWSKI, A., AND ZELLER, A. Mining temporal specifications from object usage. In Autom. Softw. Eng. (2011), vol. 18.
-
(2011)
Autom. Softw. Eng.
, vol.18
-
-
Wasylkowski, A.1
Zeller, A.2
-
40
-
-
37849020292
-
Detecting object usage anomalies
-
WASYLKOWSKI, A., ZELLER, A., AND LINDIG, C. Detecting object usage anomalies. In FSE'07, pp. 35-44.
-
FSE'07
, pp. 35-44
-
-
Wasylkowski, A.1
Zeller, A.2
Lindig, C.3
-
41
-
-
31744435407
-
Mining temporal specifications for error detection
-
WEIMER, W., AND NECULA, G. Mining temporal specifications for error detection. In TACAS (2005).
-
(2005)
TACAS
-
-
Weimer, W.1
Necula, G.2
-
42
-
-
31844437690
-
Automatic extraction of object-oriented component interfaces
-
WHALEY, J., MARTIN, M. C., AND LAM, M. S. Automatic extraction of object-oriented component interfaces. In ISSTA'02.
-
ISSTA'02
-
-
Whaley, J.1
Martin, M.C.2
Lam, M.S.3
-
43
-
-
34247116992
-
Perracotta: Mining temporal API rules from imperfect traces
-
YANG, J., EVANS, D., BHARDWAJ, D., BHAT, T., AND DAS, M. Perracotta: mining temporal API rules from imperfect traces. In ICSE '06, pp. 282-291.
-
ICSE '06
, pp. 282-291
-
-
Yang, J.1
Evans, D.2
Bhardwaj, D.3
Bhat, T.4
Das, M.5
-
44
-
-
77949371835
-
MAPO: Mining and recommending API usage patterns
-
ZHONG, H., XIE, T., ZHANG, L., PEI, J., AND MEI, H. MAPO: Mining and recommending API usage patterns. In ECOOP'09.
-
ECOOP'09
-
-
Zhong, H.1
Xie, T.2
Zhang, L.3
Pei, J.4
Mei, H.5
|