Search dblp for Publications

export results for "toc:db/conf/scam/scam2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scam/AivaloglouHH15,
  author       = {Efthimia Aivaloglou and
                  David Hoepelman and
                  Felienne Hermans},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {A grammar for spreadsheet formulas evaluated on two large datasets},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {121--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335408},
  doi          = {10.1109/SCAM.2015.7335408},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/AivaloglouHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BaloghSB15,
  author       = {Gerg{\"{o}} Balogh and
                  Attila Szabolics and
                  {\'{A}}rp{\'{a}}d Besz{\'{e}}des},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {CodeMetropolis: Eclipse over the city of source code},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {271--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335425},
  doi          = {10.1109/SCAM.2015.7335425},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/BaloghSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BanerjeeMS15,
  author       = {Kunal Banerjee and
                  Chittaranjan A. Mandal and
                  Dipankar Sarkar},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {A translation validation framework for symbolic value propagation
                  based equivalence checking of FSMDAs},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {247--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335421},
  doi          = {10.1109/SCAM.2015.7335421},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BanerjeeMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BinkleyGHIKY15,
  author       = {David W. Binkley and
                  Nicolas E. Gold and
                  Mark Harman and
                  Syed S. Islam and
                  Jens Krinke and
                  Shin Yoo},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {{ORBS} and the limits of static slicing},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335396},
  doi          = {10.1109/SCAM.2015.7335396},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BinkleyGHIKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BlazyRS15,
  author       = {Sandrine Blazy and
                  St{\'{e}}phanie Riaud and
                  Thomas Sirvent},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Data tainting and obfuscation: Improving plausibility of incorrect
                  taint},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335407},
  doi          = {10.1109/SCAM.2015.7335407},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BlazyRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BoisselleA15,
  author       = {Vincent Boisselle and
                  Bram Adams},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {The impact of cross-distribution bug duplicates, empirical study on
                  Debian and Ubuntu},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335409},
  doi          = {10.1109/SCAM.2015.7335409},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BoisselleA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BonifacioCRKC15,
  author       = {Rodrigo Bonif{\'{a}}cio and
                  Fausto Carvalho and
                  Guilherme Novaes Ramos and
                  Uir{\'{a}} Kulesza and
                  Roberta Coelho},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {The use of {C++} exception handling constructs: {A} comprehensive
                  study},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335398},
  doi          = {10.1109/SCAM.2015.7335398},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BonifacioCRKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BrandtnerLG15,
  author       = {Martin Brandtner and
                  Philipp Leitner and
                  Harald C. Gall},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Intent, tests, and release dependencies: Pragmatic recipes for source
                  code integration},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335397},
  doi          = {10.1109/SCAM.2015.7335397},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BrandtnerLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/ChochlovEB15,
  author       = {Muslim Chochlov and
                  Michael English and
                  Jim Buckley},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Using changeset descriptions as a data source to assist feature location},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {51--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335401},
  doi          = {10.1109/SCAM.2015.7335401},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/ChochlovEB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/DarizRS15,
  author       = {Luca Dariz and
                  Massimiliano Ruggeri and
                  Michele Selvatici},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {A static microcode analysis tool for programmable load drivers},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {265--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335424},
  doi          = {10.1109/SCAM.2015.7335424},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/DarizRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/FaragoHF15,
  author       = {Csaba Farag{\'{o}} and
                  P{\'{e}}ter Heged{\"{u}}s and
                  Rudolf Ferenc},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Cumulative code churn: Impact on maintainability},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335410},
  doi          = {10.1109/SCAM.2015.7335410},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/FaragoHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/FenskeSMS15,
  author       = {Wolfram Fenske and
                  Sandro Schulze and
                  Daniel Meyer and
                  Gunter Saake},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {When code smells twice as much: Metric-based detection of variability-aware
                  code smells},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {171--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335413},
  doi          = {10.1109/SCAM.2015.7335413},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/FenskeSMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/GhafariGR15,
  author       = {Mohammad Ghafari and
                  Carlo Ghezzi and
                  Konstantin Rubinov},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Automatically identifying focal methods under test in unit test cases},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {61--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335402},
  doi          = {10.1109/SCAM.2015.7335402},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/GhafariGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/GhanavatiA15,
  author       = {Mohammadreza Ghanavati and
                  Artur Andrzejak},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Automated memory leak diagnosis by regression testing},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {191--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335415},
  doi          = {10.1109/SCAM.2015.7335415},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/GhanavatiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/HuckBU15,
  author       = {Alexander H{\"{u}}ck and
                  Christian H. Bischof and
                  Jean Utke},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Checking {C++} codes for compatibility with operator overloading},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {91--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335405},
  doi          = {10.1109/SCAM.2015.7335405},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/HuckBU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/LawrieB15,
  author       = {Dawn J. Lawrie and
                  Dave W. Binkley},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Navigating source code with words},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {71--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335403},
  doi          = {10.1109/SCAM.2015.7335403},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/LawrieB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/LemosPSL15,
  author       = {Ot{\'{a}}vio Augusto Lazzarini Lemos and
                  Adriano Carvalho de Paula and
                  Hitesh Sajnani and
                  Cristina V. Lopes},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Can the use of types and query expansion help improve large-scale
                  code search?},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335400},
  doi          = {10.1109/SCAM.2015.7335400},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/LemosPSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/LudemannK15,
  author       = {Dierk L{\"{u}}demann and
                  Rainer Koschke},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {From preprocessor-constrained parse graphs to preprocessor-constrained
                  control flow},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {211--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335417},
  doi          = {10.1109/SCAM.2015.7335417},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/LudemannK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/NicolayNRM15,
  author       = {Jens Nicolay and
                  Carlos Noguera and
                  Coen De Roover and
                  Wolfgang De Meuter},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Detecting function purity in JavaScript},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {101--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335406},
  doi          = {10.1109/SCAM.2015.7335406},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/NicolayNRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/PanditaJSW15,
  author       = {Rahul Pandita and
                  Raoul Praful Jetley and
                  Sithu D. Sudarsan and
                  Laurie A. Williams},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Discovering likely mappings between APIs using text mining},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335419},
  doi          = {10.1109/SCAM.2015.7335419},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/PanditaJSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/PintoKT15,
  author       = {Felipe Pinto and
                  Uir{\'{a}} Kulesza and
                  Christoph Treude},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Automating the performance deviation analysis for multiple system
                  releases: An evolutionary study},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {201--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335416},
  doi          = {10.1109/SCAM.2015.7335416},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/PintoKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RahmanRK15,
  author       = {Mohammad Masudur Rahman and
                  Chanchal K. Roy and
                  Iman Keivanloo},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Recommending insightful comments for source code using crowdsourced
                  knowledge},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {81--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335404},
  doi          = {10.1109/SCAM.2015.7335404},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RahmanRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RaposSAC15,
  author       = {Eric J. Rapos and
                  Andrew Stevenson and
                  Manar H. Alalfi and
                  James R. Cordy},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {SimNav: Simulink navigation of model clone classes},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {241--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335420},
  doi          = {10.1109/SCAM.2015.7335420},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RaposSAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RenatusBE15,
  author       = {Stephan Renatus and
                  Corrie Bartelheimer and
                  J{\"{o}}rn Eichler},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Improving prioritization of software weaknesses using security models
                  with {AVUS}},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {259--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335423},
  doi          = {10.1109/SCAM.2015.7335423},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RenatusBE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SantosEADV15,
  author       = {Gustavo Santos and
                  Anne Etien and
                  Nicolas Anquetil and
                  St{\'{e}}phane Ducasse and
                  Marco T{\'{u}}lio Valente},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Recording and replaying system specific, source code transformations},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {221--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335418},
  doi          = {10.1109/SCAM.2015.7335418},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SantosEADV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SayaghA15,
  author       = {Mohammed Sayagh and
                  Bram Adams},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {Multi-layer software configuration: Empirical study on wordpress},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335399},
  doi          = {10.1109/SCAM.2015.7335399},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SayaghA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SteidlD15,
  author       = {Daniela Steidl and
                  Florian Deissenboeck},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {How do Java methods grow?},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {151--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335411},
  doi          = {10.1109/SCAM.2015.7335411},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SteidlD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SzokeNFFG15,
  author       = {G{\'{a}}bor Szoke and
                  Csaba Nagy and
                  Lajos Jeno F{\"{u}}l{\"{o}}p and
                  Rudolf Ferenc and
                  Tibor Gyim{\'{o}}thy},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {FaultBuster: An automatic code smell refactoring toolset},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {253--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335422},
  doi          = {10.1109/SCAM.2015.7335422},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SzokeNFFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/UddinGGR15,
  author       = {Md. Sami Uddin and
                  Varun Gaur and
                  Carl Gutwin and
                  Chanchal K. Roy},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {On the comprehension of code clone visualizations: {A} controlled
                  study using eye tracking},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {161--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335412},
  doi          = {10.1109/SCAM.2015.7335412},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/UddinGGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/YuSF15,
  author       = {Hengyang Yu and
                  Xiaohua Shi and
                  Wei Feng},
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {LeakTracer: Tracing leaks along the way},
  booktitle    = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages        = {181--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCAM.2015.7335414},
  doi          = {10.1109/SCAM.2015.7335414},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/YuSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scam/2015,
  editor       = {Michael W. Godfrey and
                  David Lo and
                  Foutse Khomh},
  title        = {15th {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7321933/proceeding},
  isbn         = {978-1-4673-7529-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}