default search action
Search dblp for Publications
export results for "toc:db/conf/scam/scam2015.bht:"
@inproceedings{DBLP:conf/scam/AivaloglouHH15, author = {Efthimia Aivaloglou and David Hoepelman and Felienne Hermans}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {A grammar for spreadsheet formulas evaluated on two large datasets}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {121--130}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335408}, doi = {10.1109/SCAM.2015.7335408}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/AivaloglouHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BaloghSB15, author = {Gerg{\"{o}} Balogh and Attila Szabolics and {\'{A}}rp{\'{a}}d Besz{\'{e}}des}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {CodeMetropolis: Eclipse over the city of source code}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {271--276}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335425}, doi = {10.1109/SCAM.2015.7335425}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/BaloghSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BanerjeeMS15, author = {Kunal Banerjee and Chittaranjan A. Mandal and Dipankar Sarkar}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {247--252}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335421}, doi = {10.1109/SCAM.2015.7335421}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BanerjeeMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BinkleyGHIKY15, author = {David W. Binkley and Nicolas E. Gold and Mark Harman and Syed S. Islam and Jens Krinke and Shin Yoo}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {{ORBS} and the limits of static slicing}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335396}, doi = {10.1109/SCAM.2015.7335396}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BinkleyGHIKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BlazyRS15, author = {Sandrine Blazy and St{\'{e}}phanie Riaud and Thomas Sirvent}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Data tainting and obfuscation: Improving plausibility of incorrect taint}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335407}, doi = {10.1109/SCAM.2015.7335407}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BlazyRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BoisselleA15, author = {Vincent Boisselle and Bram Adams}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335409}, doi = {10.1109/SCAM.2015.7335409}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BoisselleA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BonifacioCRKC15, author = {Rodrigo Bonif{\'{a}}cio and Fausto Carvalho and Guilherme Novaes Ramos and Uir{\'{a}} Kulesza and Roberta Coelho}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {The use of {C++} exception handling constructs: {A} comprehensive study}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {21--30}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335398}, doi = {10.1109/SCAM.2015.7335398}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BonifacioCRKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BrandtnerLG15, author = {Martin Brandtner and Philipp Leitner and Harald C. Gall}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Intent, tests, and release dependencies: Pragmatic recipes for source code integration}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335397}, doi = {10.1109/SCAM.2015.7335397}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BrandtnerLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/ChochlovEB15, author = {Muslim Chochlov and Michael English and Jim Buckley}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Using changeset descriptions as a data source to assist feature location}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {51--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335401}, doi = {10.1109/SCAM.2015.7335401}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/ChochlovEB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/DarizRS15, author = {Luca Dariz and Massimiliano Ruggeri and Michele Selvatici}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {A static microcode analysis tool for programmable load drivers}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {265--270}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335424}, doi = {10.1109/SCAM.2015.7335424}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/DarizRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/FaragoHF15, author = {Csaba Farag{\'{o}} and P{\'{e}}ter Heged{\"{u}}s and Rudolf Ferenc}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Cumulative code churn: Impact on maintainability}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {141--150}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335410}, doi = {10.1109/SCAM.2015.7335410}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/FaragoHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/FenskeSMS15, author = {Wolfram Fenske and Sandro Schulze and Daniel Meyer and Gunter Saake}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {When code smells twice as much: Metric-based detection of variability-aware code smells}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {171--180}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335413}, doi = {10.1109/SCAM.2015.7335413}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/FenskeSMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/GhafariGR15, author = {Mohammad Ghafari and Carlo Ghezzi and Konstantin Rubinov}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Automatically identifying focal methods under test in unit test cases}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {61--70}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335402}, doi = {10.1109/SCAM.2015.7335402}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/GhafariGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/GhanavatiA15, author = {Mohammadreza Ghanavati and Artur Andrzejak}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Automated memory leak diagnosis by regression testing}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {191--200}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335415}, doi = {10.1109/SCAM.2015.7335415}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/GhanavatiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/HuckBU15, author = {Alexander H{\"{u}}ck and Christian H. Bischof and Jean Utke}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Checking {C++} codes for compatibility with operator overloading}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {91--100}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335405}, doi = {10.1109/SCAM.2015.7335405}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/HuckBU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/LawrieB15, author = {Dawn J. Lawrie and Dave W. Binkley}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Navigating source code with words}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {71--80}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335403}, doi = {10.1109/SCAM.2015.7335403}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/LawrieB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/LemosPSL15, author = {Ot{\'{a}}vio Augusto Lazzarini Lemos and Adriano Carvalho de Paula and Hitesh Sajnani and Cristina V. Lopes}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Can the use of types and query expansion help improve large-scale code search?}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335400}, doi = {10.1109/SCAM.2015.7335400}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/LemosPSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/LudemannK15, author = {Dierk L{\"{u}}demann and Rainer Koschke}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {From preprocessor-constrained parse graphs to preprocessor-constrained control flow}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {211--220}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335417}, doi = {10.1109/SCAM.2015.7335417}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/LudemannK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/NicolayNRM15, author = {Jens Nicolay and Carlos Noguera and Coen De Roover and Wolfgang De Meuter}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Detecting function purity in JavaScript}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {101--110}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335406}, doi = {10.1109/SCAM.2015.7335406}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/NicolayNRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/PanditaJSW15, author = {Rahul Pandita and Raoul Praful Jetley and Sithu D. Sudarsan and Laurie A. Williams}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Discovering likely mappings between APIs using text mining}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335419}, doi = {10.1109/SCAM.2015.7335419}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/PanditaJSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/PintoKT15, author = {Felipe Pinto and Uir{\'{a}} Kulesza and Christoph Treude}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Automating the performance deviation analysis for multiple system releases: An evolutionary study}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {201--210}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335416}, doi = {10.1109/SCAM.2015.7335416}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/PintoKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RahmanRK15, author = {Mohammad Masudur Rahman and Chanchal K. Roy and Iman Keivanloo}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Recommending insightful comments for source code using crowdsourced knowledge}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {81--90}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335404}, doi = {10.1109/SCAM.2015.7335404}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RahmanRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RaposSAC15, author = {Eric J. Rapos and Andrew Stevenson and Manar H. Alalfi and James R. Cordy}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {SimNav: Simulink navigation of model clone classes}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {241--246}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335420}, doi = {10.1109/SCAM.2015.7335420}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RaposSAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RenatusBE15, author = {Stephan Renatus and Corrie Bartelheimer and J{\"{o}}rn Eichler}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Improving prioritization of software weaknesses using security models with {AVUS}}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {259--264}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335423}, doi = {10.1109/SCAM.2015.7335423}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RenatusBE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SantosEADV15, author = {Gustavo Santos and Anne Etien and Nicolas Anquetil and St{\'{e}}phane Ducasse and Marco T{\'{u}}lio Valente}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Recording and replaying system specific, source code transformations}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {221--230}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335418}, doi = {10.1109/SCAM.2015.7335418}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SantosEADV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SayaghA15, author = {Mohammed Sayagh and Bram Adams}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {Multi-layer software configuration: Empirical study on wordpress}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335399}, doi = {10.1109/SCAM.2015.7335399}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SayaghA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SteidlD15, author = {Daniela Steidl and Florian Deissenboeck}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {How do Java methods grow?}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {151--160}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335411}, doi = {10.1109/SCAM.2015.7335411}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SteidlD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SzokeNFFG15, author = {G{\'{a}}bor Szoke and Csaba Nagy and Lajos Jeno F{\"{u}}l{\"{o}}p and Rudolf Ferenc and Tibor Gyim{\'{o}}thy}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {FaultBuster: An automatic code smell refactoring toolset}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335422}, doi = {10.1109/SCAM.2015.7335422}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SzokeNFFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/UddinGGR15, author = {Md. Sami Uddin and Varun Gaur and Carl Gutwin and Chanchal K. Roy}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {On the comprehension of code clone visualizations: {A} controlled study using eye tracking}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {161--170}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335412}, doi = {10.1109/SCAM.2015.7335412}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/UddinGGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/YuSF15, author = {Hengyang Yu and Xiaohua Shi and Wei Feng}, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {LeakTracer: Tracing leaks along the way}, booktitle = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, pages = {181--190}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCAM.2015.7335414}, doi = {10.1109/SCAM.2015.7335414}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/YuSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scam/2015, editor = {Michael W. Godfrey and David Lo and Foutse Khomh}, title = {15th {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7321933/proceeding}, isbn = {978-1-4673-7529-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.