Filter by Type and Author

Authors: Type:

2014

  • B. D. Smet, L. Lempereur, Z. Sharafi, Y. Guéhéneuc, G. Antoniol, and N. Habra, “Taupe: visualizing and analyzing eye-tracking data,” Sci. comput. program., vol. 79, pp. 260-278, 2014.
    [Bibtex]
    @article{journals/scp/SmetLSGAH14,
    author = {Beno\^{\i}t De Smet and
    Lorent Lempereur and
    Zohreh Sharafi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Naji Habra},
    title = {Taupe: Visualizing and analyzing eye-tracking data},
    journal = {Sci. Comput. Program.},
    volume = {79},
    year = {2014},
    pages = {260-278},
    ee = {http://dx.doi.org/10.1016/j.scico.2012.01.004}
    }

2013

  • L. Barbour, F. Khomh, and Y. Zou, “An empirical study of faults in late propagation clone genealogies,” Journal of software: evolution and process, vol. 25, iss. 11, pp. 1139-1165, 2013.
    [Bibtex]
    @article{BarbourKZ13,
    author = {Liliane Barbour and
    Foutse Khomh and
    Ying Zou},
    title = {An empirical study of faults in late propagation clone genealogies},
    journal = {Journal of Software: Evolution and Process},
    volume = {25},
    number = {11},
    year = {2013},
    pages = {1139-1165},
    ee = {http://dx.doi.org/10.1002/smr.1597},
    }
  • M. Mäntylä, F. Khomh, B. Adams, E. Engstrom, and K. Petersen, “On rapid releases and software testing,” in Icsm, 2013, pp. 20-29.
    [Bibtex]
    @inproceedings{MantylaKAEP13,
    author = {Mika M{\"a}ntyl{\"a} and
    Foutse Khomh and
    Bram Adams and
    Emelie Engstrom and
    Kai Petersen},
    title = {On Rapid Releases and Software Testing},
    booktitle = {ICSM},
    year = {2013},
    pages = {20-29},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.13},
    crossref = {DBLP:conf/icsm/2013},
    }
  • S. E. S. Taba, F. Khomh, Y. Zou, A. E. Hassan, and M. Nagappan, “Predicting bugs using antipatterns,” in Icsm, 2013, pp. 270-279.
    [Bibtex]
    @inproceedings{TabaKZHN13,
    author = {Seyyed Ehsan Salamati Taba and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan and
    Meiyappan Nagappan},
    title = {Predicting Bugs Using Antipatterns},
    booktitle = {ICSM},
    year = {2013},
    pages = {270-279},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.38},
    crossref = {DBLP:conf/icsm/2013},
    }
  • F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A. E. Hassan, “How does context affect the distribution of software maintainability metrics?,” in Icsm, 2013, pp. 350-359.
    [Bibtex]
    @inproceedings{ZhangMZKH13,
    author = {Feng Zhang and
    Audris Mockus and
    Ying Zou and
    Foutse Khomh and
    Ahmed E. Hassan},
    title = {How Does Context Affect the Distribution of Software Maintainability
    Metrics?},
    booktitle = {ICSM},
    year = {2013},
    pages = {350-359},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.46},
    crossref = {DBLP:conf/icsm/2013},
    }
  • Y. Kamei, E. Shihab, B. Adams, A. E. Hassan, A. Mockus, A. Sinha, and N. Ubayashi, “A large-scale empirical study of just-in-time quality assurance,” Ieee trans. software eng., vol. 39, iss. 6, pp. 757-773, 2013.
    [Bibtex]
    @article{journals/tse/KameiSAHMSU13,
    author = {Yasutaka Kamei and
    Emad Shihab and
    Bram Adams and
    Ahmed E. Hassan and
    Audris Mockus and
    Anand Sinha and
    Naoyasu Ubayashi},
    title = {A Large-Scale Empirical Study of Just-in-Time Quality Assurance},
    journal = {IEEE Trans. Software Eng.},
    volume = {39},
    number = {6},
    year = {2013},
    pages = {757-773},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2012.70}
    }
  • E. Merlo, T. Lavoie, P. Potvin, and P. Busnel, “Large scale multi-language clone analysis in a telecommunication industrial setting,” in Iwsc, 2013, pp. 69-75.
    [Bibtex]
    @inproceedings{conf/iwsc/MerloLPB13,
    author = {Ettore Merlo and
    Thierry Lavoie and
    Pascal Potvin and
    Pierre Busnel},
    title = {Large scale multi-language clone analysis in a telecommunication
    industrial setting},
    booktitle = {IWSC},
    year = {2013},
    pages = {69-75},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613046},
    crossref = {DBLP:conf/iwsc/2013}
    }
  • B. Bérard, J. Mullins, and M. Sassolas, “Quantifying opacity,” Corr, vol. abs/1301.6799, 2013.
    [Bibtex]
    @article{journals/corr/abs-1301-6799,
    author = {B{\'e}atrice B{\'e}rard and
    John Mullins and
    Mathieu Sassolas},
    title = {Quantifying Opacity},
    journal = {CoRR},
    volume = {abs/1301.6799},
    year = {2013},
    ee = {http://arxiv.org/abs/1301.6799}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Trustrace: mining software repositories to improve the accuracy of requirement traceability links,” Ieee trans. software eng., vol. 39, iss. 5, pp. 725-741, 2013.
    [Bibtex]
    @article{journals/tse/AliGA13,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Trustrace: Mining Software Repositories to Improve the Accuracy
    of Requirement Traceability Links},
    journal = {IEEE Trans. Software Eng.},
    volume = {39},
    number = {5},
    year = {2013},
    pages = {725-741},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2012.71}
    }
  • H. Boucheneb and K. Barkaoui, “Reducing interleaving semantics redundancy in reachability analysis of time petri nets,” Acm trans. embedded comput. syst., vol. 12, iss. 1, p. 7, 2013.
    [Bibtex]
    @article{journals/tecs/BouchenebB13,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Reducing Interleaving Semantics Redundancy in Reachability
    Analysis of Time Petri Nets},
    journal = {ACM Trans. Embedded Comput. Syst.},
    volume = {12},
    number = {1},
    year = {2013},
    pages = {7},
    ee = {http://doi.acm.org/10.1145/2406336.2406343}
    }
  • M. Nayrolles, F. Palma, N. Moha, and Y. Guéhéneuc, “Soda: a tool support for the detection of soa antipatterns,” in Icsoc workshops, 2013, pp. 451-455.
    [Bibtex]
    @inproceedings{conf/icsoc/NayrollesPMG13,
    author = {Mathieu Nayrolles and
    Francis Palma and
    Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Soda: A Tool Support for the Detection of SOA Antipatterns},
    booktitle = {ICSOC Workshops},
    year = {2013},
    pages = {451-455},
    ee = {http://dx.doi.org/10.1007/978-3-642-37804-1_51},
    crossref = {DBLP:conf/icsoc/2012w}
    }
  • T. Lavoie and E. Merlo, “How much really changes? a case study of firefox version evolution using a clone detector,” in Iwsc, 2013, pp. 83-89.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM13,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {How much really changes? A case study of firefox version
    evolution using a clone detector},
    booktitle = {IWSC},
    year = {2013},
    pages = {83-89},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613048},
    crossref = {DBLP:conf/iwsc/2013}
    }
  • L. Jean-Louis, M. Gagnon, and E. Charton, “El enfoque basado en conocimiento para la extracción automática de palabras clave,” Computación y sistemas, vol. 17, iss. 2, 2013.
    [Bibtex]
    @article{journals/cys/Jean-LouisGC13,
    author = {Ludovic Jean-Louis and
    Michel Gagnon and
    Eric Charton},
    title = {El enfoque basado en conocimiento para la extracci{\'o}n
    autom{\'a}tica de palabras clave},
    journal = {Computaci{\'o}n y Sistemas},
    volume = {17},
    number = {2},
    year = {2013},
    ee = {http://cys.cic.ipn.mx/ojs/index.php/CyS/article/view/1523}
    }
  • V. Arnaoudova, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A new family of software anti-patterns: linguistic anti-patterns,” in Csmr, 2013, pp. 187-196.
    [Bibtex]
    @inproceedings{conf/csmr/ArnaoudovaPAG13,
    author = {Venera Arnaoudova and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A New Family of Software Anti-patterns: Linguistic Anti-patterns},
    booktitle = {CSMR},
    year = {2013},
    pages = {187-196},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.28},
    crossref = {DBLP:conf/csmr/2013}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, G. Antoniol, and Y. Guéhéneuc, “Madmatch: many-to-many approximate diagram matching for design comparison,” Ieee trans. software eng., vol. 39, iss. 8, pp. 1090-1111, 2013.
    [Bibtex]
    @article{journals/tse/KpodjedoRGAG13,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {MADMatch: Many-to-Many Approximate Diagram Matching for
    Design Comparison},
    journal = {IEEE Trans. Software Eng.},
    volume = {39},
    number = {8},
    year = {2013},
    pages = {1090-1111},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2013.9}
    }
  • W. Shang, Z. M. Jiang, H. Hemmati, B. Adams, A. E. Hassan, and P. Martin, “Assisting developers of big data analytics applications when deploying on hadoop clouds,” in Icse, 2013, pp. 402-411.
    [Bibtex]
    @inproceedings{conf/icse/ShangJHAHM13,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Hadi Hemmati and
    Bram Adams and
    Ahmed E. Hassan and
    Patrick Martin},
    title = {Assisting developers of big data analytics applications
    when deploying on hadoop clouds},
    booktitle = {ICSE},
    year = {2013},
    pages = {402-411},
    ee = {http://dl.acm.org/citation.cfm?id=2486842},
    crossref = {DBLP:conf/icse/2013}
    }
  • S. Wang, F. Khomh, and Y. Zou, “Improving bug localization using correlations in crash reports,” in Msr, 2013, pp. 247-256.
    [Bibtex]
    @inproceedings{conf/msr/WangKZ13,
    author = {Shaohua Wang and
    Foutse Khomh and
    Ying Zou},
    title = {Improving bug localization using correlations in crash reports},
    booktitle = {MSR},
    year = {2013},
    pages = {247-256},
    ee = {http://dl.acm.org/citation.cfm?id=2487135},
    crossref = {DBLP:conf/msr/2013}
    }
  • F. Jaafar, S. Hassaine, Y. Guéhéneuc, S. Hamel, and B. Adams, “On the relationship between program evolution and fault-proneness: an empirical study,” in Csmr, 2013, pp. 15-24.
    [Bibtex]
    @inproceedings{conf/csmr/JaafarHGHA13,
    author = {Fehmi Jaafar and
    Salima Hassaine and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Bram Adams},
    title = {On the Relationship between Program Evolution and Fault-Proneness:
    An Empirical Study},
    booktitle = {CSMR},
    year = {2013},
    pages = {15-24},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.12},
    crossref = {DBLP:conf/csmr/2013}
    }
  • D. M. Germán, B. Adams, and A. E. Hassan, “The evolution of the r software ecosystem,” in Csmr, 2013, pp. 243-252.
    [Bibtex]
    @inproceedings{conf/csmr/GermanAH13,
    author = {Daniel M. Germ{\'a}n and
    Bram Adams and
    Ahmed E. Hassan},
    title = {The Evolution of the R Software Ecosystem},
    booktitle = {CSMR},
    year = {2013},
    pages = {243-252},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.33},
    crossref = {DBLP:conf/csmr/2013}
    }
  • F. Gauthier and E. Merlo, “Semantic smells and errors in access control models: a case study in php,” in Icse, 2013, pp. 1169-1172.
    [Bibtex]
    @inproceedings{conf/icse/GauthierM04,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Semantic smells and errors in access control models: a case
    study in PHP},
    booktitle = {ICSE},
    year = {2013},
    pages = {1169-1172},
    ee = {http://dl.acm.org/citation.cfm?id=2486952},
    crossref = {DBLP:conf/icse/2013}
    }
  • L. Guerrouj, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “Tidier: an identifier splitting approach using speech recognition techniques,” Journal of software: evolution and process, vol. 25, iss. 6, pp. 575-599, 2013.
    [Bibtex]
    @article{journals/smr/GuerroujPAG13,
    author = {Latifa Guerrouj and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {TIDIER: an identifier splitting approach using speech recognition
    techniques},
    journal = {Journal of Software: Evolution and Process},
    volume = {25},
    number = {6},
    year = {2013},
    pages = {575-599},
    ee = {http://dx.doi.org/10.1002/smr.539}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Towards understanding how developers spend their effort during maintenance activities,” in Wcre, 2013, pp. 152-161.
    [Bibtex]
    @inproceedings{conf/wcre/SohKGA13,
    author = {Z{\'e}phyrin Soh and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Towards understanding how developers spend their effort
    during maintenance activities},
    booktitle = {WCRE},
    year = {2013},
    pages = {152-161},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671290},
    crossref = {DBLP:conf/wcre/2013}
    }
  • J. Panerati, F. Sironi, M. Carminati, M. Maggio, G. Beltrame, P. J. Gmytrasiewicz, D. Sciuto, and M. D. Santambrogio, “On self-adaptive resource allocation through reinforcement learning,” in Ahs, 2013, pp. 23-30.
    [Bibtex]
    @inproceedings{conf/ahs/PaneratiSCMBGSS13,
    author = {Jacopo Panerati and
    Filippo Sironi and
    Matteo Carminati and
    Martina Maggio and
    Giovanni Beltrame and
    Piotr J. Gmytrasiewicz and
    Donatella Sciuto and
    Marco D. Santambrogio},
    title = {On self-adaptive resource allocation through reinforcement
    learning},
    booktitle = {AHS},
    year = {2013},
    pages = {23-30},
    ee = {http://dx.doi.org/10.1109/AHS.2013.6604222},
    crossref = {DBLP:conf/ahs/2013}
    }
  • E. Shihab, A. Ihara, Y. Kamei, W. M. Ibrahim, M. Ohira, B. Adams, A. E. Hassan, and K. Matsumoto, “Studying re-opened bugs in open source software,” Empirical software engineering, vol. 18, iss. 5, pp. 1005-1042, 2013.
    [Bibtex]
    @article{journals/ese/ShihabIKIOAHM13,
    author = {Emad Shihab and
    Akinori Ihara and
    Yasutaka Kamei and
    Walid M. Ibrahim and
    Masao Ohira and
    Bram Adams and
    Ahmed E. Hassan and
    Ken-ichi Matsumoto},
    title = {Studying re-opened bugs in open source software},
    journal = {Empirical Software Engineering},
    volume = {18},
    number = {5},
    year = {2013},
    pages = {1005-1042},
    ee = {http://dx.doi.org/10.1007/s10664-012-9228-6}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, G. Antoniol, and B. Adams, “On the effect of program exploration on maintenance tasks,” in Wcre, 2013, pp. 391-400.
    [Bibtex]
    @inproceedings{conf/wcre/SohKGAA13,
    author = {Z{\'e}phyrin Soh and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Bram Adams},
    title = {On the effect of program exploration on maintenance tasks},
    booktitle = {WCRE},
    year = {2013},
    pages = {391-400},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671314},
    crossref = {DBLP:conf/wcre/2013}
    }
  • F. Abouzaid, M. Mazzara, J. Mullins, and N. Qamar, “Towards a formal analysis of dynamic reconfiguration in ws-bpel,” Intelligent decision technologies, vol. 7, iss. 3, pp. 213-224, 2013.
    [Bibtex]
    @article{journals/idt/AbouzaidMMQ13,
    author = {Faisal Abouzaid and
    Manuel Mazzara and
    John Mullins and
    Nafees Qamar},
    title = {Towards a formal analysis of dynamic reconfiguration in
    WS-BPEL},
    journal = {Intelligent Decision Technologies},
    volume = {7},
    number = {3},
    year = {2013},
    pages = {213-224},
    ee = {http://dx.doi.org/10.3233/IDT-130164}
    }
  • R. Hadjidj and H. Boucheneb, “Rt-studio: a tool for modular design and analysis of realtime systems using interpreted time petri nets,” in Pnse+modpe, 2013, pp. 247-254.
    [Bibtex]
    @inproceedings{conf/apn/HadjidjB13,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {RT-Studio: A Tool for Modular Design and Analysis of Realtime
    Systems Using Interpreted Time Petri Nets},
    booktitle = {PNSE+ModPE},
    year = {2013},
    pages = {247-254},
    ee = {http://ceur-ws.org/Vol-989/paper22.pdf},
    crossref = {DBLP:conf/apn/2013pnse}
    }
  • E. Duclos, S. L. Digabel, Y. Guéhéneuc, and B. Adams, “Acre: an automated aspect creator for testing c++ applications,” in Csmr, 2013, pp. 121-130.
    [Bibtex]
    @inproceedings{conf/csmr/DuclosDGA13,
    author = {Etienne Duclos and
    S{\'e}bastien Le Digabel and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Bram Adams},
    title = {ACRE: An Automated Aspect Creator for Testing C++ Applications},
    booktitle = {CSMR},
    year = {2013},
    pages = {121-130},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.22},
    crossref = {DBLP:conf/csmr/2013}
    }
  • Z. Sharafi, A. Marchetto, A. Susi, G. Antoniol, and Y. Guéhéneuc, “An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension,” in Icpc, 2013, pp. 33-42.
    [Bibtex]
    @inproceedings{conf/iwpc/SharafiMSAG13,
    author = {Zohreh Sharafi and
    Alessandro Marchetto and
    Angelo Susi and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An empirical study on the efficiency of graphical vs. textual
    representations in requirements comprehension},
    booktitle = {ICPC},
    year = {2013},
    pages = {33-42},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2013.6613831},
    crossref = {DBLP:conf/iwpc/2013}
    }
  • G. Antoniol and K. B. Gallagher, “Preface to the special issue on program comprehension,” Empirical software engineering, vol. 18, iss. 2, pp. 177-180, 2013.
    [Bibtex]
    @article{journals/ese/AntoniolG13,
    author = {Giuliano Antoniol and
    Keith B. Gallagher},
    title = {Preface to the special issue on program comprehension},
    journal = {Empirical Software Engineering},
    volume = {18},
    number = {2},
    year = {2013},
    pages = {177-180},
    ee = {http://dx.doi.org/10.1007/s10664-012-9212-1}
    }
  • O. Gendreau and P. N. Robillard, “A process practice to validate the quality of reused component documentation: a case study involving open-source components,” in Icssp, 2013, pp. 61-69.
    [Bibtex]
    @inproceedings{conf/ispw/GendreauR13,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {A process practice to validate the quality of reused component
    documentation: a case study involving open-source components},
    booktitle = {ICSSP},
    year = {2013},
    pages = {61-69},
    ee = {http://doi.acm.org/10.1145/2486046.2486059},
    crossref = {DBLP:conf/ispw/2013}
    }
  • Y. Jiang, B. Adams, and D. M. Germán, “Will my patch make it? and how fast?: case study on the linux kernel,” in Msr, 2013, pp. 101-110.
    [Bibtex]
    @inproceedings{conf/msr/JiangAG13,
    author = {Yujuan Jiang and
    Bram Adams and
    Daniel M. Germ{\'a}n},
    title = {Will my patch make it? and how fast?: case study on the
    Linux kernel},
    booktitle = {MSR},
    year = {2013},
    pages = {101-110},
    ee = {http://dl.acm.org/citation.cfm?id=2487111},
    crossref = {DBLP:conf/msr/2013}
    }
  • M. Gagnon, A. Zouaq, and L. Jean-Louis, “Can we use linked data semantic annotators for the extraction of domain-relevant expressions?,” in Www (companion volume), 2013, pp. 1239-1246.
    [Bibtex]
    @inproceedings{conf/www/GagnonZJ13,
    author = {Michel Gagnon and
    Amal Zouaq and
    Ludovic Jean-Louis},
    title = {Can we use linked data semantic annotators for the extraction
    of domain-relevant expressions?},
    booktitle = {WWW (Companion Volume)},
    year = {2013},
    pages = {1239-1246},
    ee = {http://dl.acm.org/citation.cfm?id=2488157},
    crossref = {DBLP:conf/www/2013c}
    }
  • S. Xie, F. Khomh, and Y. Zou, “An empirical study of the fault-proneness of clone mutation and clone migration,” in Msr, 2013, pp. 149-158.
    [Bibtex]
    @inproceedings{conf/msr/XieKZ13,
    author = {Shuai Xie and
    Foutse Khomh and
    Ying Zou},
    title = {An empirical study of the fault-proneness of clone mutation
    and clone migration},
    booktitle = {MSR},
    year = {2013},
    pages = {149-158},
    ee = {http://dl.acm.org/citation.cfm?id=2487118},
    crossref = {DBLP:conf/msr/2013}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, G. Antoniol, and Y. Guéhéneuc, “Studying software evolution of large object-oriented software systems using an etgm algorithm,” Journal of software: evolution and process, vol. 25, iss. 2, pp. 139-163, 2013.
    [Bibtex]
    @article{journals/smr/KpodjedoRGAG13,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Studying software evolution of large object-oriented software
    systems using an ETGM algorithm},
    journal = {Journal of Software: Evolution and Process},
    volume = {25},
    number = {2},
    year = {2013},
    pages = {139-163},
    ee = {http://dx.doi.org/10.1002/smr.519}
    }
  • H. Boucheneb, D. Lime, and O. H. Roux, “On multi-enabledness in time petri nets,” in Petri nets, 2013, pp. 130-149.
    [Bibtex]
    @inproceedings{conf/apn/BouchenebLR13,
    author = {Hanifa Boucheneb and
    Didier Lime and
    Olivier H. Roux},
    title = {On Multi-enabledness in Time Petri Nets},
    booktitle = {Petri Nets},
    year = {2013},
    pages = {130-149},
    ee = {http://dx.doi.org/10.1007/978-3-642-38697-8_8},
    crossref = {DBLP:conf/apn/2013}
    }
  • M. C. Desmarais and R. Naceur, “A matrix factorization method for mapping items to skills and for enhancing expert-based q-matrices,” in Aied, 2013, pp. 441-450.
    [Bibtex]
    @inproceedings{conf/aied/DesmaraisN13,
    author = {Michel C. Desmarais and
    Rhouma Naceur},
    title = {A Matrix Factorization Method for Mapping Items to Skills
    and for Enhancing Expert-Based Q-Matrices},
    booktitle = {AIED},
    year = {2013},
    pages = {441-450},
    ee = {http://dx.doi.org/10.1007/978-3-642-39112-5_45},
    crossref = {DBLP:conf/aied/2013}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Constraint-based fitness function for search-based software testing,” in Cpaior, 2013, pp. 378-385.
    [Bibtex]
    @inproceedings{conf/cpaior/SaktiGP13,
    author = {Abdelilah Sakti and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Constraint-Based Fitness Function for Search-Based Software
    Testing},
    booktitle = {CPAIOR},
    year = {2013},
    pages = {378-385},
    ee = {http://dx.doi.org/10.1007/978-3-642-38171-3_29},
    crossref = {DBLP:conf/cpaior/2013}
    }
  • E. Shihab, Y. Kamei, B. Adams, and A. E. Hassan, “Is lines of code a good measure of effort in effort-aware models?,” Information & software technology, vol. 55, iss. 11, pp. 1981-1993, 2013.
    [Bibtex]
    @article{journals/infsof/ShihabKAH13,
    author = {Emad Shihab and
    Yasutaka Kamei and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Is lines of code a good measure of effort in effort-aware
    models?},
    journal = {Information {\&} Software Technology},
    volume = {55},
    number = {11},
    year = {2013},
    pages = {1981-1993},
    ee = {http://dx.doi.org/10.1016/j.infsof.2013.06.002}
    }
  • B. Adams, C. Bird, F. Khomh, and K. Moir, “1st international workshop on release engineering (releng 2013),” in Icse, 2013, pp. 1545-1546.
    [Bibtex]
    @inproceedings{conf/icse/AdamsBKM04,
    author = {Bram Adams and
    Christian Bird and
    Foutse Khomh and
    Kim Moir},
    title = {1st international workshop on release engineering (RELENG
    2013)},
    booktitle = {ICSE},
    year = {2013},
    pages = {1545-1546},
    ee = {http://dl.acm.org/citation.cfm?id=2487076},
    crossref = {DBLP:conf/icse/2013}
    }
  • A. Spaeth and M. C. Desmarais, “Combining collaborative filtering and text similarity for expert profile recommendations in social websites,” in Umap, 2013, pp. 178-189.
    [Bibtex]
    @inproceedings{conf/um/SpaethD13,
    author = {Alexandre Spaeth and
    Michel C. Desmarais},
    title = {Combining Collaborative Filtering and Text Similarity for
    Expert Profile Recommendations in Social Websites},
    booktitle = {UMAP},
    year = {2013},
    pages = {178-189},
    ee = {http://dx.doi.org/10.1007/978-3-642-38844-6_15},
    crossref = {DBLP:conf/um/2013}
    }
  • A. Sabane, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A study on the relation between antipatterns and the cost of class unit testing,” in Csmr, 2013, pp. 167-176.
    [Bibtex]
    @inproceedings{conf/csmr/SabanePAG13,
    author = {Aminata Sabane and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Study on the Relation between Antipatterns and the Cost
    of Class Unit Testing},
    booktitle = {CSMR},
    year = {2013},
    pages = {167-176},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.26},
    crossref = {DBLP:conf/csmr/2013}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and F. Khomh, “Mining the relationship between anti-patterns dependencies and fault-proneness,” in Wcre, 2013, pp. 351-360.
    [Bibtex]
    @inproceedings{conf/wcre/JaafarGHK13,
    author = {Fehmi Jaafar and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Foutse Khomh},
    title = {Mining the relationship between anti-patterns dependencies
    and fault-proneness},
    booktitle = {WCRE},
    year = {2013},
    pages = {351-360},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671310},
    crossref = {DBLP:conf/wcre/2013}
    }
  • Y. Ton-That, P. N. Robillard, and M. Lavallée, “Episode measurement method: a data collection technique for observing team processes,” in Icssp, 2013, pp. 108-117.
    [Bibtex]
    @inproceedings{conf/ispw/Ton-ThatRL13,
    author = {Yvan Ton-That and
    Pierre N. Robillard and
    Mathieu Lavall{\'e}e},
    title = {Episode measurement method: a data collection technique
    for observing team processes},
    booktitle = {ICSSP},
    year = {2013},
    pages = {108-117},
    ee = {http://doi.acm.org/10.1145/2486046.2486066},
    crossref = {DBLP:conf/ispw/2013}
    }
  • M. Pinzger and G. Antoniol, “Guest editorial: reverse engineering,” Empirical software engineering, vol. 18, iss. 5, pp. 857-858, 2013.
    [Bibtex]
    @article{journals/ese/PinzgerA13,
    author = {Martin Pinzger and
    Giuliano Antoniol},
    title = {Guest editorial: reverse engineering},
    journal = {Empirical Software Engineering},
    volume = {18},
    number = {5},
    year = {2013},
    pages = {857-858},
    ee = {http://dx.doi.org/10.1007/s10664-012-9237-5}
    }
  • A. Fourmigue, G. Beltrame, and G. Nicolescu, “Explicit transient thermal simulation of liquid-cooled 3d ics,” in Date, 2013, pp. 1385-1390.
    [Bibtex]
    @inproceedings{conf/date/FourmigueBN13,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu},
    title = {Explicit transient thermal simulation of liquid-cooled 3D
    ICs},
    booktitle = {DATE},
    year = {2013},
    pages = {1385-1390},
    ee = {http://dl.acm.org/citation.cfm?id=2485618},
    crossref = {DBLP:conf/date/2013}
    }
  • A. Randolph, A. Imine, H. Boucheneb, and A. Quintero, “Specification and verification using alloy of optimistic access control for distributed collaborative editors,” in Fmics, 2013, pp. 184-198.
    [Bibtex]
    @inproceedings{conf/fmics/RandolphIBQ13,
    author = {Aurel Randolph and
    Abdessamad Imine and
    Hanifa Boucheneb and
    Alejandro Quintero},
    title = {Specification and Verification Using Alloy of Optimistic
    Access Control for Distributed Collaborative Editors},
    booktitle = {FMICS},
    year = {2013},
    pages = {184-198},
    ee = {http://dx.doi.org/10.1007/978-3-642-41010-9_13},
    crossref = {DBLP:conf/fmics/2013}
    }

2012

  • [DOI] S. Kpodjedo, P. Galinier, and G. Antoniol, “Using local similarity measures to efficiently address approximate graph matching,” Discrete applied mathematics, p. -, 2012.
    [Bibtex]
    @article{Kpodjedo2012,
    title = "Using local similarity measures to efficiently address approximate graph matching ",
    journal = "Discrete Applied Mathematics ",
    volume = "",
    number = "0",
    pages = " - ",
    year = "2012",
    note = "",
    issn = "0166-218X",
    doi = "http://dx.doi.org/10.1016/j.dam.2012.01.019",
    url = "http://www.sciencedirect.com/science/article/pii/S0166218X12000273",
    author = "Segla Kpodjedo and Philippe Galinier and Giulio Antoniol",
    keywords = "Approximate graph matching",
    keywords = "Local similarity measure",
    keywords = "Local search "
    }
  • H. Boucheneb and K. Barkaoui, “Reachability analysis of p-time petri nets with parametric markings,” in Acsd, 2012, pp. 72-81.
    [Bibtex]
    @inproceedings{conf/acsd/BouchenebB12,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Reachability Analysis of P-time Petri Nets with Parametric
    Markings},
    booktitle = {ACSD},
    year = {2012},
    pages = {72-81},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2012.23},
    crossref = {DBLP:conf/acsd/2012}
    }
  • I. M. J. Ruiz, M. Nagappan, B. Adams, and A. E. Hassan, “Understanding reuse in the android market,” in Icpc, 2012, pp. 113-122.
    [Bibtex]
    @inproceedings{conf/iwpc/RuizNAH12,
    author = {Israel J. Mojica Ruiz and
    Meiyappan Nagappan and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Understanding reuse in the Android Market},
    booktitle = {ICPC},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240477},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • F. Abouzaid, J. Mullins, M. Mazzara, and N. Dragoni, “Modelling and analysis of dynamic reconfiguration in bp-calculus,” in Kes-amsta, 2012, pp. 534-543.
    [Bibtex]
    @inproceedings{conf/kesamsta/AbouzaidMMD12,
    author = {Faisal Abouzaid and
    John Mullins and
    Manuel Mazzara and
    Nicola Dragoni},
    title = {Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus},
    booktitle = {KES-AMSTA},
    year = {2012},
    pages = {534-543},
    ee = {http://dx.doi.org/10.1007/978-3-642-30947-2_58},
    crossref = {DBLP:conf/kesamsta/2012}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Factors impacting the inputs of traceability recovery approaches,” in Software and systems traceability, , 2012, pp. 99-127.
    [Bibtex]
    @incollection{books/daglib/p/AliGA12,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Factors Impacting the Inputs of Traceability Recovery Approaches},
    booktitle = {Software and Systems Traceability},
    year = {2012},
    pages = {99-127},
    ee = {http://dx.doi.org/10.1007/978-1-4471-2239-5_5},
    crossref = {DBLP:books/daglib/0028967}
    }
  • B. Upadhyaya, F. Khomh, Y. Zou, A. Lau, and J. Ng, “A concept analysis approach for guiding users in service discovery,” in Soca, 2012, pp. 1-8.
    [Bibtex]
    @inproceedings{conf/soca/UpadhyayaKZLN12,
    author = {Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou and
    Alex Lau and
    Joanna Ng},
    title = {A concept analysis approach for guiding users in service
    discovery},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-8},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449462},
    crossref = {DBLP:conf/soca/2012}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study on factors impacting bug fixing time,” in Wcre, 2012, pp. 225-234.
    [Bibtex]
    @inproceedings{conf/wcre/ZhangKZH12,
    author = {Feng Zhang and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study on Factors Impacting Bug Fixing Time},
    booktitle = {WCRE},
    year = {2012},
    pages = {225-234},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.32},
    crossref = {DBLP:conf/wcre/2012}
    }
  • A. Randolph, H. Boucheneb, A. Imine, and A. Quintero, “On consistency of operational transformation approach,” in Infinity, 2012, pp. 45-59.
    [Bibtex]
    @inproceedings{journals/corr/abs-1302-3292,
    author = {Aurel Randolph and
    Hanifa Boucheneb and
    Abdessamad Imine and
    Alejandro Quintero},
    title = {On Consistency of Operational Transformation Approach},
    booktitle = {Infinity},
    year = {2012},
    pages = {45-59},
    ee = {http://dx.doi.org/10.4204/EPTCS.107.5},
    crossref = {DBLP:journals/corr/abs-1302-3105}
    }
  • M. Lavallée and P. N. Robillard, “The impacts of software process improvement on developers: a systematic review,” in Icse, 2012, pp. 113-122.
    [Bibtex]
    @inproceedings{conf/icse/LavalleeR12,
    author = {Mathieu Lavall{\'e}e and
    Pierre N. Robillard},
    title = {The impacts of software process improvement on developers:
    A systematic review},
    booktitle = {ICSE},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227201},
    crossref = {DBLP:conf/icse/2012}
    }
  • F. Gauthier and E. Merlo, “Fast detection of access control vulnerabilities in php applications,” in Wcre, 2012, pp. 247-256.
    [Bibtex]
    @inproceedings{conf/wcre/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Fast Detection of Access Control Vulnerabilities in PHP
    Applications},
    booktitle = {WCRE},
    year = {2012},
    pages = {247-256},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.34},
    crossref = {DBLP:conf/wcre/2012}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A qualitative study on performance bugs,” in Msr, 2012, pp. 199-208.
    [Bibtex]
    @inproceedings{conf/msr/ZamanAH12,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A qualitative study on performance bugs},
    booktitle = {MSR},
    year = {2012},
    pages = {199-208},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224281},
    crossref = {DBLP:conf/msr/2012}
    }
  • W. Shang, B. Adams, and A. E. Hassan, “Using pig as a data preparation language for large-scale mining software repositories studies: an experience report,” Journal of systems and software, vol. 85, iss. 10, pp. 2195-2204, 2012.
    [Bibtex]
    @article{journals/jss/ShangAH12,
    author = {Weiyi Shang and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Using Pig as a data preparation language for large-scale
    mining software repositories studies: An experience report},
    journal = {Journal of Systems and Software},
    volume = {85},
    number = {10},
    year = {2012},
    pages = {2195-2204},
    ee = {http://dx.doi.org/10.1016/j.jss.2011.07.034}
    }
  • Z. Soh, Z. Sharafi, B. V. den Plas, G. C. Porras, Y. Guéhéneuc, and G. Antoniol, “Professional status and expertise for uml class diagram comprehension: an empirical study,” in Icpc, 2012, pp. 163-172.
    [Bibtex]
    @inproceedings{conf/iwpc/SohSPPGA12,
    author = {Z{\'e}phyrin Soh and
    Zohreh Sharafi and
    Bertrand Van den Plas and
    Gerardo Cepeda Porras and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Professional status and expertise for UML class diagram
    comprehension: An empirical study},
    booktitle = {ICPC},
    year = {2012},
    pages = {163-172},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240484},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • N. Ali, A. Sabane, Y. Guéhéneuc, and G. Antoniol, “Improving bug location using binary class relationships,” in Scam, 2012, pp. 174-183.
    [Bibtex]
    @inproceedings{conf/scam/AliSGA12,
    author = {Nasir Ali and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Improving Bug Location Using Binary Class Relationships},
    booktitle = {SCAM},
    year = {2012},
    pages = {174-183},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.26},
    crossref = {DBLP:conf/scam/2012}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study of the effect of file editing patterns on software quality,” in Wcre, 2012, pp. 456-465.
    [Bibtex]
    @inproceedings{conf/wcre/ZhangKZH12a,
    author = {Feng Zhang and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study of the Effect of File Editing Patterns
    on Software Quality},
    booktitle = {WCRE},
    year = {2012},
    pages = {456-465},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.55},
    crossref = {DBLP:conf/wcre/2012}
    }
  • M. C. Desmarais and R. S. J. de Baker, “A review of recent advances in learner and skill modeling in intelligent learning environments,” User model. user-adapt. interact., vol. 22, iss. 1-2, pp. 9-38, 2012.
    [Bibtex]
    @article{journals/umuai/DesmaraisB12,
    author = {Michel C. Desmarais and
    Ryan Shaun Joazeiro de Baker},
    title = {A review of recent advances in learner and skill modeling
    in intelligent learning environments},
    journal = {User Model. User-Adapt. Interact.},
    volume = {22},
    number = {1-2},
    year = {2012},
    pages = {9-38},
    ee = {http://dx.doi.org/10.1007/s11257-011-9106-8}
    }
  • D. Romano, P. Raila, M. Pinzger, and F. Khomh, “Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes,” in Wcre, 2012, pp. 437-446.
    [Bibtex]
    @inproceedings{conf/wcre/RomanoRPK12,
    author = {Daniele Romano and
    Paulius Raila and
    Martin Pinzger and
    Foutse Khomh},
    title = {Analyzing the Impact of Antipatterns on Change-Proneness
    Using Fine-Grained Source Code Changes},
    booktitle = {WCRE},
    year = {2012},
    pages = {437-446},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.53},
    crossref = {DBLP:conf/wcre/2012}
    }
  • M. C. Desmarais, R. Naceur, and B. Beheshti, “Linear models of student skills for static data,” in Umap workshops, 2012.
    [Bibtex]
    @inproceedings{conf/um/DesmaraisNB12,
    author = {Michel C. Desmarais and
    Rhouma Naceur and
    Behzad Beheshti},
    title = {Linear models of student skills for static data},
    booktitle = {UMAP Workshops},
    year = {2012},
    ee = {http://ceur-ws.org/Vol-872/factmod2012_paper_1.pdf},
    crossref = {DBLP:conf/um/2012w}
    }
  • H. Boucheneb and K. Barkaoui, “Parametric verification of timeworkflow nets,” in Seke, 2012, pp. 375-380.
    [Bibtex]
    @inproceedings{conf/seke/BouchenebB12,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Parametric Verification of TimeWorkflow Nets},
    booktitle = {SEKE},
    year = {2012},
    pages = {375-380},
    crossref = {DBLP:conf/seke/2012}
    }
  • Z. Sharafi, Z. Soh, Y. Guéhéneuc, and G. Antoniol, “Women and men – different but equal: on the impact of identifier style on source code reading,” in Icpc, 2012, pp. 27-36.
    [Bibtex]
    @inproceedings{conf/iwpc/SharafiSGA12,
    author = {Zohreh Sharafi and
    Z{\'e}phyrin Soh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Women and men - Different but equal: On the impact of identifier
    style on source code reading},
    booktitle = {ICPC},
    year = {2012},
    pages = {27-36},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240505},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, G. Antoniol, and E. Aïmeur, “Support vector machines for anti-pattern detection,” in Ase, 2012, pp. 278-281.
    [Bibtex]
    @inproceedings{conf/kbse/MaigaABSGAA12,
    author = {Abdou Maiga and
    Nasir Ali and
    Neelesh Bhattacharya and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Esma A\"{\i}meur},
    title = {Support vector machines for anti-pattern detection},
    booktitle = {ASE},
    year = {2012},
    pages = {278-281},
    ee = {http://doi.acm.org/10.1145/2351676.2351723},
    crossref = {DBLP:conf/kbse/2012}
    }
  • H. Ould-Slimane, M. Bande, and H. Boucheneb, “Wiseshare: a collaborative environment for knowledge sharing governed by abac policies,” in Collaboratecom, 2012, pp. 21-29.
    [Bibtex]
    @inproceedings{conf/colcom/Ould-SlimaneBB12,
    author = {Hakima Ould-Slimane and
    Moustapha Bande and
    Hanifa Boucheneb},
    title = {WiseShare: A collaborative environment for knowledge sharing
    governed by ABAC policies},
    booktitle = {CollaborateCom},
    year = {2012},
    pages = {21-29},
    ee = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6450889},
    crossref = {DBLP:conf/colcom/2012}
    }
  • A. Zaidman and G. Antoniol, “Preface to the special issue on reverse engineering (featuring selected papers from wcre 2009),” Sci. comput. program., vol. 77, iss. 6, pp. 741-742, 2012.
    [Bibtex]
    @article{journals/scp/ZaidmanA12,
    author = {Andy Zaidman and
    Giuliano Antoniol},
    title = {Preface to the special issue on reverse engineering (featuring
    selected papers from WCRE 2009)},
    journal = {Sci. Comput. Program.},
    volume = {77},
    number = {6},
    year = {2012},
    pages = {741-742},
    ee = {http://dx.doi.org/10.1016/j.scico.2011.01.008}
    }
  • M. Ouellet, E. Merlo, N. Sozen, and M. Gagnon, “Locating features in dynamically configured avionics software,” in Icse, 2012, pp. 1453-1454.
    [Bibtex]
    @inproceedings{conf/icse/OuelletMSG12,
    author = {Maxime Ouellet and
    Ettore Merlo and
    Neset Sozen and
    Martin Gagnon},
    title = {Locating features in dynamically configured avionics software},
    booktitle = {ICSE},
    year = {2012},
    pages = {1453-1454},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227068},
    crossref = {DBLP:conf/icse/2012}
    }
  • L. Guerrouj, P. Galinier, Y. Guéhéneuc, G. Antoniol, and M. D. Penta, “Tris: a fast and accurate identifiers splitting and expansion algorithm,” in Wcre, 2012, pp. 103-112.
    [Bibtex]
    @inproceedings{conf/wcre/GuerroujGGAP12,
    author = {Latifa Guerrouj and
    Philippe Galinier and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {TRIS: A Fast and Accurate Identifiers Splitting and Expansion
    Algorithm},
    booktitle = {WCRE},
    year = {2012},
    pages = {103-112},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.20},
    crossref = {DBLP:conf/wcre/2012}
    }
  • B. Upadhyaya, F. Khomh, and Y. Zou, “Extracting restful services from web applications,” in Soca, 2012, pp. 1-4.
    [Bibtex]
    @inproceedings{conf/soca/UpadhyayaKZ12,
    author = {Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou},
    title = {Extracting RESTful services from Web applications},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-4},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449448},
    crossref = {DBLP:conf/soca/2012}
    }
  • G. Benattar, B. Bérard, D. Lime, J. Mullins, O. H. Roux, and M. Sassolas, “Channel synthesis for finite transducers,” Int. j. found. comput. sci., vol. 23, iss. 6, pp. 1241-1260, 2012.
    [Bibtex]
    @article{journals/ijfcs/BenattarBLMRS12,
    author = {Gilles Benattar and
    B{\'e}atrice B{\'e}rard and
    Didier Lime and
    John Mullins and
    Olivier H. Roux and
    Mathieu Sassolas},
    title = {Channel Synthesis for Finite Transducers},
    journal = {Int. J. Found. Comput. Sci.},
    volume = {23},
    number = {6},
    year = {2012},
    pages = {1241-1260},
    ee = {http://dx.doi.org/10.1142/S0129054112400503}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “Preserving knowledge in software projects,” Journal of systems and software, vol. 85, iss. 10, pp. 2318-2330, 2012.
    [Bibtex]
    @article{journals/jss/AlamAH12,
    author = {Omar Alam and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Preserving knowledge in software projects},
    journal = {Journal of Systems and Software},
    volume = {85},
    number = {10},
    year = {2012},
    pages = {2318-2330},
    ee = {http://dx.doi.org/10.1016/j.jss.2012.03.028}
    }
  • F. Gauthier and E. Merlo, “Alias-aware propagation of simple pattern-based properties in php applications,” in Scam, 2012, pp. 44-53.
    [Bibtex]
    @inproceedings{conf/scam/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Alias-Aware Propagation of Simple Pattern-Based Properties
    in PHP Applications},
    booktitle = {SCAM},
    year = {2012},
    pages = {44-53},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.19},
    crossref = {DBLP:conf/scam/2012}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Boosting search based testing by using constraint based testing,” in Ssbse, 2012, pp. 213-227.
    [Bibtex]
    @inproceedings{conf/ssbse/SaktiGP12,
    author = {Abdelilah Sakti and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Boosting Search Based Testing by Using Constraint Based
    Testing},
    booktitle = {SSBSE},
    year = {2012},
    pages = {213-227},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_16},
    crossref = {DBLP:conf/ssbse/2012}
    }
  • B. Beheshti and M. Desmarais, “Improving matrix factorization techniques of student test data with partial order constraints,” in Umap, 2012, pp. 346-350.
    [Bibtex]
    @inproceedings{conf/um/BeheshtiD12,
    author = {Behzad Beheshti and
    Michel Desmarais},
    title = {Improving Matrix Factorization Techniques of Student Test
    Data with Partial Order Constraints},
    booktitle = {UMAP},
    year = {2012},
    pages = {346-350},
    ee = {http://dx.doi.org/10.1007/978-3-642-31454-4_33},
    crossref = {DBLP:conf/um/2012}
    }
  • R. Nagano, H. Nakamura, Y. Kamei, B. Adams, K. Hisazumi, N. Ubayashi, and A. Fukuda, “Using the gpgpu for scaling up mining software repositories,” in Icse, 2012, pp. 1435-1436.
    [Bibtex]
    @inproceedings{conf/icse/NaganoNKAHUF12,
    author = {Rina Nagano and
    Hiroki Nakamura and
    Yasutaka Kamei and
    Bram Adams and
    Kenji Hisazumi and
    Naoyasu Ubayashi and
    Akira Fukuda},
    title = {Using the GPGPU for scaling up Mining Software Repositories},
    booktitle = {ICSE},
    year = {2012},
    pages = {1435-1436},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227077},
    crossref = {DBLP:conf/icse/2012}
    }
  • S. Medini, G. Antoniol, Y. Guéhéneuc, M. D. Penta, and P. Tonella, “Scan: an approach to label and relate execution trace segments,” in Wcre, 2012, pp. 135-144.
    [Bibtex]
    @inproceedings{conf/wcre/MediniAGPT12,
    author = {Soumaya Medini and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Massimiliano Di Penta and
    Paolo Tonella},
    title = {SCAN: An Approach to Label and Relate Execution Trace Segments},
    booktitle = {WCRE},
    year = {2012},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.23},
    crossref = {DBLP:conf/wcre/2012}
    }
  • N. Bettenburg, W. Shang, W. M. Ibrahim, B. Adams, Y. Zou, and A. E. Hassan, “An empirical study on inconsistent changes to code clones at the release level,” Sci. comput. program., vol. 77, iss. 6, pp. 760-776, 2012.
    [Bibtex]
    @article{journals/scp/BettenburgSIAZH12,
    author = {Nicolas Bettenburg and
    Weiyi Shang and
    Walid M. Ibrahim and
    Bram Adams and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An empirical study on inconsistent changes to code clones
    at the release level},
    journal = {Sci. Comput. Program.},
    volume = {77},
    number = {6},
    year = {2012},
    pages = {760-776},
    ee = {http://dx.doi.org/10.1016/j.scico.2010.11.010}
    }
  • M. D. Penta, G. Antoniol, D. M. Germán, Y. Guéhéneuc, and B. Adams, “Five days of empirical software engineering: the pased experience,” in Icse, 2012, pp. 1255-1258.
    [Bibtex]
    @inproceedings{conf/icse/PentaAGGA12,
    author = {Massimiliano Di Penta and
    Giuliano Antoniol and
    Daniel M. Germ{\'a}n and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Bram Adams},
    title = {Five days of empirical software engineering: The PASED experience},
    booktitle = {ICSE},
    year = {2012},
    pages = {1255-1258},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227017},
    crossref = {DBLP:conf/icse/2012}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A large scale empirical study on user-centric performance analysis,” in Icst, 2012, pp. 410-419.
    [Bibtex]
    @inproceedings{conf/icst/ZamanAH12,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Large Scale Empirical Study on User-Centric Performance
    Analysis},
    booktitle = {ICST},
    year = {2012},
    pages = {410-419},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICST.2012.121},
    crossref = {DBLP:conf/icst/2012}
    }
  • S. L. Abebe, V. Arnaoudova, P. Tonella, G. Antoniol, and Y. Guéhéneuc, “Can lexicon bad smells improve fault prediction?,” in Wcre, 2012, pp. 235-244.
    [Bibtex]
    @inproceedings{conf/wcre/AbebeATAG12,
    author = {Surafel Lemma Abebe and
    Venera Arnaoudova and
    Paolo Tonella and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Can Lexicon Bad Smells Improve Fault Prediction?},
    booktitle = {WCRE},
    year = {2012},
    pages = {235-244},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.33},
    crossref = {DBLP:conf/wcre/2012}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, and E. Aïmeur, “Smurf: a svm-based incremental anti-pattern detection approach,” in Wcre, 2012, pp. 466-475.
    [Bibtex]
    @inproceedings{conf/wcre/MaigaABSGA12,
    author = {Abdou Maiga and
    Nasir Ali and
    Neelesh Bhattacharya and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Esma A\"{\i}meur},
    title = {SMURF: A SVM-based Incremental Anti-pattern Detection Approach},
    booktitle = {WCRE},
    year = {2012},
    pages = {466-475},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.56},
    crossref = {DBLP:conf/wcre/2012}
    }
  • N. Moha, F. Palma, M. Nayrolles, B. J. Conseil, Y. Guéhéneuc, B. Baudry, and J. Jézéquel, “Specification and detection of soa antipatterns,” in Icsoc, 2012, pp. 1-16.
    [Bibtex]
    @inproceedings{conf/icsoc/MohaPNCGBJ12,
    author = {Naouel Moha and
    Francis Palma and
    Mathieu Nayrolles and
    Benjamin Joyen Conseil and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Benoit Baudry and
    Jean-Marc J{\'e}z{\'e}quel},
    title = {Specification and Detection of SOA Antipatterns},
    booktitle = {ICSOC},
    year = {2012},
    pages = {1-16},
    ee = {http://dx.doi.org/10.1007/978-3-642-34321-6_1},
    crossref = {DBLP:conf/icsoc/2012}
    }
  • S. Hassaine, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Advise: architectural decay in software evolution,” in Csmr, 2012, pp. 267-276.
    [Bibtex]
    @inproceedings{conf/csmr/HassaineGHA12,
    author = {Salima Hassaine and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {ADvISE: Architectural Decay in Software Evolution},
    booktitle = {CSMR},
    year = {2012},
    pages = {267-276},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.34},
    crossref = {DBLP:conf/csmr/2012}
    }
  • P. N. Robillard and M. Lavallée, “Software team processes: a taxonomy,” in Icssp, 2012, pp. 101-109.
    [Bibtex]
    @inproceedings{conf/ispw/RobillardL12,
    author = {Pierre N. Robillard and
    Mathieu Lavall{\'e}e},
    title = {Software team processes: A taxonomy},
    booktitle = {ICSSP},
    year = {2012},
    pages = {101-109},
    ee = {http://dx.doi.org/10.1109/ICSSP.2012.6225952},
    crossref = {DBLP:conf/ispw/2012}
    }
  • T. Lavoie and E. Merlo, “An accurate estimation of the levenshtein distance using metric trees and manhattan distance,” in Iwsc, 2012, pp. 1-7.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM12,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {An accurate estimation of the Levenshtein distance using
    metric trees and Manhattan distance},
    booktitle = {IWSC},
    year = {2012},
    pages = {1-7},
    ee = {http://dx.doi.org/10.1109/IWSC.2012.6227861},
    crossref = {DBLP:conf/iwsc/2012}
    }
  • F. Gauthier and E. Merlo, “Investigation of access control models with formal concept analysis: a case study,” in Csmr, 2012, pp. 397-402.
    [Bibtex]
    @inproceedings{conf/csmr/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Investigation of Access Control Models with Formal Concept
    Analysis: A Case Study},
    booktitle = {CSMR},
    year = {2012},
    pages = {397-402},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.50},
    crossref = {DBLP:conf/csmr/2012}
    }
  • W. M. Ibrahim, N. Bettenburg, B. Adams, and A. E. Hassan, “On the relationship between comment update practices and software bugs,” Journal of systems and software, vol. 85, iss. 10, pp. 2293-2304, 2012.
    [Bibtex]
    @article{journals/jss/IbrahimBAH12,
    author = {Walid M. Ibrahim and
    Nicolas Bettenburg and
    Bram Adams and
    Ahmed E. Hassan},
    title = {On the relationship between comment update practices and
    Software Bugs},
    journal = {Journal of Systems and Software},
    volume = {85},
    number = {10},
    year = {2012},
    pages = {2293-2304},
    ee = {http://dx.doi.org/10.1016/j.jss.2011.09.019}
    }
  • D. Letarte, F. Gauthier, E. Merlo, N. Sutyanyong, and C. Zuzarte, “Targeted genetic test sql generation for the db2 database,” in Dbtest, 2012, p. 5.
    [Bibtex]
    @inproceedings{conf/sigmod/LetarteGMSZ12,
    author = {Dominic Letarte and
    Fran\c{c}ois Gauthier and
    Ettore Merlo and
    Nattavut Sutyanyong and
    Calisto Zuzarte},
    title = {Targeted genetic test SQL generation for the DB2 database},
    booktitle = {DBTest},
    year = {2012},
    pages = {5},
    ee = {http://doi.acm.org/10.1145/2304510.2304517},
    crossref = {DBLP:conf/sigmod/2012dbtest}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, and G. Antoniol, “The quest for ubiquity: a roadmap for software and systems traceability research,” in Re, 2012, pp. 71-80.
    [Bibtex]
    @inproceedings{conf/re/GotelCHZEGA12,
    author = {Orlena Gotel and
    Jane Cleland-Huang and
    Jane Huffman Hayes and
    Andrea Zisman and
    Alexander Egyed and
    Paul Gr{\"u}nbacher and
    Giuliano Antoniol},
    title = {The quest for Ubiquity: A roadmap for software and systems
    traceability research},
    booktitle = {RE},
    year = {2012},
    pages = {71-80},
    ee = {http://dx.doi.org/10.1109/RE.2012.6345841},
    crossref = {DBLP:conf/re/2012}
    }
  • S. McIntosh, B. Adams, and A. E. Hassan, “The evolution of java build systems,” Empirical software engineering, vol. 17, iss. 4-5, pp. 578-608, 2012.
    [Bibtex]
    @article{journals/ese/McIntoshAH12,
    author = {Shane McIntosh and
    Bram Adams and
    Ahmed E. Hassan},
    title = {The evolution of Java build systems},
    journal = {Empirical Software Engineering},
    volume = {17},
    number = {4-5},
    year = {2012},
    pages = {578-608},
    ee = {http://dx.doi.org/10.1007/s10664-011-9169-5}
    }
  • F. Khomh, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of the impact of antipatterns on class change- and fault-proneness,” Empirical software engineering, vol. 17, iss. 3, pp. 243-275, 2012.
    [Bibtex]
    @article{journals/ese/KhomhPGA12,
    author = {Foutse Khomh and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An exploratory study of the impact of antipatterns on class
    change- and fault-proneness},
    journal = {Empirical Software Engineering},
    volume = {17},
    number = {3},
    year = {2012},
    pages = {243-275},
    ee = {http://dx.doi.org/10.1007/s10664-011-9171-y}
    }
  • F. Khomh, T. Dhaliwal, Y. Zou, and B. Adams, “Do faster releases improve software quality? an empirical case study of mozilla firefox,” in Msr, 2012, pp. 179-188.
    [Bibtex]
    @inproceedings{conf/msr/KhomhDZA12,
    author = {Foutse Khomh and
    Tejinder Dhaliwal and
    Ying Zou and
    Bram Adams},
    title = {Do faster releases improve software quality? An empirical
    case study of Mozilla Firefox},
    booktitle = {MSR},
    year = {2012},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224279},
    crossref = {DBLP:conf/msr/2012}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, A. Dekhtyar, G. Antoniol, and J. I. Maletic, “The grand challenge of traceability (v1.0),” in Software and systems traceability, , 2012, pp. 343-409.
    [Bibtex]
    @incollection{books/daglib/p/GotelCHZEGDAM12,
    author = {Orlena Gotel and
    Jane Cleland-Huang and
    Jane Huffman Hayes and
    Andrea Zisman and
    Alexander Egyed and
    Paul Gr{\"u}nbacher and
    Alex Dekhtyar and
    Giuliano Antoniol and
    Jonathan I. Maletic},
    title = {The Grand Challenge of Traceability (v1.0)},
    booktitle = {Software and Systems Traceability},
    year = {2012},
    pages = {343-409},
    ee = {http://dx.doi.org/10.1007/978-1-4471-2239-5_16},
    crossref = {DBLP:books/daglib/0028967}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated detection of performance regressions using statistical process control techniques,” in Icpe, 2012, pp. 299-310.
    [Bibtex]
    @inproceedings{conf/wosp/NguyenAJHNF12,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {Automated detection of performance regressions using statistical
    process control techniques},
    booktitle = {ICPE},
    year = {2012},
    pages = {299-310},
    ee = {http://doi.acm.org/10.1145/2188286.2188344},
    crossref = {DBLP:conf/wosp/2012}
    }
  • F. Khomh, H. Yuan, and Y. Zou, “Adapting linux for mobile platforms: an empirical study of android,” in Icsm, 2012, pp. 629-632.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhYZ12,
    author = {Foutse Khomh and
    Hao Yuan and
    Ying Zou},
    title = {Adapting Linux for mobile platforms: An empirical study
    of Android},
    booktitle = {ICSM},
    year = {2012},
    pages = {629-632},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405339},
    crossref = {DBLP:conf/icsm/2012}
    }
  • T. Dhaliwal, F. Khomh, Y. Zou, and A. E. Hassan, “Recovering commit dependencies for selective code integration in software product lines,” in Icsm, 2012, pp. 202-211.
    [Bibtex]
    @inproceedings{conf/icsm/DhaliwalKZH12,
    author = {Tejinder Dhaliwal and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {Recovering commit dependencies for selective code integration
    in software product lines},
    booktitle = {ICSM},
    year = {2012},
    pages = {202-211},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405273},
    crossref = {DBLP:conf/icsm/2012}
    }
  • M. C. Desmarais, B. Beheshti, and R. Naceur, “Item to skills mapping: deriving a conjunctive q-matrix from data,” in Its, 2012, pp. 454-463.
    [Bibtex]
    @inproceedings{conf/its/DesmaraisBN12,
    author = {Michel C. Desmarais and
    Behzad Beheshti and
    Rhouma Naceur},
    title = {Item to Skills Mapping: Deriving a Conjunctive Q-matrix
    from Data},
    booktitle = {ITS},
    year = {2012},
    pages = {454-463},
    ee = {http://dx.doi.org/10.1007/978-3-642-30950-2_58},
    crossref = {DBLP:conf/its/2012}
    }
  • N. Bhattacharya, O. El-Mahi, E. Duclos, G. Beltrame, G. Antoniol, S. L. Digabel, and Y. Guéhéneuc, “Optimizing threads schedule alignments to expose the interference bug pattern,” in Ssbse, 2012, pp. 90-104.
    [Bibtex]
    @inproceedings{conf/ssbse/BhattacharyaEDBADG12,
    author = {Neelesh Bhattacharya and
    Olfat El-Mahi and
    Etienne Duclos and
    Giovanni Beltrame and
    Giuliano Antoniol and
    S{\'e}bastien Le Digabel and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Optimizing Threads Schedule Alignments to Expose the Interference
    Bug Pattern},
    booktitle = {SSBSE},
    year = {2012},
    pages = {90-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_8},
    crossref = {DBLP:conf/ssbse/2012}
    }
  • B. Beheshti, M. Desmarais, and R. Naceur, “Methods to find the number of latent skills,” in Edm, 2012, pp. 81-86.
    [Bibtex]
    @inproceedings{conf/edm/BeheshtiDN12,
    author = {Behzad Beheshti and
    Michel Desmarais and
    Rhouma Naceur},
    title = {Methods to find the number of latent skills},
    booktitle = {EDM},
    year = {2012},
    pages = {81-86},
    ee = {http://educationaldatamining.org/EDM2012/uploads/procs/Full_Papers/edm2012_full_3.pdf},
    crossref = {DBLP:conf/edm/2012}
    }
  • E. Charton and M. Gagnon, “A disambiguation resource extracted from wikipedia for semantic annotation,” in Lrec, 2012, pp. 3665-3671.
    [Bibtex]
    @inproceedings{conf/lrec/ChartonG12,
    author = {Eric Charton and
    Michel Gagnon},
    title = {A disambiguation resource extracted from Wikipedia for semantic
    annotation},
    booktitle = {LREC},
    year = {2012},
    pages = {3665-3671},
    ee = {http://www.lrec-conf.org/proceedings/lrec2012/summaries/983.html},
    crossref = {DBLP:conf/lrec/2012}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, A. Dekhtyar, G. Antoniol, J. I. Maletic, and P. Mäder, “Traceability fundamentals,” in Software and systems traceability, , 2012, pp. 3-22.
    [Bibtex]
    @incollection{books/daglib/p/GotelCHZEGDAMM12,
    author = {Orlena Gotel and
    Jane Cleland-Huang and
    Jane Huffman Hayes and
    Andrea Zisman and
    Alexander Egyed and
    Paul Gr{\"u}nbacher and
    Alex Dekhtyar and
    Giuliano Antoniol and
    Jonathan I. Maletic and
    Patrick M{\"a}der},
    title = {Traceability Fundamentals},
    booktitle = {Software and Systems Traceability},
    year = {2012},
    pages = {3-22},
    ee = {http://dx.doi.org/10.1007/978-1-4471-2239-5_1},
    crossref = {DBLP:books/daglib/0028967}
    }
  • T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, “Inferring repository file structure modifications using nearest-neighbor clone detection,” in Wcre, 2012, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/wcre/LavoieKMZ12,
    author = {Thierry Lavoie and
    Foutse Khomh and
    Ettore Merlo and
    Ying Zou},
    title = {Inferring Repository File Structure Modifications Using
    Nearest-Neighbor Clone Detection},
    booktitle = {WCRE},
    year = {2012},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.42},
    crossref = {DBLP:conf/wcre/2012}
    }
  • E. Shihab, A. E. Hassan, B. Adams, and Z. M. Jiang, “An industrial study on the risk of software changes,” in Sigsoft fse, 2012, p. 62.
    [Bibtex]
    @inproceedings{conf/sigsoft/ShihabHAJ12,
    author = {Emad Shihab and
    Ahmed E. Hassan and
    Bram Adams and
    Zhen Ming Jiang},
    title = {An industrial study on the risk of software changes},
    booktitle = {SIGSOFT FSE},
    year = {2012},
    pages = {62},
    ee = {http://doi.acm.org/10.1145/2393596.2393670},
    crossref = {DBLP:conf/sigsoft/2012}
    }
  • N. Ali, Z. Sharafi, Y. Guéhéneuc, and G. Antoniol, “An empirical study on requirements traceability using eye-tracking,” in Icsm, 2012, pp. 191-200.
    [Bibtex]
    @inproceedings{conf/icsm/AliSGA12,
    author = {Nasir Ali and
    Zohreh Sharafi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An empirical study on requirements traceability using eye-tracking},
    booktitle = {ICSM},
    year = {2012},
    pages = {191-200},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405271},
    crossref = {DBLP:conf/icsm/2012}
    }
  • R. Suvorov, M. Nagappan, A. E. Hassan, Y. Zou, and B. Adams, “An empirical study of build system migrations in practice: case studies on kde and the linux kernel,” in Icsm, 2012, pp. 160-169.
    [Bibtex]
    @inproceedings{conf/icsm/SuvorovNHZA12,
    author = {Roman Suvorov and
    Meiyappan Nagappan and
    Ahmed E. Hassan and
    Ying Zou and
    Bram Adams},
    title = {An empirical study of build system migrations in practice:
    Case studies on KDE and the Linux kernel},
    booktitle = {ICSM},
    year = {2012},
    pages = {160-169},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405267},
    crossref = {DBLP:conf/icsm/2012}
    }

2011

  • D. Romano, M. D. Penta, and G. Antoniol, “An approach for search based testing of null pointer exceptions,” in Icst, 2011, pp. 160-169.
    [Bibtex]
    @inproceedings{conf/icst/RomanoPA11,
    author = {Daniele Romano and
    Massimiliano Di Penta and
    Giuliano Antoniol},
    title = {An Approach for Search Based Testing of Null Pointer Exceptions},
    booktitle = {ICST},
    year = {2011},
    pages = {160-169},
    ee = {http://dx.doi.org/10.1109/ICST.2011.49},
    crossref = {DBLP:conf/icst/2011}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, K. Martin, and P. Flora, “Modeling the performance of ultra-large-scale systems using layered simulations,” in Mesoca, 2011, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/mesoca/FooJAHZMF11,
    author = {King Chun Foo and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou and
    Kim Martin and
    Parminder Flora},
    title = {Modeling the performance of Ultra-Large-Scale systems using
    layered simulations},
    booktitle = {MESOCA},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/MESOCA.2011.6049040},
    crossref = {DBLP:conf/mesoca/2011}
    }
  • H. Xiao, B. Upadhyaya, F. Khomh, Y. Zou, J. Ng, and A. Lau, “An automatic approach for extracting process knowledge from the web,” in Icws, 2011, pp. 315-322.
    [Bibtex]
    @inproceedings{conf/icws/XiaoUKZNL11,
    author = {Hua Xiao and
    Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou and
    Joanna Ng and
    Alex Lau},
    title = {An Automatic Approach for Extracting Process Knowledge from
    the Web},
    booktitle = {ICWS},
    year = {2011},
    pages = {315-322},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICWS.2011.85},
    crossref = {DBLP:conf/icws/2011}
    }
  • S. Bouktif, F. Ahmed, I. Khalil, and G. Antoniol, “Corrigendum to "a novel composite model approach to improve software quality prediction" [information and software technology 52 (12) (2010) 1298-1311],” Information & software technology, vol. 53, iss. 3, p. 291, 2011.
    [Bibtex]
    @article{journals/infsof/BouktifAKA11,
    author = {Salah Bouktif and
    Faheem Ahmed and
    Issa Khalil and
    Giuliano Antoniol},
    title = {Corrigendum to "A novel composite model approach to improve
    software quality prediction" [Information and Software Technology
    52 (12) (2010) 1298-1311]},
    journal = {Information {\&} Software Technology},
    volume = {53},
    number = {3},
    year = {2011},
    pages = {291},
    ee = {http://dx.doi.org/10.1016/j.infsof.2010.12.004}
    }
  • M. D. Penta, M. Harman, and G. Antoniol, “The use of search-based optimization techniques to schedule and staff software projects: an approach and an empirical study,” Softw., pract. exper., vol. 41, iss. 5, pp. 495-519, 2011.
    [Bibtex]
    @article{journals/spe/PentaHA11,
    author = {Massimiliano Di Penta and
    Mark Harman and
    Giuliano Antoniol},
    title = {The use of search-based optimization techniques to schedule
    and staff software projects: an approach and an empirical
    study},
    journal = {Softw., Pract. Exper.},
    volume = {41},
    number = {5},
    year = {2011},
    pages = {495-519},
    ee = {http://dx.doi.org/10.1002/spe.1001}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Identifying performance deviations in thread pools,” in Icsm, 2011, pp. 83-92.
    [Bibtex]
    @inproceedings{conf/icsm/SyerAH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Identifying performance deviations in thread pools},
    booktitle = {ICSM},
    year = {2011},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080775},
    crossref = {DBLP:conf/icsm/2011}
    }
  • A. Belderrar, S. Kpodjedo, Y. Guéhéneuc, G. Antoniol, and P. Galinier, “Sub-graph mining: identifying micro-architectures in evolving object-oriented software,” in Csmr, 2011, pp. 171-180.
    [Bibtex]
    @inproceedings{conf/csmr/BelderrarKGAG11,
    author = {Ahmed Belderrar and
    Segla Kpodjedo and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Philippe Galinier},
    title = {Sub-graph Mining: Identifying Micro-architectures in Evolving
    Object-Oriented Software},
    booktitle = {CSMR},
    year = {2011},
    pages = {171-180},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.23},
    crossref = {DBLP:conf/csmr/2011}
    }
  • F. Khomh, S. Vaucher, Y. Guéhéneuc, and H. A. Sahraoui, “Bdtex: a gqm-based bayesian approach for the detection of antipatterns,” Journal of systems and software, vol. 84, iss. 4, pp. 559-572, 2011.
    [Bibtex]
    @article{journals/jss/KhomhVGS11,
    author = {Foutse Khomh and
    St{\'e}phane Vaucher and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui},
    title = {BDTEX: A GQM-based Bayesian approach for the detection of
    antipatterns},
    journal = {Journal of Systems and Software},
    volume = {84},
    number = {4},
    year = {2011},
    pages = {559-572},
    ee = {http://dx.doi.org/10.1016/j.jss.2010.11.921}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, E. M. Aboulhamid, and I. O’Connor, “Multi-granularity thermal evaluation of 3d mpsoc architectures,” in Date, 2011, pp. 575-578.
    [Bibtex]
    @inproceedings{conf/date/FourmigueBNAO11,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu and
    El Mostapha Aboulhamid and
    Ian O'Connor},
    title = {Multi-granularity thermal evaluation of 3D MPSoC architectures},
    booktitle = {DATE},
    year = {2011},
    pages = {575-578},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763287},
    crossref = {DBLP:conf/date/2011}
    }
  • F. Gauthier, D. Letarte, T. Lavoie, and E. Merlo, “Extraction and comprehension of moodle’s access control model: a case study,” in Pst, 2011, pp. 44-51.
    [Bibtex]
    @inproceedings{conf/pst/GauthierLLM11,
    author = {Fran\c{c}ois Gauthier and
    Dominic Letarte and
    Thierry Lavoie and
    Ettore Merlo},
    title = {Extraction and comprehension of moodle's access control
    model: A case study},
    booktitle = {PST},
    year = {2011},
    pages = {44-51},
    ee = {http://dx.doi.org/10.1109/PST.2011.5971962},
    crossref = {DBLP:conf/pst/2011}
    }
  • M. Desmarais, “Conditions for effectively deriving a q-matrix from data with non-negative matrix factorization. best paper award,” in Edm, 2011, pp. 41-50.
    [Bibtex]
    @inproceedings{conf/edm/Desmarais11,
    author = {Michel Desmarais},
    title = {Conditions for Effectively Deriving a Q-Matrix from Data
    with Non-negative Matrix Factorization. Best Paper Award},
    booktitle = {EDM},
    year = {2011},
    pages = {41-50},
    ee = {http://educationaldatamining.org/EDM2011/wp-content/uploads/proc/edm2011_paper35_full_Desmarais.pdf},
    crossref = {DBLP:conf/edm/2011}
    }
  • G. Benattar, B. Bérard, D. Lime, J. Mullins, O. H. Roux, and M. Sassolas, “Channel synthesis for finite transducers,” in Afl, 2011, pp. 79-92.
    [Bibtex]
    @inproceedings{conf/afl/BenattarBLMRS11,
    author = {Gilles Benattar and
    B{\'e}atrice B{\'e}rard and
    Didier Lime and
    John Mullins and
    Olivier H. Roux and
    Mathieu Sassolas},
    title = {Channel Synthesis for Finite Transducers},
    booktitle = {AFL},
    year = {2011},
    pages = {79-92},
    crossref = {DBLP:conf/afl/2011}
    }
  • F. Khomh, B. Chan, Y. Zou, and A. E. Hassan, “An entropy evaluation approach for triaging field crashes: a case study of mozilla firefox,” in Wcre, 2011, pp. 261-270.
    [Bibtex]
    @inproceedings{conf/wcre/KhomhCZH11,
    author = {Foutse Khomh and
    Brian Chan and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Entropy Evaluation Approach for Triaging Field Crashes:
    A Case Study of Mozilla Firefox},
    booktitle = {WCRE},
    year = {2011},
    pages = {261-270},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.39},
    crossref = {DBLP:conf/wcre/2011}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “A seismology-inspired approach to study change propagation,” in Icsm, 2011, pp. 53-62.
    [Bibtex]
    @inproceedings{conf/icsm/HassaineBGHA11,
    author = {Salima Hassaine and
    Ferdaous Boughanmi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {A seismology-inspired approach to study change propagation},
    booktitle = {ICSM},
    year = {2011},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080772},
    crossref = {DBLP:conf/icsm/2011}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, Y. Guéhéneuc, and G. Antoniol, “Design evolution metrics for defect prediction in object oriented systems,” Empirical software engineering, vol. 16, iss. 1, pp. 141-175, 2011.
    [Bibtex]
    @article{journals/ese/KpodjedoRGGA11,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Design evolution metrics for defect prediction in object
    oriented systems},
    journal = {Empirical Software Engineering},
    volume = {16},
    number = {1},
    year = {2011},
    pages = {141-175},
    ee = {http://dx.doi.org/10.1007/s10664-010-9151-7}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Automatic semantic web annotation of named entities,” in Canadian conference on ai, 2011, pp. 74-85.
    [Bibtex]
    @inproceedings{conf/ai/ChartonGO11,
    author = {Eric Charton and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Automatic Semantic Web Annotation of Named Entities},
    booktitle = {Canadian Conference on AI},
    year = {2011},
    pages = {74-85},
    ee = {http://dx.doi.org/10.1007/978-3-642-21043-3_10},
    crossref = {DBLP:conf/ai/2011}
    }
  • X. Zhao, F. Khomh, and Y. Zou, “Improving the modifiability of the architecture of business applications,” in Qsic, 2011, pp. 176-185.
    [Bibtex]
    @inproceedings{conf/qsic/ZhaoKZ11,
    author = {Xulin Zhao and
    Foutse Khomh and
    Ying Zou},
    title = {Improving the Modifiability of the Architecture of Business
    Applications},
    booktitle = {QSIC},
    year = {2011},
    pages = {176-185},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2011.36},
    crossref = {DBLP:conf/qsic/2011}
    }
  • M. Lavallée and P. N. Robillard, “Causes of premature aging during software development: an observational study,” in Evol/iwpse, 2011, pp. 61-70.
    [Bibtex]
    @inproceedings{conf/iwpse/LavalleeR11,
    author = {Mathieu Lavall{\'e}e and
    Pierre N. Robillard},
    title = {Causes of premature aging during software development: an
    observational study},
    booktitle = {EVOL/IWPSE},
    year = {2011},
    pages = {61-70},
    ee = {http://doi.acm.org/10.1145/2024445.2024458},
    crossref = {DBLP:conf/iwpse/2011}
    }
  • N. Bhattacharya, A. Sakti, G. Antoniol, Y. Guéhéneuc, and G. Pesant, “Divide-by-zero exception raising via branch coverage,” in Ssbse, 2011, pp. 204-218.
    [Bibtex]
    @inproceedings{conf/ssbse/BhattacharyaSAGP11,
    author = {Neelesh Bhattacharya and
    Abdelilah Sakti and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Divide-by-Zero Exception Raising via Branch Coverage},
    booktitle = {SSBSE},
    year = {2011},
    pages = {204-218},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_19},
    crossref = {DBLP:conf/ssbse/2011}
    }
  • N. Ali, W. Wu, G. Antoniol, M. D. Penta, Y. Guéhéneuc, and J. H. Hayes, “Moms: multi-objective miniaturization of software,” in Icsm, 2011, pp. 153-162.
    [Bibtex]
    @inproceedings{conf/icsm/AliWAPGH11,
    author = {Nasir Ali and
    Wei Wu and
    Giuliano Antoniol and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Jane Huffman Hayes},
    title = {MoMS: Multi-objective miniaturization of software},
    booktitle = {ICSM},
    year = {2011},
    pages = {153-162},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080782},
    crossref = {DBLP:conf/icsm/2011}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Requirements traceability for object oriented systems by partitioning source code,” in Wcre, 2011, pp. 45-54.
    [Bibtex]
    @inproceedings{conf/wcre/AliGA11,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Requirements Traceability for Object Oriented Systems by
    Partitioning Source Code},
    booktitle = {WCRE},
    year = {2011},
    pages = {45-54},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.16},
    crossref = {DBLP:conf/wcre/2011}
    }
  • N. Bettenburg, B. Adams, A. E. Hassan, and M. Smidt, “A lightweight approach to uncover technical artifacts in unstructured data,” in Icpc, 2011, pp. 185-188.
    [Bibtex]
    @inproceedings{conf/iwpc/BettenburgAHS11,
    author = {Nicolas Bettenburg and
    Bram Adams and
    Ahmed E. Hassan and
    Michel Smidt},
    title = {A Lightweight Approach to Uncover Technical Artifacts in
    Unstructured Data},
    booktitle = {ICPC},
    year = {2011},
    pages = {185-188},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.36},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. McIntosh, B. Adams, A. E. Hassan, and Y. Zou, “Using indexed sequence diagrams to recover the behaviour of ajax applications,” in Wse, 2011, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/wse/McIntoshAHZ11,
    author = {Shane McIntosh and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou},
    title = {Using indexed sequence diagrams to recover the behaviour
    of AJAX applications},
    booktitle = {WSE},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/WSE.2011.6081813},
    crossref = {DBLP:conf/wse/2011}
    }
  • R. Hadjidj and H. Boucheneb, “Efficient reachability analysis for time petri nets,” Ieee trans. computers, vol. 60, iss. 8, pp. 1085-1099, 2011.
    [Bibtex]
    @article{journals/tc/HadjidjB11,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {Efficient Reachability Analysis for Time Petri Nets},
    journal = {IEEE Trans. Computers},
    volume = {60},
    number = {8},
    year = {2011},
    pages = {1085-1099},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TC.2010.195}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Change impact analysis: an earthquake metaphor,” in Icpc, 2011, pp. 209-210.
    [Bibtex]
    @inproceedings{conf/iwpc/HassaineBGHA11,
    author = {Salima Hassaine and
    Ferdaous Boughanmi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {Change Impact Analysis: An Earthquake Metaphor},
    booktitle = {ICPC},
    year = {2011},
    pages = {209-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.54},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Trust-based requirements traceability,” in Icpc, 2011, pp. 111-120.
    [Bibtex]
    @inproceedings{conf/iwpc/AliGA11,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Trust-Based Requirements Traceability},
    booktitle = {ICPC},
    year = {2011},
    pages = {111-120},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.42},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • F. Khomh, B. Chan, Y. Zou, A. Sinha, and D. Dietz, “Predicting post-release defects using pre-release field testing results,” in Icsm, 2011, pp. 253-262.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhCZSD11,
    author = {Foutse Khomh and
    Brian Chan and
    Ying Zou and
    Anand Sinha and
    Dave Dietz},
    title = {Predicting post-release defects using pre-release field
    testing results},
    booktitle = {ICSM},
    year = {2011},
    pages = {253-262},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080792},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. Abbes, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension,” in Csmr, 2011, pp. 181-190.
    [Bibtex]
    @inproceedings{conf/csmr/AbbesKGA11,
    author = {Marwen Abbes and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An Empirical Study of the Impact of Two Antipatterns, Blob
    and Spaghetti Code, on Program Comprehension},
    booktitle = {CSMR},
    year = {2011},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.24},
    crossref = {DBLP:conf/csmr/2011}
    }
  • T. Lavoie and E. Merlo, “Automated type-3 clone oracle using levenshtein metric,” in Iwsc, 2011, pp. 34-40.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM11,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {Automated type-3 clone oracle using levenshtein metric},
    booktitle = {IWSC},
    year = {2011},
    pages = {34-40},
    ee = {http://doi.acm.org/10.1145/1985404.1985411},
    crossref = {DBLP:conf/iwsc/2011}
    }
  • M. D. Syer, B. Adams, Y. Zou, and A. E. Hassan, “Exploring the development of micro-apps: a case study on the blackberry and android platforms,” in Scam, 2011, pp. 55-64.
    [Bibtex]
    @inproceedings{conf/scam/SyerAZH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ying Zou and
    Ahmed E. Hassan},
    title = {Exploring the Development of Micro-apps: A Case Study on
    the BlackBerry and Android Platforms},
    booktitle = {SCAM},
    year = {2011},
    pages = {55-64},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.25},
    crossref = {DBLP:conf/scam/2011}
    }
  • D. Letarte, F. Gauthier, and E. Merlo, “Security model evolution of php web applications,” in Icst, 2011, pp. 289-298.
    [Bibtex]
    @inproceedings{conf/icst/LetarteGM11,
    author = {Dominic Letarte and
    Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Security Model Evolution of PHP Web Applications},
    booktitle = {ICST},
    year = {2011},
    pages = {289-298},
    ee = {http://dx.doi.org/10.1109/ICST.2011.36},
    crossref = {DBLP:conf/icst/2011}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated verification of load tests using control charts,” in Apsec, 2011, pp. 282-289.
    [Bibtex]
    @inproceedings{conf/apsec/NguyenAJHNF11,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {Automated Verification of Load Tests Using Control Charts},
    booktitle = {APSEC},
    year = {2011},
    pages = {282-289},
    ee = {http://doi.ieeecomputersociety.org/10.1109/APSEC.2011.59},
    crossref = {DBLP:conf/apsec/2011}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, and E. M. Aboulhamid, “A linear-time approach for the transient thermal simulation of liquid-cooled 3d ics,” in Codes+isss, 2011, pp. 197-206.
    [Bibtex]
    @inproceedings{conf/codes/FourmigueBNA11,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu and
    El Mostapha Aboulhamid},
    title = {A linear-time approach for the transient thermal simulation
    of liquid-cooled 3d ics},
    booktitle = {CODES+ISSS},
    year = {2011},
    pages = {197-206},
    ee = {http://doi.acm.org/10.1145/2039370.2039402},
    crossref = {DBLP:conf/codes/2011}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “Security versus performance bugs: a case study on firefox,” in Msr, 2011, pp. 93-102.
    [Bibtex]
    @inproceedings{conf/msr/ZamanAH11,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Security versus performance bugs: a case study on Firefox},
    booktitle = {MSR},
    year = {2011},
    pages = {93-102},
    ee = {http://doi.acm.org/10.1145/1985441.1985457},
    crossref = {DBLP:conf/msr/2011}
    }
  • E. Shihab, Z. M. Jiang, B. Adams, A. E. Hassan, and R. Bowerman, “Prioritizing the creation of unit tests in legacy software systems,” Softw., pract. exper., vol. 41, iss. 10, pp. 1027-1048, 2011.
    [Bibtex]
    @article{journals/spe/ShihabJAHB11,
    author = {Emad Shihab and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Robert Bowerman},
    title = {Prioritizing the creation of unit tests in legacy software
    systems},
    journal = {Softw., Pract. Exper.},
    volume = {41},
    number = {10},
    year = {2011},
    pages = {1027-1048},
    ee = {http://dx.doi.org/10.1002/spe.1053}
    }
  • S. McIntosh, B. Adams, T. H. D. Nguyen, Y. Kamei, and A. E. Hassan, “An empirical study of build maintenance effort,” in Icse, 2011, pp. 141-150.
    [Bibtex]
    @inproceedings{conf/icse/McIntoshANKH11,
    author = {Shane McIntosh and
    Bram Adams and
    Thanh H. D. Nguyen and
    Yasutaka Kamei and
    Ahmed E. Hassan},
    title = {An empirical study of build maintenance effort},
    booktitle = {ICSE},
    year = {2011},
    pages = {141-150},
    ee = {http://doi.acm.org/10.1145/1985793.1985813},
    crossref = {DBLP:conf/icse/2011}
    }
  • E. Shihab, A. Mockus, Y. Kamei, B. Adams, and A. E. Hassan, “High-impact defects: a study of breakage and surprise defects,” in Sigsoft fse, 2011, pp. 300-310.
    [Bibtex]
    @inproceedings{conf/sigsoft/ShihabMKAH11,
    author = {Emad Shihab and
    Audris Mockus and
    Yasutaka Kamei and
    Bram Adams and
    Ahmed E. Hassan},
    title = {High-impact defects: a study of breakage and surprise defects},
    booktitle = {SIGSOFT FSE},
    year = {2011},
    pages = {300-310},
    ee = {http://doi.acm.org/10.1145/2025113.2025155},
    crossref = {DBLP:conf/sigsoft/2011}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “An exploratory study of macro co-changes,” in Wcre, 2011, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/wcre/JaafarGHA11,
    author = {Fehmi Jaafar and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {An Exploratory Study of Macro Co-changes},
    booktitle = {WCRE},
    year = {2011},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.47},
    crossref = {DBLP:conf/wcre/2011}
    }
  • M. Gaha, M. Gagnon, and F. Sirois, “A modern blackboard system,” in Web intelligence/iat workshops, 2011, pp. 163-166.
    [Bibtex]
    @inproceedings{conf/iat/GahaGS11,
    author = {Mohamed Gaha and
    Michel Gagnon and
    Fr{\'e}d{\'e}ric Sirois},
    title = {A Modern Blackboard System},
    booktitle = {Web Intelligence/IAT Workshops},
    year = {2011},
    pages = {163-166},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI-IAT.2011.183},
    crossref = {DBLP:conf/iat/2011w}
    }
  • W. Shang, Z. M. Jiang, B. Adams, A. E. Hassan, M. W. Godfrey, M. N. Nasser, and P. Flora, “An exploratory study of the evolution of communicated information about the execution of large software systems,” in Wcre, 2011, pp. 335-344.
    [Bibtex]
    @inproceedings{conf/wcre/ShangJAHGNF11,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Michael W. Godfrey and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {An Exploratory Study of the Evolution of Communicated Information
    about the Execution of Large Software Systems},
    booktitle = {WCRE},
    year = {2011},
    pages = {335-344},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.48},
    crossref = {DBLP:conf/wcre/2011}
    }
  • H. Boucheneb and K. Barkaoui, “Relevant timed schedules/clock vectors for constructing time petri net reachability graphs,” Discrete event dynamic systems, vol. 21, iss. 2, pp. 171-204, 2011.
    [Bibtex]
    @article{journals/deds/BouchenebB11,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Relevant Timed Schedules/Clock Vectors for Constructing
    Time Petri Net Reachability Graphs},
    journal = {Discrete Event Dynamic Systems},
    volume = {21},
    number = {2},
    year = {2011},
    pages = {171-204},
    ee = {http://dx.doi.org/10.1007/s10626-011-0100-4}
    }
  • T. Dhaliwal, F. Khomh, and Y. Zou, “Classifying field crash reports for fixing bugs: a case study of mozilla firefox,” in Icsm, 2011, pp. 333-342.
    [Bibtex]
    @inproceedings{conf/icsm/DhaliwalKZ11,
    author = {Tejinder Dhaliwal and
    Foutse Khomh and
    Ying Zou},
    title = {Classifying field crash reports for fixing bugs: A case
    study of Mozilla Firefox},
    booktitle = {ICSM},
    year = {2011},
    pages = {333-342},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080800},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. C. Desmarais, “Performance comparison of item-to-item skills models with the irt single latent trait model,” in Umap, 2011, pp. 75-86.
    [Bibtex]
    @inproceedings{conf/um/Desmarais11,
    author = {Michel C. Desmarais},
    title = {Performance Comparison of Item-to-Item Skills Models with
    the IRT Single Latent Trait Model},
    booktitle = {UMAP},
    year = {2011},
    pages = {75-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-22362-4_7},
    crossref = {DBLP:conf/um/2011}
    }
  • L. Barbour, F. Khomh, and Y. Zou, “Late propagation in software clones,” in Icsm, 2011, pp. 273-282.
    [Bibtex]
    @inproceedings{conf/icsm/BarbourKZ11,
    author = {Liliane Barbour and
    Foutse Khomh and
    Ying Zou},
    title = {Late propagation in software clones},
    booktitle = {ICSM},
    year = {2011},
    pages = {273-282},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080794},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. B. Kelly, J. S. Alexander, B. Adams, and A. E. Hassan, “Recovering a balanced overview of topics in a software domain,” in Scam, 2011, pp. 135-144.
    [Bibtex]
    @inproceedings{conf/scam/KellyAAH11,
    author = {Matthew B. Kelly and
    Jason S. Alexander and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Recovering a Balanced Overview of Topics in a Software Domain},
    booktitle = {SCAM},
    year = {2011},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.23},
    crossref = {DBLP:conf/scam/2011}
    }
  • G. Beltrame and G. Nicolescu, “A multi-objective decision-theoretic exploration algorithm for platform-based design,” in Date, 2011, pp. 1192-1195.
    [Bibtex]
    @inproceedings{conf/date/BeltrameN11,
    author = {Giovanni Beltrame and
    Gabriela Nicolescu},
    title = {A multi-objective decision-theoretic exploration algorithm
    for platform-based design},
    booktitle = {DATE},
    year = {2011},
    pages = {1192-1195},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763311},
    crossref = {DBLP:conf/date/2011}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Industrial case study on supporting the comprehension of system behaviour under load,” in Icpc, 2011, pp. 215-216.
    [Bibtex]
    @inproceedings{conf/iwpc/SyerAH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Industrial Case Study on Supporting the Comprehension of
    System Behaviour under Load},
    booktitle = {ICPC},
    year = {2011},
    pages = {215-216},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.38},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Modeling the evolution of topics in source code histories,” in Msr, 2011, pp. 173-182.
    [Bibtex]
    @inproceedings{conf/msr/ThomasAHB11,
    author = {Stephen W. Thomas and
    Bram Adams and
    Ahmed E. Hassan and
    Dorothea Blostein},
    title = {Modeling the evolution of topics in source code histories},
    booktitle = {MSR},
    year = {2011},
    pages = {173-182},
    ee = {http://doi.acm.org/10.1145/1985441.1985467},
    crossref = {DBLP:conf/msr/2011}
    }
  • M. C. Desmarais, “Mapping question items to skills with non-negative matrix factorization,” Sigkdd explorations, vol. 13, iss. 2, pp. 30-36, 2011.
    [Bibtex]
    @article{journals/sigkdd/Desmarais11,
    author = {Michel C. Desmarais},
    title = {Mapping question items to skills with non-negative matrix
    factorization},
    journal = {SIGKDD Explorations},
    volume = {13},
    number = {2},
    year = {2011},
    pages = {30-36},
    ee = {http://doi.acm.org/10.1145/2207243.2207248}
    }
  • L. M. Eshkevari, V. Arnaoudova, M. D. Penta, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of identifier renamings,” in Msr, 2011, pp. 33-42.
    [Bibtex]
    @inproceedings{conf/msr/EshkevariAPOGA11,
    author = {Laleh Mousavi Eshkevari and
    Venera Arnaoudova and
    Massimiliano Di Penta and
    Rocco Oliveto and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An exploratory study of identifier renamings},
    booktitle = {MSR},
    year = {2011},
    pages = {33-42},
    ee = {http://doi.acm.org/10.1145/1985441.1985449},
    crossref = {DBLP:conf/msr/2011}
    }
  • B. Dit, L. Guerrouj, D. Poshyvanyk, and G. Antoniol, “Can better identifier splitting techniques help feature location?,” in Icpc, 2011, pp. 11-20.
    [Bibtex]
    @inproceedings{conf/iwpc/DitGPA11,
    author = {Bogdan Dit and
    Latifa Guerrouj and
    Denys Poshyvanyk and
    Giuliano Antoniol},
    title = {Can Better Identifier Splitting Techniques Help Feature
    Location?},
    booktitle = {ICPC},
    year = {2011},
    pages = {11-20},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.47},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. Medini, P. Galinier, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “A fast algorithm to locate concepts in execution traces,” in Ssbse, 2011, pp. 252-266.
    [Bibtex]
    @inproceedings{conf/ssbse/MediniGPGA11,
    author = {Soumaya Medini and
    Philippe Galinier and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {A Fast Algorithm to Locate Concepts in Execution Traces},
    booktitle = {SSBSE},
    year = {2011},
    pages = {252-266},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_22},
    crossref = {DBLP:conf/ssbse/2011}
    }

2010

  • M. D. Penta, D. M. Germán, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of the evolution of software licensing,” in Icse (1), 2010, pp. 145-154.
    [Bibtex]
    @inproceedings{conf/icse/PentaGGA10,
    author = {Massimiliano Di Penta and
    Daniel M. Germ{\'a}n and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An exploratory study of the evolution of software licensing},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {145-154},
    ee = {http://doi.acm.org/10.1145/1806799.1806824},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • O. Kaczor, Y. Guéhéneuc, and S. Hamel, “Identification of design motifs with pattern matching algorithms,” Information & software technology, vol. 52, iss. 2, pp. 152-168, 2010.
    [Bibtex]
    @article{journals/infsof/KaczorGH10,
    author = {Olivier Kaczor and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel},
    title = {Identification of design motifs with pattern matching algorithms},
    journal = {Information {\&} Software Technology},
    volume = {52},
    number = {2},
    year = {2010},
    pages = {152-168},
    ee = {http://dx.doi.org/10.1016/j.infsof.2009.08.006}
    }
  • S. Hamadou and J. Mullins, “Calibrating the power of schedulers for probabilistic polynomial-time calculus,” Journal of computer security, vol. 18, iss. 2, pp. 265-316, 2010.
    [Bibtex]
    @article{journals/jcs/HamadouM10,
    author = {Sardaouna Hamadou and
    John Mullins},
    title = {Calibrating the power of schedulers for probabilistic polynomial-time
    calculus},
    journal = {Journal of Computer Security},
    volume = {18},
    number = {2},
    year = {2010},
    pages = {265-316},
    ee = {http://dx.doi.org/10.3233/JCS-2010-0362}
    }
  • E. Shihab, Z. M. Jiang, W. M. Ibrahim, B. Adams, and A. E. Hassan, “Understanding the impact of code and process metrics on post-release defects: a case study on the eclipse project,” in Esem, 2010.
    [Bibtex]
    @inproceedings{conf/esem/ShihabJIAH10,
    author = {Emad Shihab and
    Zhen Ming Jiang and
    Walid M. Ibrahim and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Understanding the impact of code and process metrics on
    post-release defects: a case study on the Eclipse project},
    booktitle = {ESEM},
    year = {2010},
    ee = {http://doi.acm.org/10.1145/1852786.1852792},
    crossref = {DBLP:conf/esem/2010}
    }
  • S. Hassaine, F. Khomh, Y. Guéhéneuc, and S. Hamel, “Ids: an immune-inspired approach for the detection of software design smells,” in Quatic, 2010, pp. 343-348.
    [Bibtex]
    @inproceedings{conf/quatic/HassaineKGH10,
    author = {Salima Hassaine and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel},
    title = {IDS: An Immune-Inspired Approach for the Detection of Software
    Design Smells},
    booktitle = {QUATIC},
    year = {2010},
    pages = {343-348},
    ee = {http://dx.doi.org/10.1109/QUATIC.2010.61},
    crossref = {DBLP:conf/quatic/2010}
    }
  • N. Madani, L. Guerrouj, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Recognizing words from source code identifiers using speech recognition techniques,” in Csmr, 2010, pp. 68-77.
    [Bibtex]
    @inproceedings{conf/csmr/MadaniGPGA10,
    author = {Nioosha Madani and
    Latifa Guerrouj and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Recognizing Words from Source Code Identifiers Using Speech
    Recognition Techniques},
    booktitle = {CSMR},
    year = {2010},
    pages = {68-77},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.31},
    crossref = {DBLP:conf/csmr/2010}
    }
  • J. K. Ng, Y. Guéhéneuc, and G. Antoniol, “Identification of behavioural and creational design motifs through dynamic analysis,” Journal of software maintenance, vol. 22, iss. 8, pp. 597-627, 2010.
    [Bibtex]
    @article{journals/smr/NgGA10,
    author = {Janice Ka-Yee Ng and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Identification of behavioural and creational design motifs
    through dynamic analysis},
    journal = {Journal of Software Maintenance},
    volume = {22},
    number = {8},
    year = {2010},
    pages = {597-627},
    ee = {http://dx.doi.org/10.1002/smr.421}
    }
  • Y. Guéhéneuc, J. Guyomarc’h, and H. A. Sahraoui, “Improving design-pattern identification: a new approach and an exploratory study,” Software quality journal, vol. 18, iss. 1, pp. 145-174, 2010.
    [Bibtex]
    @article{journals/sqj/GueheneucGS10,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Jean-Yves Guyomarc'h and
    Houari A. Sahraoui},
    title = {Improving design-pattern identification: a new approach
    and an exploratory study},
    journal = {Software Quality Journal},
    volume = {18},
    number = {1},
    year = {2010},
    pages = {145-174},
    ee = {http://dx.doi.org/10.1007/s11219-009-9082-y}
    }
  • N. Moha, Y. Guéhéneuc, L. Duchien, and A. L. Meur, “Decor: a method for the specification and detection of code and design smells,” Ieee trans. software eng., vol. 36, iss. 1, pp. 20-36, 2010.
    [Bibtex]
    @article{journals/tse/MohaGDM10,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Laurence Duchien and
    Anne-Fran\c{c}oise Le Meur},
    title = {DECOR: A Method for the Specification and Detection of Code
    and Design Smells},
    journal = {IEEE Trans. Software Eng.},
    volume = {36},
    number = {1},
    year = {2010},
    pages = {20-36},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2009.50}
    }
  • M. D. Penta, D. M. Germán, and G. Antoniol, “Identifying licensing of jar archives using a code-search approach,” in Msr, 2010, pp. 151-160.
    [Bibtex]
    @inproceedings{conf/msr/PentaGA10,
    author = {Massimiliano Di Penta and
    Daniel M. Germ{\'a}n and
    Giuliano Antoniol},
    title = {Identifying licensing of jar archives using a code-search
    approach},
    booktitle = {MSR},
    year = {2010},
    pages = {151-160},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463282},
    crossref = {DBLP:conf/msr/2010}
    }
  • N. Bettenburg and B. Adams, “Workshop on mining unstructured data (mud) because "mining unstructured data is like fishing in muddy waters"!,” in Wcre, 2010, pp. 277-278.
    [Bibtex]
    @inproceedings{conf/wcre/BettenburgA10,
    author = {Nicolas Bettenburg and
    Bram Adams},
    title = {Workshop on Mining Unstructured Data (MUD) because "Mining
    Unstructured Data is Like Fishing in Muddy Waters"!},
    booktitle = {WCRE},
    year = {2010},
    pages = {277-278},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.39},
    crossref = {DBLP:conf/wcre/2010}
    }
  • F. Asadi, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A heuristic-based approach to identify concepts in execution traces,” in Csmr, 2010, pp. 31-40.
    [Bibtex]
    @inproceedings{conf/csmr/AsadiPAG10,
    author = {Fatemeh Asadi and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Heuristic-Based Approach to Identify Concepts in Execution
    Traces},
    booktitle = {CSMR},
    year = {2010},
    pages = {31-40},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.17},
    crossref = {DBLP:conf/csmr/2010}
    }
  • Y. Kamei, S. Matsumoto, A. Monden, K. Matsumoto, B. Adams, and A. E. Hassan, “Revisiting common bug prediction findings using effort-aware models,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/icsm/KameiMMMAH10,
    author = {Yasutaka Kamei and
    Shinsuke Matsumoto and
    Akito Monden and
    Ken-ichi Matsumoto and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Revisiting common bug prediction findings using effort-aware
    models},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609530},
    crossref = {DBLP:conf/icsm/2010}
    }
  • W. Wu, Y. Guéhéneuc, G. Antoniol, and M. Kim, “Aura: a hybrid approach to identify framework evolution,” in Icse (1), 2010, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/icse/WuGAK10,
    author = {Wei Wu and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Miryung Kim},
    title = {AURA: a hybrid approach to identify framework evolution},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {325-334},
    ee = {http://doi.acm.org/10.1145/1806799.1806848},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • S. Bouktif, F. Ahmed, I. Khalil, and G. Antoniol, “A novel composite model approach to improve software quality prediction,” Information & software technology, vol. 52, iss. 12, pp. 1298-1311, 2010.
    [Bibtex]
    @article{journals/infsof/BouktifAKA10,
    author = {Salah Bouktif and
    Faheem Ahmed and
    Issa Khalil and
    Giuliano Antoniol},
    title = {A novel composite model approach to improve software quality
    prediction},
    journal = {Information {\&} Software Technology},
    volume = {52},
    number = {12},
    year = {2010},
    pages = {1298-1311},
    ee = {http://dx.doi.org/10.1016/j.infsof.2010.07.003}
    }
  • E. Shihab, Z. M. Jiang, B. Adams, A. E. Hassan, and R. Bowerman, “Prioritizing unit test creation for test-driven maintenance of legacy systems,” in Qsic, 2010, pp. 132-141.
    [Bibtex]
    @inproceedings{conf/qsic/ShihabJAHB10,
    author = {Emad Shihab and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Robert Bowerman},
    title = {Prioritizing Unit Test Creation for Test-Driven Maintenance
    of Legacy Systems},
    booktitle = {QSIC},
    year = {2010},
    pages = {132-141},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.74},
    crossref = {DBLP:conf/qsic/2010}
    }
  • G. C. Porras and Y. Guéhéneuc, “An empirical study on the efficiency of different design pattern representations in uml class diagrams,” Empirical software engineering, vol. 15, iss. 5, pp. 493-522, 2010.
    [Bibtex]
    @article{journals/ese/PorrasG10,
    author = {Gerardo Cepeda Porras and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An empirical study on the efficiency of different design
    pattern representations in UML class diagrams},
    journal = {Empirical Software Engineering},
    volume = {15},
    number = {5},
    year = {2010},
    pages = {493-522},
    ee = {http://dx.doi.org/10.1007/s10664-009-9125-9}
    }
  • G. M. K. Selim, L. Barbour, W. Shang, B. Adams, A. E. Hassan, and Y. Zou, “Studying the impact of clones on software defects,” in Wcre, 2010, pp. 13-21.
    [Bibtex]
    @inproceedings{conf/wcre/SelimBSAHZ10,
    author = {Gehan M. K. Selim and
    Liliane Barbour and
    Weiyi Shang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou},
    title = {Studying the Impact of Clones on Software Defects},
    booktitle = {WCRE},
    year = {2010},
    pages = {13-21},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.11},
    crossref = {DBLP:conf/wcre/2010}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “Studying the impact of dependency network measures on software quality,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/icsm/NguyenAH10,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Studying the impact of dependency network measures on software
    quality},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609560},
    crossref = {DBLP:conf/icsm/2010}
    }
  • S. Kpodjedo, P. Galinier, and G. Antoniol, “On the use of similarity metrics for approximate graph matching,” Electronic notes in discrete mathematics, vol. 36, pp. 687-694, 2010.
    [Bibtex]
    @article{journals/endm/KpodjedoGA10,
    author = {Segla Kpodjedo and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {On the use of similarity metrics for approximate graph matching},
    journal = {Electronic Notes in Discrete Mathematics},
    volume = {36},
    year = {2010},
    pages = {687-694},
    ee = {http://dx.doi.org/10.1016/j.endm.2010.05.087}
    }
  • B. Adams, Z. M. Jiang, and A. E. Hassan, “Identifying crosscutting concerns using historical code changes,” in Icse (1), 2010, pp. 305-314.
    [Bibtex]
    @inproceedings{conf/icse/AdamsJH10,
    author = {Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan},
    title = {Identifying crosscutting concerns using historical code
    changes},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {305-314},
    ee = {http://doi.acm.org/10.1145/1806799.1806846},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • V. Arnaoudova, L. M. Eshkevari, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “Physical and conceptual identifier dispersion: measures and relation to fault proneness,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @inproceedings{conf/icsm/ArnaoudovaEOGA10,
    author = {Venera Arnaoudova and
    Laleh Mousavi Eshkevari and
    Rocco Oliveto and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Physical and conceptual identifier dispersion: Measures
    and relation to fault proneness},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609748},
    crossref = {DBLP:conf/icsm/2010}
    }
  • N. Haderer, F. Khomh, and G. Antoniol, “Squaner: a framework for monitoring the quality of software systems,” in Icsm, 2010, pp. 1-4.
    [Bibtex]
    @inproceedings{conf/icsm/HadererKA10,
    author = {Nicolas Haderer and
    Foutse Khomh and
    Giuliano Antoniol},
    title = {SQUANER: A framework for monitoring the quality of software
    systems},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-4},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609684},
    crossref = {DBLP:conf/icsm/2010}
    }
  • S. Kpodjedo, P. Galinier, and G. Antoniol, “Enhancing a tabu algorithm for approximate graph matching by using similarity measures,” in Evocop, 2010, pp. 119-130.
    [Bibtex]
    @inproceedings{conf/evoW/KpodjedoGA10,
    author = {Segla Kpodjedo and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Enhancing a Tabu Algorithm for Approximate Graph Matching
    by Using Similarity Measures},
    booktitle = {EvoCOP},
    year = {2010},
    pages = {119-130},
    ee = {http://dx.doi.org/10.1007/978-3-642-12139-5_11},
    crossref = {DBLP:conf/evoW/2010cop}
    }
  • W. Shang, B. Adams, and A. E. Hassan, “An experience report on scaling tools for mining software repositories using mapreduce,” in Ase, 2010, pp. 275-284.
    [Bibtex]
    @inproceedings{conf/kbse/ShangAH10,
    author = {Weiyi Shang and
    Bram Adams and
    Ahmed E. Hassan},
    title = {An experience report on scaling tools for mining software
    repositories using MapReduce},
    booktitle = {ASE},
    year = {2010},
    pages = {275-284},
    ee = {http://doi.acm.org/10.1145/1858996.1859050},
    crossref = {DBLP:conf/kbse/2010}
    }
  • N. Moha, Y. Guéhéneuc, A. L. Meur, L. Duchien, and A. Tiberghien, “From a domain analysis to the specification and detection of code and design smells,” Formal asp. comput., vol. 22, iss. 3-4, pp. 345-361, 2010.
    [Bibtex]
    @article{journals/fac/MohaGMDT10,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Anne-Fran\c{c}oise Le Meur and
    Laurence Duchien and
    Alban Tiberghien},
    title = {From a domain analysis to the specification and detection
    of code and design smells},
    journal = {Formal Asp. Comput.},
    volume = {22},
    number = {3-4},
    year = {2010},
    pages = {345-361},
    ee = {http://dx.doi.org/10.1007/s00165-009-0115-x}
    }
  • B. Bérard, J. Mullins, and M. Sassolas, “Quantifying opacity,” in Qest, 2010, pp. 263-272.
    [Bibtex]
    @inproceedings{conf/qest/BerardMS10,
    author = {B{\'e}atrice B{\'e}rard and
    John Mullins and
    Mathieu Sassolas},
    title = {Quantifying Opacity},
    booktitle = {QEST},
    year = {2010},
    pages = {263-272},
    ee = {http://dx.doi.org/10.1109/QEST.2010.40},
    crossref = {DBLP:conf/qest/2010}
    }
  • T. Lavoie, M. Eilers-Smith, and E. Merlo, “Challenging cloning related problems with gpu-based algorithms,” in Iwsc, 2010, pp. 25-32.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieEM10,
    author = {Thierry Lavoie and
    Michael Eilers-Smith and
    Ettore Merlo},
    title = {Challenging cloning related problems with GPU-based algorithms},
    booktitle = {IWSC},
    year = {2010},
    pages = {25-32},
    ee = {http://doi.acm.org/10.1145/1808901.1808905},
    crossref = {DBLP:conf/iwsc/2010}
    }
  • E. Shihab, A. Ihara, Y. Kamei, W. M. Ibrahim, M. Ohira, B. Adams, A. E. Hassan, and K. Matsumoto, “Predicting re-opened bugs: a case study on the eclipse project,” in Wcre, 2010, pp. 249-258.
    [Bibtex]
    @inproceedings{conf/wcre/ShihabIKIOAHM10,
    author = {Emad Shihab and
    Akinori Ihara and
    Yasutaka Kamei and
    Walid M. Ibrahim and
    Masao Ohira and
    Bram Adams and
    Ahmed E. Hassan and
    Ken-ichi Matsumoto},
    title = {Predicting Re-opened Bugs: A Case Study on the Eclipse Project},
    booktitle = {WCRE},
    year = {2010},
    pages = {249-258},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.36},
    crossref = {DBLP:conf/wcre/2010}
    }
  • J. M. T. Moreno and M. Gagnon, “The cortex automatic summarization system at the qa@inex track 2010,” in Inex, 2010, pp. 290-294.
    [Bibtex]
    @inproceedings{conf/inex/MorenoG10,
    author = {Juan Manuel Torres Moreno and
    Michel Gagnon},
    title = {The Cortex Automatic Summarization System at the QA@INEX
    Track 2010},
    booktitle = {INEX},
    year = {2010},
    pages = {290-294},
    ee = {http://dx.doi.org/10.1007/978-3-642-23577-1_26},
    crossref = {DBLP:conf/inex/2010}
    }
  • T. Mens, Y. Guéhéneuc, J. Fernández-Ramil, and M. D’Hondt, “Guest editors’ introduction: software evolution,” Ieee software, vol. 27, iss. 4, pp. 22-25, 2010.
    [Bibtex]
    @article{journals/software/MensGFD10,
    author = {Tom Mens and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Juan Fern{\'a}ndez-Ramil and
    Maja D'Hondt},
    title = {Guest Editors' Introduction: Software Evolution},
    journal = {IEEE Software},
    volume = {27},
    number = {4},
    year = {2010},
    pages = {22-25},
    ee = {http://doi.ieeecomputersociety.org/10.1109/MS.2010.100}
    }
  • G. Bavota, R. Oliveto, A. D. Lucia, G. Antoniol, and Y. Guéhéneuc, “Playing with refactoring: identifying extract class opportunities through game theory,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @inproceedings{conf/icsm/BavotaOLAG10,
    author = {Gabriele Bavota and
    Rocco Oliveto and
    Andrea De Lucia and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Playing with refactoring: Identifying extract class opportunities
    through game theory},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609739},
    crossref = {DBLP:conf/icsm/2010}
    }
  • F. Abouzaid and J. Mullins, “Formal specification of correlation in ws orchestrations using bp-calculus,” Electr. notes theor. comput. sci., vol. 260, pp. 3-24, 2010.
    [Bibtex]
    @article{journals/entcs/AbouzaidM10,
    author = {Faisal Abouzaid and
    John Mullins},
    title = {Formal Specification of Correlation in WS Orchestrations
    Using BP-calculus},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {260},
    year = {2010},
    pages = {3-24},
    ee = {http://dx.doi.org/10.1016/j.entcs.2009.12.029}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “A case study of bias in bug-fix datasets,” in Wcre, 2010, pp. 259-268.
    [Bibtex]
    @inproceedings{conf/wcre/NguyenAH10,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Case Study of Bias in Bug-Fix Datasets},
    booktitle = {WCRE},
    year = {2010},
    pages = {259-268},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.37},
    crossref = {DBLP:conf/wcre/2010}
    }
  • G. Kniesel, A. Binun, P. Hegedus, L. J. Fülöp, A. Chatzigeorgiou, Y. Guéhéneuc, and N. Tsantalis, “Dpdx–towards a common result exchange format for design pattern detection tools,” in Csmr, 2010, pp. 232-235.
    [Bibtex]
    @inproceedings{conf/csmr/KnieselBHFCGT10,
    author = {G{\"u}nter Kniesel and
    Alexander Binun and
    P{\'e}ter Hegedus and
    Lajos Jeno F{\"u}l{\"o}p and
    Alexander Chatzigeorgiou and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Nikolaos Tsantalis},
    title = {DPDX--Towards a Common Result Exchange Format for Design
    Pattern Detection Tools},
    booktitle = {CSMR},
    year = {2010},
    pages = {232-235},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.40},
    crossref = {DBLP:conf/csmr/2010}
    }
  • H. Malik, Z. M. Jiang, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Automatic comparison of load tests to support the performance analysis of large enterprise systems,” in Csmr, 2010, pp. 222-231.
    [Bibtex]
    @inproceedings{conf/csmr/MalikJAHFH10,
    author = {Haroon Malik and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Parminder Flora and
    Gilbert Hamann},
    title = {Automatic Comparison of Load Tests to Support the Performance
    Analysis of Large Enterprise Systems},
    booktitle = {CSMR},
    year = {2010},
    pages = {222-231},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.39},
    crossref = {DBLP:conf/csmr/2010}
    }
  • S. McIntosh, B. Adams, and A. E. Hassan, “The evolution of ant build systems,” in Msr, 2010, pp. 42-51.
    [Bibtex]
    @inproceedings{conf/msr/McIntoshAH10,
    author = {Shane McIntosh and
    Bram Adams and
    Ahmed E. Hassan},
    title = {The evolution of ANT build systems},
    booktitle = {MSR},
    year = {2010},
    pages = {42-51},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463341},
    crossref = {DBLP:conf/msr/2010}
    }
  • Y. Guéhéneuc, “Design: patterns,” in Encyclopedia of software engineering, , 2010, pp. 204-219.
    [Bibtex]
    @incollection{reference/se/Gueheneuc10,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Design: Patterns},
    booktitle = {Encyclopedia of Software Engineering},
    year = {2010},
    pages = {204-219},
    ee = {http://www.informaworld.com/10.1081/E-ESE-120044217},
    crossref = {DBLP:reference/se/2010}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Decision-theoretic design space exploration of multiprocessor platforms,” Ieee trans. on cad of integrated circuits and systems, vol. 29, iss. 7, pp. 1083-1095, 2010.
    [Bibtex]
    @article{journals/tcad/BeltrameFS10,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {Decision-Theoretic Design Space Exploration of Multiprocessor
    Platforms},
    journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
    volume = {29},
    number = {7},
    year = {2010},
    pages = {1083-1095},
    ee = {http://dx.doi.org/10.1109/TCAD.2010.2049053}
    }
  • N. Kerzazi and P. N. Robillard, “Multi-perspective software process modeling,” in Sera, 2010, pp. 85-92.
    [Bibtex]
    @inproceedings{conf/sera/KerzaziR10,
    author = {Noureddine Kerzazi and
    Pierre N. Robillard},
    title = {Multi-perspective Software Process Modeling},
    booktitle = {SERA},
    year = {2010},
    pages = {85-92},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SERA.2010.21},
    crossref = {DBLP:conf/sera/2010}
    }
  • M. C. Desmarais and I. Pelczer, “On the faithfulness of simulated student performance data,” in Edm, 2010, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/edm/DesmaraisP10,
    author = {Michel C. Desmarais and
    Ildik{\'o} Pelczer},
    title = {On the Faithfulness of Simulated Student Performance Data},
    booktitle = {EDM},
    year = {2010},
    pages = {21-30},
    ee = {http://educationaldatamining.org/EDM2010/uploads/proc/edm2010_submission_56.pdf},
    crossref = {DBLP:conf/edm/2010}
    }
  • H. A. Sahraoui, L. C. Briand, Y. Guéhéneuc, and O. Beaurepaire, “Investigating the impact of a measurement program on software quality,” Information & software technology, vol. 52, iss. 9, pp. 923-933, 2010.
    [Bibtex]
    @article{journals/infsof/SahraouiBGB10,
    author = {Houari A. Sahraoui and
    Lionel C. Briand and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Olivier Beaurepaire},
    title = {Investigating the impact of a measurement program on software
    quality},
    journal = {Information {\&} Software Technology},
    volume = {52},
    number = {9},
    year = {2010},
    pages = {923-933},
    ee = {http://dx.doi.org/10.1016/j.infsof.2010.03.013}
    }
  • H. Malik, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Using load tests to automatically compare the subsystems of a large enterprise system,” in Compsac, 2010, pp. 117-126.
    [Bibtex]
    @inproceedings{conf/compsac/MalikAHFH10,
    author = {Haroon Malik and
    Bram Adams and
    Ahmed E. Hassan and
    Parminder Flora and
    Gilbert Hamann},
    title = {Using Load Tests to Automatically Compare the Subsystems
    of a Large Enterprise System},
    booktitle = {COMPSAC},
    year = {2010},
    pages = {117-126},
    ee = {http://dx.doi.org/10.1109/COMPSAC.2010.18},
    crossref = {DBLP:conf/compsac/2010}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Validating the use of topic models for software evolution,” in Scam, 2010, pp. 55-64.
    [Bibtex]
    @inproceedings{conf/scam/ThomasAHB10,
    author = {Stephen W. Thomas and
    Bram Adams and
    Ahmed E. Hassan and
    Dorothea Blostein},
    title = {Validating the Use of Topic Models for Software Evolution},
    booktitle = {SCAM},
    year = {2010},
    pages = {55-64},
    ee = {http://dx.doi.org/10.1109/SCAM.2010.13},
    crossref = {DBLP:conf/scam/2010}
    }
  • P. Heidari and H. Boucheneb, “Efficient method for checking the existence of a safety/ reachability controller for time petri nets,” in Acsd, 2010, pp. 201-210.
    [Bibtex]
    @inproceedings{conf/acsd/HeidariB10,
    author = {Parisa Heidari and
    Hanifa Boucheneb},
    title = {Efficient Method for Checking the Existence of a Safety/
    Reachability Controller for Time Petri Nets},
    booktitle = {ACSD},
    year = {2010},
    pages = {201-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2010.23},
    crossref = {DBLP:conf/acsd/2010}
    }
  • H. Boucheneb and K. Barkaoui, “On interleaving in \P,A\-time petri nets with strong semantics,” in Infinity, 2010, pp. 17-31.
    [Bibtex]
    @inproceedings{journals/corr/abs-1011-0218,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {On interleaving in \{P,A\}-Time Petri nets with strong semantics},
    booktitle = {INFINITY},
    year = {2010},
    pages = {17-31},
    ee = {http://dx.doi.org/10.4204/EPTCS.39.2},
    crossref = {DBLP:journals/corr/abs-1010-6112}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, and P. Flora, “Mining performance regression testing repositories for automated performance analysis,” in Qsic, 2010, pp. 32-41.
    [Bibtex]
    @inproceedings{conf/qsic/FooJAHZF10,
    author = {King Chun Foo and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou and
    Parminder Flora},
    title = {Mining Performance Regression Testing Repositories for Automated
    Performance Analysis},
    booktitle = {QSIC},
    year = {2010},
    pages = {32-41},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.35},
    crossref = {DBLP:conf/qsic/2010}
    }
  • W. M. Ibrahim, N. Bettenburg, E. Shihab, B. Adams, and A. E. Hassan, “Should i contribute to this discussion?,” in Msr, 2010, pp. 181-190.
    [Bibtex]
    @inproceedings{conf/msr/IbrahimBSAH10,
    author = {Walid M. Ibrahim and
    Nicolas Bettenburg and
    Emad Shihab and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Should I contribute to this discussion?},
    booktitle = {MSR},
    year = {2010},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463345},
    crossref = {DBLP:conf/msr/2010}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Can syntactic and logical graphs help word sense disambiguation?,” in Lrec, 2010.
    [Bibtex]
    @inproceedings{conf/lrec/ZouaqGO10,
    author = {Amal Zouaq and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Can Syntactic and Logical Graphs help Word Sense Disambiguation?},
    booktitle = {LREC},
    year = {2010},
    ee = {http://www.lrec-conf.org/proceedings/lrec2010/summaries/374.html},
    crossref = {DBLP:conf/lrec/2010}
    }
  • L. Ruhlmann, B. Ozell, M. Gagnon, S. Bourgoin, and E. Charton, “Improving communication using 3d animation,” in Kes (4), 2010, pp. 410-419.
    [Bibtex]
    @inproceedings{conf/kes/RuhlmannOGBC10,
    author = {Laurent Ruhlmann and
    Beno\^{\i}t Ozell and
    Michel Gagnon and
    Steve Bourgoin and
    Eric Charton},
    title = {Improving Communication Using 3D Animation},
    booktitle = {KES (4)},
    year = {2010},
    pages = {410-419},
    ee = {http://dx.doi.org/10.1007/978-3-642-15384-6_44},
    crossref = {DBLP:conf/kes/2010-4}
    }
  • H. Malik, B. Adams, and A. E. Hassan, “Pinpointing the subsystems responsible for the performance deviations in a load test,” in Issre, 2010, pp. 201-210.
    [Bibtex]
    @inproceedings{conf/issre/MalikAH10,
    author = {Haroon Malik and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Pinpointing the Subsystems Responsible for the Performance
    Deviations in a Load Test},
    booktitle = {ISSRE},
    year = {2010},
    pages = {201-210},
    ee = {http://dx.doi.org/10.1109/ISSRE.2010.43},
    crossref = {DBLP:conf/issre/2010}
    }
  • H. Boucheneb, A. Imine, and M. Najem, “Symbolic model-checking of optimistic replication algorithms,” in Ifm, 2010, pp. 89-104.
    [Bibtex]
    @inproceedings{conf/ifm/BouchenebIN10,
    author = {Hanifa Boucheneb and
    Abdessamad Imine and
    Manal Najem},
    title = {Symbolic Model-Checking of Optimistic Replication Algorithms},
    booktitle = {IFM},
    year = {2010},
    pages = {89-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-16265-7_8},
    crossref = {DBLP:conf/ifm/2010}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Poly-co: an unsupervised co-reference detection system,” in Inlg, 2010.
    [Bibtex]
    @inproceedings{conf/inlg/ChartonGO10,
    author = {Eric Charton and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Poly-co: An Unsupervised Co-reference Detection System},
    booktitle = {INLG},
    year = {2010},
    ee = {http://www.aclweb.org/anthology/W10-4228},
    crossref = {DBLP:conf/inlg/2010}
    }
  • R. Oliveto, F. Khomh, G. Antoniol, and Y. Guéhéneuc, “Numerical signatures of antipatterns: an approach based on b-splines,” in Csmr, 2010, pp. 248-251.
    [Bibtex]
    @inproceedings{conf/csmr/OlivetoKAG10,
    author = {Rocco Oliveto and
    Foutse Khomh and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Numerical Signatures of Antipatterns: An Approach Based
    on B-Splines},
    booktitle = {CSMR},
    year = {2010},
    pages = {248-251},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.47},
    crossref = {DBLP:conf/csmr/2010}
    }

2009

  • H. Boucheneb, G. Gardey, and O. H. Roux, “Tctl model checking of time petri nets,” J. log. comput., vol. 19, iss. 6, pp. 1509-1540, 2009.
    [Bibtex]
    @article{journals/logcom/BouchenebGR09,
    author = {Hanifa Boucheneb and
    Guillaume Gardey and
    Olivier H. Roux},
    title = {TCTL Model Checking of Time Petri Nets},
    journal = {J. Log. Comput.},
    volume = {19},
    number = {6},
    year = {2009},
    pages = {1509-1540},
    ee = {http://dx.doi.org/10.1093/logcom/exp036}
    }
  • F. Khomh, “Squad: software quality understanding through the analysis of design,” in Wcre, 2009, pp. 303-306.
    [Bibtex]
    @inproceedings{conf/wcre/Khomh99a,
    author = {Foutse Khomh},
    title = {SQUAD: Software Quality Understanding through the Analysis
    of Design},
    booktitle = {WCRE},
    year = {2009},
    pages = {303-306},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.22},
    crossref = {DBLP:conf/wcre/2009}
    }
  • B. Adams, “Co-evolution of source code and the build system,” in Icsm, 2009, pp. 461-464.
    [Bibtex]
    @inproceedings{conf/icsm/Adams09,
    author = {Bram Adams},
    title = {Co-evolution of source code and the build system},
    booktitle = {ICSM},
    year = {2009},
    pages = {461-464},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306272},
    crossref = {DBLP:conf/icsm/2009}
    }
  • S. Marr, M. Haupt, S. Timbermont, B. Adams, T. D’Hondt, P. Costanza, and W. D. Meuter, “Virtual machine support for many-core architectures: decoupling abstract from concrete concurrency models,” in Places, 2009, pp. 63-77.
    [Bibtex]
    @inproceedings{journals/corr/abs-1002-0939,
    author = {Stefan Marr and
    Michael Haupt and
    Stijn Timbermont and
    Bram Adams and
    Theo D'Hondt and
    Pascal Costanza and
    Wolfgang De Meuter},
    title = {Virtual Machine Support for Many-Core Architectures: Decoupling
    Abstract from Concrete Concurrency Models},
    booktitle = {PLACES},
    year = {2009},
    pages = {63-77},
    ee = {http://dx.doi.org/10.4204/EPTCS.17.6},
    crossref = {DBLP:journals/corr/abs-1002-1408}
    }
  • S. L. Abebe, S. Haiduc, A. Marcus, P. Tonella, and G. Antoniol, “Analyzing the evolution of the source code vocabulary,” in Csmr, 2009, pp. 189-198.
    [Bibtex]
    @inproceedings{conf/csmr/AbebeHMTA09,
    author = {Surafel Lemma Abebe and
    Sonia Haiduc and
    Andrian Marcus and
    Paolo Tonella and
    Giuliano Antoniol},
    title = {Analyzing the Evolution of the Source Code Vocabulary},
    booktitle = {CSMR},
    year = {2009},
    pages = {189-198},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.61},
    crossref = {DBLP:conf/csmr/2009}
    }
  • O. Gendreau and P. N. Robillard, “Exploring knowledge flow in software project development,” in Eknow, 2009, pp. 99-104.
    [Bibtex]
    @inproceedings{conf/eknow/GendreauR09,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {Exploring Knowledge Flow in Software Project Development},
    booktitle = {eKNOW},
    year = {2009},
    pages = {99-104},
    ee = {http://doi.ieeecomputersociety.org/10.1109/eKNOW.2009.30},
    crossref = {DBLP:conf/eknow/2009}
    }
  • Y. Guéhéneuc, H. H. Kagdi, and J. I. Maletic, “Working session: using eye-tracking to understand program comprehension,” in Icpc, 2009, pp. 278-279.
    [Bibtex]
    @inproceedings{conf/iwpc/GueheneucKM09,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Huzefa H. Kagdi and
    Jonathan I. Maletic},
    title = {Working session: Using eye-tracking to understand program
    comprehension},
    booktitle = {ICPC},
    year = {2009},
    pages = {278-279},
    ee = {http://dx.doi.org/10.1109/ICPC.2009.5090057},
    crossref = {DBLP:conf/iwpc/2009}
    }
  • S. Fu, M. C. Desmarais, B. Pi, Y. Zhou, W. Wang, G. Zou, S. Han, and X. Rao, “Simple but effective porn query recognition by k-nn with semantic similarity measure,” in Apweb/waim, 2009, pp. 3-14.
    [Bibtex]
    @inproceedings{conf/waim/FuDPZWZHR09,
    author = {Shunkai Fu and
    Michel C. Desmarais and
    Bingfeng Pi and
    Ying Zhou and
    Weilei Wang and
    Gang Zou and
    Song Han and
    Xunrong Rao},
    title = {Simple but Effective Porn Query Recognition by k-NN with
    Semantic Similarity Measure},
    booktitle = {APWeb/WAIM},
    year = {2009},
    pages = {3-14},
    ee = {http://dx.doi.org/10.1007/978-3-642-00672-2_3},
    crossref = {DBLP:conf/waim/2009}
    }
  • S. Fu, S. Han, B. Pi, M. Desmarais, Y. Zhou, J. Zhuo, G. Zou, and W. Wang, “Large scale analysis of chinese mobile query behavior,” in Ike, 2009, pp. 258-264.
    [Bibtex]
    @inproceedings{conf/ike/FuHPDZZZW09,
    author = {Shunkai Fu and
    Song Han and
    Bingfeng Pi and
    Michel Desmarais and
    Ying Zhou and
    Jianhui Zhuo and
    Gang Zou and
    Weilei Wang},
    title = {Large Scale Analysis of Chinese Mobile Query Behavior},
    booktitle = {IKE},
    year = {2009},
    pages = {258-264},
    crossref = {DBLP:conf/ike/2009}
    }
  • F. Khomh, S. Vaucher, Y. Guéhéneuc, and H. A. Sahraoui, “A bayesian approach for the detection of code and design smells,” in Qsic, 2009, pp. 305-314.
    [Bibtex]
    @inproceedings{conf/qsic/KhomhVGS09,
    author = {Foutse Khomh and
    St{\'e}phane Vaucher and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui},
    title = {A Bayesian Approach for the Detection of Code and Design
    Smells},
    booktitle = {QSIC},
    year = {2009},
    pages = {305-314},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2009.47},
    crossref = {DBLP:conf/qsic/2009}
    }
  • S. Fu, B. Pi, Y. Zhou, M. C. Desmarais, W. Wang, S. Han, and X. Rao, “Cross-channel query recommendation on commercial mobile search engine: why, how and empirical evaluation,” in Pakdd, 2009, pp. 883-890.
    [Bibtex]
    @inproceedings{conf/pakdd/FuPZDWHR09,
    author = {Shunkai Fu and
    Bingfeng Pi and
    Ying Zhou and
    Michel C. Desmarais and
    Weilei Wang and
    Song Han and
    Xunrong Rao},
    title = {Cross-Channel Query Recommendation on Commercial Mobile
    Search Engine: Why, How and Empirical Evaluation},
    booktitle = {PAKDD},
    year = {2009},
    pages = {883-890},
    ee = {http://dx.doi.org/10.1007/978-3-642-01307-2_92},
    crossref = {DBLP:conf/pakdd/2009}
    }
  • M. Haupt, C. Gibbs, B. Adams, S. Timbermont, Y. Coady, and R. Hirschfeld, “Disentangling virtual machine architecture,” Iet software, vol. 3, iss. 3, pp. 201-218, 2009.
    [Bibtex]
    @article{journals/iee/HauptGATCH09,
    author = {Michael Haupt and
    Celina Gibbs and
    Bram Adams and
    Stijn Timbermont and
    Yvonne Coady and
    Robert Hirschfeld},
    title = {Disentangling virtual machine architecture},
    journal = {IET Software},
    volume = {3},
    number = {3},
    year = {2009},
    pages = {201-218},
    ee = {http://dx.doi.org/10.1049/iet-sen.2007.0121}
    }
  • D. M. Germán, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Code siblings: technical and legal implications of copying code between applications,” in Msr, 2009, pp. 81-90.
    [Bibtex]
    @inproceedings{conf/msr/GermanPGA09,
    author = {Daniel M. Germ{\'a}n and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Code siblings: Technical and legal implications of copying
    code between applications},
    booktitle = {MSR},
    year = {2009},
    pages = {81-90},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069483},
    crossref = {DBLP:conf/msr/2009}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Resp: a nonintrusive transaction-level reflective mpsoc simulation platform for design space exploration,” Ieee trans. on cad of integrated circuits and systems, vol. 28, iss. 12, pp. 1857-1869, 2009.
    [Bibtex]
    @article{journals/tcad/BeltrameFS09,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {ReSP: A Nonintrusive Transaction-Level Reflective MPSoC
    Simulation Platform for Design Space Exploration},
    journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
    volume = {28},
    number = {12},
    year = {2009},
    pages = {1857-1869},
    ee = {http://dx.doi.org/10.1109/TCAD.2009.2030268}
    }
  • Z. Awedikian, K. Ayari, and G. Antoniol, “Mc/dc automatic test input data generation,” in Gecco, 2009, pp. 1657-1664.
    [Bibtex]
    @inproceedings{conf/gecco/AwedikianAA09,
    author = {Zeina Awedikian and
    Kamel Ayari and
    Giuliano Antoniol},
    title = {MC/DC automatic test input data generation},
    booktitle = {GECCO},
    year = {2009},
    pages = {1657-1664},
    ee = {http://doi.acm.org/10.1145/1569901.1570123},
    crossref = {DBLP:conf/gecco/2009g}
    }
  • A. Seffah, J. Vanderdonckt, and M. C. Desmarais, “Human-centered software engineering: software engineering architectures, patterns, and sodels for human computer interaction,” in Human-centered software engineering, , 2009, pp. 1-6.
    [Bibtex]
    @incollection{series/hci/SeffahVD09a,
    author = {Ahmed Seffah and
    Jean Vanderdonckt and
    Michel C. Desmarais},
    title = {Human-Centered Software Engineering: Software Engineering
    Architectures, Patterns, and Sodels for Human Computer Interaction},
    booktitle = {Human-Centered Software Engineering},
    year = {2009},
    pages = {1-6},
    ee = {http://dx.doi.org/10.1007/978-1-84800-907-3_1},
    crossref = {DBLP:series/hci/SeffahVD09}
    }
  • G. Beltrame, C. Bolchini, and A. Miele, “Multi-level fault modeling for transaction-level specifications,” in Acm great lakes symposium on vlsi, 2009, pp. 87-92.
    [Bibtex]
    @inproceedings{conf/glvlsi/BeltrameBM09,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Antonio Miele},
    title = {Multi-level fault modeling for transaction-level specifications},
    booktitle = {ACM Great Lakes Symposium on VLSI},
    year = {2009},
    pages = {87-92},
    ee = {http://doi.acm.org/10.1145/1531542.1531565},
    crossref = {DBLP:conf/glvlsi/2009}
    }
  • G. Antoniol, R. Oliveto, and D. Poshyvanyk, “5$^{\mbox{th}}$ international workshop on traceability in emerging forms of software engineering (tefse 2009),” in Icse companion, 2009, pp. 472-473.
    [Bibtex]
    @inproceedings{conf/icse/AntoniolOP09,
    author = {Giuliano Antoniol and
    Rocco Oliveto and
    Denys Poshyvanyk},
    title = {5$^{\mbox{th}}$ international workshop on Traceability in Emerging
    Forms of Software Engineering (TEFSE 2009)},
    booktitle = {ICSE Companion},
    year = {2009},
    pages = {472-473},
    ee = {http://dx.doi.org/10.1109/ICSE-COMPANION.2009.5071068},
    crossref = {DBLP:conf/icse/2009c}
    }
  • S. Jeanmart, Y. Guéhéneuc, H. A. Sahraoui, and N. Habra, “Impact of the visitor pattern on program comprehension and maintenance,” in Esem, 2009, pp. 69-78.
    [Bibtex]
    @inproceedings{conf/esem/JeanmartGSH09,
    author = {Sebastien Jeanmart and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui and
    Naji Habra},
    title = {Impact of the visitor pattern on program comprehension and
    maintenance},
    booktitle = {ESEM},
    year = {2009},
    pages = {69-78},
    ee = {http://doi.acm.org/10.1145/1671248.1671255},
    crossref = {DBLP:conf/esem/2009}
    }
  • S. Gueorguiev, M. Harman, and G. Antoniol, “Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering,” in Gecco, 2009, pp. 1673-1680.
    [Bibtex]
    @inproceedings{conf/gecco/GueorguievHA09,
    author = {Stefan Gueorguiev and
    Mark Harman and
    Giuliano Antoniol},
    title = {Software project planning for robustness and completion
    time in the presence of uncertainty using multi objective
    search based software engineering},
    booktitle = {GECCO},
    year = {2009},
    pages = {1673-1680},
    ee = {http://doi.acm.org/10.1145/1569901.1570125},
    crossref = {DBLP:conf/gecco/2009g}
    }
  • H. Boucheneb and A. Imine, “On model-checking optimistic replication algorithms,” in Fmoods/forte, 2009, pp. 73-89.
    [Bibtex]
    @inproceedings{conf/forte/BouchenebI09,
    author = {Hanifa Boucheneb and
    Abdessamad Imine},
    title = {On Model-Checking Optimistic Replication Algorithms},
    booktitle = {FMOODS/FORTE},
    year = {2009},
    pages = {73-89},
    ee = {http://dx.doi.org/10.1007/978-3-642-02138-1_5},
    crossref = {DBLP:conf/forte/2009}
    }
  • E. Shihab, N. Bettenburg, B. Adams, and A. E. Hassan, “On the central role of mailing lists in open source projects: an exploratory study,” in Jsai-isai workshops, 2009, pp. 91-103.
    [Bibtex]
    @inproceedings{conf/jsai/ShihabBAH09,
    author = {Emad Shihab and
    Nicolas Bettenburg and
    Bram Adams and
    Ahmed E. Hassan},
    title = {On the Central Role of Mailing Lists in Open Source Projects:
    An Exploratory Study},
    booktitle = {JSAI-isAI Workshops},
    year = {2009},
    pages = {91-103},
    ee = {http://dx.doi.org/10.1007/978-3-642-14888-0_9},
    crossref = {DBLP:conf/jsai/2009}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “A real-time application design methodology for mpsocs,” in Date, 2009, pp. 767-772.
    [Bibtex]
    @inproceedings{conf/date/BeltrameFS09,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {A real-time application design methodology for MPSoCs},
    booktitle = {DATE},
    year = {2009},
    pages = {767-772},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5090609{\&}arnumber=5090767{\&}count=326{\&}index=153},
    crossref = {DBLP:conf/date/2009}
    }
  • W. Shang, Z. M. Jiang, B. Adams, and A. E. Hassan, “Mapreduce as a general framework to support research in mining software repositories (msr),” in Msr, 2009, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/msr/ShangJAH09,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan},
    title = {MapReduce as a general framework to support research in
    Mining Software Repositories (MSR)},
    booktitle = {MSR},
    year = {2009},
    pages = {21-30},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069477},
    crossref = {DBLP:conf/msr/2009}
    }
  • S. Fu, B. Pi, M. Desmarais, Y. Zhou, W. Wang, and S. Han, “Query recommendation and its usefulness evaluation on mobile search engine,” in Smc, 2009, pp. 1292-1297.
    [Bibtex]
    @inproceedings{conf/smc/FuPDZWH09,
    author = {Shunkai Fu and
    Bingfeng Pi and
    Michel Desmarais and
    Ying Zhou and
    Weilei Wang and
    Song Han},
    title = {Query Recommendation and Its Usefulness Evaluation on Mobile
    Search Engine},
    booktitle = {SMC},
    year = {2009},
    pages = {1292-1297},
    ee = {http://dx.doi.org/10.1109/ICSMC.2009.5345920},
    crossref = {DBLP:conf/smc/2009}
    }
  • N. Bettenburg, W. Shang, W. M. Ibrahim, B. Adams, Y. Zou, and A. E. Hassan, “An empirical study on inconsistent changes to code clones at release level,” in Wcre, 2009, pp. 85-94.
    [Bibtex]
    @inproceedings{conf/wcre/BettenburgSIAZH99a,
    author = {Nicolas Bettenburg and
    Weiyi Shang and
    Walid M. Ibrahim and
    Bram Adams and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study on Inconsistent Changes to Code Clones
    at Release Level},
    booktitle = {WCRE},
    year = {2009},
    pages = {85-94},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.51},
    crossref = {DBLP:conf/wcre/2009}
    }
  • R. Hadjidj and H. Boucheneb, “On-the-fly tctl model checking for time petri nets,” Theor. comput. sci., vol. 410, iss. 42, pp. 4241-4261, 2009.
    [Bibtex]
    @article{journals/tcs/HadjidjB09,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {On-the-fly TCTL model checking for time Petri nets},
    journal = {Theor. Comput. Sci.},
    volume = {410},
    number = {42},
    year = {2009},
    pages = {4241-4261},
    ee = {http://dx.doi.org/10.1016/j.tcs.2009.06.019}
    }
  • F. Abouzaid and J. Mullins, “Model-checking web services orchestrations using bp-calculus,” Electr. notes theor. comput. sci., vol. 255, pp. 3-21, 2009.
    [Bibtex]
    @article{journals/entcs/AbouzaidM09,
    author = {Faisal Abouzaid and
    John Mullins},
    title = {Model-checking Web Services Orchestrations using BP-calculus},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {255},
    year = {2009},
    pages = {3-21},
    ee = {http://dx.doi.org/10.1016/j.entcs.2009.10.022}
    }
  • D. Letarte and E. Merlo, “Extraction of inter-procedural simple role privilege models from php code,” in Wcre, 2009, pp. 187-191.
    [Bibtex]
    @inproceedings{conf/wcre/LetarteM99a,
    author = {Dominic Letarte and
    Ettore Merlo},
    title = {Extraction of Inter-procedural Simple Role Privilege Models
    from PHP Code},
    booktitle = {WCRE},
    year = {2009},
    pages = {187-191},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.32},
    crossref = {DBLP:conf/wcre/2009}
    }
  • E. Merlo and T. Lavoie, “Computing structural types of clone syntactic blocks,” in Wcre, 2009, pp. 274-278.
    [Bibtex]
    @inproceedings{conf/wcre/MerloL99a,
    author = {Ettore Merlo and
    Thierry Lavoie},
    title = {Computing Structural Types of Clone Syntactic Blocks},
    booktitle = {WCRE},
    year = {2009},
    pages = {274-278},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.33},
    crossref = {DBLP:conf/wcre/2009}
    }
  • Y. Guéhéneuc, “A theory of program comprehension: joining vision science and program comprehension,” Ijssci, vol. 1, iss. 2, pp. 54-72, 2009.
    [Bibtex]
    @article{journals/ijssci/Gueheneuc09,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Theory of Program Comprehension: Joining Vision Science
    and Program Comprehension},
    journal = {IJSSCI},
    volume = {1},
    number = {2},
    year = {2009},
    pages = {54-72},
    ee = {http://dx.doi.org/10.4018/jssci.2009040104}
    }
  • B. Adams, W. D. Meuter, H. Tromp, and A. E. Hassan, “Can we refactor conditional compilation into aspects?,” in Aosd, 2009, pp. 243-254.
    [Bibtex]
    @inproceedings{conf/aosd/AdamsMTH09,
    author = {Bram Adams and
    Wolfgang De Meuter and
    Herman Tromp and
    Ahmed E. Hassan},
    title = {Can we refactor conditional compilation into aspects?},
    booktitle = {AOSD},
    year = {2009},
    pages = {243-254},
    ee = {http://doi.acm.org/10.1145/1509239.1509274},
    crossref = {DBLP:conf/aosd/2009}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Recovering the evolution stable part using an ecgm algorithm: is there a tunnel in mozilla?,” in Csmr, 2009, pp. 179-188.
    [Bibtex]
    @inproceedings{conf/csmr/KpodjedoRGA09,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Recovering the Evolution Stable Part Using an ECGM Algorithm:
    Is There a Tunnel in Mozilla?},
    booktitle = {CSMR},
    year = {2009},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.24},
    crossref = {DBLP:conf/csmr/2009}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Unsupervised and open ontology-based semantic analysis,” in Ltc, 2009, pp. 245-256.
    [Bibtex]
    @inproceedings{conf/ltconf/ZouaqGO09,
    author = {Amal Zouaq and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Unsupervised and Open Ontology-Based Semantic Analysis},
    booktitle = {LTC},
    year = {2009},
    pages = {245-256},
    ee = {http://dx.doi.org/10.1007/978-3-642-20095-3_23},
    crossref = {DBLP:conf/ltconf/2009}
    }
  • F. Khomh, M. D. Penta, and Y. Guéhéneuc, “An exploratory study of the impact of code smells on software change-proneness,” in Wcre, 2009, pp. 75-84.
    [Bibtex]
    @inproceedings{conf/wcre/KhomhPG99a,
    author = {Foutse Khomh and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An Exploratory Study of the Impact of Code Smells on Software
    Change-proneness},
    booktitle = {WCRE},
    year = {2009},
    pages = {75-84},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.28},
    crossref = {DBLP:conf/wcre/2009}
    }
  • T. Rafla, M. C. Desmarais, and P. N. Robillard, “Toward a refined paradigm for architecting usable systems,” in Human-centered software engineering, , 2009, pp. 245-255.
    [Bibtex]
    @incollection{series/hci/RaflaDR09,
    author = {Tamer Rafla and
    Michel C. Desmarais and
    Pierre N. Robillard},
    title = {Toward a Refined Paradigm for Architecting Usable Systems},
    booktitle = {Human-Centered Software Engineering},
    year = {2009},
    pages = {245-255},
    ee = {http://dx.doi.org/10.1007/978-1-84800-907-3_11},
    crossref = {DBLP:series/hci/SeffahVD09}
    }
  • F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Playing roles in design patterns: an empirical descriptive and analytic study,” in Icsm, 2009, pp. 83-92.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhGA09,
    author = {Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Playing roles in design patterns: An empirical descriptive
    and analytic study},
    booktitle = {ICSM},
    year = {2009},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306327},
    crossref = {DBLP:conf/icsm/2009}
    }
  • H. Rakkay, H. Boucheneb, and O. H. Roux, “Time arc petri nets and their analysis,” in Acsd, 2009, pp. 138-147.
    [Bibtex]
    @inproceedings{conf/acsd/RakkayBR09,
    author = {Hind Rakkay and
    Hanifa Boucheneb and
    Olivier H. Roux},
    title = {Time Arc Petri Nets and Their Analysis},
    booktitle = {ACSD},
    year = {2009},
    pages = {138-147},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2009.21},
    crossref = {DBLP:conf/acsd/2009}
    }
  • H. Rakkay and H. Boucheneb, “Security analysis of role based access control models using colored petri nets and cpntools,” Transactions on computational science, vol. 4, pp. 149-176, 2009.
    [Bibtex]
    @article{journals/tcos/RakkayB09,
    author = {Hind Rakkay and
    Hanifa Boucheneb},
    title = {Security Analysis of Role Based Access Control Models Using
    Colored Petri Nets and CPNtools},
    journal = {Transactions on Computational Science},
    volume = {4},
    year = {2009},
    pages = {149-176},
    ee = {http://dx.doi.org/10.1007/978-3-642-01004-0_9},
    crossref = {DBLP:journals/tcos/2009-4}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “A study of the time dependence of code changes,” in Wcre, 2009, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/wcre/AlamAH99a,
    author = {Omar Alam and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Study of the Time Dependence of Code Changes},
    booktitle = {WCRE},
    year = {2009},
    pages = {21-30},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.25},
    crossref = {DBLP:conf/wcre/2009}
    }
  • A. Jodoin and M. Desmarais, “L’environnement de développement dynamique (edd) pour le prototypage rapide d’interfaces graphiques,” in Ihm, 2009, pp. 111-117.
    [Bibtex]
    @inproceedings{conf/ihm/JodoinD09,
    author = {Andr{\'e} Jodoin and
    Michel Desmarais},
    title = {L'environnement de d{\'e}veloppement dynamique (EDD)
    pour le prototypage rapide d'interfaces graphiques},
    booktitle = {IHM},
    year = {2009},
    pages = {111-117},
    ee = {http://doi.acm.org/10.1145/1629826.1629844},
    crossref = {DBLP:conf/ihm/2009}
    }
  • D. Hernon, T. Salamon, R. Kempers, S. Krishnan, A. Lyons, M. Hodes, P. Kolodner, J. Mullins, and L. McGarry, “Thermal management: enabling enhanced functionality and reduced carbon footprint,” Bell labs technical journal, vol. 14, iss. 3, pp. 7-19, 2009.
    [Bibtex]
    @article{journals/bell/HernonSKKLHKMM09,
    author = {Domhnaill Hernon and
    Todd Salamon and
    Roger Kempers and
    Shankar Krishnan and
    Alan Lyons and
    Marc Hodes and
    Paul Kolodner and
    John Mullins and
    Liam McGarry},
    title = {Thermal management: Enabling enhanced functionality and
    reduced carbon footprint},
    journal = {Bell Labs Technical Journal},
    volume = {14},
    number = {3},
    year = {2009},
    pages = {7-19},
    ee = {http://dx.doi.org/10.1002/bltj.20385}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “Measuring the progress of projects using the time dependence of code changes,” in Icsm, 2009, pp. 329-338.
    [Bibtex]
    @inproceedings{conf/icsm/AlamAH09,
    author = {Omar Alam and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Measuring the progress of projects using the time dependence
    of code changes},
    booktitle = {ICSM},
    year = {2009},
    pages = {329-338},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306313},
    crossref = {DBLP:conf/icsm/2009}
    }
  • S. Vaucher, F. Khomh, N. Moha, and Y. Guéhéneuc, “Tracking design smells: lessons from a study of god classes,” in Wcre, 2009, pp. 145-154.
    [Bibtex]
    @inproceedings{conf/wcre/VaucherKMG99a,
    author = {St{\'e}phane Vaucher and
    Foutse Khomh and
    Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Tracking Design Smells: Lessons from a Study of God Classes},
    booktitle = {WCRE},
    year = {2009},
    pages = {145-154},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.23},
    crossref = {DBLP:conf/wcre/2009}
    }
  • G. Antoniol, “Keynote paper: search based software testing for software security: breaking code to make it safer,” in Icst workshops, 2009, pp. 87-100.
    [Bibtex]
    @inproceedings{conf/icst/Antoniol09,
    author = {Giuliano Antoniol},
    title = {Keynote Paper: Search Based Software Testing for Software
    Security: Breaking Code to Make it Safer},
    booktitle = {ICST Workshops},
    year = {2009},
    pages = {87-100},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSTW.2009.12},
    crossref = {DBLP:conf/icst/2009w}
    }
  • J. M. T. Moreno, P. St-Onge, M. Gagnon, M. El-Bèze, and P. Bellot, “Automatic summarization system coupled with a question-answering system (qaas),” Corr, vol. abs/0905.2990, 2009.
    [Bibtex]
    @article{journals/corr/abs-0905-2990,
    author = {Juan Manuel Torres Moreno and
    Pier-Luc St-Onge and
    Michel Gagnon and
    Marc El-B{\`e}ze and
    Patrice Bellot},
    title = {Automatic Summarization System coupled with a Question-Answering
    System (QAAS)},
    journal = {CoRR},
    volume = {abs/0905.2990},
    year = {2009},
    ee = {http://arxiv.org/abs/0905.2990}
    }
  • B. Adams, K. D. Schutter, A. Zaidman, S. Demeyer, H. Tromp, and W. D. Meuter, “Using aspect orientation in legacy environments for reverse engineering using dynamic analysis – an industrial experience report,” Journal of systems and software, vol. 82, iss. 4, pp. 668-684, 2009.
    [Bibtex]
    @article{journals/jss/AdamsSZDTM09,
    author = {Bram Adams and
    Kris De Schutter and
    Andy Zaidman and
    Serge Demeyer and
    Herman Tromp and
    Wolfgang De Meuter},
    title = {Using aspect orientation in legacy environments for reverse
    engineering using dynamic analysis - An industrial experience
    report},
    journal = {Journal of Systems and Software},
    volume = {82},
    number = {4},
    year = {2009},
    pages = {668-684},
    ee = {http://dx.doi.org/10.1016/j.jss.2008.09.031}
    }
  • H. Boucheneb and K. Barkaoui, “Covering steps graphs of time petri nets,” Electr. notes theor. comput. sci., vol. 239, pp. 155-165, 2009.
    [Bibtex]
    @article{journals/entcs/BouchenebB09,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Covering Steps Graphs of Time Petri Nets},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {239},
    year = {2009},
    pages = {155-165},
    ee = {http://dx.doi.org/10.1016/j.entcs.2009.05.037}
    }

2008

  • S. Denier and Y. Guéhéneuc, “Mendel: a model, metrics, and rules to understand class hierarchies,” in Icpc, 2008, pp. 143-152.
    [Bibtex]
    @inproceedings{conf/iwpc/DenierG08,
    author = {Simon Denier and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Mendel: A Model, Metrics, and Rules to Understand Class
    Hierarchies},
    booktitle = {ICPC},
    year = {2008},
    pages = {143-152},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.37},
    crossref = {DBLP:conf/iwpc/2008}
    }
  • C. D. Grosso, G. Antoniol, E. Merlo, and P. Galinier, “Detecting buffer overflow via automatic test input data generation,” Computers & or, vol. 35, iss. 10, pp. 3125-3143, 2008.
    [Bibtex]
    @article{journals/cor/GrossoAMG08,
    author = {Concettina Del Grosso and
    Giuliano Antoniol and
    Ettore Merlo and
    Philippe Galinier},
    title = {Detecting buffer overflow via automatic test input data
    generation},
    journal = {Computers {\&} OR},
    volume = {35},
    number = {10},
    year = {2008},
    pages = {3125-3143},
    ee = {http://dx.doi.org/10.1016/j.cor.2007.01.013}
    }
  • S. Fu, M. Desmarais, and F. Li, “One-pass learning algorithm for fast recovery of bayesian network,” in Flairs conference, 2008, pp. 53-58.
    [Bibtex]
    @inproceedings{conf/flairs/FuDL08,
    author = {Shunkai Fu and
    Michel Desmarais and
    Fan Li},
    title = {One-Pass Learning Algorithm for Fast Recovery of Bayesian
    Network},
    booktitle = {FLAIRS Conference},
    year = {2008},
    pages = {53-58},
    ee = {http://www.aaai.org/Library/FLAIRS/2008/flairs08-020.php},
    crossref = {DBLP:conf/flairs/2008}
    }
  • G. Falcone, Y. Guéhéneuc, C. F. J. Lange, Z. Porkoláb, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2008, pp. 77-86.
    [Bibtex]
    @inproceedings{conf/ecoopw/FalconeGLPS08,
    author = {Giovanni Falcone and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Christian F. J. Lange and
    Zolt{\'a}n Porkol{\'a}b and
    Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2008},
    pages = {77-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-02047-6_9},
    crossref = {DBLP:conf/ecoopw/2008}
    }
  • K. Barkaoui, H. Boucheneb, and A. Hicheur, “Modelling and analysis of time-constrained flexible workflows with time recursive ecatnets,” in Ws-fm, 2008, pp. 19-36.
    [Bibtex]
    @inproceedings{conf/wsfm/BarkaouiBH08,
    author = {Kamel Barkaoui and
    Hanifa Boucheneb and
    Awatef Hicheur},
    title = {Modelling and Analysis of Time-Constrained Flexible Workflows
    with Time Recursive ECATNets},
    booktitle = {WS-FM},
    year = {2008},
    pages = {19-36},
    ee = {http://dx.doi.org/10.1007/978-3-642-01364-5_2},
    crossref = {DBLP:conf/wsfm/2008}
    }
  • S. Fu and M. Desmarais, “Fast markov blanket discovery algorithm via local learning within single pass,” in Canadian conference on ai, 2008, pp. 96-107.
    [Bibtex]
    @inproceedings{conf/ai/FuD08,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Fast Markov Blanket Discovery Algorithm Via Local Learning
    within Single Pass},
    booktitle = {Canadian Conference on AI},
    year = {2008},
    pages = {96-107},
    ee = {http://dx.doi.org/10.1007/978-3-540-68825-9_10},
    crossref = {DBLP:conf/ai/2008}
    }
  • M. Desmarais, “Just-in-time knowledge for effective hybrid learning,” in Ichl, 2008, pp. 31-39.
    [Bibtex]
    @inproceedings{conf/ichl/Desmarais08,
    author = {Michel Desmarais},
    title = {Just-in-Time Knowledge for Effective Hybrid Learning},
    booktitle = {ICHL},
    year = {2008},
    pages = {31-39},
    ee = {http://dx.doi.org/10.1007/978-3-540-85170-7_3},
    crossref = {DBLP:conf/ichl/2008}
    }
  • G. Antoniol, J. H. Hayes, Y. Guéhéneuc, and M. D. Penta, “Reuse or rewrite: combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date,” in Icsm, 2008, pp. 147-156.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolHGP08,
    author = {Giuliano Antoniol and
    Jane Huffman Hayes and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Massimiliano Di Penta},
    title = {Reuse or rewrite: Combining textual, static, and dynamic
    analyses to assess the cost of keeping a system up-to-date},
    booktitle = {ICSM},
    year = {2008},
    pages = {147-156},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658063},
    crossref = {DBLP:conf/icsm/2008}
    }
  • M. C. Desmarais, A. Villarreal, and M. Gagnon, “Adaptive test design with a naive bayes framework,” in Edm, 2008, pp. 48-56.
    [Bibtex]
    @inproceedings{conf/edm/DesmaraisVG08,
    author = {Michel C. Desmarais and
    Alejandro Villarreal and
    Michel Gagnon},
    title = {Adaptive Test Design with a Naive Bayes Framework},
    booktitle = {EDM},
    year = {2008},
    pages = {48-56},
    ee = {http://www.educationaldatamining.org/EDM2008/uploads/proc/5_Desmarais_17.pdf},
    crossref = {DBLP:conf/edm/2008}
    }
  • S. Fu and M. Desmarais, “Tradeoff analysis of different markov blanket local learning approaches,” in Pakdd, 2008, pp. 562-571.
    [Bibtex]
    @inproceedings{conf/pakdd/FuD08,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Tradeoff Analysis of Different Markov Blanket Local Learning
    Approaches},
    booktitle = {PAKDD},
    year = {2008},
    pages = {562-571},
    ee = {http://dx.doi.org/10.1007/978-3-540-68125-0_51},
    crossref = {DBLP:conf/pakdd/2008}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design,” in Codes+isss, 2008, pp. 7-12.
    [Bibtex]
    @inproceedings{conf/codes/BeltrameFS08,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {Concurrency emulation and analysis of parallel applications
    for multi-processor system-on-chip co-design},
    booktitle = {CODES+ISSS},
    year = {2008},
    pages = {7-12},
    ee = {http://doi.acm.org/10.1145/1450135.1450138},
    crossref = {DBLP:conf/codes/2008}
    }
  • M. D. Penta, G. Antoniol, and M. Harman, “Special issue on search-based software maintenance,” Journal of software maintenance, vol. 20, iss. 5, pp. 317-319, 2008.
    [Bibtex]
    @article{journals/smr/PentaAH08,
    author = {Massimiliano Di Penta and
    Giuliano Antoniol and
    Mark Harman},
    title = {Special Issue on Search-Based Software Maintenance},
    journal = {Journal of Software Maintenance},
    volume = {20},
    number = {5},
    year = {2008},
    pages = {317-319},
    ee = {http://dx.doi.org/10.1002/smr.395}
    }
  • F. Abouzaid and J. Mullins, “A calculus for generation, verification and refinement of bpel specifications,” Electr. notes theor. comput. sci., vol. 200, iss. 3, pp. 43-65, 2008.
    [Bibtex]
    @article{journals/entcs/AbouzaidM08,
    author = {Faisal Abouzaid and
    John Mullins},
    title = {A Calculus for Generation, Verification and Refinement of
    BPEL Specifications},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {200},
    number = {3},
    year = {2008},
    pages = {43-65},
    ee = {http://dx.doi.org/10.1016/j.entcs.2008.04.092}
    }
  • S. Cherry and P. N. Robillard, “The social side of software engineering – a real ad hoc collaboration network,” Int. j. hum.-comput. stud., vol. 66, iss. 7, pp. 495-505, 2008.
    [Bibtex]
    @article{journals/ijmms/CherryR08,
    author = {S{\'e}bastien Cherry and
    Pierre N. Robillard},
    title = {The social side of software engineering - A real ad hoc
    collaboration network},
    journal = {Int. J. Hum.-Comput. Stud.},
    volume = {66},
    number = {7},
    year = {2008},
    pages = {495-505},
    ee = {http://dx.doi.org/10.1016/j.ijhcs.2008.01.002}
    }
  • N. Moha, Y. Guéhéneuc, A. L. Meur, and L. Duchien, “A domain analysis to specify design defects and generate detection algorithms,” in Fase, 2008, pp. 276-291.
    [Bibtex]
    @inproceedings{conf/fase/MohaGMD08,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Anne-Fran\c{c}oise Le Meur and
    Laurence Duchien},
    title = {A Domain Analysis to Specify Design Defects and Generate
    Detection Algorithms},
    booktitle = {FASE},
    year = {2008},
    pages = {276-291},
    ee = {http://dx.doi.org/10.1007/978-3-540-78743-3_20},
    crossref = {DBLP:conf/fase/2008}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Semantics for model-based validation of continuous/discrete systems,” in Date, 2008, pp. 498-503.
    [Bibtex]
    @inproceedings{conf/date/GheorgheBNB08,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {Semantics for Model-Based Validation of Continuous/Discrete
    Systems},
    booktitle = {DATE},
    year = {2008},
    pages = {498-503},
    ee = {http://dx.doi.org/10.1109/DATE.2008.4484730},
    crossref = {DBLP:conf/date/2008}
    }
  • J. H. Hayes, G. Antoniol, and Y. Guéhéneuc, “Prereqir: recovering pre-requirements via cluster analysis,” in Wcre, 2008, pp. 165-174.
    [Bibtex]
    @inproceedings{conf/wcre/HayesAG08,
    author = {Jane Huffman Hayes and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {PREREQIR: Recovering Pre-Requirements via Cluster Analysis},
    booktitle = {WCRE},
    year = {2008},
    pages = {165-174},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.36},
    crossref = {DBLP:conf/wcre/2008}
    }
  • N. Moha, A. R. Hacene, P. Valtchev, and Y. Guéhéneuc, “Refactorings of design defects using relational concept analysis,” in Icfca, 2008, pp. 289-304.
    [Bibtex]
    @inproceedings{conf/icfca/MohaHVG08,
    author = {Naouel Moha and
    Amine Rouane Hacene and
    Petko Valtchev and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Refactorings of Design Defects Using Relational Concept
    Analysis},
    booktitle = {ICFCA},
    year = {2008},
    pages = {289-304},
    ee = {http://dx.doi.org/10.1007/978-3-540-78137-0_21},
    crossref = {DBLP:conf/icfca/2008}
    }
  • M. Eaddy, A. V. Aho, G. Antoniol, and Y. Guéhéneuc, “Cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis,” in Icpc, 2008, pp. 53-62.
    [Bibtex]
    @inproceedings{conf/iwpc/EaddyAAG08,
    author = {Marc Eaddy and
    Alfred V. Aho and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {CERBERUS: Tracing Requirements to Source Code Using Information
    Retrieval, Dynamic Analysis, and Program Analysis},
    booktitle = {ICPC},
    year = {2008},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.39},
    crossref = {DBLP:conf/iwpc/2008}
    }
  • H. Boucheneb and K. Barkaoui, “Relevant timed schedules / clock valuations for constructing time petri net reachability graphs,” in Formats, 2008, pp. 265-279.
    [Bibtex]
    @inproceedings{conf/formats/BouchenebB08,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Relevant Timed Schedules / Clock Valuations for Constructing
    Time Petri Net Reachability Graphs},
    booktitle = {FORMATS},
    year = {2008},
    pages = {265-279},
    ee = {http://dx.doi.org/10.1007/978-3-540-85778-5_19},
    crossref = {DBLP:conf/formats/2008}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “High-level modeling and exploration of reconfigurable mpsocs,” in Ahs, 2008, pp. 330-337.
    [Bibtex]
    @inproceedings{conf/ahs/BeltrameFS08,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {High-Level Modeling and Exploration of Reconfigurable MPSoCs},
    booktitle = {AHS},
    year = {2008},
    pages = {330-337},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AHS.2008.15},
    crossref = {DBLP:conf/ahs/2008}
    }
  • K. Barkaoui, R. B. Ayed, H. Boucheneb, and A. Hicheur, “Verification of workflow processes under multilevel security considerations,” in Crisis, 2008, pp. 77-84.
    [Bibtex]
    @inproceedings{conf/crisis/BarkaouiABH08,
    author = {Kamel Barkaoui and
    Rahma Ben Ayed and
    Hanifa Boucheneb and
    Awatef Hicheur},
    title = {Verification of Workflow processes under multilevel security
    considerations},
    booktitle = {CRiSIS},
    year = {2008},
    pages = {77-84},
    ee = {http://dx.doi.org/10.1109/CRISIS.2008.4757466},
    crossref = {DBLP:conf/crisis/2008}
    }
  • Y. Guéhéneuc and G. Antoniol, “Demima: a multilayered approach for design pattern identification,” Ieee trans. software eng., vol. 34, iss. 5, pp. 667-684, 2008.
    [Bibtex]
    @article{journals/tse/GueheneucA08,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {DeMIMA: A Multilayered Approach for Design Pattern Identification},
    journal = {IEEE Trans. Software Eng.},
    volume = {34},
    number = {5},
    year = {2008},
    pages = {667-684},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2008.48}
    }
  • H. Boucheneb and A. Imine, “Experiments in model-checking optimistic replication algorithms,” Corr, vol. abs/0804.3023, 2008.
    [Bibtex]
    @article{journals/corr/abs-0804-3023,
    author = {Hanifa Boucheneb and
    Abdessamad Imine},
    title = {Experiments in Model-Checking Optimistic Replication Algorithms},
    journal = {CoRR},
    volume = {abs/0804.3023},
    year = {2008},
    ee = {http://arxiv.org/abs/0804.3023}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Error correcting graph matching application to software evolution,” in Wcre, 2008, pp. 289-293.
    [Bibtex]
    @inproceedings{conf/wcre/KpodjedoRGA08,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Error Correcting Graph Matching Application to Software
    Evolution},
    booktitle = {WCRE},
    year = {2008},
    pages = {289-293},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.48},
    crossref = {DBLP:conf/wcre/2008}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “Resp: a non-intrusive transaction-level reflective mpsoc simulation platform for design space exploration,” in Asp-dac, 2008, pp. 673-678.
    [Bibtex]
    @inproceedings{conf/aspdac/BeltrameBFMS08,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Luca Fossati and
    Antonio Miele and
    Donatella Sciuto},
    title = {ReSP: A non-intrusive Transaction-Level Reflective MPSoC
    Simulation Platform for design space exploration},
    booktitle = {ASP-DAC},
    year = {2008},
    pages = {673-678},
    ee = {http://dx.doi.org/10.1109/ASPDAC.2008.4484036},
    crossref = {DBLP:conf/aspdac/2008}
    }
  • H. Boucheneb, “Interval timed coloured petri net: efficient construction of its state class space preserving linear properties,” Formal asp. comput., vol. 20, iss. 2, pp. 225-238, 2008.
    [Bibtex]
    @article{journals/fac/Boucheneb08,
    author = {Hanifa Boucheneb},
    title = {Interval timed coloured Petri net: efficient construction
    of its state class space preserving linear properties},
    journal = {Formal Asp. Comput.},
    volume = {20},
    number = {2},
    year = {2008},
    pages = {225-238},
    ee = {http://dx.doi.org/10.1007/s00165-007-0050-7}
    }
  • R. Hadjidj and H. Boucheneb, “Improving state class constructions for ctl* model checking of time petri nets,” Sttt, vol. 10, iss. 2, pp. 167-184, 2008.
    [Bibtex]
    @article{journals/sttt/HadjidjB08,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {Improving state class constructions for CTL* model checking
    of time Petri nets},
    journal = {STTT},
    volume = {10},
    number = {2},
    year = {2008},
    pages = {167-184},
    ee = {http://dx.doi.org/10.1007/s10009-007-0040-3}
    }
  • B. Kenmei, G. Antoniol, and M. D. Penta, “Trend analysis and issue prediction in large-scale open source systems,” in Csmr, 2008, pp. 73-82.
    [Bibtex]
    @inproceedings{conf/csmr/KenmeiAP08,
    author = {B{\'e}n{\'e}dicte Kenmei and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Trend Analysis and Issue Prediction in Large-Scale Open
    Source Systems},
    booktitle = {CSMR},
    year = {2008},
    pages = {73-82},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493302},
    crossref = {DBLP:conf/csmr/2008}
    }
  • F. Khomh and Y. Guéhéneuc, “Do design patterns impact software quality positively?,” in Csmr, 2008, pp. 274-278.
    [Bibtex]
    @inproceedings{conf/csmr/KhomhG08,
    author = {Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Do Design Patterns Impact Software Quality Positively?},
    booktitle = {CSMR},
    year = {2008},
    pages = {274-278},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493325},
    crossref = {DBLP:conf/csmr/2008}
    }
  • M. D. Penta, L. Cerulo, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the relationships between design pattern roles and class change proneness,” in Icsm, 2008, pp. 217-226.
    [Bibtex]
    @inproceedings{conf/icsm/PentaCGA08,
    author = {Massimiliano Di Penta and
    Luigi Cerulo and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An empirical study of the relationships between design pattern
    roles and class change proneness},
    booktitle = {ICSM},
    year = {2008},
    pages = {217-226},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658070},
    crossref = {DBLP:conf/icsm/2008}
    }
  • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. Guéhéneuc, “Is it a bug or an enhancement?: a text-based approach to classify change requests,” in Cascon, 2008, p. 23.
    [Bibtex]
    @inproceedings{conf/cascon/AntoniolAPKG08,
    author = {Giuliano Antoniol and
    Kamel Ayari and
    Massimiliano Di Penta and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Is it a bug or an enhancement?: a text-based approach to
    classify change requests},
    booktitle = {CASCON},
    year = {2008},
    pages = {23},
    ee = {http://doi.acm.org/10.1145/1463788.1463819},
    crossref = {DBLP:conf/cascon/2008}
    }
  • É. Germain and P. N. Robillard, “Towards software process patterns: an empirical analysis of the behavior of student teams,” Information & software technology, vol. 50, iss. 11, pp. 1088-1097, 2008.
    [Bibtex]
    @article{journals/infsof/GermainR08,
    author = {{\'E}ric Germain and
    Pierre N. Robillard},
    title = {Towards software process patterns: An empirical analysis
    of the behavior of student teams},
    journal = {Information {\&} Software Technology},
    volume = {50},
    number = {11},
    year = {2008},
    pages = {1088-1097},
    ee = {http://dx.doi.org/10.1016/j.infsof.2007.10.018}
    }
  • H. Boucheneb and H. Rakkay, “A more efficient time petri net state space abstraction useful to model checking timed linear properties,” Fundam. inform., vol. 88, iss. 4, pp. 469-495, 2008.
    [Bibtex]
    @article{journals/fuin/BouchenebR08,
    author = {Hanifa Boucheneb and
    Hind Rakkay},
    title = {A More Efficient Time Petri Net State Space Abstraction
    Useful to Model Checking Timed Linear Properties},
    journal = {Fundam. Inform.},
    volume = {88},
    number = {4},
    year = {2008},
    pages = {469-495},
    ee = {http://iospress.metapress.com/content/b760h3603l550564/}
    }
  • S. Hardy and P. N. Robillard, “Petri net-based method for the analysis of the dynamics of signal propagation in signaling pathways,” Bioinformatics, vol. 24, iss. 2, pp. 209-217, 2008.
    [Bibtex]
    @article{journals/bioinformatics/HardyR08,
    author = {Simon Hardy and
    Pierre N. Robillard},
    title = {Petri net-based method for the analysis of the dynamics
    of signal propagation in signaling pathways},
    journal = {Bioinformatics},
    volume = {24},
    number = {2},
    year = {2008},
    pages = {209-217},
    ee = {http://dx.doi.org/10.1093/bioinformatics/btm560}
    }

2007

  • Y. Guéhéneuc, C. F. J. Lange, H. A. Sahraoui, G. Falcone, M. Lanza, C. Calero, and F. B. e Abreu, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2007, pp. 166-170.
    [Bibtex]
    @inproceedings{conf/ecoopw/GueheneucLSFLCA07,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Christian F. J. Lange and
    Houari A. Sahraoui and
    Giovanni Falcone and
    Michele Lanza and
    Coral Calero and
    Fernando Brito e Abreu},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {166-170},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_16},
    crossref = {DBLP:conf/ecoopw/2007}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “A probabilistic scheduler for the analysis of cryptographic protocols,” Electr. notes theor. comput. sci., vol. 194, iss. 1, pp. 61-83, 2007.
    [Bibtex]
    @article{journals/entcs/BrlekHM07,
    author = {Srecko Brlek and
    Sardaouna Hamadou and
    John Mullins},
    title = {A Probabilistic Scheduler for the Analysis of Cryptographic
    Protocols},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {194},
    number = {1},
    year = {2007},
    pages = {61-83},
    ee = {http://dx.doi.org/10.1016/j.entcs.2007.10.009}
    }
  • S. Fu and M. Desmarais, “Local learning algorithm for markov blanket discovery,” in Australian conference on artificial intelligence, 2007, pp. 68-79.
    [Bibtex]
    @inproceedings{conf/ausai/FuD07,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Local Learning Algorithm for Markov Blanket Discovery},
    booktitle = {Australian Conference on Artificial Intelligence},
    year = {2007},
    pages = {68-79},
    ee = {http://dx.doi.org/10.1007/978-3-540-76928-6_9},
    crossref = {DBLP:conf/ausai/2007}
    }
  • D. Boteanu, J. M. Fernandez, J. McHugh, and J. Mullins, “Queue management as a dos counter-measure?,” in Isc, 2007, pp. 263-280.
    [Bibtex]
    @inproceedings{conf/isw/BoteanuFMM07,
    author = {Daniel Boteanu and
    Jos{\'e} M. Fernandez and
    John McHugh and
    John Mullins},
    title = {Queue Management as a DoS Counter-Measure?},
    booktitle = {ISC},
    year = {2007},
    pages = {263-280},
    ee = {http://dx.doi.org/10.1007/978-3-540-75496-1_18},
    crossref = {DBLP:conf/isw/2007}
    }
  • S. Demeyer, Y. Guéhéneuc, A. Keller, C. F. J. Lange, K. Mens, A. Kuhn, and M. Kuhlemann, “Object-oriented reengineering,” in Ecoop workshops, 2007, pp. 142-153.
    [Bibtex]
    @inproceedings{conf/ecoopw/DemeyerGKLMKK07,
    author = {Serge Demeyer and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Anne Keller and
    Christian F. J. Lange and
    Kim Mens and
    Adrian Kuhn and
    Martin Kuhlemann},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {142-153},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_14},
    crossref = {DBLP:conf/ecoopw/2007}
    }
  • G. Gardey, J. Mullins, and O. H. Roux, “Non-interference control synthesis for security timed automata,” Electr. notes theor. comput. sci., vol. 180, iss. 1, pp. 35-53, 2007.
    [Bibtex]
    @article{journals/entcs/GardeyMR07,
    author = {Guillaume Gardey and
    John Mullins and
    Olivier H. Roux},
    title = {Non-Interference Control Synthesis for Security Timed Automata},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {180},
    number = {1},
    year = {2007},
    pages = {35-53},
    ee = {http://dx.doi.org/10.1016/j.entcs.2005.05.046}
    }
  • O. Gendreau and P. N. Robillard, “Knowledge conversion in software development,” in Seke, 2007, pp. 392-395.
    [Bibtex]
    @inproceedings{conf/seke/GendreauR07,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {Knowledge Conversion in Software Development},
    booktitle = {SEKE},
    year = {2007},
    pages = {392-395},
    crossref = {DBLP:conf/seke/2007}
    }
  • B. Adams, K. D. Schutter, H. Tromp, and W. D. Meuter, “The evolution of the linux build system,” Eceasst, vol. 8, 2007.
    [Bibtex]
    @article{journals/eceasst/AdamsSTM07,
    author = {Bram Adams and
    Kris De Schutter and
    Herman Tromp and
    Wolfgang De Meuter},
    title = {The Evolution of the Linux Build System},
    journal = {ECEASST},
    volume = {8},
    year = {2007},
    ee = {http://eceasst.cs.tu-berlin.de/index.php/eceasst/article/view/115}
    }
  • P. N. Robillard, P. d’Astous, F. Détienne, and W. Visser, “Measuring cognitive activities in software engineering,” Corr, vol. abs/cs/0702001, 2007.
    [Bibtex]
    @article{journals/corr/abs-cs-0702001,
    author = {Pierre N. Robillard and
    Patrick d'Astous and
    Fran\c{c}oise D{\'e}tienne and
    Willemien Visser},
    title = {Measuring Cognitive Activities in Software Engineering},
    journal = {CoRR},
    volume = {abs/cs/0702001},
    year = {2007},
    ee = {http://arxiv.org/abs/cs/0702001}
    }
  • J. Migneault, J. Robert, M. C. Desmarais, and S. Caron, “Comparing voice with touch screen for controlling the instructor’s operating station of a flight simulator,” in Smc, 2007, pp. 3662-3667.
    [Bibtex]
    @inproceedings{conf/smc/MigneaultRDC07,
    author = {Jo{\"e}l Migneault and
    Jean-Marc Robert and
    Michel C. Desmarais and
    Sylvain Caron},
    title = {Comparing voice with touch screen for controlling the instructor's
    operating station of a flight simulator},
    booktitle = {SMC},
    year = {2007},
    pages = {3662-3667},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414002},
    crossref = {DBLP:conf/smc/2007}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “A formalization of global simulation models for continuous/discrete systems,” in Scsc, 2007, pp. 559-566.
    [Bibtex]
    @inproceedings{conf/scsc/GheorgheBNB07,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {A formalization of global simulation models for continuous/discrete
    systems},
    booktitle = {SCSC},
    year = {2007},
    pages = {559-566},
    ee = {http://doi.acm.org/10.1145/1357910.1357998},
    crossref = {DBLP:conf/scsc/2007}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Gesture-based interactions with virtually embodied wearable computer software processes competing for user attention,” in Smc, 2007, pp. 2533-2538.
    [Bibtex]
    @inproceedings{conf/smc/PlouznikoffPDR07,
    author = {Nicolas Plouznikoff and
    Alexandre Plouznikoff and
    Michel Desmarais and
    Jean-Marc Robert},
    title = {Gesture-based interactions with virtually embodied wearable
    computer software processes competing for user attention},
    booktitle = {SMC},
    year = {2007},
    pages = {2533-2538},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414047},
    crossref = {DBLP:conf/smc/2007}
    }
  • G. Antoniol and M. Ceccarelli, “Microarray image gridding with stochastic search based approaches,” Image vision comput., vol. 25, iss. 2, pp. 155-163, 2007.
    [Bibtex]
    @article{journals/ivc/AntoniolC07,
    author = {Giuliano Antoniol and
    Michele Ceccarelli},
    title = {Microarray image gridding with stochastic search based approaches},
    journal = {Image Vision Comput.},
    volume = {25},
    number = {2},
    year = {2007},
    pages = {155-163},
    ee = {http://dx.doi.org/10.1016/j.imavis.2006.01.023}
    }
  • Y. Guéhéneuc, “Ptidej: a flexible reverse engineering tool suite,” in Icsm, 2007, pp. 529-530.
    [Bibtex]
    @inproceedings{conf/icsm/Gueheneuc07,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Ptidej: A Flexible Reverse Engineering Tool Suite},
    booktitle = {ICSM},
    year = {2007},
    pages = {529-530},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362684},
    crossref = {DBLP:conf/icsm/2007}
    }
  • A. Ouardani, S. Pierre, and H. Boucheneb, “A security protocol for mobile agents based upon the cooperation of sedentary agents,” J. network and computer applications, vol. 30, iss. 3, pp. 1228-1243, 2007.
    [Bibtex]
    @article{journals/jnca/OuardaniPB07,
    author = {Abdelhamid Ouardani and
    Samuel Pierre and
    Hanifa Boucheneb},
    title = {A security protocol for mobile agents based upon the cooperation
    of sedentary agents},
    journal = {J. Network and Computer Applications},
    volume = {30},
    number = {3},
    year = {2007},
    pages = {1228-1243},
    ee = {http://dx.doi.org/10.1016/j.jnca.2006.04.008}
    }
  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Makao,” in Icsm, 2007, pp. 517-518.
    [Bibtex]
    @inproceedings{conf/icsm/AdamsTSM07a,
    author = {Bram Adams and
    Herman Tromp and
    Kris De Schutter and
    Wolfgang De Meuter},
    title = {MAKAO},
    booktitle = {ICSM},
    year = {2007},
    pages = {517-518},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362678},
    crossref = {DBLP:conf/icsm/2007}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Sql-injection security evolution analysis in php,” in Wse, 2007, pp. 45-49.
    [Bibtex]
    @inproceedings{conf/wse/MerloLA07,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {SQL-Injection Security Evolution Analysis in PHP},
    booktitle = {WSE},
    year = {2007},
    pages = {45-49},
    ee = {http://dx.doi.org/10.1109/WSE.2007.4380243},
    crossref = {DBLP:conf/wse/2007}
    }
  • D. Poshyvanyk, Y. Guéhéneuc, A. Marcus, G. Antoniol, and V. Rajlich, “Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval,” Ieee trans. software eng., vol. 33, iss. 6, pp. 420-432, 2007.
    [Bibtex]
    @article{journals/tse/PoshyvanykGMAR07,
    author = {Denys Poshyvanyk and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Andrian Marcus and
    Giuliano Antoniol and
    V{\'a}clav Rajlich},
    title = {Feature Location Using Probabilistic Ranking of Methods
    Based on Execution Scenarios and Information Retrieval},
    journal = {IEEE Trans. Software Eng.},
    volume = {33},
    number = {6},
    year = {2007},
    pages = {420-432},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2007.1016}
    }
  • B. Adams and K. D. Schutter, “An aspect for idiom-based exception handling: (using local continuation join points, join point properties, annotations and type parameters),” in Splat, 2007, p. 1.
    [Bibtex]
    @inproceedings{conf/aosd/AdamsS07,
    author = {Bram Adams and
    Kris De Schutter},
    title = {An aspect for idiom-based exception handling: (using local
    continuation join points, join point properties, annotations
    and type parameters)},
    booktitle = {SPLAT},
    year = {2007},
    pages = {1},
    ee = {http://doi.acm.org/10.1145/1233843.1233844},
    crossref = {DBLP:conf/aosd/2007splat}
    }
  • H. Boucheneb and H. Rakkay, “A more efficient time petri net state space abstraction preserving linear properties,” in Acsd, 2007, pp. 61-70.
    [Bibtex]
    @inproceedings{conf/acsd/BouchenebR07,
    author = {Hanifa Boucheneb and
    Hind Rakkay},
    title = {A more efficient time Petri net state space abstraction
    preserving linear properties},
    booktitle = {ACSD},
    year = {2007},
    pages = {61-70},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2007.41},
    crossref = {DBLP:conf/acsd/2007}
    }
  • J. Mullins and R. Oarga, “Model checking of extended ocl constraints on uml models in socle,” in Fmoods, 2007, pp. 59-75.
    [Bibtex]
    @inproceedings{conf/fmoods/MullinsO07,
    author = {John Mullins and
    Raveca Oarga},
    title = {Model Checking of Extended OCL Constraints on UML Models
    in SOCLe},
    booktitle = {FMOODS},
    year = {2007},
    pages = {59-75},
    ee = {http://dx.doi.org/10.1007/978-3-540-72952-5_4},
    crossref = {DBLP:conf/fmoods/2007}
    }
  • M. D. Penta, M. Harman, G. Antoniol, and F. Qureshi, “The effect of communication overhead on software maintenance project staffing: a search-based approach,” in Icsm, 2007, pp. 315-324.
    [Bibtex]
    @inproceedings{conf/icsm/PentaHAQ07,
    author = {Massimiliano Di Penta and
    Mark Harman and
    Giuliano Antoniol and
    Fahim Qureshi},
    title = {The Effect of Communication Overhead on Software Maintenance
    Project Staffing: a Search-Based Approach},
    booktitle = {ICSM},
    year = {2007},
    pages = {315-324},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362644},
    crossref = {DBLP:conf/icsm/2007}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “A framework for reliability assessment and enhancement in multi-processor systems-on-chip,” in Dft, 2007, pp. 132-141.
    [Bibtex]
    @inproceedings{conf/dft/BeltrameBFMS07,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Luca Fossati and
    Antonio Miele and
    Donatella Sciuto},
    title = {A Framework for Reliability Assessment and Enhancement in
    Multi-Processor Systems-On-Chip},
    booktitle = {DFT},
    year = {2007},
    pages = {132-141},
    ee = {http://doi.ieeecomputersociety.org/10.1109/DFT.2007.35},
    crossref = {DBLP:conf/dft/2007}
    }
  • S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, “Comparison and evaluation of clone detection tools,” Ieee trans. software eng., vol. 33, iss. 9, pp. 577-591, 2007.
    [Bibtex]
    @article{journals/tse/BellonKAKM07,
    author = {Stefan Bellon and
    Rainer Koschke and
    Giuliano Antoniol and
    Jens Krinke and
    Ettore Merlo},
    title = {Comparison and Evaluation of Clone Detection Tools},
    journal = {IEEE Trans. Software Eng.},
    volume = {33},
    number = {9},
    year = {2007},
    pages = {577-591},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2007.70725}
    }
  • R. Oliveto, G. Antoniol, A. Marcus, and J. H. Hayes, “Software artefact traceability: the never-ending challenge,” in Icsm, 2007, pp. 485-488.
    [Bibtex]
    @inproceedings{conf/icsm/OlivetoAMH07,
    author = {Rocco Oliveto and
    Giuliano Antoniol and
    Andrian Marcus and
    Jane Huffman Hayes},
    title = {Software Artefact Traceability: the Never-Ending Challenge},
    booktitle = {ICSM},
    year = {2007},
    pages = {485-488},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362664},
    crossref = {DBLP:conf/icsm/2007}
    }
  • F. Lemieux and M. C. Desmarais, “Conception centrée sur l’utilisateur lors de la définition des exigences en rup\copyright. une étude de cas,” Ingénierie des systèmes d’information, vol. 12, iss. 6, pp. 9-37, 2007.
    [Bibtex]
    @article{journals/isi/LemieuxD07,
    author = {Fran\c{c}ois Lemieux and
    Michel C. Desmarais},
    title = {Conception centr{\'e}e sur l'utilisateur lors de la d{\'e}finition
    des exigences en RUP{\copyright}. Une {\'e}tude de cas},
    journal = {Ing{\'e}nierie des Syst{\`e}mes d'Information},
    volume = {12},
    number = {6},
    year = {2007},
    pages = {9-37},
    ee = {http://dx.doi.org/10.3166/isi.12.6.9-37}
    }
  • S. Hardy and P. N. Robillard, “Visualization of the simulation data of biochemical network models: a painted petri net approach,” in Scsc, 2007, pp. 802-808.
    [Bibtex]
    @inproceedings{conf/scsc/HardyR07,
    author = {Simon Hardy and
    Pierre N. Robillard},
    title = {Visualization of the simulation data of biochemical network
    models: a painted Petri net approach},
    booktitle = {SCSC},
    year = {2007},
    pages = {802-808},
    ee = {http://doi.acm.org/10.1145/1357910.1358033},
    crossref = {DBLP:conf/scsc/2007}
    }
  • N. Moha and Y. Guéhéneuc, “P<scp>tidej</scp> and d<scp>ecor</scp>: identification of design patterns and design defects,” in Oopsla companion, 2007, pp. 868-869.
    [Bibtex]
    @inproceedings{conf/oopsla/MohaG07,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {P{\&}lt;scp{\&}gt;TIDEJ{\&}lt;/scp{\&}gt; and D{\&}lt;scp{\&}gt;ECOR{\&}lt;/scp{\&}gt;:
    identification of design patterns and design defects},
    booktitle = {OOPSLA Companion},
    year = {2007},
    pages = {868-869},
    ee = {http://doi.acm.org/10.1145/1297846.1297930},
    crossref = {DBLP:conf/oopsla/2007c}
    }
  • K. D. Schutter and B. Adams, “Aspect-orientation for revitalising legacy business software,” Electr. notes theor. comput. sci., vol. 166, pp. 63-80, 2007.
    [Bibtex]
    @article{journals/entcs/SchutterA07,
    author = {Kris De Schutter and
    Bram Adams},
    title = {Aspect-orientation For Revitalising Legacy Business Software},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {166},
    year = {2007},
    pages = {63-80},
    ee = {http://dx.doi.org/10.1016/j.entcs.2006.08.002}
    }
  • G. Antoniol, “Requiem for software evolution research: a few steps toward the creative age,” in Iwpse, 2007, pp. 1-3.
    [Bibtex]
    @inproceedings{conf/iwpse/Antoniol07,
    author = {Giuliano Antoniol},
    title = {Requiem for software evolution research: a few steps toward
    the creative age},
    booktitle = {IWPSE},
    year = {2007},
    pages = {1-3},
    ee = {http://doi.acm.org/10.1145/1294948.1294950},
    crossref = {DBLP:conf/iwpse/2007}
    }
  • M. Gagnon, “Ontology-based integration of data sources,” in Fusion, 2007, pp. 1-8.
    [Bibtex]
    @inproceedings{conf/fusion/Gagnon07,
    author = {Michel Gagnon},
    title = {Ontology-based integration of data sources},
    booktitle = {FUSION},
    year = {2007},
    pages = {1-8},
    ee = {http://dx.doi.org/10.1109/ICIF.2007.4408086},
    crossref = {DBLP:conf/fusion/2007}
    }
  • N. Moha and Y. Guéhéneuc, “Decor: a tool for the detection of design defects,” in Ase, 2007, pp. 527-528.
    [Bibtex]
    @inproceedings{conf/kbse/MohaG07,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Decor: a tool for the detection of design defects},
    booktitle = {ASE},
    year = {2007},
    pages = {527-528},
    ee = {http://doi.acm.org/10.1145/1321631.1321727},
    crossref = {DBLP:conf/kbse/2007}
    }
  • G. Beltrame, D. Sciuto, and C. Silvano, “Multi-accuracy power and performance transaction-level modeling,” Ieee trans. on cad of integrated circuits and systems, vol. 26, iss. 10, pp. 1830-1842, 2007.
    [Bibtex]
    @article{journals/tcad/BeltrameSS07,
    author = {Giovanni Beltrame and
    Donatella Sciuto and
    Cristina Silvano},
    title = {Multi-Accuracy Power and Performance Transaction-Level Modeling},
    journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
    volume = {26},
    number = {10},
    year = {2007},
    pages = {1830-1842},
    ee = {http://dx.doi.org/10.1109/TCAD.2007.895790}
    }
  • T. Rafla, P. N. Robillard, and M. Desmarais, “A method to elicit architecturally sensitive usability requirements: its integration into a software development process,” Software quality journal, vol. 15, iss. 2, pp. 117-133, 2007.
    [Bibtex]
    @article{journals/sqj/RaflaRD07,
    author = {Tamer Rafla and
    Pierre N. Robillard and
    Michel Desmarais},
    title = {A method to elicit architecturally sensitive usability requirements:
    its integration into a software development process},
    journal = {Software Quality Journal},
    volume = {15},
    number = {2},
    year = {2007},
    pages = {117-133},
    ee = {http://dx.doi.org/10.1007/s11219-006-9009-9}
    }
  • K. Ayari, S. Bouktif, and G. Antoniol, “Automatic mutation test input data generation via ant colony,” in Gecco, 2007, pp. 1074-1081.
    [Bibtex]
    @inproceedings{conf/gecco/AyariBA07,
    author = {Kamel Ayari and
    Salah Bouktif and
    Giuliano Antoniol},
    title = {Automatic mutation test input data generation via ant colony},
    booktitle = {GECCO},
    year = {2007},
    pages = {1074-1081},
    ee = {http://doi.acm.org/10.1145/1276958.1277172},
    crossref = {DBLP:conf/gecco/2007}
    }
  • K. Ayari, P. Meshkinfam, G. Antoniol, and M. D. Penta, “Threats on building models from cvs and bugzilla repositories: the mozilla case study,” in Cascon, 2007, pp. 215-228.
    [Bibtex]
    @inproceedings{conf/cascon/AyariMAP07,
    author = {Kamel Ayari and
    Peyman Meshkinfam and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Threats on building models from CVS and Bugzilla repositories:
    the Mozilla case study},
    booktitle = {CASCON},
    year = {2007},
    pages = {215-228},
    ee = {http://doi.acm.org/10.1145/1321211.1321234},
    crossref = {DBLP:conf/cascon/2007}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Automated protection of php applications against sql-injection attacks,” in Csmr, 2007, pp. 191-202.
    [Bibtex]
    @inproceedings{conf/csmr/MerloLA07,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {Automated Protection of PHP Applications Against SQL-injection
    Attacks},
    booktitle = {CSMR},
    year = {2007},
    pages = {191-202},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.16},
    crossref = {DBLP:conf/csmr/2007}
    }
  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Design recovery and maintenance of build systems,” in Icsm, 2007, pp. 114-123.
    [Bibtex]
    @inproceedings{conf/icsm/AdamsTSM07,
    author = {Bram Adams and
    Herman Tromp and
    Kris De Schutter and
    Wolfgang De Meuter},
    title = {Design recovery and maintenance of build systems},
    booktitle = {ICSM},
    year = {2007},
    pages = {114-123},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362624},
    crossref = {DBLP:conf/icsm/2007}
    }
  • G. Antoniol, Y. Guéhéneuc, E. Merlo, and P. Tonella, “Mining the lexicon used by programmers during sofware evolution,” in Icsm, 2007, pp. 14-23.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolGMT07,
    author = {Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Ettore Merlo and
    Paolo Tonella},
    title = {Mining the Lexicon Used by Programmers during Sofware Evolution},
    booktitle = {ICSM},
    year = {2007},
    pages = {14-23},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362614},
    crossref = {DBLP:conf/icsm/2007}
    }

2006

  • Y. Guéhéneuc, K. Mens, and R. Wuyts, “A comparative framework for design recovery tools,” in Csmr, 2006, pp. 123-134.
    [Bibtex]
    @inproceedings{conf/csmr/GueheneucMW06,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Kim Mens and
    Roel Wuyts},
    title = {A Comparative Framework for Design Recovery Tools},
    booktitle = {CSMR},
    year = {2006},
    pages = {123-134},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.1},
    crossref = {DBLP:conf/csmr/2006}
    }
  • A. Walenstein, R. Koschke, and E. Merlo, “06301 summary — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/WalensteinKM06,
    author = {Andrew Walenstein and
    Rainer Koschke and
    Ettore Merlo},
    title = {06301 Summary -- Duplication, Redundancy, and Similarity
    in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/971},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • G. Antoniol and Y. Guéhéneuc, “Feature identification: an epidemiological metaphor,” Ieee trans. software eng., vol. 32, iss. 9, pp. 627-641, 2006.
    [Bibtex]
    @article{journals/tse/AntoniolG06,
    author = {Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Feature Identification: An Epidemiological Metaphor},
    journal = {IEEE Trans. Software Eng.},
    volume = {32},
    number = {9},
    year = {2006},
    pages = {627-641},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TSE.2006.88}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, D. Lyonnard, and C. Pilkington, “Exploiting tlm and object introspection for system-level simulation,” in Date, 2006, pp. 100-105.
    [Bibtex]
    @inproceedings{conf/date/BeltrameSSLP06,
    author = {Giovanni Beltrame and
    Donatella Sciuto and
    Cristina Silvano and
    Damien Lyonnard and
    Chuck Pilkington},
    title = {Exploiting TLM and object introspection for system-level
    simulation},
    booktitle = {DATE},
    year = {2006},
    pages = {100-105},
    ee = {http://doi.acm.org/10.1145/1131515},
    crossref = {DBLP:conf/date/2006p}
    }
  • M. Dulipovici and P. N. Robillard, “Vector-based method for measuring and comparing software requirements implementation,” in Acst, 2006, pp. 292-297.
    [Bibtex]
    @inproceedings{conf/acst/DulipoviciR06,
    author = {Mihaela Dulipovici and
    Pierre N. Robillard},
    title = {Vector-based method for measuring and comparing software
    requirements implementation},
    booktitle = {ACST},
    year = {2006},
    pages = {292-297},
    crossref = {DBLP:conf/acst/2006}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, P. G. Paulin, and E. Bensoudane, “An application mapping methodology and case study for multi-processor on-chip architectures,” in Vlsi-soc, 2006, pp. 146-151.
    [Bibtex]
    @inproceedings{conf/vlsi/BeltrameSSPB06,
    author = {Giovanni Beltrame and
    Donatella Sciuto and
    Cristina Silvano and
    Pierre G. Paulin and
    Essaid Bensoudane},
    title = {An Application Mapping Methodology and Case Study for Multi-Processor
    On-Chip Architectures},
    booktitle = {VLSI-SoC},
    year = {2006},
    pages = {146-151},
    ee = {http://dx.doi.org/10.1109/VLSISOC.2006.313219},
    crossref = {DBLP:conf/vlsi/2006soc}
    }
  • S. Bouktif, G. Antoniol, and E. Merlo, “A feedback based quality assessment to support open source software evolution: the grass case study,” in Icsm, 2006, pp. 155-165.
    [Bibtex]
    @inproceedings{conf/icsm/BouktifAM06,
    author = {Salah Bouktif and
    Giuliano Antoniol and
    Ettore Merlo},
    title = {A Feedback Based Quality Assessment to Support Open Source
    Software Evolution: the GRASS Case Study},
    booktitle = {ICSM},
    year = {2006},
    pages = {155-165},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2006.5},
    crossref = {DBLP:conf/icsm/2006}
    }
  • L. Lepanto, G. Paré, D. Aubry, P. N. Robillard, and J. Lesage, “Impact of pacs on dictation turnaround time and productivity,” J. digital imaging, vol. 19, iss. 1, pp. 92-97, 2006.
    [Bibtex]
    @article{journals/jdi/LepantoPARL06,
    author = {Luigi Lepanto and
    Guy Par{\'e} and
    David Aubry and
    Pierre N. Robillard and
    Jacques Lesage},
    title = {Impact of PACS on Dictation Turnaround Time and Productivity},
    journal = {J. Digital Imaging},
    volume = {19},
    number = {1},
    year = {2006},
    pages = {92-97},
    ee = {http://dx.doi.org/10.1007/s10278-005-9245-8}
    }
  • M. Desmarais, P. Meshkinfam, and M. Gagnon, “Learned student models with item to item knowledge structures,” User model. user-adapt. interact., vol. 16, iss. 5, pp. 403-434, 2006.
    [Bibtex]
    @article{journals/umuai/DesmaraisMG06,
    author = {Michel Desmarais and
    Peyman Meshkinfam and
    Michel Gagnon},
    title = {Learned student models with item to item knowledge structures},
    journal = {User Model. User-Adapt. Interact.},
    volume = {16},
    number = {5},
    year = {2006},
    pages = {403-434},
    ee = {http://dx.doi.org/10.1007/s11257-006-9016-3}
    }
  • K. D. Schutter and B. Adams, “Face-off: aop+lmp vs. legacy software,” in Aspects for legacy applications, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/SchutterA06,
    author = {Kris De Schutter and
    Bram Adams},
    title = {Face-off: AOP+LMP vs. legacy software},
    booktitle = {Aspects For Legacy Applications},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/888},
    crossref = {DBLP:conf/dagstuhl/2006P6302}
    }
  • M. Gagnon and L. D. Sylva, “Text compression by syntactic pruning,” in Canadian conference on ai, 2006, pp. 312-323.
    [Bibtex]
    @inproceedings{conf/ai/GagnonS06,
    author = {Michel Gagnon and
    Lyne Da Sylva},
    title = {Text Compression by Syntactic Pruning},
    booktitle = {Canadian Conference on AI},
    year = {2006},
    pages = {312-323},
    ee = {http://dx.doi.org/10.1007/11766247_27},
    crossref = {DBLP:conf/ai/2006}
    }
  • H. Boucheneb and R. Hadjidj, “\it CTL$^{\mbox{*}}$ model checking for time petri nets,” Theor. comput. sci., vol. 353, iss. 1-3, pp. 208-227, 2006.
    [Bibtex]
    @article{journals/tcs/BouchenebH06,
    author = {Hanifa Boucheneb and
    Rachid Hadjidj},
    title = {{\it CTL}$^{\mbox{*}}$ model checking for time Petri nets},
    journal = {Theor. Comput. Sci.},
    volume = {353},
    number = {1-3},
    year = {2006},
    pages = {208-227},
    ee = {http://dx.doi.org/10.1016/j.tcs.2005.11.002}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Scenario-driven dynamic analysis for comprehending large software systems,” in Csmr, 2006, pp. 71-80.
    [Bibtex]
    @inproceedings{conf/csmr/SalahMAP06,
    author = {Maher Salah and
    Spiros Mancoridis and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Scenario-Driven Dynamic Analysis for Comprehending Large
    Software Systems},
    booktitle = {CSMR},
    year = {2006},
    pages = {71-80},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.47},
    crossref = {DBLP:conf/csmr/2006}
    }
  • E. Merlo, “Detection of plagiarism in university projects using metrics-based spectral similarity,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/Merlo06,
    author = {Ettore Merlo},
    title = {Detection of Plagiarism in University Projects Using Metrics-based
    Spectral Similarity},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/986},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “A flaw in the electronic commerce protocol set,” Inf. process. lett., vol. 97, iss. 3, pp. 104-108, 2006.
    [Bibtex]
    @article{journals/ipl/BrlekHM06,
    author = {Srecko Brlek and
    Sardaouna Hamadou and
    John Mullins},
    title = {A flaw in the electronic commerce protocol SET},
    journal = {Inf. Process. Lett.},
    volume = {97},
    number = {3},
    year = {2006},
    pages = {104-108},
    ee = {http://dx.doi.org/10.1016/j.ipl.2005.10.002}
    }
  • R. Hadjidj and H. Boucheneb, “On-the-fly tctl model checking for time petri nets using state class graphs,” in Acsd, 2006, pp. 111-122.
    [Bibtex]
    @inproceedings{conf/acsd/HadjidjB06,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {On-the-fly TCTL model checking for Time Petri Nets using
    state class graphs},
    booktitle = {ACSD},
    year = {2006},
    pages = {111-122},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2006.18},
    crossref = {DBLP:conf/acsd/2006}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Support mobile à la tâche: médiation utilisateur – monde réel par l’intermédiaire d’un ordinateur porté,” in Ihm, 2006, pp. 107-114.
    [Bibtex]
    @inproceedings{conf/ihm/PlouznikoffPDR06,
    author = {Nicolas Plouznikoff and
    Alexandre Plouznikoff and
    Michel Desmarais and
    Jean-Marc Robert},
    title = {Support mobile {\`a} la t{\^a}che: m{\'e}diation
    utilisateur - monde r{\'e}el par l'interm{\'e}diaire
    d'un ordinateur port{\'e}},
    booktitle = {IHM},
    year = {2006},
    pages = {107-114},
    ee = {http://doi.acm.org/10.1145/1132736.1132750},
    crossref = {DBLP:conf/ihm/2006}
    }
  • T. Rafla, P. N. Robillard, and M. Desmarais, “Investigating the impact of usability on software architecture through scenarios: a case study on web systems,” Journal of systems and software, vol. 79, iss. 3, pp. 415-426, 2006.
    [Bibtex]
    @article{journals/jss/RaflaRD06,
    author = {Tamer Rafla and
    Pierre N. Robillard and
    Michel Desmarais},
    title = {Investigating the impact of usability on software architecture
    through scenarios: A case study on Web systems},
    journal = {Journal of Systems and Software},
    volume = {79},
    number = {3},
    year = {2006},
    pages = {415-426},
    ee = {http://dx.doi.org/10.1016/j.jss.2005.10.014}
    }
  • S. Galice, M. Minier, J. Mullins, and S. Ubéda, “Cryptographic protocol to establish trusted history of interactions,” in Esas, 2006, pp. 136-149.
    [Bibtex]
    @inproceedings{conf/esas/GaliceMMU06,
    author = {Samuel Galice and
    Marine Minier and
    John Mullins and
    St{\'e}phane Ub{\'e}da},
    title = {Cryptographic Protocol to Establish Trusted History of Interactions},
    booktitle = {ESAS},
    year = {2006},
    pages = {136-149},
    ee = {http://dx.doi.org/10.1007/11964254_13},
    crossref = {DBLP:conf/esas/2006}
    }
  • H. Boucheneb and R. Hadjidj, “Using inclusion abstraction to construct atomic state class graphs for time petri nets,” Ijes, vol. 2, iss. 1/2, pp. 128-139, 2006.
    [Bibtex]
    @article{journals/ijes/BouchenebH06,
    author = {Hanifa Boucheneb and
    Rachid Hadjidj},
    title = {Using inclusion abstraction to construct Atomic State Class
    Graphs for Time Petri Nets},
    journal = {IJES},
    volume = {2},
    number = {1/2},
    year = {2006},
    pages = {128-139},
    ee = {http://dx.doi.org/10.1504/IJES.2006.010171}
    }
  • N. Moha, J. Rezgui, Y. Guéhéneuc, P. Valtchev, and G. El-Boussaidi, “Using fca to suggest refactorings to correct design defects,” in Cla, 2006, pp. 269-275.
    [Bibtex]
    @inproceedings{conf/cla/MohaRGVE06,
    author = {Naouel Moha and
    Jihene Rezgui and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Petko Valtchev and
    Ghizlane El-Boussaidi},
    title = {Using FCA to Suggest Refactorings to Correct Design Defects},
    booktitle = {CLA},
    year = {2006},
    pages = {269-275},
    ee = {http://dx.doi.org/10.1007/978-3-540-78921-5_20},
    crossref = {DBLP:conf/cla/2006}
    }
  • S. Bouktif, Y. Guéhéneuc, and G. Antoniol, “Extracting change-patterns from cvs repositories,” in Wcre, 2006, pp. 221-230.
    [Bibtex]
    @inproceedings{conf/wcre/BouktifGA06,
    author = {Salah Bouktif and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Extracting Change-patterns from CVS Repositories},
    booktitle = {WCRE},
    year = {2006},
    pages = {221-230},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.27},
    crossref = {DBLP:conf/wcre/2006}
    }
  • A. Plouznikoff, N. Plouznikoff, J. Robert, and M. Desmarais, “Enhancing human-machine interactions: virtual interface alteration through wearable computers,” in Chi, 2006, pp. 373-376.
    [Bibtex]
    @inproceedings{conf/chi/PlouznikoffPRD06,
    author = {Alexandre Plouznikoff and
    Nicolas Plouznikoff and
    Jean-Marc Robert and
    Michel Desmarais},
    title = {Enhancing human-machine interactions: virtual interface
    alteration through wearable computers},
    booktitle = {CHI},
    year = {2006},
    pages = {373-376},
    ee = {http://doi.acm.org/10.1145/1124772.1124828},
    crossref = {DBLP:conf/chi/2006}
    }
  • A. Jodoin, R. L’Archevêque, P. Allard, M. Desmarais, and L. Granger, “Un environnement de développement dynamique qui intègre des composants graphiques actifs,” in Ihm, 2006, pp. 293-294.
    [Bibtex]
    @inproceedings{conf/ihm/JodoinLADG06,
    author = {Andr{\'e} Jodoin and
    R{\'e}gent L'Archev{\^e}que and
    Pierre Allard and
    Michel Desmarais and
    Louis Granger},
    title = {Un environnement de d{\'e}veloppement dynamique qui int{\`e}gre
    des composants graphiques actifs},
    booktitle = {IHM},
    year = {2006},
    pages = {293-294},
    ee = {http://doi.acm.org/10.1145/1132736.1132789},
    crossref = {DBLP:conf/ihm/2006}
    }
  • A. Walenstein, J. R. Cordy, W. S. Evans, A. E. Hassan, T. Kamiya, C. Kapser, and E. Merlo, “06301 working session summary: presentation and visualization of redundant code,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/WalensteinCEHKKM06,
    author = {Andrew Walenstein and
    James R. Cordy and
    William S. Evans and
    Ahmed E. Hassan and
    Toshihiro Kamiya and
    Cory Kapser and
    Ettore Merlo},
    title = {06301 Working Session Summary: Presentation and Visualization
    of Redundant Code},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/966},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • S. Bouktif, G. Antoniol, E. Merlo, and M. Neteler, “A novel approach to optimize clone refactoring activity,” in Gecco, 2006, pp. 1885-1892.
    [Bibtex]
    @inproceedings{conf/gecco/BouktifAMN06,
    author = {Salah Bouktif and
    Giuliano Antoniol and
    Ettore Merlo and
    Markus Neteler},
    title = {A novel approach to optimize clone refactoring activity},
    booktitle = {GECCO},
    year = {2006},
    pages = {1885-1892},
    ee = {http://doi.acm.org/10.1145/1143997.1144312},
    crossref = {DBLP:conf/gecco/2006}
    }
  • R. Wuyts, S. Demeyer, Y. Guéhéneuc, K. Mens, and S. Ducasse, “Object-oriented reengineering,” in Ecoop workshops, 2006, pp. 69-71.
    [Bibtex]
    @inproceedings{conf/ecoopw/WuytsDGMD06,
    author = {Roel Wuyts and
    Serge Demeyer and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Kim Mens and
    St{\'e}phane Ducasse},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {69-71},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_8},
    crossref = {DBLP:conf/ecoopw/2006}
    }
  • G. Antoniol, J. Krinke, and P. Tonella, “Special issue on source code analysis and manipulation,” Sci. comput. program., vol. 62, iss. 3, pp. 205-208, 2006.
    [Bibtex]
    @article{journals/scp/AntoniolKT06,
    author = {Giuliano Antoniol and
    Jens Krinke and
    Paolo Tonella},
    title = {Special issue on Source code analysis and manipulation},
    journal = {Sci. Comput. Program.},
    volume = {62},
    number = {3},
    year = {2006},
    pages = {205-208},
    ee = {http://dx.doi.org/10.1016/j.scico.2006.04.009}
    }
  • N. Moha, D. -L. Huynh, and Y. Guéhéneuc, “Une taxonomie et un métamodèle pour la détection des défauts de conception,” in Lmo, 2006, pp. 201-216.
    [Bibtex]
    @inproceedings{conf/lmo/MohaHG06,
    author = {Naouel Moha and
    D.-L. Huynh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Une taxonomie et un m{\'e}tamod{\`e}le pour la d{\'e}tection
    des d{\'e}fauts de conception},
    booktitle = {LMO},
    year = {2006},
    pages = {201-216},
    crossref = {DBLP:conf/lmo/2006}
    }
  • H. Rakkay and H. Boucheneb, “Timed secure colored petri net based analysis of information flow,” Annales des télécommunications, vol. 61, iss. 11-12, pp. 1314-1346, 2006.
    [Bibtex]
    @article{journals/adt/RakkayB06,
    author = {Hind Rakkay and
    Hanifa Boucheneb},
    title = {Timed secure colored Petri net based analysis of information
    flow},
    journal = {Annales des T{\'e}l{\'e}communications},
    volume = {61},
    number = {11-12},
    year = {2006},
    pages = {1314-1346},
    ee = {http://dx.doi.org/10.1007/BF03219899}
    }
  • G. Beltrame, D. Bruschi, D. Sciuto, and C. Silvano, “Decision-theoretic exploration of multiprocessor platforms,” in Codes+isss, 2006, pp. 205-210.
    [Bibtex]
    @inproceedings{conf/codes/BeltrameBSS06,
    author = {Giovanni Beltrame and
    Dario Bruschi and
    Donatella Sciuto and
    Cristina Silvano},
    title = {Decision-theoretic exploration of multiProcessor platforms},
    booktitle = {CODES+ISSS},
    year = {2006},
    pages = {205-210},
    ee = {http://doi.acm.org/10.1145/1176254.1176305},
    crossref = {DBLP:conf/codes/2006}
    }
  • M. Desmarais and M. Gagnon, “Bayesian student models based on item to item knowledge structures,” in Ec-tel, 2006, pp. 111-124.
    [Bibtex]
    @inproceedings{conf/ectel/DesmaraisG06,
    author = {Michel Desmarais and
    Michel Gagnon},
    title = {Bayesian Student Models Based on Item to Item Knowledge
    Structures},
    booktitle = {EC-TEL},
    year = {2006},
    pages = {111-124},
    ee = {http://dx.doi.org/10.1007/11876663_11},
    crossref = {DBLP:conf/ectel/2006}
    }
  • P. d’Astous, F. Détienne, W. Visser, and P. N. Robillard, “Changing our view on design evaluation meetings methodology: a study of software technical review meetings,” Corr, vol. abs/cs/0611153, 2006.
    [Bibtex]
    @article{journals/corr/abs-cs-0611153,
    author = {Patrick d'Astous and
    Fran\c{c}oise D{\'e}tienne and
    Willemien Visser and
    Pierre N. Robillard},
    title = {Changing our view on design evaluation meetings methodology:
    a study of software technical review meetings},
    journal = {CoRR},
    volume = {abs/cs/0611153},
    year = {2006},
    ee = {http://arxiv.org/abs/cs/0611153}
    }
  • M. Gagnon, E. M. P. de Coelho, and R. A. Finger, “Towards a formalization of tense and aspect for the generation of portuguese sentences,” in Propor, 2006, pp. 229-232.
    [Bibtex]
    @inproceedings{conf/propor/GagnonCF06,
    author = {Michel Gagnon and
    Eliana de Mattos Pinto Coelho and
    Roger Antonio Finger},
    title = {Towards a Formalization of Tense and Aspect for the Generation
    of Portuguese Sentences},
    booktitle = {PROPOR},
    year = {2006},
    pages = {229-232},
    ee = {http://dx.doi.org/10.1007/11751984_28},
    crossref = {DBLP:conf/propor/2006}
    }
  • N. Moha, Y. Guéhéneuc, and P. Leduc, “Automatic generation of detection algorithms for design defects,” in Ase, 2006, pp. 297-300.
    [Bibtex]
    @inproceedings{conf/kbse/MohaGL06,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Pierre Leduc},
    title = {Automatic Generation of Detection Algorithms for Design
    Defects},
    booktitle = {ASE},
    year = {2006},
    pages = {297-300},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ASE.2006.22},
    crossref = {DBLP:conf/kbse/2006}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “Some remarks on the certificates registration of the electronic commerce protocol set,” in Aict/iciw, 2006, p. 119.
    [Bibtex]
    @inproceedings{conf/aict/BrlekHM06,
    author = {Srecko Brlek and
    Sardaouna Hamadou and
    John Mullins},
    title = {Some Remarks on the Certificates Registration of the Electronic
    Commerce Protocol SET},
    booktitle = {AICT/ICIW},
    year = {2006},
    pages = {119},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AICT-ICIW.2006.176},
    crossref = {DBLP:conf/aict/2006}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Formal definitions of simulation interfaces in a continuous/discrete co-simulation tool,” in Ieee international workshop on rapid system prototyping, 2006, pp. 186-192.
    [Bibtex]
    @inproceedings{conf/rsp/GheorgheBNB06,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {Formal Definitions of Simulation Interfaces in a Continuous/Discrete
    Co-Simulation Tool},
    booktitle = {IEEE International Workshop on Rapid System Prototyping},
    year = {2006},
    pages = {186-192},
    ee = {http://doi.ieeecomputersociety.org/10.1109/RSP.2006.18},
    crossref = {DBLP:conf/rsp/2006}
    }
  • D. Poshyvanyk, A. Marcus, V. Rajlich, Y. Guéhéneuc, and G. Antoniol, “Combining probabilistic ranking and latent semantic indexing for feature identification,” in Icpc, 2006, pp. 137-148.
    [Bibtex]
    @inproceedings{conf/iwpc/PoshyvanykMRGA06,
    author = {Denys Poshyvanyk and
    Andrian Marcus and
    V{\'a}clav Rajlich and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Combining Probabilistic Ranking and Latent Semantic Indexing
    for Feature Identification},
    booktitle = {ICPC},
    year = {2006},
    pages = {137-148},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2006.17},
    crossref = {DBLP:conf/iwpc/2006}
    }
  • F. A. Fontana, C. Raibulet, Y. Guéhéneuc, G. Antoniol, and J. M. Smith, “Design pattern detection for reverse engineering,” in Wcre, 2006, p. 316.
    [Bibtex]
    @inproceedings{conf/wcre/FontanaRGAS06,
    author = {Francesca Arcelli Fontana and
    Claudia Raibulet and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Jason McC. Smith},
    title = {Design Pattern Detection for Reverse Engineering},
    booktitle = {WCRE},
    year = {2006},
    pages = {316},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.23},
    crossref = {DBLP:conf/wcre/2006}
    }
  • A. Zaidman, S. Demeyer, B. Adams, K. D. Schutter, G. Hoffman, and B. D. Ruyck, “Regaining lost knowledge through dynamic analysis and aspect orientation,” in Csmr, 2006, pp. 91-102.
    [Bibtex]
    @inproceedings{conf/csmr/ZaidmanDASHR06,
    author = {Andy Zaidman and
    Serge Demeyer and
    Bram Adams and
    Kris De Schutter and
    Ghislain Hoffman and
    Bernard De Ruyck},
    title = {Regaining Lost Knowledge through Dynamic Analysis and Aspect
    Orientation},
    booktitle = {CSMR},
    year = {2006},
    pages = {91-102},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.45},
    crossref = {DBLP:conf/csmr/2006}
    }
  • R. Koschke, A. Walenstein, and E. Merlo, “06301 abstracts collection — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/KoschkeWM06,
    author = {Rainer Koschke and
    Andrew Walenstein and
    Ettore Merlo},
    title = {06301 Abstracts Collection -- Duplication, Redundancy, and
    Similarity in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/972},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • F. B. e Abreu, C. Calero, Y. Guéhéneuc, M. Lanza, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2006, pp. 87-96.
    [Bibtex]
    @inproceedings{conf/ecoopw/AbreuCGLS06,
    author = {Fernando Brito e Abreu and
    Coral Calero and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Michele Lanza and
    Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {87-96},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_10},
    crossref = {DBLP:conf/ecoopw/2006}
    }
  • O. Kaczor, Y. Guéhéneuc, and S. Hamel, “Efficient identification of design patterns with bit-vector algorithm,” in Csmr, 2006, pp. 175-184.
    [Bibtex]
    @inproceedings{conf/csmr/KaczorGH06,
    author = {Olivier Kaczor and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel},
    title = {Efficient Identification of Design Patterns with Bit-vector
    Algorithm},
    booktitle = {CSMR},
    year = {2006},
    pages = {175-184},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.25},
    crossref = {DBLP:conf/csmr/2006}
    }
  • S. Galice, V. Legrand, M. Minier, J. Mullins, and S. Ubéda, “The kaa project: a trust policy point of view,” Corr, vol. abs/cs/0606005, 2006.
    [Bibtex]
    @article{journals/corr/abs-cs-0606005,
    author = {Samuel Galice and
    V{\'e}ronique Legrand and
    Marine Minier and
    John Mullins and
    St{\'e}phane Ub{\'e}da},
    title = {The KAA project: a trust policy point of view},
    journal = {CoRR},
    volume = {abs/cs/0606005},
    year = {2006},
    ee = {http://arxiv.org/abs/cs/0606005}
    }
  • S. Galice, V. Legrand, M. Minier, J. Mullins, and S. Ubéda, “A history-based framework to build trust management systems,” in Securecomm, 2006, pp. 1-7.
    [Bibtex]
    @inproceedings{conf/securecomm/GaliceLMMU06,
    author = {Samuel Galice and
    V{\'e}ronique Legrand and
    Marine Minier and
    John Mullins and
    St{\'e}phane Ub{\'e}da},
    title = {A History-Based Framework to Build Trust Management Systems},
    booktitle = {SecureComm},
    year = {2006},
    pages = {1-7},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SECCOMW.2006.359580},
    crossref = {DBLP:conf/securecomm/2006}
    }
  • H. Boucheneb, “Checking untimed and timed linear properties of the interval timed colored petri net model,” Computación y sistemas, vol. 10, iss. 2, 2006.
    [Bibtex]
    @article{journals/cys/Boucheneb06,
    author = {Hanifa Boucheneb},
    title = {Checking Untimed and Timed Linear Properties of the Interval
    Timed Colored Petri Net Model},
    journal = {Computaci{\'o}n y Sistemas},
    volume = {10},
    number = {2},
    year = {2006},
    ee = {http://cys.cic.ipn.mx/ojs/index.php/CyS/article/view/1137}
    }
  • M. Ceccarelli and G. Antoniol, “A deformable grid-matching approach for microarray images,” Ieee transactions on image processing, vol. 15, iss. 10, pp. 3178-3188, 2006.
    [Bibtex]
    @article{journals/tip/CeccarelliA06,
    author = {Michele Ceccarelli and
    Giuliano Antoniol},
    title = {A Deformable Grid-Matching Approach for Microarray Images},
    journal = {IEEE Transactions on Image Processing},
    volume = {15},
    number = {10},
    year = {2006},
    pages = {3178-3188},
    ee = {http://dx.doi.org/10.1109/TIP.2006.877488}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Insider and ousider threat-sensitive sql injection vulnerability analysis in php,” in Wcre, 2006, pp. 147-156.
    [Bibtex]
    @inproceedings{conf/wcre/MerloLA06,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {Insider and Ousider Threat-Sensitive SQL Injection Vulnerability
    Analysis in PHP},
    booktitle = {WCRE},
    year = {2006},
    pages = {147-156},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.33},
    crossref = {DBLP:conf/wcre/2006}
    }
  • P. d’Astous, P. N. Robillard, F. Détienne, and W. Visser, “Quantitative measurements of the influence of participant roles during peer review meetings,” Corr, vol. abs/cs/0612005, 2006.
    [Bibtex]
    @article{journals/corr/abs-cs-0612005,
    author = {Patrick d'Astous and
    Pierre N. Robillard and
    Fran\c{c}oise D{\'e}tienne and
    Willemien Visser},
    title = {Quantitative Measurements of the Influence of Participant
    Roles during Peer Review Meetings},
    journal = {CoRR},
    volume = {abs/cs/0612005},
    year = {2006},
    ee = {http://arxiv.org/abs/cs/0612005}
    }
  • S. Bouktif, H. A. Sahraoui, and G. Antoniol, “Simulated annealing for improving software quality prediction,” in Gecco, 2006, pp. 1893-1900.
    [Bibtex]
    @inproceedings{conf/gecco/BouktifSA06,
    author = {Salah Bouktif and
    Houari A. Sahraoui and
    Giuliano Antoniol},
    title = {Simulated annealing for improving software quality prediction},
    booktitle = {GECCO},
    year = {2006},
    pages = {1893-1900},
    ee = {http://doi.acm.org/10.1145/1143997.1144313},
    crossref = {DBLP:conf/gecco/2006}
    }
  • P. G. Paulin, C. Pilkington, M. Langevin, E. Bensoudane, D. Lyonnard, O. Benny, B. Lavigueur, D. Lo, G. Beltrame, V. Gagné, and G. Nicolescu, “Parallel programming models for a multiprocessor soc platform applied to networking and multimedia,” Ieee trans. vlsi syst., vol. 14, iss. 7, pp. 667-680, 2006.
    [Bibtex]
    @article{journals/tvlsi/PaulinPLBLBLLBGN06,
    author = {Pierre G. Paulin and
    Chuck Pilkington and
    Michel Langevin and
    Essaid Bensoudane and
    Damien Lyonnard and
    Olivier Benny and
    Bruno Lavigueur and
    David Lo and
    Giovanni Beltrame and
    Vincent Gagn{\'e} and
    Gabriela Nicolescu},
    title = {Parallel programming models for a multiprocessor SoC platform
    applied to networking and multimedia},
    journal = {IEEE Trans. VLSI Syst.},
    volume = {14},
    number = {7},
    year = {2006},
    pages = {667-680},
    ee = {http://doi.ieeecomputersociety.org/10.1109/TVLSI.2006.878259}
    }
  • Y. Guéhéneuc, “Taupe: towards understanding program comprehension,” in Cascon, 2006, pp. 1-13.
    [Bibtex]
    @inproceedings{conf/cascon/Gueheneuc06,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {TAUPE: towards understanding program comprehension},
    booktitle = {CASCON},
    year = {2006},
    pages = {1-13},
    ee = {http://doi.acm.org/10.1145/1188966.1188968},
    crossref = {DBLP:conf/cascon/2006}
    }

2005

  • G. Antoniol and Y. Guéhéneuc, “Feature identification: a novel approach and a case study,” in Icsm, 2005, pp. 357-366.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolG05,
    author = {Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Feature Identification: A Novel Approach and a Case Study},
    booktitle = {ICSM},
    year = {2005},
    pages = {357-366},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.48},
    crossref = {DBLP:conf/icsm/2005}
    }
  • J. I. Maletic, G. Antoniol, J. Cleland-Huang, and J. H. Hayes, “3rd international workshop on traceability in emerging forms of software engineering (tefse 2005),” in Ase, 2005, p. 462.
    [Bibtex]
    @inproceedings{conf/kbse/MaleticACH05,
    author = {Jonathan I. Maletic and
    Giuliano Antoniol and
    Jane Cleland-Huang and
    Jane Huffman Hayes},
    title = {3rd international workshop on traceability in emerging forms
    of software engineering (TEFSE 2005)},
    booktitle = {ASE},
    year = {2005},
    pages = {462},
    ee = {http://doi.acm.org/10.1145/1101908.1102002},
    crossref = {DBLP:conf/kbse/2005}
    }
  • P. N. Robillard, “Opportunistic problem solving in software engineering,” Ieee software, vol. 22, iss. 6, pp. 60-67, 2005.
    [Bibtex]
    @article{journals/software/Robillard05,
    author = {Pierre N. Robillard},
    title = {Opportunistic Problem Solving in Software Engineering},
    journal = {IEEE Software},
    volume = {22},
    number = {6},
    year = {2005},
    pages = {60-67},
    ee = {http://doi.ieeecomputersociety.org/10.1109/MS.2005.161}
    }
  • M. Desmarais and X. Pu, “Computer adaptive testing: comparison of a probabilistic network approach with item response theory,” in User modeling, 2005, pp. 392-396.
    [Bibtex]
    @inproceedings{conf/um/DesmaraisP05,
    author = {Michel Desmarais and
    Xiaoming Pu},
    title = {Computer Adaptive Testing: Comparison of a Probabilistic
    Network Approach with Item Response Theory},
    booktitle = {User Modeling},
    year = {2005},
    pages = {392-396},
    ee = {http://dx.doi.org/10.1007/11527886_51},
    crossref = {DBLP:conf/um/2005}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories,” Acm sigsoft software engineering notes, vol. 30, iss. 4, pp. 1-5, 2005.
    [Bibtex]
    @article{journals/sigsoft/AntoniolRV05,
    author = {Giuliano Antoniol and
    Vincenzo Fabio Rollo and
    Gabriele Venturi},
    title = {Linear predictive coding and cepstrum coefficients for mining
    time variant information from software repositories},
    journal = {ACM SIGSOFT Software Engineering Notes},
    volume = {30},
    number = {4},
    year = {2005},
    pages = {1-5},
    ee = {http://doi.acm.org/10.1145/1082983.1083156}
    }
  • G. Antoniol, M. Ceccarelli, and A. Petrosino, “Microarray image addressing based on the radon transform,” in Icip (1), 2005, pp. 13-16.
    [Bibtex]
    @inproceedings{conf/icip/AntoniolCP05,
    author = {Giuliano Antoniol and
    Michele Ceccarelli and
    Alfredo Petrosino},
    title = {Microarray image addressing based on the Radon transform},
    booktitle = {ICIP (1)},
    year = {2005},
    pages = {13-16},
    ee = {http://dx.doi.org/10.1109/ICIP.2005.1529675},
    crossref = {DBLP:conf/icip/2005}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Towards employing use-cases and dynamic analysis to comprehend mozilla,” in Icsm, 2005, pp. 639-642.
    [Bibtex]
    @inproceedings{conf/icsm/SalahMAP05,
    author = {Maher Salah and
    Spiros Mancoridis and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Towards Employing Use-Cases and Dynamic Analysis to Comprehend
    Mozilla},
    booktitle = {ICSM},
    year = {2005},
    pages = {639-642},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.94},
    crossref = {DBLP:conf/icsm/2005}
    }
  • M. Desmarais, S. Fu, and X. Pu, “Tradeoff analysis between knowledge assessment approaches,” in Aied, 2005, pp. 209-216.
    [Bibtex]
    @inproceedings{conf/aied/DesmaraisFP05,
    author = {Michel Desmarais and
    Shunkai Fu and
    Xiaoming Pu},
    title = {Tradeoff analysis between knowledge assessment approaches},
    booktitle = {AIED},
    year = {2005},
    pages = {209-216},
    ee = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1311},
    crossref = {DBLP:conf/aied/2005}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories,” in Msr, 2005.
    [Bibtex]
    @inproceedings{conf/msr/AntoniolRV05,
    author = {Giuliano Antoniol and
    Vincenzo Fabio Rollo and
    Gabriele Venturi},
    title = {Linear predictive coding and cepstrum coefficients for mining
    time variant information from software repositories},
    booktitle = {MSR},
    year = {2005},
    ee = {http://doi.acm.org/10.1145/1083142.1083156},
    crossref = {DBLP:conf/msr/2005}
    }
  • C. D. Grosso, G. Antoniol, M. D. Penta, P. Galinier, and E. Merlo, “Improving network applications security: a new heuristic to generate stress testing data,” in Gecco, 2005, pp. 1037-1043.
    [Bibtex]
    @inproceedings{conf/gecco/GrossoAPGM05,
    author = {Concettina Del Grosso and
    Giuliano Antoniol and
    Massimiliano Di Penta and
    Philippe Galinier and
    Ettore Merlo},
    title = {Improving network applications security: a new heuristic
    to generate stress testing data},
    booktitle = {GECCO},
    year = {2005},
    pages = {1037-1043},
    ee = {http://doi.acm.org/10.1145/1068009.1068185},
    crossref = {DBLP:conf/gecco/2005}
    }
  • M. D. Penta, M. Neteler, G. Antoniol, and E. Merlo, “A language-independent software renovation framework,” Journal of systems and software, vol. 77, iss. 3, pp. 225-240, 2005.
    [Bibtex]
    @article{journals/jss/PentaNAM05,
    author = {Massimiliano Di Penta and
    Markus Neteler and
    Giuliano Antoniol and
    Ettore Merlo},
    title = {A language-independent software renovation framework},
    journal = {Journal of Systems and Software},
    volume = {77},
    number = {3},
    year = {2005},
    pages = {225-240},
    ee = {http://dx.doi.org/10.1016/j.jss.2004.03.033}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques applied to optimization of project planning for a massive maintenance project,” in Icsm, 2005, pp. 240-249.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolPH05,
    author = {Giuliano Antoniol and
    Massimiliano Di Penta and
    Mark Harman},
    title = {Search-Based Techniques Applied to Optimization of Project
    Planning for a Massive Maintenance Project},
    booktitle = {ICSM},
    year = {2005},
    pages = {240-249},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.79},
    crossref = {DBLP:conf/icsm/2005}
    }
  • A. Fellah and J. Mullins, “Admissible interference by typing for cryptographic protocols,” in Icics, 2005, pp. 123-135.
    [Bibtex]
    @inproceedings{conf/icics/FellahM05,
    author = {Alaaeddine Fellah and
    John Mullins},
    title = {Admissible Interference by Typing for Cryptographic Protocols},
    booktitle = {ICICS},
    year = {2005},
    pages = {123-135},
    ee = {http://dx.doi.org/10.1007/11602897_11},
    crossref = {DBLP:conf/icics/2005}
    }
  • M. C. Desmarais and X. Pu, “A bayesian student model without hidden nodes and its comparison with item response theory,” I. j. artificial intelligence in education, vol. 15, iss. 4, pp. 291-323, 2005.
    [Bibtex]
    @article{journals/aiedu/DesmaraisP05,
    author = {Michel C. Desmarais and
    Xiaoming Pu},
    title = {A Bayesian Student Model without Hidden Nodes and its Comparison
    with Item Response Theory},
    journal = {I. J. Artificial Intelligence in Education},
    volume = {15},
    number = {4},
    year = {2005},
    pages = {291-323},
    ee = {http://iospress.metapress.com/content/22n7l4e8hub714yv/}
    }
  • N. B. Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, “Characterizing intransitive noninterference for 3-domain security policies with observability,” Ieee trans. automat. contr., vol. 50, iss. 6, pp. 920-925, 2005.
    [Bibtex]
    @article{journals/tac/Hadj-AlouaneLLMY05,
    author = {Nejib Ben Hadj-Alouane and
    St{\'e}phane Lafrance and
    Feng Lin and
    John Mullins and
    Moez Yeddes},
    title = {Characterizing intransitive noninterference for 3-domain
    security policies with observability},
    journal = {IEEE Trans. Automat. Contr.},
    volume = {50},
    number = {6},
    year = {2005},
    pages = {920-925},
    ee = {http://dx.doi.org/10.1109/TAC.2005.850643}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Detecting groups of co-changing files in cvs repositories,” in Iwpse, 2005, pp. 23-32.
    [Bibtex]
    @inproceedings{conf/iwpse/AntoniolRV05,
    author = {Giuliano Antoniol and
    Vincenzo Fabio Rollo and
    Gabriele Venturi},
    title = {Detecting groups of co-changing files in CVS repositories},
    booktitle = {IWPSE},
    year = {2005},
    pages = {23-32},
    ee = {http://doi.ieeecomputersociety.org/10.1109/IWPSE.2005.11},
    crossref = {DBLP:conf/iwpse/2005}
    }
  • É. Germain and P. N. Robillard, “Engineering-based processes and agile methodologies for software development: a comparative case study,” Journal of systems and software, vol. 75, iss. 1-2, pp. 17-27, 2005.
    [Bibtex]
    @article{journals/jss/GermainR05,
    author = {{\'E}ric Germain and
    Pierre N. Robillard},
    title = {Engineering-based processes and agile methodologies for
    software development: a comparative case study},
    journal = {Journal of Systems and Software},
    volume = {75},
    number = {1-2},
    year = {2005},
    pages = {17-27},
    ee = {http://dx.doi.org/10.1016/j.jss.2004.02.022}
    }
  • A. Ouardani, S. Pierre, and H. Boucheneb, “A secure protocol for mobile agents in hostile environment,” in Mata, 2005, pp. 192-202.
    [Bibtex]
    @inproceedings{conf/mata/OuardaniPB05,
    author = {Abdelhamid Ouardani and
    Samuel Pierre and
    Hanifa Boucheneb},
    title = {A Secure Protocol for Mobile Agents in Hostile Environment},
    booktitle = {MATA},
    year = {2005},
    pages = {192-202},
    ee = {http://dx.doi.org/10.1007/11569510_19},
    crossref = {DBLP:conf/mata/2005}
    }
  • Y. Guéhéneuc and G. Antoniol, “Report on the 1st international workshop on design pattern theory and practice,” in Step, 2005, pp. 193-195.
    [Bibtex]
    @inproceedings{conf/step/GueheneucA05,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Report on the 1st International Workshop on Design Pattern
    Theory and Practice},
    booktitle = {STEP},
    year = {2005},
    pages = {193-195},
    ee = {http://doi.ieeecomputersociety.org/10.1109/STEP.2005.20},
    crossref = {DBLP:conf/step/2005}
    }
  • R. Hadjidj and H. Boucheneb, “Much compact time petri net state class spaces useful to restore ctl* properties,” in Acsd, 2005, pp. 224-233.
    [Bibtex]
    @inproceedings{conf/acsd/HadjidjB05,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {Much Compact Time Petri Net State Class Spaces Useful to
    Restore CTL* Properties},
    booktitle = {ACSD},
    year = {2005},
    pages = {224-233},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2005.28},
    crossref = {DBLP:conf/acsd/2005}
    }
  • Y. Guéhéneuc and H. A. Sahraoui, “Des signatures numériques pour améliorer la recherche structurelle de patrons,” L’objet, vol. 11, iss. 1-2, pp. 97-112, 2005.
    [Bibtex]
    @article{journals/Lobjet/GueheneucS05,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui},
    title = {Des signatures num{\'e}riques pour am{\'e}liorer la
    recherche structurelle de patrons},
    journal = {L'OBJET},
    volume = {11},
    number = {1-2},
    year = {2005},
    pages = {97-112},
    ee = {http://dx.doi.org/10.3166/objet.11.1-2.97-112}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “Anonymous and secure electronic transaction protocol,” Annales des télécommunications, vol. 60, iss. 5-6, pp. 530-557, 2005.
    [Bibtex]
    @article{journals/adt/BrlekHM05,
    author = {Srecko Brlek and
    Sardaouna Hamadou and
    John Mullins},
    title = {Anonymous and Secure Electronic Transaction protocol},
    journal = {Annales des T{\'e}l{\'e}communications},
    volume = {60},
    number = {5-6},
    year = {2005},
    pages = {530-557},
    ee = {http://dx.doi.org/10.1007/BF03219936}
    }
  • M. Desmarais, “Web log session analyzer: integrating parsing and logic programming into a data mart architecture,” in Web intelligence, 2005, pp. 794-797.
    [Bibtex]
    @inproceedings{conf/webi/Desmarais05,
    author = {Michel Desmarais},
    title = {Web Log Session Analyzer: Integrating Parsing and Logic
    Programming into a Data Mart Architecture},
    booktitle = {Web Intelligence},
    year = {2005},
    pages = {794-797},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI.2005.159},
    crossref = {DBLP:conf/webi/2005}
    }
  • G. Antoniol, M. D. Penta, H. Gall, and M. Pinzger, “Towards the integration of versioning systems, bug reports and source code meta-models,” Electr. notes theor. comput. sci., vol. 127, iss. 3, pp. 87-99, 2005.
    [Bibtex]
    @article{journals/entcs/AntoniolPGP05,
    author = {Giuliano Antoniol and
    Massimiliano Di Penta and
    Harald Gall and
    Martin Pinzger},
    title = {Towards the Integration of Versioning Systems, Bug Reports
    and Source Code Meta-Models},
    journal = {Electr. Notes Theor. Comput. Sci.},
    volume = {127},
    number = {3},
    year = {2005},
    pages = {87-99},
    ee = {http://dx.doi.org/10.1016/j.entcs.2004.08.036}
    }
  • N. B. Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. M. Yeddes, “On the verification of intransitive noninterference in multilevel security,” Ieee transactions on systems, man, and cybernetics, part b, vol. 35, iss. 5, pp. 948-958, 2005.
    [Bibtex]
    @article{journals/tsmc/Hadj-AlouaneLLMY05,
    author = {Nejib Ben Hadj-Alouane and
    St{\'e}phane Lafrance and
    Feng Lin and
    John Mullins and
    Mohamed Moez Yeddes},
    title = {On the verification of intransitive noninterference in multilevel
    security},
    journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part
    B},
    volume = {35},
    number = {5},
    year = {2005},
    pages = {948-958},
    ee = {http://dx.doi.org/10.1109/TSMCB.2005.847749}
    }

Recent Tweets