In Proceedings

Conference publications:

2017

  • C. Chen, J. Panerati, I. Hafnaoui, and G. Beltrame, “Static probabilistic timing analysis with a permanent fault detection mechanism,” in 12th ieee international symposium on industrial embedded systems (sies), 2017.
    [Bibtex]
    @InProceedings{ChenStatic2017,
    title = {Static Probabilistic Timing Analysis with a Permanent Fault Detection Mechanism},
    author = {Chen, Chao and Panerati, Jacopo and Hafnaoui, Imane and Beltrame, Giovanni},
    booktitle = {12th IEEE International Symposium on Industrial Embedded Systems (SIES)},
    year = 2017,
    organization = {IEEE}
    }
  • M. Moussa, M. Di Penta, G. Antoniol, and G. Beltrame, “Accuse: helping users to minimize android app privacy concerns,” in 4th ieee/acm international conference on mobile software engineering and systems, 2017.
    [Bibtex]
    @InProceedings{MoussaACCUSE2017,
    title = {ACCUSE: Helping Users to Minimize Android App Privacy Concerns},
    author = {Moussa, Majda and Di Penta, Massimiliano and Antoniol, Giuliano and Beltrame, Giovanni},
    booktitle = {4th IEEE/ACM International Conference on Mobile Software Engineering and Systems},
    year = {2017},
    organization = {IEEE, ACM},
    keyword = {accepted},
    note = {Accepted for publication}
    }
  • D. St-Onge, C. Pinciroli, and G. Beltrame, “Circle formation with computation-free robots,” in Proceedings of the IEEE/RSJ international conference on intelligent robots and systems (IROS), 2017.
    [Bibtex]
    @InProceedings{St-OngeCircle2017,
    title = {Circle Formation with Computation-Free Robots},
    author = {St-Onge, David and Pinciroli, Carlo and Beltrame, Giovanni},
    booktitle = {Proceedings of the {IEEE/RSJ} International Conference on Intelligent Robots and Systems ({IROS})},
    year = {2017}
    }

2016

  • R. Ayari, I. Hafnaoui, G. Beltrame, and G. Nicolescu, “Schedulability-guided crossover operator for real-time scheduling on heterogeneous multi-core systems,” in Proceedings – ieee international symposium on rapid system prototyping, rsp, 2016.
    [Bibtex]
    @InProceedings{AyariSchedulability-Guided2016,
    title = {Schedulability-Guided Crossover Operator for Real-Time Scheduling on Heterogeneous Multi-core Systems},
    booktitle = {Proceedings - IEEE International Symposium on Rapid System Prototyping, RSP},
    author = {Ayari, Rabeh and Hafnaoui, Imane and Beltrame, Giovanni and Nicolescu, Gabriela},
    year = {2016}
    }
  • R. Ayari, I. Hafnaoui, G. Beltrame, and G. Nicolescu, “Simulation-based schedulability assessment for real-time systems,” in Proceedings of the conference on summer computer simulation, 2016.
    [Bibtex]
    @InProceedings{AyariSimulation-based2016,
    author = {Ayari, Rabeh and Hafnaoui, Imane and Beltrame, Giovanni and Nicolescu, Gabriela},
    title = {Simulation-based Schedulability Assessment for Real-Time Systems},
    journal = {Simulation Series},
    year = {2016},
    organization = {Society for Computer Simulation International},
    booktitle = {Proceedings of the Conference on Summer Computer Simulation}
    }
  • B. Bani, F. Khomh, and Y. -, “A study of the energy consumption of databases and cloud patterns,” in Icsoc, 2016, pp. 606-614.
    [Bibtex]
    @InProceedings{BaniStudy2016,
    author = {B{\'{e}}chir Bani and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {A Study of the Energy Consumption of Databases and Cloud Patterns},
    booktitle = {ICSOC},
    series = {Lecture Notes in Computer Science},
    volume = {9936},
    pages = {606--614},
    publisher = {Springer},
    year = {2016}
    }
  • C. Chen, J. Panerati, and G. Beltrame, “Effects of online fault detection mechanisms on probabilistic timing analysis,” in 2016 ieee international symposium on defect and fault tolerance in vlsi and nanotechnology systems (dfts), 2016.
    [Bibtex]
    @InProceedings{ChenEffects2016,
    author = {Chen, C. and Panerati, J. and Beltrame, G.},
    booktitle = {2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)},
    title = {Effects of Online Fault Detection Mechanisms on Probabilistic Timing Analysis},
    year = {2016},
    month = {Sept.}
    }
  • C. Chen, L. Santinelli, J. Hugues, and G. Beltrame, “Static probabilistic timing analysis in presence of faults,” in 11th ieee international symposium on industrial embedded systems (sies), 2016.
    [Bibtex]
    @InProceedings{ChenStatic2016,
    author = {Chen, C. and Santinelli, L. and Hugues, J. and Beltrame, G.},
    booktitle = {11th IEEE International Symposium on Industrial Embedded Systems (SIES)},
    title = {Static Probabilistic Timing Analysis in Presence of Faults},
    year = {2016},
    month = {May}
    }
  • L. Guerrouj, O. Baysal, D. Lo, and F. Khomh, “Software analytics: challenges and opportunities,” in ICSE (companion volume), 2016, pp. 902-903.
    [Bibtex]
    @InProceedings{GuerroujSoftware2016,
    author = {Latifa Guerrouj and Olga Baysal and David Lo and Foutse Khomh},
    title = {Software analytics: challenges and opportunities},
    booktitle = {{ICSE} (Companion Volume)},
    pages = {902--903},
    publisher = {ACM},
    year = {2016}
    }
  • I. Hafnaoui, R. Ayari, G. Nicolescu, and G. Beltrame, “Simulation-based model generator for software performance estimation,” in Proceedings of the conference on summer computer simulation, 2016.
    [Bibtex]
    @InProceedings{HafnaouiSimulation-based2016,
    author = {Hafnaoui, Imane and Ayari, Rabeh and Nicolescu, Gabriela and Beltrame, Giovanni},
    title = {Simulation-based Model Generator for Software Performance Estimation},
    journal = {Simulation Series},
    year = {2016},
    organization = {Society for Computer Simulation International},
    booktitle = {Proceedings of the Conference on Summer Computer Simulation}
    }
  • B. Karasneh, M. R. V. Chaudron, F. Khomh, and Y. -, “Studying the relation between anti-patterns in design models and in source code,” in Saner, 2016, pp. 36-45.
    [Bibtex]
    @InProceedings{KarasnehStudying2016,
    author = {Bilal Karasneh and Michel R. V. Chaudron and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Studying the Relation between Anti-Patterns in Design Models and in Source Code},
    booktitle = {SANER},
    pages = {36--45},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • O. Mlouki, F. Khomh, and G. Antoniol, “On the detection of licenses violations in android ecosystem,” in Saner, 2016, pp. 382-392.
    [Bibtex]
    @InProceedings{MloukiOn2016,
    author = {Ons Mlouki and Foutse Khomh and Giulio Antoniol},
    title = {On the Detection of Licenses Violations in Android Ecosystem},
    booktitle = {SANER},
    year = {2016},
    pages = {382-392}
    }
  • O. Mlouki, F. Khomh, and G. Antoniol, “On the detection of licenses violations in the android ecosystem,” in Saner, 2016, pp. 382-392.
    [Bibtex]
    @InProceedings{MloukiOn2016-1,
    author = {Ons Mlouki and Foutse Khomh and Giuliano Antoniol},
    title = {On the Detection of Licenses Violations in the Android Ecosystem},
    booktitle = {SANER},
    pages = {382--392},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • R. Morales, A. Sabane, P. Musavi, F. Khomh, F. Chicano, and G. Antoniol, “Finding the best compromise between design quality and testing effort during refactoring,” in Saner, 2016, p. To Appear.
    [Bibtex]
    @InProceedings{MoralesFinding2016,
    author = { Rodrigo Morales and Aminata Sabane and Pooya Musavi and Foutse Khomh and Francisco Chicano and Giulio Antoniol},
    title = {Finding the Best Compromise Between Design Quality and Testing Effort During Refactoring},
    booktitle = {SANER},
    year = {2016},
    pages = {To Appear}
    }
  • R. Morales, A. Sabane, P. Musavi, F. Khomh, F. Chicano, and G. Antoniol, “Finding the best compromise between design quality and testing effort during refactoring,” in Saner, 2016, pp. 24-35.
    [Bibtex]
    @InProceedings{MoralesFinding2016-1,
    author = {Rodrigo Morales and Aminata Sabane and Pooya Musavi and Foutse Khomh and Francisco Chicano and Giuliano Antoniol},
    title = {Finding the Best Compromise Between Design Quality and Testing Effort During Refactoring},
    booktitle = {SANER},
    pages = {24--35},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • P. Musavi, B. Adams, and F. Khomh, “Experience report: an empirical study of API failures in openstack cloud environments,” in Issre, 2016, pp. 424-434.
    [Bibtex]
    @InProceedings{MusaviExperience2016,
    author = {Pooya Musavi and Bram Adams and Foutse Khomh},
    title = {Experience Report: An Empirical Study of {API} Failures in OpenStack Cloud Environments},
    booktitle = {ISSRE},
    pages = {424--434},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • J. Panerati, G. Beltrame, N. Schwind, S. Zeltner, and K. Inoue, “Probabilistic resilience in hidden markov models,” in Iop conference series: materials science and engineering, 2016.
    [Bibtex]
    @InProceedings{PaneratiProbabilistic2016,
    title = {Probabilistic Resilience in Hidden Markov Models},
    author = {Panerati, Jacopo and Beltrame, Giovanni and Schwind, Nicolas and Zeltner, Stefan and Inoue, Katsumi},
    booktitle = {IOP Conference Series: Materials Science and Engineering},
    volume = {131},
    number = {1},
    year = {2016},
    organization = {IOP Publishing}
    }
  • F. Petrillo, Z. Soh, F. Khomh, M. Pimenta, C. M. D. S. Freitas, and Y. -, “Towards understanding interactive debugging,” in Qrs, 2016, pp. 152-163.
    [Bibtex]
    @InProceedings{PetrilloTowards2016,
    author = {F{\'{a}}bio Petrillo and Z{\'{e}}phyrin Soh and Foutse Khomh and Marcelo Pimenta and Carla M. D. S. Freitas and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Towards Understanding Interactive Debugging},
    booktitle = {QRS},
    pages = {152--163},
    publisher = {IEEE},
    year = {2016}
    }
  • F. Petrillo, Z. Soh, F. Khomh, M. S. Pimenta, C. M. D. S. Freitas, and Y. -, “Understanding interactive debugging with swarm debug infrastructure,” in Icpc, 2016, pp. 1-4.
    [Bibtex]
    @InProceedings{PetrilloUnderstanding2016,
    author = {F{\'{a}}bio Petrillo and Z{\'{a}}phyrin Soh and Foutse Khomh and Marcelo Soares Pimenta and Carla Maria Dal Sasso Freitas and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Understanding interactive debugging with Swarm Debug Infrastructure},
    booktitle = {ICPC},
    pages = {1--4},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • C. Pinciroli and G. Beltrame, “Buzz: an extensible programming language for heterogeneous swarm robotics,” in Proceedings of the IEEE/RSJ intl. conference on intelligent robots and systems, 2016, pp. 3794-3800.
    [Bibtex]
    @InProceedings{PinciroliBuzz2016,
    author = {Carlo Pinciroli and Giovanni Beltrame},
    title = {Buzz: An Extensible Programming Language for Heterogeneous Swarm Robotics},
    booktitle = {Proceedings of the {IEEE/RSJ} Intl. Conference on Intelligent Robots and Systems},
    year = {2016},
    month = {October},
    pages = {3794-3800}
    }
  • C. Pinciroli, A. Gasparri, E. Garone, and G. Beltrame, “Decentralized progressive shape formation with robot swarms,” in 13th international symposium on distributed autonomous robotic systems (DARS2016), 2016.
    [Bibtex]
    @InProceedings{PinciroliDecentralized2016,
    author = {Pinciroli, Carlo and Gasparri, Andrea and Garone, Emanuele and Beltrame, Giovanni},
    title = {Decentralized Progressive Shape Formation with Robot Swarms},
    booktitle = {13th International Symposium on Distributed Autonomous Robotic Systems ({DARS2016})},
    year = {2016},
    pages = {}
    }
  • R. Saborido-Infantes, G. Beltrame, F. Khomh, E. Alba, and G. Antoniol, “Optimizing user experience in choosing android applications,” in Saner, 2016, pp. 438-448.
    [Bibtex]
    @InProceedings{Saborido-InfantesOptimizing2016,
    author = {Ruben Saborido-Infantes and Giovanni Beltrame and Foutse Khomh and Enrique Alba and Giulio Antoniol},
    title = {Optimizing User Experience in Choosing Android Applications},
    booktitle = {SANER},
    year = {2016},
    pages = {438-448}
    }
  • R. Saborido, G. Beltrame, F. Khomh, E. Alba, and G. Antoniol, “Optimizing user experience in choosing Android applications,” in 23rd IEEE international conference on software analysis, evolution, and reengineering, SANER, 2016, pp. 438-448.
    [Bibtex]
    @InProceedings{SaboridoOptimizing2016,
    author = {Saborido, Rubén and Beltrame, Giovanni and Khomh, Foutse and Alba, Enrique and Antoniol, Giuliano},
    title = {Optimizing User Experience in Choosing {Android} Applications},
    booktitle = {23rd {IEEE} International Conference on Software Analysis, Evolution, and Reengineering, {SANER}},
    pages = {438-448},
    year = {2016}
    }
  • R. Saborido, G. Beltrame, F. Khomh, E. Alba, and G. Antoniol, “Optimizing user experience in choosing android applications,” in Saner, 2016, pp. 438-448.
    [Bibtex]
    @InProceedings{SaboridoOptimizing2016-1,
    author = {Rub{\'{e}}n Saborido and Giovanni Beltrame and Foutse Khomh and Enrique Alba and Giuliano Antoniol},
    title = {Optimizing User Experience in Choosing Android Applications},
    booktitle = {SANER},
    pages = {438--448},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • Z. Soh, A. Yamashita, F. Khomh, and Y. -, “Do code smells impact the effort of different maintenance programming activities?,” in Saner, 2016, pp. 393-402.
    [Bibtex]
    @InProceedings{SohDo2016,
    author = {Z{\'{e}}phyrin Soh and Aiko Yamashita and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Do Code Smells Impact the Effort of Different Maintenance Programming Activities?},
    booktitle = {SANER},
    pages = {393--402},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • H. Washizaki, Y. -, and F. Khomh, “A taxonomy for program metamodels in program reverse engineering,” in Icsme, 2016, pp. 44-55.
    [Bibtex]
    @InProceedings{WashizakiTaxonomy2016,
    author = {Hironori Washizaki and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Foutse Khomh},
    title = {A Taxonomy for Program Metamodels in Program Reverse Engineering},
    booktitle = {ICSME},
    pages = {44--55},
    publisher = {{IEEE} Computer Society},
    year = {2016}
    }
  • J. Zabeau, A. Nöel, and G. Beltrame, “Manufacturing compact electrospray thrusters to deorbit a nanosatellite,” in Proceedings of the 67th international astronautical congress, 2016.
    [Bibtex]
    @InProceedings{ZabeauManufacturing2016,
    author = {Zabeau, Josu\'e and N\"oel, Alexis and Beltrame, Giovanni},
    title = {Manufacturing Compact Electrospray Thrusters to Deorbit a Nanosatellite},
    booktitle = {Proceedings of the 67th International Astronautical Congress},
    year = {2016}
    }
  • J. Zabeau, A. Nöel, and G. Beltrame, “A miniaturized incubator design for microgravity botanic experiments in cubesats,” in Proceedings of the 67th international astronautical congress, 2016.
    [Bibtex]
    @InProceedings{ZabeauMiniaturized2016,
    author = {Zabeau, Josu\'e and N\"oel, Alexis and Beltrame, Giovanni},
    title = {A Miniaturized Incubator Design For Microgravity Botanic Experiments in CubeSats},
    booktitle = {Proceedings of the 67th International Astronautical Congress},
    year = {2016}
    }

2015

  • A. S. Abtahizadeh, F. Khomh, and Y. -, “How green are cloud patterns?,” in Ipccc, 2015, pp. 1-8.
    [Bibtex]
    @InProceedings{AbtahizadehHow2015,
    author = {S. Amirhossein Abtahizadeh and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {How green are cloud patterns?},
    booktitle = {IPCCC},
    pages = {1--8},
    publisher = {{IEEE} Computer Society},
    year = {2015}
    }
  • B. Adams, S. Bellomo, C. Bird, F. Khomh, and K. Moir, “3rd international workshop on release engineering (RELENG 2015),” in Icse, 2015, pp. 995-996.
    [Bibtex]
    @InProceedings{Adams3rd2015,
    author = {Bram Adams and Stephany Bellomo and Christian Bird and Foutse Khomh and Kim Moir},
    title = {3rd International Workshop on Release Engineering {(RELENG} 2015)},
    booktitle = {ICSE},
    pages = {995--996},
    publisher = {{IEEE} Computer Society},
    year = {2015}
    }
  • L. An and F. Khomh, “Challenges and issues of mining crash reports,” in Swan@saner, 2015, pp. 5-8.
    [Bibtex]
    @InProceedings{AnChallenges2015,
    author = {Le An and Foutse Khomh},
    title = {Challenges and Issues of Mining Crash Reports},
    booktitle = {SWAN@SANER},
    pages = {5--8},
    publisher = {{IEEE} Computer Society},
    year = {2015}
    }
  • L. An and F. Khomh, “An empirical study of crash-inducing commits in mozilla firefox,” in Promise, 2015, p. 5:1–5:10.
    [Bibtex]
    @InProceedings{AnEmpirical2015,
    author = {Le An and Foutse Khomh},
    title = {An Empirical Study of Crash-inducing Commits in Mozilla Firefox},
    booktitle = {PROMISE},
    pages = {5:1--5:10},
    publisher = {ACM},
    year = {2015}
    }
  • L. An and F. Khomh, “An empirical study of highly impactful bugs in mozilla projects,” in Qrs, 2015, pp. 262-271.
    [Bibtex]
    @InProceedings{AnEmpirical2015-1,
    author = {Le An and Foutse Khomh},
    title = {An Empirical Study of Highly Impactful Bugs in Mozilla Projects},
    booktitle = {QRS},
    pages = {262--271},
    publisher = {IEEE},
    year = {2015}
    }
  • H. Anwar and G. Beltrame, “A probabilistically analysable cache implementation on fpga,” in Ieee international new circuits and systems (newcas), Grenoble, France, 2015.
    [Bibtex]
    @InProceedings{AnwarProbabilistically2015,
    address = {Grenoble, France},
    author = {Anwar, Hassan and Beltrame, Giovanni},
    booktitle = {IEEE International NEW Circuits And Systems (NEWCAS)},
    title = {A Probabilistically Analysable Cache Implementation on FPGA},
    year = 2015,
    month = jun
    }
  • L. M. Eshkevari, F. D. Santos, J. R. Cordy, and G. Antoniol, “Are php applications ready for hack,” in International conference on software analysis, evolution, and reengineering (saner), 2015-01-01 2015, pp. 63-72.
    [Bibtex]
    @InProceedings{EshkevariAre2015,
    title = {Are PHP applications ready for Hack},
    author = {Laleh Mousavi Eshkevari and Fabien Dos Santos and James R. Cordy and Giuliano Antoniol},
    year = {2015},
    date = {2015-01-01},
    booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER)},
    pages = {63-72}
    }
  • C. Fodé, J. Panerati, A. Guay, P. Desroches, M. Valdatta, M. Smyth, M. Lalonde, N. Bellini, D. Rastelli, S. Naldi, and G. Beltrame, “Eleonora, a 3u cubesat for the canadian satellite design challenge,” in Proceedings of the 66th international astronautical congress, jerusalem, israel, 2015, 2015.
    [Bibtex]
    @InProceedings{FodeEleonora2015,
    author = {Fod\'e, Constance and Panerati, Jacopo and Guay, Alexandre and Desroches, Prescilia and Valdatta, Marcello and Smyth, Mark and Lalonde, Mathieu and Bellini, Niccol\`o and Rastelli, Davide and Naldi, Stefano and Beltrame, Giovanni},
    title = {Eleonora, a 3U CubeSat for the Canadian Satellite Design Challenge},
    booktitle = {Proceedings of the 66th International Astronautical Congress, Jerusalem, Israel, 2015},
    year = {2015}
    }
  • D. Martin, J. Cordy, B. Adams, and G. Antoniol, “Make it simple – an empirical analysis of gnu make feature use in open source projects,” in Icpc, 2015, pp. 207-217.
    [Bibtex]
    @InProceedings{MartinMake2015,
    author = {Douglas Martin and James Cordy and Bram Adams and Giulio Antoniol},
    title = {Make It Simple - An Empirical Analysis of GNU Make Feature Use in Open Source Projects},
    booktitle = {ICPC},
    year = {2015},
    pages = {207-217}
    }
  • R. Morales, S. McIntosh, and F. Khomh, “Do code review practices impact design quality? A case study of the qt, vtk, and ITK projects,” in Saner, 2015, pp. 171-180.
    [Bibtex]
    @InProceedings{MoralesDo2015,
    author = {Rodrigo Morales and Shane McIntosh and Foutse Khomh},
    title = {Do code review practices impact design quality? {A} case study of the Qt, VTK, and {ITK} projects},
    booktitle = {SANER},
    pages = {171--180},
    publisher = {{IEEE} Computer Society},
    year = {2015}
    }
  • J. Panerati and G. Beltrame, “Trading off power and fault-tolerance in real-time embedded systems,” in Nasa/esa adaptive hardware and systems, Montreal, Canada, 2015.
    [Bibtex]
    @InProceedings{PaneratiTrading2015,
    address = {Montreal, Canada},
    author = {Panerati, Jacopo and Beltrame, Giovanni},
    booktitle = {NASA/ESA Adaptive Hardware and Systems},
    title = {Trading Off Power and Fault-tolerance in Real-time Embedded Systems},
    year = 2015,
    month = jun
    }
  • S. Panichella, V. Arnaoudova, M. D. Penta, and G. Antoniol, “Would static analysis tools help developers with code reviews?,” in International conference on software analysis, evolution, and reengineering (saner), 2015-01-01 2015, pp. 161-170.
    [Bibtex]
    @InProceedings{PanichellaWould2015,
    title = {Would Static Analysis Tools Help Developers with Code Reviews?},
    author = {Sebastiano Panichella and Venera Arnaoudova and Massimiliano Di Penta and Giuliano Antoniol},
    year = {2015},
    date = {2015-01-01},
    booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER)},
    pages = {161-170}
    }
  • C. Pinciroli, S. Riahi, and G. Beltrame, “A low-cost validation setup for the thermal modelling of electronic devices,” in IEEE 13th international new circuits and systems conference (NEWCAS 2015), Los Alamitos, CA, 2015.
    [Bibtex]
    @InProceedings{PinciroliLow-Cost2015,
    author = {Pinciroli, Carlo and Riahi, Sami and Beltrame, Giovanni},
    title = {A Low-Cost Validation Setup for the Thermal Modelling of Electronic Devices},
    booktitle = {{IEEE} 13th International New Circuits and Systems Conference ({NEWCAS 2015})},
    address = {Los Alamitos, CA},
    year = {2015}
    }
  • C. Pinciroli, A. Lee-Brown, and G. Beltrame, “A tuple space for data sharing in robot swarms,” in 9th EAI international conference on bio-inspired information and communications technologies (BICT 2015), 2015, pp. 287-294.
    [Bibtex]
    @InProceedings{PinciroliTuple2015,
    author = {Pinciroli, Carlo and Lee-Brown, Adam and Beltrame, Giovanni},
    title = {A Tuple Space for Data Sharing in Robot Swarms},
    booktitle = {9th {EAI} International Conference on Bio-inspired Information and Communications Technologies ({BICT} 2015)},
    year = {2015},
    pages = {287-294},
    publisher = {ACM Digital Library}
    }
  • Z. Soh, T. Drioul, P. -, F. Khomh, Y. -, and N. Habra, “Noises in interaction traces data and their impact on previous research studies,” in Esem, 2015, pp. 1-10.
    [Bibtex]
    @InProceedings{SohNoises2015,
    author = {Z{\'{e}}phyrin Soh and Thomas Drioul and Pierre{-}Antoine Rappe and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Naji Habra},
    title = {Noises in Interaction Traces Data and Their Impact on Previous Research Studies},
    booktitle = {ESEM},
    pages = {1--10},
    publisher = {IEEE},
    year = {2015}
    }
  • M. Soualhia, F. Khomh, and S. Tahar, “ATLAS: an adaptive failure-aware scheduler for hadoop,” in Ipccc, 2015, pp. 1-8.
    [Bibtex]
    @InProceedings{SoualhiaATLAS-2015,
    author = {Mbarka Soualhia and Foutse Khomh and Sofi{\`{e}}ne Tahar},
    title = {{ATLAS:} An AdapTive faiLure-Aware Scheduler for Hadoop},
    booktitle = {IPCCC},
    pages = {1--8},
    publisher = {{IEEE} Computer Society},
    year = {2015}
    }
  • M. Soualhia, F. Khomh, and S. Tahar, “Predicting scheduling failures in the cloud: A case study with google clusters and hadoop on amazon EMR,” in Hpcc/css/icess, 2015, pp. 58-65.
    [Bibtex]
    @InProceedings{SoualhiaPredicting2015,
    author = {Mbarka Soualhia and Foutse Khomh and Sofi{\`{e}}ne Tahar},
    title = {Predicting Scheduling Failures in the Cloud: {A} Case Study with Google Clusters and Hadoop on Amazon {EMR}},
    booktitle = {HPCC/CSS/ICESS},
    pages = {58--65},
    publisher = {IEEE},
    year = {2015}
    }

2014

  • L. An, F. Khomh, and B. Adams, “Supplementary bug fixes vs. re-opened bugs,” in Scam, 2014, pp. 205-214.
    [Bibtex]
    @InProceedings{AnSupplementary2014,
    author = {Le An and Foutse Khomh and Bram Adams},
    title = {Supplementary Bug Fixes vs. Re-opened Bugs},
    booktitle = {SCAM},
    pages = {205--214},
    publisher = {{IEEE} Computer Society},
    year = {2014}
    }
  • [PDF] H. Anwar, S. Jafri, S. Dytckov, M. Daneshtalab, M. Ebrahimi, J. Plosila, G. Beltrame, and H. Tenhunen, “Exploring spiking neural network on coarse-grain reconfigurable architectures,” in Second acm int. work. manycore embed. sytems, Minneapolis, MN, USA, 2014.
    [Bibtex]
    @InProceedings{AnwarExploring2014,
    address = {Minneapolis, MN, USA},
    author = {Anwar, Hassan and Jafri, Syed and Dytckov, Sergei and Daneshtalab, Masoud and Ebrahimi, Masoumeh and Plosila, Juha and Beltrame, Giovanni and Tenhunen, Hannu},
    booktitle = {Second ACM Int. Work. Manycore Embed. Sytems},
    title = {Exploring Spiking Neural Network on Coarse-Grain Reconfigurable Architectures},
    year = 2014,
    month = jun,
    pdf = {/pdf/Anwar2014.pdf}
    }
  • [PDF] H. Anwar, M. Daneshtalab, M. Ebrahimi, J. Plosila, H. Tenhunen, S. Dytckov, and G. Beltrame, “Parameterized aes-based crypto processor for fpgas,” in 17th euromicro conference on digital systems design (dsd), Verona, Italy, 2014.
    [Bibtex]
    @InProceedings{AnwarParameterized2014,
    address = {Verona, Italy},
    author = {Anwar, Hassan and Daneshtalab, Masoud and Ebrahimi, Masoumeh and Plosila, Juha and Tenhunen, Hannu and Dytckov, Sergei and Beltrame, Giovanni},
    booktitle = {17th Euromicro Conference on Digital Systems Design (DSD)},
    title = {Parameterized AES-based crypto processor for FPGAs},
    year = 2014,
    month = aug,
    pdf = {/pdf/Anwar2014.pdf}
    }
  • G. Bavota, R. Oliveto, A. D. Lucia, A. Marcus, Y. Guéhéneuc, and G. Antoniol, “In medio stat virtus: extract class refactoring through nash equilibria,” in Csmr-wcre, 2014, pp. 214-223.
    [Bibtex]
    @InProceedings{BavotaIn2014,
    author = {Gabriele Bavota and Rocco Oliveto and Andrea De Lucia and Andrian Marcus and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {In medio stat virtus: Extract class refactoring through nash equilibria},
    booktitle = {CSMR-WCRE},
    year = {2014},
    pages = {214-223},
    ee = {http://dx.doi.org/10.1109/CSMR-WCRE.2014.6747173},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • V. Bougie, E. Bourbeau, N. Cloutier, A. Guay, M. Lalonde, J. Panerati, M. Smyth, M. Tousignant, D. Fortier, and G. Beltrame, “A nano-satellite to monitor glaciers recession affecting biodiversity in the canadian arctic,” in Proceedings of the 65th international astronautics congress, 2014.
    [Bibtex]
    @InProceedings{BougieNano-satellite2014,
    author = {Bougie, Vincent and Bourbeau, Etienne and Cloutier, Nicolas and Guay, Alexandre and Lalonde, Mathieu and Panerati, Jacopo and Smyth, Mark and Tousignant, Maxime and Fortier, Daniel and Beltrame, Giovanni},
    booktitle = {Proceedings of the 65th International Astronautics Congress},
    title = {A Nano-satellite to Monitor Glaciers Recession Affecting Biodiversity in the Canadian Arctic},
    year = {2014},
    month = oct
    }
  • L. M. Eshkevari, G. Antoniol, J. R. Cordy, and M. D. Penta, “Identifying and locating interference issues in php applications: the case of wordpress,” in Icpc, 2014, pp. 157-167.
    [Bibtex]
    @InProceedings{EshkevariIdentifying2014,
    author = {Laleh Mousavi Eshkevari and Giuliano Antoniol and James R. Cordy and Massimiliano Di Penta},
    title = {Identifying and locating interference issues in PHP applications: the case of WordPress},
    booktitle = {ICPC},
    year = {2014},
    pages = {157-167},
    ee = {http://doi.acm.org/10.1145/2597008.2597153},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] A. Fourmigue, G. Beltrame, and G. Nicolescu, “Efficient transient thermal simulation of 3d ics with liquid-cooling and through silicon vias,” in Proc. of the design automation and test in europe conference (date), 2014, pp. 1385-1390.
    [Bibtex]
    @InProceedings{FourmigueEfficient2014,
    author = {A. Fourmigue and G. Beltrame and G. Nicolescu},
    title = {Efficient Transient Thermal Simulation of 3D ICs with Liquid-Cooling and Through Silicon Vias},
    booktitle = {Proc. of the Design Automation and Test in Europe Conference (DATE)},
    year = {2014},
    month = mar,
    pages = {1385-1390},
    pdf = {/pdf/Fourmigue2014.pdf}
    }
  • G. Hecht, B. J. -, C. D. Figueiredo, N. Moha, and F. Khomh, “An empirical study of the impact of cloud patterns on quality of service (qos),” in Cloudcom, 2014, pp. 278-283.
    [Bibtex]
    @InProceedings{HechtEmpirical2014,
    author = {Geoffrey Hecht and Benjamin Jose{-}Scheidt and Clement De Figueiredo and Naouel Moha and Foutse Khomh},
    title = {An Empirical Study of the Impact of Cloud Patterns on Quality of Service (QoS)},
    booktitle = {CloudCom},
    pages = {278--283},
    publisher = {{IEEE} Computer Society},
    year = {2014}
    }
  • F. Jaafar, F. Khomh, Y. -, and M. Zulkernine, “Anti-pattern mutations and fault-proneness,” in Qsic, 2014, pp. 246-255.
    [Bibtex]
    @InProceedings{JaafarAnti-pattern2014,
    author = {Fehmi Jaafar and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Mohammad Zulkernine},
    title = {Anti-pattern Mutations and Fault-proneness},
    booktitle = {QSIC},
    pages = {246--255},
    publisher = {IEEE},
    year = {2014}
    }
  • Y. Jiang, B. Adams, F. Khomh, and D. M. Germán, “Tracing back the history of commits in low-tech reviewing environments: a case study of the linux kernel,” in Esem, 2014, p. 51:1–51:10.
    [Bibtex]
    @InProceedings{JiangTracing2014,
    author = {Yujuan Jiang and Bram Adams and Foutse Khomh and Daniel M. Germ{\'{a}}n},
    title = {Tracing back the history of commits in low-tech reviewing environments: a case study of the Linux kernel},
    booktitle = {ESEM},
    pages = {51:1--51:10},
    publisher = {ACM},
    year = {2014}
    }
  • N. Kerzazi and F. Khomh, “Factors impacting rapid releases: an industrial case study,” in Esem, 2014, p. 61:1–61:8.
    [Bibtex]
    @InProceedings{KerzaziFactors2014,
    author = {Noureddine Kerzazi and Foutse Khomh},
    title = {Factors impacting rapid releases: an industrial case study},
    booktitle = {ESEM},
    pages = {61:1--61:8},
    publisher = {ACM},
    year = {2014}
    }
  • N. Kerzazi, F. Khomh, and B. Adams, “Why do automated builds break? an empirical study,” in Icsme, 2014, pp. 41-50.
    [Bibtex]
    @InProceedings{KerzaziWhy2014,
    author = {Noureddine Kerzazi and Foutse Khomh and Bram Adams},
    title = {Why Do Automated Builds Break? An Empirical Study},
    booktitle = {ICSME},
    pages = {41--50},
    publisher = {{IEEE} Computer Society},
    year = {2014}
    }
  • F. Khomh, “On improving the dependability of cloud applications with fault-tolerance,” in WICSA companion, 2014, p. 2:1–2:3.
    [Bibtex]
    @InProceedings{KhomhOn2014,
    author = {Foutse Khomh},
    title = {On improving the dependability of cloud applications with fault-tolerance},
    booktitle = {{WICSA} Companion},
    pages = {2:1--2:3},
    publisher = {ACM},
    year = {2014}
    }
  • F. Palma, L. An, F. Khomh, N. Moha, and Y. -, “Investigating the change-proneness of service patterns and antipatterns,” in Soca, 2014, pp. 1-8.
    [Bibtex]
    @InProceedings{PalmaInvestigating2014,
    author = {Francis Palma and Le An and Foutse Khomh and Naouel Moha and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Investigating the Change-Proneness of Service Patterns and Antipatterns},
    booktitle = {SOCA},
    pages = {1--8},
    publisher = {{IEEE} Computer Society},
    year = {2014}
    }
  • [PDF] J. Panerati, S. Abdi, and G. Beltrame, “Balancing system availability and lifetime with dynamic hidden markov models,” in Adapt. hardw. syst. (ahs), 2014 nasa/esa conf., 2014.
    [Bibtex]
    @InProceedings{PaneratiBalancing2014,
    author = {Panerati, Jacopo and Abdi, Samar and Beltrame, Giovanni},
    booktitle = {Adapt. Hardw. Syst. (AHS), 2014 NASA/ESA Conf.},
    month = jul,
    title = {Balancing System Availability and Lifetime with Dynamic Hidden Markov Models},
    year = {2014},
    pdf = {/pdf/Panerati2014.pdf},
    poster = {/pdf/Panerati2014_poster.pdf}
    }
  • J. Panerati and G. Beltrame, “Fault-tolerant soft real-time computing systems based on dynamic bayesian reasoning,” in Proceedings 65th international astronautics congress, 2014.
    [Bibtex]
    @InProceedings{PaneratiFault-tolerant2014,
    author = {Panerati, Jacopo and Beltrame, Giovanni},
    booktitle = {Proceedings 65th International Astronautics Congress},
    title = {Fault-tolerant Soft Real-time Computing Systems based on Dynamic Bayesian Reasoning},
    year = {2014},
    month = oct
    }
  • [DOI] S. Panichella, G. Bavota, M. D. Penta, G. Canfora, and G. Antoniol, “How developers’ collaborations identified from different sources tell us about code changes,” in 30th IEEE international conference on software maintenance and evolution, victoria, bc, canada, september 29 – october 3, 2014, 2014, pp. 251-260.
    [Bibtex]
    @InProceedings{PanichellaHow2014,
    author = {Sebastiano Panichella and Gabriele Bavota and Massimiliano Di Penta and Gerardo Canfora and Giuliano Antoniol},
    title = {How Developers' Collaborations Identified from Different Sources Tell Us about Code Changes},
    booktitle = {30th {IEEE} International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29 - October 3, 2014},
    pages = {251--260},
    year = {2014},
    url = {http://dx.doi.org/10.1109/ICSME.2014.47},
    doi = {10.1109/ICSME.2014.47}
    }
  • M. Shridhar, B. Adams, and F. Khomh, “A qualitative analysis of software build system changes and build ownership styles,” in Esem, 2014, p. 29:1–29:10.
    [Bibtex]
    @InProceedings{Shridharqualitative2014,
    author = {Mini Shridhar and Bram Adams and Foutse Khomh},
    title = {A qualitative analysis of software build system changes and build ownership styles},
    booktitle = {ESEM},
    pages = {29:1--29:10},
    publisher = {ACM},
    year = {2014}
    }
  • S. Xie, F. Khomh, Y. Zou, and I. Keivanloo, “An empirical study on the fault-proneness of clone migration in clone genealogies,” in Csmr-wcre, 2014, pp. 94-103.
    [Bibtex]
    @InProceedings{Xieempirical2014,
    author = {Shuai Xie and Foutse Khomh and Ying Zou and Iman Keivanloo},
    title = {An empirical study on the fault-proneness of clone migration in clone genealogies},
    booktitle = {CSMR-WCRE},
    pages = {94--103},
    publisher = {{IEEE} Computer Society},
    year = {2014}
    }

2013

  • B. Adams, C. Bird, F. Khomh, and K. Moir, “1st international workshop on release engineering (releng 2013),” in Icse, 2013, pp. 1545-1546.
    [Bibtex]
    @InProceedings{Adams1st2013,
    author = {Bram Adams and Christian Bird and Foutse Khomh and Kim Moir},
    title = {1st international workshop on release engineering (RELENG 2013)},
    booktitle = {ICSE},
    year = {2013},
    pages = {1545-1546},
    ee = {http://dl.acm.org/citation.cfm?id=2487076}
    }
  • B. Adams, C. Bird, F. Khomh, and K. Moir, “1st international workshop on release engineering (RELENG 2013),” in Icse, 2013, pp. 1545-1546.
    [Bibtex]
    @InProceedings{Adams1st2013-1,
    author = {Bram Adams and Christian Bird and Foutse Khomh and Kim Moir},
    title = {1st international workshop on release engineering {(RELENG} 2013)},
    booktitle = {ICSE},
    pages = {1545--1546},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • V. Arnaoudova, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A new family of software anti-patterns: linguistic anti-patterns,” in Csmr, 2013, pp. 187-196.
    [Bibtex]
    @InProceedings{ArnaoudovaNew2013,
    author = {Venera Arnaoudova and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A New Family of Software Anti-patterns: Linguistic Anti-patterns},
    booktitle = {CSMR},
    year = {2013},
    pages = {187-196},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.28}
    }
  • [PDF] V. Arnaoudova, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A new family of software anti-patterns: linguistic anti-patterns,” in Csmr, 2013, pp. 187-196.
    [Bibtex]
    @InProceedings{ArnaoudovaNew2013-1,
    author = {Venera Arnaoudova and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A New Family of Software Anti-patterns: Linguistic Anti-patterns},
    booktitle = {CSMR},
    year = {2013},
    pages = {187-196},
    ee = {http://dx.doi.org/10.1109/CSMR.2013.28, http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.28},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2013/06498467.pdf}
    }
  • H. Boucheneb, D. Lime, and O. H. Roux, “On multi-enabledness in time petri nets,” in Petri nets, 2013, pp. 130-149.
    [Bibtex]
    @InProceedings{BouchenebOn2013,
    author = {Hanifa Boucheneb and Didier Lime and Olivier H. Roux},
    title = {On Multi-enabledness in Time Petri Nets},
    booktitle = {Petri Nets},
    year = {2013},
    pages = {130-149},
    ee = {http://dx.doi.org/10.1007/978-3-642-38697-8_8}
    }
  • M. C. Desmarais and R. Naceur, “A matrix factorization method for mapping items to skills and for enhancing expert-based q-matrices,” in Aied, 2013, pp. 441-450.
    [Bibtex]
    @InProceedings{DesmaraisMatrix2013,
    author = {Michel C. Desmarais and Rhouma Naceur},
    title = {A Matrix Factorization Method for Mapping Items to Skills and for Enhancing Expert-Based Q-Matrices},
    booktitle = {AIED},
    year = {2013},
    pages = {441-450},
    ee = {http://dx.doi.org/10.1007/978-3-642-39112-5_45}
    }
  • E. Duclos, S. L. Digabel, Y. Guéhéneuc, and B. Adams, “Acre: an automated aspect creator for testing c++ applications,” in Csmr, 2013, pp. 121-130.
    [Bibtex]
    @InProceedings{DuclosACRE2013,
    author = {Etienne Duclos and S{\'e}bastien Le Digabel and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Bram Adams},
    title = {ACRE: An Automated Aspect Creator for Testing C++ Applications},
    booktitle = {CSMR},
    year = {2013},
    pages = {121-130},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.22}
    }
  • [PDF] O. El-Mahi, G. Nicolescu, G. Pesant, and G. Beltrame, “Embedded system verification through constraint-based scheduling,” in Proc. of the rapid system prototyping workshop, rsp, 2013.
    [Bibtex]
    @InProceedings{El-MahiEmbedded2013,
    author = {O. El-Mahi and G. Nicolescu and G. Pesant and G. Beltrame},
    title = {Embedded System Verification Through Constraint-Based Scheduling},
    booktitle = {Proc. of the Rapid System Prototyping Workshop, RSP},
    year = {2013},
    month = sep,
    pdf = {/pdf/Ibrahim2013.pdf}
    }
  • A. Fourmigue, G. Beltrame, and G. Nicolescu, “Explicit transient thermal simulation of liquid-cooled 3d ics,” in Date, 2013, pp. 1385-1390.
    [Bibtex]
    @InProceedings{FourmigueExplicit2013,
    author = {Alain Fourmigue and Giovanni Beltrame and Gabriela Nicolescu},
    title = {Explicit transient thermal simulation of liquid-cooled 3D ICs},
    booktitle = {DATE},
    year = {2013},
    pages = {1385-1390},
    ee = {http://dl.acm.org/citation.cfm?id=2485618}
    }
  • [PDF] A. Fourmigue, G. Beltrame, and G. Nicolescu, “Explicit transient thermal analysis of liquid-cooled 3d-ics,” in Proc. of the design automation and test in europe conference (date), 2013, pp. 1385-1390.
    [Bibtex]
    @InProceedings{FourmigueExplicit2013-1,
    author = {A. Fourmigue and G. Beltrame and G. Nicolescu},
    title = {Explicit Transient Thermal Analysis of Liquid-cooled 3D-ICs},
    booktitle = {Proc. of the Design Automation and Test in Europe Conference (DATE)},
    year = {2013},
    month = mar,
    pages = {1385-1390},
    pdf = {/pdf/Fourmigue2013.pdf}
    }
  • M. Gagnon, A. Zouaq, and L. Jean-Louis, “Can we use linked data semantic annotators for the extraction of domain-relevant expressions?,” in Www (companion volume), 2013, pp. 1239-1246.
    [Bibtex]
    @InProceedings{GagnonCan2013,
    author = {Michel Gagnon and Amal Zouaq and Ludovic Jean-Louis},
    title = {Can we use linked data semantic annotators for the extraction of domain-relevant expressions?},
    booktitle = {WWW (Companion Volume)},
    year = {2013},
    pages = {1239-1246},
    ee = {http://dl.acm.org/citation.cfm?id=2488157}
    }
  • F. Gauthier and E. Merlo, “Semantic smells and errors in access control models: a case study in php,” in Icse, 2013, pp. 1169-1172.
    [Bibtex]
    @InProceedings{GauthierSemantic2013,
    author = {Fran\c{c}ois Gauthier and Ettore Merlo},
    title = {Semantic smells and errors in access control models: a case study in PHP},
    booktitle = {ICSE},
    year = {2013},
    pages = {1169-1172},
    ee = {http://dl.acm.org/citation.cfm?id=2486952}
    }
  • O. Gendreau and P. N. Robillard, “A process practice to validate the quality of reused component documentation: a case study involving open-source components,” in Icssp, 2013, pp. 61-69.
    [Bibtex]
    @InProceedings{Gendreauprocess2013,
    author = {Olivier Gendreau and Pierre N. Robillard},
    title = {A process practice to validate the quality of reused component documentation: a case study involving open-source components},
    booktitle = {ICSSP},
    year = {2013},
    pages = {61-69},
    ee = {http://doi.acm.org/10.1145/2486046.2486059}
    }
  • D. M. Germán, B. Adams, and A. E. Hassan, “The evolution of the r software ecosystem,” in Csmr, 2013, pp. 243-252.
    [Bibtex]
    @InProceedings{GermanEvolution2013,
    author = {Daniel M. Germ{\'a}n and Bram Adams and Ahmed E. Hassan},
    title = {The Evolution of the R Software Ecosystem},
    booktitle = {CSMR},
    year = {2013},
    pages = {243-252},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.33}
    }
  • R. Hadjidj and H. Boucheneb, “Rt-studio: a tool for modular design and analysis of realtime systems using interpreted time petri nets,” in Pnse+modpe, 2013, pp. 247-254.
    [Bibtex]
    @InProceedings{HadjidjRT-Studio2013,
    author = {Rachid Hadjidj and Hanifa Boucheneb},
    title = {RT-Studio: A Tool for Modular Design and Analysis of Realtime Systems Using Interpreted Time Petri Nets},
    booktitle = {PNSE+ModPE},
    year = {2013},
    pages = {247-254},
    ee = {http://ceur-ws.org/Vol-989/paper22.pdf}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and F. Khomh, “Mining the relationship between anti-patterns dependencies and fault-proneness,” in Wcre, 2013, pp. 351-360.
    [Bibtex]
    @InProceedings{JaafarMining2013,
    author = {Fehmi Jaafar and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Foutse Khomh},
    title = {Mining the relationship between anti-patterns dependencies and fault-proneness},
    booktitle = {WCRE},
    year = {2013},
    pages = {351-360},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671310}
    }
  • F. Jaafar, Y. -, S. Hamel, and F. Khomh, “Mining the relationship between anti-patterns dependencies and fault-proneness,” in Wcre, 2013, pp. 351-360.
    [Bibtex]
    @InProceedings{JaafarMining2013-1,
    author = {Fehmi Jaafar and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel and Foutse Khomh},
    title = {Mining the relationship between anti-patterns dependencies and fault-proneness},
    booktitle = {WCRE},
    pages = {351--360},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • F. Jaafar, S. Hassaine, Y. Guéhéneuc, S. Hamel, and B. Adams, “On the relationship between program evolution and fault-proneness: an empirical study,” in Csmr, 2013, pp. 15-24.
    [Bibtex]
    @InProceedings{JaafarOn2013,
    author = {Fehmi Jaafar and Salima Hassaine and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Bram Adams},
    title = {On the Relationship between Program Evolution and Fault-Proneness: An Empirical Study},
    booktitle = {CSMR},
    year = {2013},
    pages = {15-24},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.12}
    }
  • Y. Jiang, B. Adams, and D. M. Germán, “Will my patch make it? and how fast?: case study on the linux kernel,” in Msr, 2013, pp. 101-110.
    [Bibtex]
    @InProceedings{JiangWill2013,
    author = {Yujuan Jiang and Bram Adams and Daniel M. Germ{\'a}n},
    title = {Will my patch make it? and how fast?: case study on the Linux kernel},
    booktitle = {MSR},
    year = {2013},
    pages = {101-110},
    ee = {http://dl.acm.org/citation.cfm?id=2487111}
    }
  • T. Lavoie and E. Merlo, “How much really changes? a case study of firefox version evolution using a clone detector,” in Iwsc, 2013, pp. 83-89.
    [Bibtex]
    @InProceedings{LavoieHow2013,
    author = {Thierry Lavoie and Ettore Merlo},
    title = {How much really changes? A case study of firefox version evolution using a clone detector},
    booktitle = {IWSC},
    year = {2013},
    pages = {83-89},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613048}
    }
  • M. Leotta, F. Ricca, G. Antoniol, V. Garousi, J. Zhi, and G. Ruhe, “A pilot experiment to quantify the effect of documentation accuracy on maintenance tasks,” in Icsm, 2013, pp. 428-431.
    [Bibtex]
    @InProceedings{LeottaPilot2013,
    author = {Maurizio Leotta and Filippo Ricca and Giuliano Antoniol and Vahid Garousi and Junji Zhi and G{\"u}nther Ruhe},
    title = {A Pilot Experiment to Quantify the Effect of Documentation Accuracy on Maintenance Tasks},
    booktitle = {ICSM},
    year = {2013},
    pages = {428-431},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.64},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • M. Mäntylä, F. Khomh, B. Adams, E. Engstrom, and K. Petersen, “On rapid releases and software testing,” in Icsm, 2013, pp. 20-29.
    [Bibtex]
    @InProceedings{MantylaOn2013,
    author = {Mika M{\"a}ntyl{\"a} and Foutse Khomh and Bram Adams and Emelie Engstrom and Kai Petersen},
    title = {On Rapid Releases and Software Testing},
    booktitle = {ICSM},
    year = {2013},
    pages = {20-29},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.13}
    }
  • M. Mäntylä, F. Khomh, B. Adams, E. Engström, and K. Petersen, “On rapid releases and software testing,” in Icsm, 2013, pp. 20-29.
    [Bibtex]
    @InProceedings{MantylaOn2013-1,
    author = {Mika M{\"{a}}ntyl{\"{a}} and Foutse Khomh and Bram Adams and Emelie Engstr{\"{o}}m and Kai Petersen},
    title = {On Rapid Releases and Software Testing},
    booktitle = {ICSM},
    pages = {20--29},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • E. Merlo, T. Lavoie, P. Potvin, and P. Busnel, “Large scale multi-language clone analysis in a telecommunication industrial setting,” in Iwsc, 2013, pp. 69-75.
    [Bibtex]
    @InProceedings{MerloLarge2013,
    author = {Ettore Merlo and Thierry Lavoie and Pascal Potvin and Pierre Busnel},
    title = {Large scale multi-language clone analysis in a telecommunication industrial setting},
    booktitle = {IWSC},
    year = {2013},
    pages = {69-75},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613046}
    }
  • M. Nayrolles, F. Palma, N. Moha, and Y. Guéhéneuc, “Soda: a tool support for the detection of soa antipatterns,” in Icsoc workshops, 2013, pp. 451-455.
    [Bibtex]
    @InProceedings{NayrollesSoda2013,
    author = {Mathieu Nayrolles and Francis Palma and Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Soda: A Tool Support for the Detection of SOA Antipatterns},
    booktitle = {ICSOC Workshops},
    year = {2013},
    pages = {451-455},
    ee = {http://dx.doi.org/10.1007/978-3-642-37804-1_51}
    }
  • J. Panerati, F. Sironi, M. Carminati, M. Maggio, G. Beltrame, P. J. Gmytrasiewicz, D. Sciuto, and M. D. Santambrogio, “On self-adaptive resource allocation through reinforcement learning,” in Ahs, 2013, pp. 23-30.
    [Bibtex]
    @InProceedings{PaneratiOn2013,
    author = {Jacopo Panerati and Filippo Sironi and Matteo Carminati and Martina Maggio and Giovanni Beltrame and Piotr J. Gmytrasiewicz and Donatella Sciuto and Marco D. Santambrogio},
    title = {On self-adaptive resource allocation through reinforcement learning},
    booktitle = {AHS},
    year = {2013},
    pages = {23-30},
    ee = {http://dx.doi.org/10.1109/AHS.2013.6604222}
    }
  • [PDF] J. Panerati, F. Sironi, M. Carminati, M. Maggio, G. Beltrame, P. Gmytrasiewicz, and M. Santrambrogio, “Online learning of adaptation policies within the adaptation manager framework,” in Proc. of the ieee adaptive hardware and systems conference (ahs), 2013.
    [Bibtex]
    @InProceedings{PaneratiOnline2013,
    title = {Online Learning of Adaptation Policies within the Adaptation Manager Framework},
    optvolume = {1},
    booktitle = {Proc. of the IEEE Adaptive Hardware and Systems Conference (AHS)},
    author = {Panerati, J. and Sironi, F. and Carminati, M. and Maggio, M. and Beltrame, G. and Gmytrasiewicz, P. and Santrambrogio, M.},
    year = {2013},
    month = jun,
    pdf = {/pdf/Panerati2013.pdf}
    }
  • A. Randolph, A. Imine, H. Boucheneb, and A. Quintero, “Specification and verification using alloy of optimistic access control for distributed collaborative editors,” in Fmics, 2013, pp. 184-198.
    [Bibtex]
    @InProceedings{RandolphSpecification2013,
    author = {Aurel Randolph and Abdessamad Imine and Hanifa Boucheneb and Alejandro Quintero},
    title = {Specification and Verification Using Alloy of Optimistic Access Control for Distributed Collaborative Editors},
    booktitle = {FMICS},
    year = {2013},
    pages = {184-198},
    ee = {http://dx.doi.org/10.1007/978-3-642-41010-9_13}
    }
  • A. Sabane, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A study on the relation between antipatterns and the cost of class unit testing,” in Csmr, 2013, pp. 167-176.
    [Bibtex]
    @InProceedings{SabaneStudy2013,
    author = {Aminata Sabane and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Study on the Relation between Antipatterns and the Cost of Class Unit Testing},
    booktitle = {CSMR},
    year = {2013},
    pages = {167-176},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.26}
    }
  • [PDF] A. Sabane, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A study on the relation between antipatterns and the cost of class unit testing,” in Csmr, 2013, pp. 167-176.
    [Bibtex]
    @InProceedings{SabaneStudy2013-1,
    author = {Aminata Sabane and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Study on the Relation between Antipatterns and the Cost of Class Unit Testing},
    booktitle = {CSMR},
    year = {2013},
    pages = {167-176},
    ee = {http://dx.doi.org/10.1109/CSMR.2013.26, http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.26},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2013/06498465.pdf}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Constraint-based fitness function for search-based software testing,” in Cpaior, 2013, pp. 378-385.
    [Bibtex]
    @InProceedings{SaktiConstraint-Based2013,
    author = {Abdelilah Sakti and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Gilles Pesant},
    title = {Constraint-Based Fitness Function for Search-Based Software Testing},
    booktitle = {CPAIOR},
    year = {2013},
    pages = {378-385},
    ee = {http://dx.doi.org/10.1007/978-3-642-38171-3_29}
    }
  • W. Shang, Z. M. Jiang, H. Hemmati, B. Adams, A. E. Hassan, and P. Martin, “Assisting developers of big data analytics applications when deploying on hadoop clouds,” in Icse, 2013, pp. 402-411.
    [Bibtex]
    @InProceedings{ShangAssisting2013,
    author = {Weiyi Shang and Zhen Ming Jiang and Hadi Hemmati and Bram Adams and Ahmed E. Hassan and Patrick Martin},
    title = {Assisting developers of big data analytics applications when deploying on hadoop clouds},
    booktitle = {ICSE},
    year = {2013},
    pages = {402-411},
    ee = {http://dl.acm.org/citation.cfm?id=2486842}
    }
  • Z. Sharafi, A. Marchetto, A. Susi, G. Antoniol, and Y. Guéhéneuc, “An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension,” in Icpc, 2013, pp. 33-42.
    [Bibtex]
    @InProceedings{Sharafiempirical2013,
    author = {Zohreh Sharafi and Alessandro Marchetto and Angelo Susi and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension},
    booktitle = {ICPC},
    year = {2013},
    pages = {33-42},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2013.6613831}
    }
  • Z. Sharafi, A. Marchetto, A. Susi, G. Antoniol, and Y. Guéhéneuc, “An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension,” in Icpc, 2013, pp. 33-42.
    [Bibtex]
    @InProceedings{Sharafiempirical2013-1,
    author = {Zohreh Sharafi and Alessandro Marchetto and Angelo Susi and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension},
    booktitle = {ICPC},
    year = {2013},
    pages = {33-42},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2013.6613831},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, G. Antoniol, and B. Adams, “On the effect of program exploration on maintenance tasks,” in Wcre, 2013, pp. 391-400.
    [Bibtex]
    @InProceedings{SohOn2013,
    author = {Z{\'e}phyrin Soh and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Bram Adams},
    title = {On the effect of program exploration on maintenance tasks},
    booktitle = {WCRE},
    year = {2013},
    pages = {391-400},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671314}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, G. Antoniol, and B. Adams, “On the effect of program exploration on maintenance tasks,” in Wcre, 2013, pp. 391-400.
    [Bibtex]
    @InProceedings{SohOn2013-1,
    author = {Z{\'e}phyrin Soh and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Bram Adams},
    title = {On the effect of program exploration on maintenance tasks},
    booktitle = {WCRE},
    year = {2013},
    pages = {391-400},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671314},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Z. Soh, F. Khomh, Y. -, G. Antoniol, and B. Adams, “On the effect of program exploration on maintenance tasks,” in Wcre, 2013, pp. 391-400.
    [Bibtex]
    @InProceedings{SohOn2013-2,
    author = {Z{\'{e}}phyrin Soh and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Giuliano Antoniol and Bram Adams},
    title = {On the effect of program exploration on maintenance tasks},
    booktitle = {WCRE},
    pages = {391--400},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Towards understanding how developers spend their effort during maintenance activities,” in Wcre, 2013, pp. 152-161.
    [Bibtex]
    @InProceedings{SohTowards2013,
    author = {Z{\'e}phyrin Soh and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Towards understanding how developers spend their effort during maintenance activities},
    booktitle = {WCRE},
    year = {2013},
    pages = {152-161},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671290}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Towards understanding how developers spend their effort during maintenance activities,” in Wcre, 2013, pp. 152-161.
    [Bibtex]
    @InProceedings{SohTowards2013-1,
    author = {Z{\'e}phyrin Soh and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Towards understanding how developers spend their effort during maintenance activities},
    booktitle = {WCRE},
    year = {2013},
    pages = {152-161},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671290},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Z. Soh, F. Khomh, Y. -, and G. Antoniol, “Towards understanding how developers spend their effort during maintenance activities,” in Wcre, 2013, pp. 152-161.
    [Bibtex]
    @InProceedings{SohTowards2013-2,
    author = {Z{\'{e}}phyrin Soh and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Giuliano Antoniol},
    title = {Towards understanding how developers spend their effort during maintenance activities},
    booktitle = {WCRE},
    pages = {152--161},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • A. Spaeth and M. C. Desmarais, “Combining collaborative filtering and text similarity for expert profile recommendations in social websites,” in Umap, 2013, pp. 178-189.
    [Bibtex]
    @InProceedings{SpaethCombining2013,
    author = {Alexandre Spaeth and Michel C. Desmarais},
    title = {Combining Collaborative Filtering and Text Similarity for Expert Profile Recommendations in Social Websites},
    booktitle = {UMAP},
    year = {2013},
    pages = {178-189},
    ee = {http://dx.doi.org/10.1007/978-3-642-38844-6_15}
    }
  • S. E. S. Taba, F. Khomh, Y. Zou, A. E. Hassan, and M. Nagappan, “Predicting bugs using antipatterns,” in Icsm, 2013, pp. 270-279.
    [Bibtex]
    @InProceedings{TabaPredicting2013,
    author = {Seyyed Ehsan Salamati Taba and Foutse Khomh and Ying Zou and Ahmed E. Hassan and Meiyappan Nagappan},
    title = {Predicting Bugs Using Antipatterns},
    booktitle = {ICSM},
    year = {2013},
    pages = {270-279},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.38}
    }
  • S. E. S. Taba, F. Khomh, Y. Zou, A. E. Hassan, and M. Nagappan, “Predicting bugs using antipatterns,” in Icsm, 2013, pp. 270-279.
    [Bibtex]
    @InProceedings{TabaPredicting2013-1,
    author = {Seyyed Ehsan Salamati Taba and Foutse Khomh and Ying Zou and Ahmed E. Hassan and Meiyappan Nagappan},
    title = {Predicting Bugs Using Antipatterns},
    booktitle = {ICSM},
    pages = {270--279},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • Y. Ton-That, P. N. Robillard, and M. Lavallée, “Episode measurement method: a data collection technique for observing team processes,” in Icssp, 2013, pp. 108-117.
    [Bibtex]
    @InProceedings{Ton-ThatEpisode2013,
    author = {Yvan Ton-That and Pierre N. Robillard and Mathieu Lavall{\'e}e},
    title = {Episode measurement method: a data collection technique for observing team processes},
    booktitle = {ICSSP},
    year = {2013},
    pages = {108-117},
    ee = {http://doi.acm.org/10.1145/2486046.2486066}
    }
  • S. Wang, F. Khomh, and Y. Zou, “Improving bug localization using correlations in crash reports,” in Msr, 2013, pp. 247-256.
    [Bibtex]
    @InProceedings{WangImproving2013,
    author = {Shaohua Wang and Foutse Khomh and Ying Zou},
    title = {Improving bug localization using correlations in crash reports},
    booktitle = {MSR},
    year = {2013},
    pages = {247-256},
    ee = {http://dl.acm.org/citation.cfm?id=2487135}
    }
  • S. Wang, F. Khomh, and Y. Zou, “Improving bug localization using correlations in crash reports,” in Msr, 2013, pp. 247-256.
    [Bibtex]
    @InProceedings{WangImproving2013-1,
    author = {Shaohua Wang and Foutse Khomh and Ying Zou},
    title = {Improving bug localization using correlations in crash reports},
    booktitle = {MSR},
    pages = {247--256},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • S. Xie, F. Khomh, and Y. Zou, “An empirical study of the fault-proneness of clone mutation and clone migration,” in Msr, 2013, pp. 149-158.
    [Bibtex]
    @InProceedings{Xieempirical2013,
    author = {Shuai Xie and Foutse Khomh and Ying Zou},
    title = {An empirical study of the fault-proneness of clone mutation and clone migration},
    booktitle = {MSR},
    year = {2013},
    pages = {149-158},
    ee = {http://dl.acm.org/citation.cfm?id=2487118}
    }
  • S. Xie, F. Khomh, and Y. Zou, “An empirical study of the fault-proneness of clone mutation and clone migration,” in Msr, 2013, pp. 149-158.
    [Bibtex]
    @InProceedings{Xieempirical2013-1,
    author = {Shuai Xie and Foutse Khomh and Ying Zou},
    title = {An empirical study of the fault-proneness of clone mutation and clone migration},
    booktitle = {MSR},
    pages = {149--158},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }
  • F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A. E. Hassan, “How does context affect the distribution of software maintainability metrics?,” in Icsm, 2013, pp. 350-359.
    [Bibtex]
    @InProceedings{ZhangHow2013,
    author = {Feng Zhang and Audris Mockus and Ying Zou and Foutse Khomh and Ahmed E. Hassan},
    title = {How Does Context Affect the Distribution of Software Maintainability Metrics?},
    booktitle = {ICSM},
    year = {2013},
    pages = {350-359},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.46}
    }
  • F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A. E. Hassan, “How does context affect the distribution of software maintainability metrics?,” in Icsm, 2013, pp. 350-359.
    [Bibtex]
    @InProceedings{ZhangHow2013-1,
    author = {Feng Zhang and Audris Mockus and Ying Zou and Foutse Khomh and Ahmed E. Hassan},
    title = {How Does Context Affect the Distribution of Software Maintainability Metrics?},
    booktitle = {ICSM},
    pages = {350--359},
    publisher = {{IEEE} Computer Society},
    year = {2013}
    }

2012

  • S. L. Abebe, V. Arnaoudova, P. Tonella, G. Antoniol, and Y. Guéhéneuc, “Can lexicon bad smells improve fault prediction?,” in Wcre, 2012, pp. 235-244.
    [Bibtex]
    @InProceedings{AbebeCan2012,
    author = {Surafel Lemma Abebe and Venera Arnaoudova and Paolo Tonella and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Can Lexicon Bad Smells Improve Fault Prediction?},
    booktitle = {WCRE},
    year = {2012},
    pages = {235-244},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.33}
    }
  • [PDF] S. L. Abebe, V. Arnaoudova, P. Tonella, G. Antoniol, and Y. Guéhéneuc, “Can lexicon bad smells improve fault prediction?,” in Wcre, 2012, pp. 235-244.
    [Bibtex]
    @InProceedings{AbebeCan2012-1,
    author = {Surafel Lemma Abebe and Venera Arnaoudova and Paolo Tonella and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Can Lexicon Bad Smells Improve Fault Prediction?},
    booktitle = {WCRE},
    year = {2012},
    pages = {235-244},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.33},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2012/06385119.pdf}
    }
  • F. Abouzaid, J. Mullins, M. Mazzara, and N. Dragoni, “Modelling and analysis of dynamic reconfiguration in bp-calculus,” in Kes-amsta, 2012, pp. 534-543.
    [Bibtex]
    @InProceedings{AbouzaidModelling2012,
    author = {Faisal Abouzaid and John Mullins and Manuel Mazzara and Nicola Dragoni},
    title = {Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus},
    booktitle = {KES-AMSTA},
    year = {2012},
    pages = {534-543},
    ee = {http://dx.doi.org/10.1007/978-3-642-30947-2_58}
    }
  • N. Ali, A. Sabane, Y. Guéhéneuc, and G. Antoniol, “Improving bug location using binary class relationships,” in Scam, 2012, pp. 174-183.
    [Bibtex]
    @InProceedings{AliImproving2012,
    author = {Nasir Ali and Aminata Sabane and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Improving Bug Location Using Binary Class Relationships},
    booktitle = {SCAM},
    year = {2012},
    pages = {174-183},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.26}
    }
  • N. Ali, A. Sabane, Y. Guéhéneuc, and G. Antoniol, “Improving bug location using binary class relationships,” in Scam, 2012, pp. 174-183.
    [Bibtex]
    @InProceedings{AliImproving2012-1,
    author = {Nasir Ali and Aminata Sabane and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Improving Bug Location Using Binary Class Relationships},
    booktitle = {SCAM},
    year = {2012},
    pages = {174-183},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.26},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • N. Ali, Z. Sharafi, Y. Guéhéneuc, and G. Antoniol, “An empirical study on requirements traceability using eye-tracking,” in Icsm, 2012, pp. 191-200.
    [Bibtex]
    @InProceedings{Aliempirical2012,
    author = {Nasir Ali and Zohreh Sharafi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An empirical study on requirements traceability using eye-tracking},
    booktitle = {ICSM},
    year = {2012},
    pages = {191-200},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405271}
    }
  • [PDF] N. Ali, Z. Sharafi, Y. Guéhéneuc, and G. Antoniol, “An empirical study on requirements traceability using eye-tracking,” in Icsm, 2012, pp. 191-200.
    [Bibtex]
    @InProceedings{Aliempirical2012-1,
    author = {Nasir Ali and Zohreh Sharafi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An empirical study on requirements traceability using eye-tracking},
    booktitle = {ICSM},
    year = {2012},
    pages = {191-200},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405271},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2012/06405271.pdf}
    }
  • B. Beheshti and M. Desmarais, “Improving matrix factorization techniques of student test data with partial order constraints,” in Umap, 2012, pp. 346-350.
    [Bibtex]
    @InProceedings{BeheshtiImproving2012,
    author = {Behzad Beheshti and Michel Desmarais},
    title = {Improving Matrix Factorization Techniques of Student Test Data with Partial Order Constraints},
    booktitle = {UMAP},
    year = {2012},
    pages = {346-350},
    ee = {http://dx.doi.org/10.1007/978-3-642-31454-4_33}
    }
  • B. Beheshti, M. Desmarais, and R. Naceur, “Methods to find the number of latent skills,” in Edm, 2012, pp. 81-86.
    [Bibtex]
    @InProceedings{BeheshtiMethods2012,
    author = {Behzad Beheshti and Michel Desmarais and Rhouma Naceur},
    title = {Methods to find the number of latent skills},
    booktitle = {EDM},
    year = {2012},
    pages = {81-86},
    ee = {http://educationaldatamining.org/EDM2012/uploads/procs/Full_Papers/edm2012_full_3.pdf}
    }
  • N. Bhattacharya, O. El-Mahi, E. Duclos, G. Beltrame, G. Antoniol, S. L. Digabel, and Y. Guéhéneuc, “Optimizing threads schedule alignments to expose the interference bug pattern,” in Ssbse, 2012, pp. 90-104.
    [Bibtex]
    @InProceedings{BhattacharyaOptimizing2012,
    author = {Neelesh Bhattacharya and Olfat El-Mahi and Etienne Duclos and Giovanni Beltrame and Giuliano Antoniol and S{\'e}bastien Le Digabel and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Optimizing Threads Schedule Alignments to Expose the Interference Bug Pattern},
    booktitle = {SSBSE},
    year = {2012},
    pages = {90-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_8}
    }
  • N. Bhattacharya, O. El-Mahi, E. Duclos, G. Beltrame, G. Antoniol, S. L. Digabel, and Y. Guéhéneuc, “Optimizing threads schedule alignments to expose the interference bug pattern,” in Ssbse, 2012, pp. 90-104.
    [Bibtex]
    @InProceedings{BhattacharyaOptimizing2012-1,
    author = {Neelesh Bhattacharya and Olfat El-Mahi and Etienne Duclos and Giovanni Beltrame and Giuliano Antoniol and S{\'e}bastien Le Digabel and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Optimizing Threads Schedule Alignments to Expose the Interference Bug Pattern},
    booktitle = {SSBSE},
    year = {2012},
    pages = {90-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_8},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • N. Bhattacharya, O. El-Mahi, E. Duclos, G. Beltrame, G. Antoniol, S. Le~Digabel, and Y. Gueheneuc, “Optimizing threads schedule alignments to expose the interference bug pattern,” in Intl. symp. on search based software engineering (ssbse), 2012.
    [Bibtex]
    @InProceedings{BhattacharyaOptimizing2012-3,
    author = {N. Bhattacharya and O. El-Mahi and E. Duclos and G. Beltrame and G. Antoniol and S. Le~Digabel and Y. Gueheneuc},
    title = {Optimizing Threads Schedule Alignments to Expose the Interference Bug Pattern},
    booktitle = {Intl. Symp. on Search Based Software Engineering (SSBSE)},
    year = 2012,
    month = sep
    }
  • H. Boucheneb and K. Barkaoui, “Parametric verification of timeworkflow nets,” in Seke, 2012, pp. 375-380.
    [Bibtex]
    @InProceedings{BouchenebParametric2012,
    author = {Hanifa Boucheneb and Kamel Barkaoui},
    title = {Parametric Verification of TimeWorkflow Nets},
    booktitle = {SEKE},
    year = {2012},
    pages = {375-380}
    }
  • H. Boucheneb and K. Barkaoui, “Reachability analysis of p-time petri nets with parametric markings,” in Acsd, 2012, pp. 72-81.
    [Bibtex]
    @InProceedings{BouchenebReachability2012,
    author = {Hanifa Boucheneb and Kamel Barkaoui},
    title = {Reachability Analysis of P-time Petri Nets with Parametric Markings},
    booktitle = {ACSD},
    year = {2012},
    pages = {72-81},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2012.23}
    }
  • E. Charton and M. Gagnon, “A disambiguation resource extracted from wikipedia for semantic annotation,” in Lrec, 2012, pp. 3665-3671.
    [Bibtex]
    @InProceedings{Chartondisambiguation2012,
    author = {Eric Charton and Michel Gagnon},
    title = {A disambiguation resource extracted from Wikipedia for semantic annotation},
    booktitle = {LREC},
    year = {2012},
    pages = {3665-3671},
    ee = {http://www.lrec-conf.org/proceedings/lrec2012/summaries/983.html}
    }
  • T. Lamine~Ben~Cheikh, G. Beltrame, G. Nicolescu, F. Cheriet, and S. Tahar, “Parallelization strategies of the canny edge detector for multi-core cpus and many-core gpus,” in Proc. of the ieee intl. newcas conference, 2012.
    [Bibtex]
    @InProceedings{CheikhParallelization2012,
    author = {T. Lamine~Ben~Cheikh and G. Beltrame and G. Nicolescu and F. Cheriet and S. Tahar},
    title = {Parallelization Strategies of the Canny Edge Detector for multi-core CPUs and many-core GPUs},
    booktitle = {Proc. of the IEEE Intl. NEWCAS Conference},
    year = {2012},
    month = may
    }
  • M. C. Desmarais, B. Beheshti, and R. Naceur, “Item to skills mapping: deriving a conjunctive q-matrix from data,” in Its, 2012, pp. 454-463.
    [Bibtex]
    @InProceedings{DesmaraisItem2012,
    author = {Michel C. Desmarais and Behzad Beheshti and Rhouma Naceur},
    title = {Item to Skills Mapping: Deriving a Conjunctive Q-matrix from Data},
    booktitle = {ITS},
    year = {2012},
    pages = {454-463},
    ee = {http://dx.doi.org/10.1007/978-3-642-30950-2_58}
    }
  • M. C. Desmarais, R. Naceur, and B. Beheshti, “Linear models of student skills for static data,” in Umap workshops, 2012.
    [Bibtex]
    @InProceedings{DesmaraisLinear2012,
    author = {Michel C. Desmarais and Rhouma Naceur and Behzad Beheshti},
    title = {Linear models of student skills for static data},
    booktitle = {UMAP Workshops},
    year = {2012},
    ee = {http://ceur-ws.org/Vol-872/factmod2012_paper_1.pdf}
    }
  • T. Dhaliwal, F. Khomh, Y. Zou, and A. E. Hassan, “Recovering commit dependencies for selective code integration in software product lines,” in Icsm, 2012, pp. 202-211.
    [Bibtex]
    @InProceedings{DhaliwalRecovering2012,
    author = {Tejinder Dhaliwal and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {Recovering commit dependencies for selective code integration in software product lines},
    booktitle = {ICSM},
    year = {2012},
    pages = {202-211},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405273}
    }
  • T. Dhaliwal, F. Khomh, Y. Zou, and A. E. Hassan, “Recovering commit dependencies for selective code integration in software product lines,” in Icsm, 2012, pp. 202-211.
    [Bibtex]
    @InProceedings{DhaliwalRecovering2012-1,
    author = {Tejinder Dhaliwal and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {Recovering commit dependencies for selective code integration in software product lines},
    booktitle = {ICSM},
    pages = {202--211},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • O. El-Mahi, G. Nicolescu, G. Pesant, and G. Beltrame, “Embedded system verification through constraint-based scheduling,” in Proc. of the ieee intl. high level design validation and test workshop, hldvt, 2012.
    [Bibtex]
    @InProceedings{El-MahiEmbedded2012,
    author = {O. El-Mahi and G. Nicolescu and G. Pesant and G. Beltrame},
    title = {Embedded System Verification Through Constraint-Based Scheduling},
    booktitle = {Proc. of the IEEE Intl. High Level Design Validation and Test Workshop, HLDVT},
    year = {2012},
    month = nov
    }
  • F. Gauthier and E. Merlo, “Alias-aware propagation of simple pattern-based properties in php applications,” in Scam, 2012, pp. 44-53.
    [Bibtex]
    @InProceedings{GauthierAlias-Aware2012,
    author = {Fran\c{c}ois Gauthier and Ettore Merlo},
    title = {Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications},
    booktitle = {SCAM},
    year = {2012},
    pages = {44-53},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.19}
    }
  • F. Gauthier and E. Merlo, “Fast detection of access control vulnerabilities in php applications,” in Wcre, 2012, pp. 247-256.
    [Bibtex]
    @InProceedings{GauthierFast2012,
    author = {Fran\c{c}ois Gauthier and Ettore Merlo},
    title = {Fast Detection of Access Control Vulnerabilities in PHP Applications},
    booktitle = {WCRE},
    year = {2012},
    pages = {247-256},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.34}
    }
  • F. Gauthier and E. Merlo, “Investigation of access control models with formal concept analysis: a case study,” in Csmr, 2012, pp. 397-402.
    [Bibtex]
    @InProceedings{GauthierInvestigation2012,
    author = {Fran\c{c}ois Gauthier and Ettore Merlo},
    title = {Investigation of Access Control Models with Formal Concept Analysis: A Case Study},
    booktitle = {CSMR},
    year = {2012},
    pages = {397-402},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.50}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, and G. Antoniol, “The quest for ubiquity: a roadmap for software and systems traceability research,” in Re, 2012, pp. 71-80.
    [Bibtex]
    @InProceedings{Gotelquest2012,
    author = {Orlena Gotel and Jane Cleland-Huang and Jane Huffman Hayes and Andrea Zisman and Alexander Egyed and Paul Gr{\"u}nbacher and Giuliano Antoniol},
    title = {The quest for Ubiquity: A roadmap for software and systems traceability research},
    booktitle = {RE},
    year = {2012},
    pages = {71-80},
    ee = {http://dx.doi.org/10.1109/RE.2012.6345841}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, and G. Antoniol, “The quest for ubiquity: a roadmap for software and systems traceability research,” in Re, 2012, pp. 71-80.
    [Bibtex]
    @InProceedings{Gotelquest2012-1,
    author = {Orlena Gotel and Jane Cleland-Huang and Jane Huffman Hayes and Andrea Zisman and Alexander Egyed and Paul Gr{\"u}nbacher and Giuliano Antoniol},
    title = {The quest for Ubiquity: A roadmap for software and systems traceability research},
    booktitle = {RE},
    year = {2012},
    pages = {71-80},
    ee = {http://dx.doi.org/10.1109/RE.2012.6345841},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • L. Guerrouj, P. Galinier, Y. Guéhéneuc, G. Antoniol, and M. D. Penta, “Tris: a fast and accurate identifiers splitting and expansion algorithm,” in Wcre, 2012, pp. 103-112.
    [Bibtex]
    @InProceedings{GuerroujTRIS2012,
    author = {Latifa Guerrouj and Philippe Galinier and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Massimiliano Di Penta},
    title = {TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm},
    booktitle = {WCRE},
    year = {2012},
    pages = {103-112},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.20}
    }
  • L. Guerrouj, P. Galinier, Y. Guéhéneuc, G. Antoniol, and M. D. Penta, “Tris: a fast and accurate identifiers splitting and expansion algorithm,” in Wcre, 2012, pp. 103-112.
    [Bibtex]
    @InProceedings{GuerroujTRIS2012-1,
    author = {Latifa Guerrouj and Philippe Galinier and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Massimiliano Di Penta},
    title = {TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm},
    booktitle = {WCRE},
    year = {2012},
    pages = {103-112},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.20},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • S. Hassaine, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Advise: architectural decay in software evolution,” in Csmr, 2012, pp. 267-276.
    [Bibtex]
    @InProceedings{HassaineADvISE2012,
    author = {Salima Hassaine and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {ADvISE: Architectural Decay in Software Evolution},
    booktitle = {CSMR},
    year = {2012},
    pages = {267-276},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.34}
    }
  • S. Hassaine, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Advise: architectural decay in software evolution,” in Csmr, 2012, pp. 267-276.
    [Bibtex]
    @InProceedings{HassaineADvISE2012-1,
    author = {Salima Hassaine and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {ADvISE: Architectural Decay in Software Evolution},
    booktitle = {CSMR},
    year = {2012},
    pages = {267-276},
    ee = {http://dx.doi.org/10.1109/CSMR.2012.34, http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.34},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Khomh, H. Yuan, and Y. Zou, “Adapting linux for mobile platforms: an empirical study of android,” in Icsm, 2012, pp. 629-632.
    [Bibtex]
    @InProceedings{KhomhAdapting2012,
    author = {Foutse Khomh and Hao Yuan and Ying Zou},
    title = {Adapting Linux for mobile platforms: An empirical study of Android},
    booktitle = {ICSM},
    year = {2012},
    pages = {629-632},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405339}
    }
  • F. Khomh, H. Yuan, and Y. Zou, “Adapting linux for mobile platforms: an empirical study of android,” in Icsm, 2012, pp. 629-632.
    [Bibtex]
    @InProceedings{KhomhAdapting2012-1,
    author = {Foutse Khomh and Hao Yuan and Ying Zou},
    title = {Adapting Linux for mobile platforms: An empirical study of Android},
    booktitle = {ICSM},
    pages = {629--632},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • F. Khomh, T. Dhaliwal, Y. Zou, and B. Adams, “Do faster releases improve software quality? an empirical case study of mozilla firefox,” in Msr, 2012, pp. 179-188.
    [Bibtex]
    @InProceedings{KhomhDo2012,
    author = {Foutse Khomh and Tejinder Dhaliwal and Ying Zou and Bram Adams},
    title = {Do faster releases improve software quality? An empirical case study of Mozilla Firefox},
    booktitle = {MSR},
    year = {2012},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224279}
    }
  • F. Khomh, T. Dhaliwal, Y. Zou, and B. Adams, “Do faster releases improve software quality? an empirical case study of mozilla firefox,” in Msr, 2012, pp. 179-188.
    [Bibtex]
    @InProceedings{KhomhDo2012-1,
    author = {Foutse Khomh and Tejinder Dhaliwal and Ying Zou and Bram Adams},
    title = {Do faster releases improve software quality? An empirical case study of Mozilla Firefox},
    booktitle = {MSR},
    pages = {179--188},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • M. Lavallée and P. N. Robillard, “The impacts of software process improvement on developers: a systematic review,” in Icse, 2012, pp. 113-122.
    [Bibtex]
    @InProceedings{Lavalleeimpacts2012,
    author = {Mathieu Lavall{\'e}e and Pierre N. Robillard},
    title = {The impacts of software process improvement on developers: A systematic review},
    booktitle = {ICSE},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227201}
    }
  • T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, “Inferring repository file structure modifications using nearest-neighbor clone detection,” in Wcre, 2012, pp. 325-334.
    [Bibtex]
    @InProceedings{LavoieInferring2012,
    author = {Thierry Lavoie and Foutse Khomh and Ettore Merlo and Ying Zou},
    title = {Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection},
    booktitle = {WCRE},
    year = {2012},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.42}
    }
  • T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, “Inferring repository file structure modifications using nearest-neighbor clone detection,” in Wcre, 2012, pp. 325-334.
    [Bibtex]
    @InProceedings{LavoieInferring2012-1,
    author = {Thierry Lavoie and Foutse Khomh and Ettore Merlo and Ying Zou},
    title = {Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection},
    booktitle = {WCRE},
    pages = {325--334},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • T. Lavoie and E. Merlo, “An accurate estimation of the levenshtein distance using metric trees and manhattan distance,” in Iwsc, 2012, pp. 1-7.
    [Bibtex]
    @InProceedings{Lavoieaccurate2012,
    author = {Thierry Lavoie and Ettore Merlo},
    title = {An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance},
    booktitle = {IWSC},
    year = {2012},
    pages = {1-7},
    ee = {http://dx.doi.org/10.1109/IWSC.2012.6227861}
    }
  • D. Letarte, F. Gauthier, E. Merlo, N. Sutyanyong, and C. Zuzarte, “Targeted genetic test sql generation for the db2 database,” in Dbtest, 2012, p. 5.
    [Bibtex]
    @InProceedings{LetarteTargeted2012,
    author = {Dominic Letarte and Fran\c{c}ois Gauthier and Ettore Merlo and Nattavut Sutyanyong and Calisto Zuzarte},
    title = {Targeted genetic test SQL generation for the DB2 database},
    booktitle = {DBTest},
    year = {2012},
    pages = {5},
    ee = {http://doi.acm.org/10.1145/2304510.2304517}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, and E. Aïmeur, “Smurf: a svm-based incremental anti-pattern detection approach,” in Wcre, 2012, pp. 466-475.
    [Bibtex]
    @InProceedings{MaigaSMURF2012,
    author = {Abdou Maiga and Nasir Ali and Neelesh Bhattacharya and Aminata Sabane and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Esma A\"{\i}meur},
    title = {SMURF: A SVM-based Incremental Anti-pattern Detection Approach},
    booktitle = {WCRE},
    year = {2012},
    pages = {466-475},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.56}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, G. Antoniol, and E. Aïmeur, “Support vector machines for anti-pattern detection,” in Ase, 2012, pp. 278-281.
    [Bibtex]
    @InProceedings{MaigaSupport2012,
    author = {Abdou Maiga and Nasir Ali and Neelesh Bhattacharya and Aminata Sabane and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Esma A\"{\i}meur},
    title = {Support vector machines for anti-pattern detection},
    booktitle = {ASE},
    year = {2012},
    pages = {278-281},
    ee = {http://doi.acm.org/10.1145/2351676.2351723}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, G. Antoniol, and E. Aïmeur, “Support vector machines for anti-pattern detection,” in Ase, 2012, pp. 278-281.
    [Bibtex]
    @InProceedings{MaigaSupport2012-1,
    author = {Abdou Maiga and Nasir Ali and Neelesh Bhattacharya and Aminata Sabane and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Esma A\"{\i}meur},
    title = {Support vector machines for anti-pattern detection},
    booktitle = {ASE},
    year = {2012},
    pages = {278-281},
    ee = {http://doi.acm.org/10.1145/2351676.2351723},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • S. Medini, G. Antoniol, Y. Guéhéneuc, M. D. Penta, and P. Tonella, “Scan: an approach to label and relate execution trace segments,” in Wcre, 2012, pp. 135-144.
    [Bibtex]
    @InProceedings{MediniSCAN2012,
    author = {Soumaya Medini and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Massimiliano Di Penta and Paolo Tonella},
    title = {SCAN: An Approach to Label and Relate Execution Trace Segments},
    booktitle = {WCRE},
    year = {2012},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.23}
    }
  • [PDF] S. Medini, G. Antoniol, Y. Guéhéneuc, M. D. Penta, and P. Tonella, “Scan: an approach to label and relate execution trace segments,” in Wcre, 2012, pp. 135-144.
    [Bibtex]
    @InProceedings{MediniSCAN2012-1,
    author = {Soumaya Medini and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Massimiliano Di Penta and Paolo Tonella},
    title = {SCAN: An Approach to Label and Relate Execution Trace Segments},
    booktitle = {WCRE},
    year = {2012},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.23},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2012/06385109.pdf}
    }
  • N. Moha, F. Palma, M. Nayrolles, B. J. Conseil, Y. Guéhéneuc, B. Baudry, and J. Jézéquel, “Specification and detection of soa antipatterns,” in Icsoc, 2012, pp. 1-16.
    [Bibtex]
    @InProceedings{MohaSpecification2012,
    author = {Naouel Moha and Francis Palma and Mathieu Nayrolles and Benjamin Joyen Conseil and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Benoit Baudry and Jean-Marc J{\'e}z{\'e}quel},
    title = {Specification and Detection of SOA Antipatterns},
    booktitle = {ICSOC},
    year = {2012},
    pages = {1-16},
    ee = {http://dx.doi.org/10.1007/978-3-642-34321-6_1}
    }
  • R. Nagano, H. Nakamura, Y. Kamei, B. Adams, K. Hisazumi, N. Ubayashi, and A. Fukuda, “Using the gpgpu for scaling up mining software repositories,” in Icse, 2012, pp. 1435-1436.
    [Bibtex]
    @InProceedings{NaganoUsing2012,
    author = {Rina Nagano and Hiroki Nakamura and Yasutaka Kamei and Bram Adams and Kenji Hisazumi and Naoyasu Ubayashi and Akira Fukuda},
    title = {Using the GPGPU for scaling up Mining Software Repositories},
    booktitle = {ICSE},
    year = {2012},
    pages = {1435-1436},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227077}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated detection of performance regressions using statistical process control techniques,” in Icpe, 2012, pp. 299-310.
    [Bibtex]
    @InProceedings{NguyenAutomated2012,
    author = {Thanh H. D. Nguyen and Bram Adams and Zhen Ming Jiang and Ahmed E. Hassan and Mohamed N. Nasser and Parminder Flora},
    title = {Automated detection of performance regressions using statistical process control techniques},
    booktitle = {ICPE},
    year = {2012},
    pages = {299-310},
    ee = {http://doi.acm.org/10.1145/2188286.2188344}
    }
  • M. Ouellet, E. Merlo, N. Sozen, and M. Gagnon, “Locating features in dynamically configured avionics software,” in Icse, 2012, pp. 1453-1454.
    [Bibtex]
    @InProceedings{OuelletLocating2012,
    author = {Maxime Ouellet and Ettore Merlo and Neset Sozen and Martin Gagnon},
    title = {Locating features in dynamically configured avionics software},
    booktitle = {ICSE},
    year = {2012},
    pages = {1453-1454},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227068}
    }
  • H. Ould-Slimane, M. Bande, and H. Boucheneb, “Wiseshare: a collaborative environment for knowledge sharing governed by abac policies,” in Collaboratecom, 2012, pp. 21-29.
    [Bibtex]
    @InProceedings{Ould-SlimaneWiseShare2012,
    author = {Hakima Ould-Slimane and Moustapha Bande and Hanifa Boucheneb},
    title = {WiseShare: A collaborative environment for knowledge sharing governed by ABAC policies},
    booktitle = {CollaborateCom},
    year = {2012},
    pages = {21-29},
    ee = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6450889}
    }
  • M. D. Penta, G. Antoniol, D. M. Germán, Y. Guéhéneuc, and B. Adams, “Five days of empirical software engineering: the pased experience,” in Icse, 2012, pp. 1255-1258.
    [Bibtex]
    @InProceedings{PentaFive2012,
    author = {Massimiliano Di Penta and Giuliano Antoniol and Daniel M. Germ{\'a}n and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Bram Adams},
    title = {Five days of empirical software engineering: The PASED experience},
    booktitle = {ICSE},
    year = {2012},
    pages = {1255-1258},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227017}
    }
  • M. D. Penta, G. Antoniol, D. M. Germán, Y. Guéhéneuc, and B. Adams, “Five days of empirical software engineering: the pased experience,” in Icse, 2012, pp. 1255-1258.
    [Bibtex]
    @InProceedings{PentaFive2012-1,
    author = {Massimiliano Di Penta and Giuliano Antoniol and Daniel M. Germ{\'a}n and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Bram Adams},
    title = {Five days of empirical software engineering: The PASED experience},
    booktitle = {ICSE},
    year = {2012},
    pages = {1255-1258},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227017},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • A. Randolph, H. Boucheneb, A. Imine, and A. Quintero, “On consistency of operational transformation approach,” in Infinity, 2012, pp. 45-59.
    [Bibtex]
    @InProceedings{RandolphOn2012,
    author = {Aurel Randolph and Hanifa Boucheneb and Abdessamad Imine and Alejandro Quintero},
    title = {On Consistency of Operational Transformation Approach},
    booktitle = {Infinity},
    year = {2012},
    pages = {45-59},
    ee = {http://dx.doi.org/10.4204/EPTCS.107.5}
    }
  • P. N. Robillard and M. Lavallée, “Software team processes: a taxonomy,” in Icssp, 2012, pp. 101-109.
    [Bibtex]
    @InProceedings{RobillardSoftware2012,
    author = {Pierre N. Robillard and Mathieu Lavall{\'e}e},
    title = {Software team processes: A taxonomy},
    booktitle = {ICSSP},
    year = {2012},
    pages = {101-109},
    ee = {http://dx.doi.org/10.1109/ICSSP.2012.6225952}
    }
  • D. Romano, P. Raila, M. Pinzger, and F. Khomh, “Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes,” in Wcre, 2012, pp. 437-446.
    [Bibtex]
    @InProceedings{RomanoAnalyzing2012,
    author = {Daniele Romano and Paulius Raila and Martin Pinzger and Foutse Khomh},
    title = {Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes},
    booktitle = {WCRE},
    year = {2012},
    pages = {437-446},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.53}
    }
  • D. Romano, P. Raila, M. Pinzger, and F. Khomh, “Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes,” in Wcre, 2012, pp. 437-446.
    [Bibtex]
    @InProceedings{RomanoAnalyzing2012-1,
    author = {Daniele Romano and Paulius Raila and Martin Pinzger and Foutse Khomh},
    title = {Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes},
    booktitle = {WCRE},
    pages = {437--446},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • I. M. J. Ruiz, M. Nagappan, B. Adams, and A. E. Hassan, “Understanding reuse in the android market,” in Icpc, 2012, pp. 113-122.
    [Bibtex]
    @InProceedings{RuizUnderstanding2012,
    author = {Israel J. Mojica Ruiz and Meiyappan Nagappan and Bram Adams and Ahmed E. Hassan},
    title = {Understanding reuse in the Android Market},
    booktitle = {ICPC},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240477}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Boosting search based testing by using constraint based testing,” in Ssbse, 2012, pp. 213-227.
    [Bibtex]
    @InProceedings{SaktiBoosting2012,
    author = {Abdelilah Sakti and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Gilles Pesant},
    title = {Boosting Search Based Testing by Using Constraint Based Testing},
    booktitle = {SSBSE},
    year = {2012},
    pages = {213-227},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_16}
    }
  • Z. Sharafi, Z. Soh, Y. Guéhéneuc, and G. Antoniol, “Women and men – different but equal: on the impact of identifier style on source code reading,” in Icpc, 2012, pp. 27-36.
    [Bibtex]
    @InProceedings{SharafiWomen2012,
    author = {Zohreh Sharafi and Z{\'e}phyrin Soh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Women and men - Different but equal: On the impact of identifier style on source code reading},
    booktitle = {ICPC},
    year = {2012},
    pages = {27-36},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240505}
    }
  • Z. Sharafi, Z. Soh, Y. Guéhéneuc, and G. Antoniol, “Women and men – different but equal: on the impact of identifier style on source code reading,” in Icpc, 2012, pp. 27-36.
    [Bibtex]
    @InProceedings{SharafiWomen2012-1,
    author = {Zohreh Sharafi and Z{\'e}phyrin Soh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Women and men - Different but equal: On the impact of identifier style on source code reading},
    booktitle = {ICPC},
    year = {2012},
    pages = {27-36},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240505},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • E. Shihab, A. E. Hassan, B. Adams, and Z. M. Jiang, “An industrial study on the risk of software changes,” in Sigsoft fse, 2012, p. 62.
    [Bibtex]
    @InProceedings{Shihabindustrial2012,
    author = {Emad Shihab and Ahmed E. Hassan and Bram Adams and Zhen Ming Jiang},
    title = {An industrial study on the risk of software changes},
    booktitle = {SIGSOFT FSE},
    year = {2012},
    pages = {62},
    ee = {http://doi.acm.org/10.1145/2393596.2393670}
    }
  • Z. Soh, Z. Sharafi, B. V. den Plas, G. C. Porras, Y. Guéhéneuc, and G. Antoniol, “Professional status and expertise for uml class diagram comprehension: an empirical study,” in Icpc, 2012, pp. 163-172.
    [Bibtex]
    @InProceedings{SohProfessional2012,
    author = {Z{\'e}phyrin Soh and Zohreh Sharafi and Bertrand Van den Plas and Gerardo Cepeda Porras and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Professional status and expertise for UML class diagram comprehension: An empirical study},
    booktitle = {ICPC},
    year = {2012},
    pages = {163-172},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240484}
    }
  • Z. Soh, Z. Sharafi, B. V. den Plas, G. C. Porras, Y. Guéhéneuc, and G. Antoniol, “Professional status and expertise for uml class diagram comprehension: an empirical study,” in Icpc, 2012, pp. 163-172.
    [Bibtex]
    @InProceedings{SohProfessional2012-1,
    author = {Z{\'e}phyrin Soh and Zohreh Sharafi and Bertrand Van den Plas and Gerardo Cepeda Porras and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Professional status and expertise for UML class diagram comprehension: An empirical study},
    booktitle = {ICPC},
    year = {2012},
    pages = {163-172},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240484},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • R. Suvorov, M. Nagappan, A. E. Hassan, Y. Zou, and B. Adams, “An empirical study of build system migrations in practice: case studies on kde and the linux kernel,” in Icsm, 2012, pp. 160-169.
    [Bibtex]
    @InProceedings{Suvorovempirical2012,
    author = {Roman Suvorov and Meiyappan Nagappan and Ahmed E. Hassan and Ying Zou and Bram Adams},
    title = {An empirical study of build system migrations in practice: Case studies on KDE and the Linux kernel},
    booktitle = {ICSM},
    year = {2012},
    pages = {160-169},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405267}
    }
  • B. Upadhyaya, F. Khomh, and Y. Zou, “Extracting restful services from web applications,” in Soca, 2012, pp. 1-4.
    [Bibtex]
    @InProceedings{UpadhyayaExtracting2012,
    author = {Bipin Upadhyaya and Foutse Khomh and Ying Zou},
    title = {Extracting RESTful services from Web applications},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-4},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449448}
    }
  • B. Upadhyaya, F. Khomh, and Y. Zou, “Extracting restful services from web applications,” in Soca, 2012, pp. 1-4.
    [Bibtex]
    @InProceedings{UpadhyayaExtracting2012-1,
    author = {Bipin Upadhyaya and Foutse Khomh and Ying Zou},
    title = {Extracting RESTful services from Web applications},
    booktitle = {SOCA},
    pages = {1--4},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • B. Upadhyaya, F. Khomh, Y. Zou, A. Lau, and J. Ng, “A concept analysis approach for guiding users in service discovery,” in Soca, 2012, pp. 1-8.
    [Bibtex]
    @InProceedings{Upadhyayaconcept2012,
    author = {Bipin Upadhyaya and Foutse Khomh and Ying Zou and Alex Lau and Joanna Ng},
    title = {A concept analysis approach for guiding users in service discovery},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-8},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449462}
    }
  • B. Upadhyaya, F. Khomh, Y. Zou, A. Lau, and J. Ng, “A concept analysis approach for guiding users in service discovery,” in Soca, 2012, pp. 1-8.
    [Bibtex]
    @InProceedings{Upadhyayaconcept2012-1,
    author = {Bipin Upadhyaya and Foutse Khomh and Ying Zou and Alex Lau and Joanna Ng},
    title = {A concept analysis approach for guiding users in service discovery},
    booktitle = {SOCA},
    pages = {1--8},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A large scale empirical study on user-centric performance analysis,” in Icst, 2012, pp. 410-419.
    [Bibtex]
    @InProceedings{ZamanLarge2012,
    author = {Shahed Zaman and Bram Adams and Ahmed E. Hassan},
    title = {A Large Scale Empirical Study on User-Centric Performance Analysis},
    booktitle = {ICST},
    year = {2012},
    pages = {410-419},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICST.2012.121}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A qualitative study on performance bugs,” in Msr, 2012, pp. 199-208.
    [Bibtex]
    @InProceedings{Zamanqualitative2012,
    author = {Shahed Zaman and Bram Adams and Ahmed E. Hassan},
    title = {A qualitative study on performance bugs},
    booktitle = {MSR},
    year = {2012},
    pages = {199-208},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224281}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study on factors impacting bug fixing time,” in Wcre, 2012, pp. 225-234.
    [Bibtex]
    @InProceedings{ZhangEmpirical2012,
    author = {Feng Zhang and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {An Empirical Study on Factors Impacting Bug Fixing Time},
    booktitle = {WCRE},
    year = {2012},
    pages = {225-234},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.32}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study of the effect of file editing patterns on software quality,” in Wcre, 2012, pp. 456-465.
    [Bibtex]
    @InProceedings{ZhangEmpirical2012-1,
    author = {Feng Zhang and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {An Empirical Study of the Effect of File Editing Patterns on Software Quality},
    booktitle = {WCRE},
    year = {2012},
    pages = {456-465},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.55}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study on factors impacting bug fixing time,” in Wcre, 2012, pp. 225-234.
    [Bibtex]
    @InProceedings{ZhangEmpirical2012-2,
    author = {Feng Zhang and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {An Empirical Study on Factors Impacting Bug Fixing Time},
    booktitle = {WCRE},
    pages = {225--234},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study of the effect of file editing patterns on software quality,” in Wcre, 2012, pp. 456-465.
    [Bibtex]
    @InProceedings{ZhangEmpirical2012-3,
    author = {Feng Zhang and Foutse Khomh and Ying Zou and Ahmed E. Hassan},
    title = {An Empirical Study of the Effect of File Editing Patterns on Software Quality},
    booktitle = {WCRE},
    pages = {456--465},
    publisher = {{IEEE} Computer Society},
    year = {2012}
    }

2011

  • M. Abbes, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension,” in Csmr, 2011, pp. 181-190.
    [Bibtex]
    @InProceedings{AbbesEmpirical2011,
    author = {Marwen Abbes and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension},
    booktitle = {CSMR},
    year = {2011},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.24}
    }
  • M. Abbes, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension,” in Csmr, 2011, pp. 181-190.
    [Bibtex]
    @InProceedings{AbbesEmpirical2011-1,
    author = {Marwen Abbes and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension},
    booktitle = {CSMR},
    year = {2011},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.24},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • M. Abbes, F. Khomh, Y. -, and G. Antoniol, “An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension,” in Csmr, 2011, pp. 181-190.
    [Bibtex]
    @InProceedings{AbbesEmpirical2011-2,
    author = {Marwen Abbes and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Giuliano Antoniol},
    title = {An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension},
    booktitle = {CSMR},
    pages = {181--190},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • N. Ali, W. Wu, G. Antoniol, M. D. Penta, Y. Guéhéneuc, and J. H. Hayes, “Moms: multi-objective miniaturization of software,” in Icsm, 2011, pp. 153-162.
    [Bibtex]
    @InProceedings{AliMoMS2011,
    author = {Nasir Ali and Wei Wu and Giuliano Antoniol and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Jane Huffman Hayes},
    title = {MoMS: Multi-objective miniaturization of software},
    booktitle = {ICSM},
    year = {2011},
    pages = {153-162},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080782}
    }
  • N. Ali, W. Wu, G. Antoniol, M. D. Penta, Y. Guéhéneuc, and J. H. Hayes, “Moms: multi-objective miniaturization of software,” in Icsm, 2011, pp. 153-162.
    [Bibtex]
    @InProceedings{AliMoMS2011-1,
    author = {Nasir Ali and Wei Wu and Giuliano Antoniol and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Jane Huffman Hayes},
    title = {MoMS: Multi-objective miniaturization of software},
    booktitle = {ICSM},
    year = {2011},
    pages = {153-162},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080782},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Requirements traceability for object oriented systems by partitioning source code,” in Wcre, 2011, pp. 45-54.
    [Bibtex]
    @InProceedings{AliRequirements2011,
    author = {Nasir Ali and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Requirements Traceability for Object Oriented Systems by Partitioning Source Code},
    booktitle = {WCRE},
    year = {2011},
    pages = {45-54},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.16}
    }
  • [PDF] N. Ali, Y. Guéhéneuc, and G. Antoniol, “Requirements traceability for object oriented systems by partitioning source code,” in Wcre, 2011, pp. 45-54.
    [Bibtex]
    @InProceedings{AliRequirements2011-1,
    author = {Nasir Ali and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Requirements Traceability for Object Oriented Systems by Partitioning Source Code},
    booktitle = {WCRE},
    year = {2011},
    pages = {45-54},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.16},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/06079774.pdf}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Trust-based requirements traceability,” in Icpc, 2011, pp. 111-120.
    [Bibtex]
    @InProceedings{AliTrust-Based2011,
    author = {Nasir Ali and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Trust-Based Requirements Traceability},
    booktitle = {ICPC},
    year = {2011},
    pages = {111-120},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.42}
    }
  • [PDF] N. Ali, Y. Guéhéneuc, and G. Antoniol, “Trust-based requirements traceability,” in Icpc, 2011, pp. 111-120.
    [Bibtex]
    @InProceedings{AliTrust-Based2011-1,
    author = {Nasir Ali and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Trust-Based Requirements Traceability},
    booktitle = {ICPC},
    year = {2011},
    pages = {111-120},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.42},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/05970169.pdf}
    }
  • L. Barbour, F. Khomh, and Y. Zou, “Late propagation in software clones,” in Icsm, 2011, pp. 273-282.
    [Bibtex]
    @InProceedings{BarbourLate2011,
    author = {Liliane Barbour and Foutse Khomh and Ying Zou},
    title = {Late propagation in software clones},
    booktitle = {ICSM},
    year = {2011},
    pages = {273-282},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080794}
    }
  • L. Barbour, F. Khomh, and Y. Zou, “Late propagation in software clones,” in Icsm, 2011, pp. 273-282.
    [Bibtex]
    @InProceedings{BarbourLate2011-1,
    author = {Liliane Barbour and Foutse Khomh and Ying Zou},
    title = {Late propagation in software clones},
    booktitle = {ICSM},
    pages = {273--282},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • A. Belderrar, S. Kpodjedo, Y. Guéhéneuc, G. Antoniol, and P. Galinier, “Sub-graph mining: identifying micro-architectures in evolving object-oriented software,” in Csmr, 2011, pp. 171-180.
    [Bibtex]
    @InProceedings{BelderrarSub-graph2011,
    author = {Ahmed Belderrar and Segla Kpodjedo and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Philippe Galinier},
    title = {Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software},
    booktitle = {CSMR},
    year = {2011},
    pages = {171-180},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.23}
    }
  • [PDF] A. Belderrar, S. Kpodjedo, Y. Guéhéneuc, G. Antoniol, and P. Galinier, “Sub-graph mining: identifying micro-architectures in evolving object-oriented software,” in Csmr, 2011, pp. 171-180.
    [Bibtex]
    @InProceedings{BelderrarSub-graph2011-1,
    author = {Ahmed Belderrar and Segla Kpodjedo and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Philippe Galinier},
    title = {Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software},
    booktitle = {CSMR},
    year = {2011},
    pages = {171-180},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.23},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/05741259.pdf}
    }
  • G. Beltrame and G. Nicolescu, “A multi-objective decision-theoretic exploration algorithm for platform-based design,” in Proc. of design, automation and test in europe (date), 2011, pp. 1192-1195.
    [Bibtex]
    @InProceedings{BeltrameMulti-Objective2011,
    title = {A Multi-Objective Decision-Theoretic Exploration Algorithm for Platform-Based Design},
    optvolume = {1},
    booktitle = {Proc. of Design, Automation and Test in Europe (DATE)},
    author = {G. Beltrame and G. Nicolescu},
    year = {2011},
    month = apr,
    pages = {1192--1195}
    }
  • G. Beltrame and G. Nicolescu, “A multi-objective decision-theoretic exploration algorithm for platform-based design,” in Date, 2011, pp. 1192-1195.
    [Bibtex]
    @InProceedings{Beltramemulti-objective2011-1,
    author = {Giovanni Beltrame and Gabriela Nicolescu},
    title = {A multi-objective decision-theoretic exploration algorithm for platform-based design},
    booktitle = {DATE},
    year = {2011},
    pages = {1192-1195},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763311}
    }
  • G. Benattar, B. Bérard, D. Lime, J. Mullins, O. H. Roux, and M. Sassolas, “Channel synthesis for finite transducers,” in Afl, 2011, pp. 79-92.
    [Bibtex]
    @InProceedings{BenattarChannel2011,
    author = {Gilles Benattar and B{\'e}atrice B{\'e}rard and Didier Lime and John Mullins and Olivier H. Roux and Mathieu Sassolas},
    title = {Channel Synthesis for Finite Transducers},
    booktitle = {AFL},
    year = {2011},
    pages = {79-92}
    }
  • N. Bettenburg, B. Adams, A. E. Hassan, and M. Smidt, “A lightweight approach to uncover technical artifacts in unstructured data,” in Icpc, 2011, pp. 185-188.
    [Bibtex]
    @InProceedings{BettenburgLightweight2011,
    author = {Nicolas Bettenburg and Bram Adams and Ahmed E. Hassan and Michel Smidt},
    title = {A Lightweight Approach to Uncover Technical Artifacts in Unstructured Data},
    booktitle = {ICPC},
    year = {2011},
    pages = {185-188},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.36}
    }
  • N. Bhattacharya, A. Sakti, G. Antoniol, Y. Guéhéneuc, and G. Pesant, “Divide-by-zero exception raising via branch coverage,” in Ssbse, 2011, pp. 204-218.
    [Bibtex]
    @InProceedings{BhattacharyaDivide-by-Zero2011,
    author = {Neelesh Bhattacharya and Abdelilah Sakti and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Gilles Pesant},
    title = {Divide-by-Zero Exception Raising via Branch Coverage},
    booktitle = {SSBSE},
    year = {2011},
    pages = {204-218},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_19}
    }
  • [PDF] N. Bhattacharya, A. Sakti, G. Antoniol, Y. Guéhéneuc, and G. Pesant, “Divide-by-zero exception raising via branch coverage,” in Ssbse, 2011, pp. 204-218.
    [Bibtex]
    @InProceedings{BhattacharyaDivide-by-Zero2011-1,
    author = {Neelesh Bhattacharya and Abdelilah Sakti and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Gilles Pesant},
    title = {Divide-by-Zero Exception Raising via Branch Coverage},
    booktitle = {SSBSE},
    year = {2011},
    pages = {204-218},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_19},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/chp3A1010072F978364223716419.pdf}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Automatic semantic web annotation of named entities,” in Canadian conference on ai, 2011, pp. 74-85.
    [Bibtex]
    @InProceedings{ChartonAutomatic2011,
    author = {Eric Charton and Michel Gagnon and Beno\^{\i}t Ozell},
    title = {Automatic Semantic Web Annotation of Named Entities},
    booktitle = {Canadian Conference on AI},
    year = {2011},
    pages = {74-85},
    ee = {http://dx.doi.org/10.1007/978-3-642-21043-3_10}
    }
  • M. Desmarais, “Conditions for effectively deriving a q-matrix from data with non-negative matrix factorization. best paper award,” in Edm, 2011, pp. 41-50.
    [Bibtex]
    @InProceedings{DesmaraisConditions2011,
    author = {Michel Desmarais},
    title = {Conditions for Effectively Deriving a Q-Matrix from Data with Non-negative Matrix Factorization. Best Paper Award},
    booktitle = {EDM},
    year = {2011},
    pages = {41-50},
    ee = {http://educationaldatamining.org/EDM2011/wp-content/uploads/proc/edm2011_paper35_full_Desmarais.pdf}
    }
  • M. C. Desmarais, “Performance comparison of item-to-item skills models with the irt single latent trait model,” in Umap, 2011, pp. 75-86.
    [Bibtex]
    @InProceedings{DesmaraisPerformance2011,
    author = {Michel C. Desmarais},
    title = {Performance Comparison of Item-to-Item Skills Models with the IRT Single Latent Trait Model},
    booktitle = {UMAP},
    year = {2011},
    pages = {75-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-22362-4_7}
    }
  • T. Dhaliwal, F. Khomh, and Y. Zou, “Classifying field crash reports for fixing bugs: a case study of mozilla firefox,” in Icsm, 2011, pp. 333-342.
    [Bibtex]
    @InProceedings{DhaliwalClassifying2011,
    author = {Tejinder Dhaliwal and Foutse Khomh and Ying Zou},
    title = {Classifying field crash reports for fixing bugs: A case study of Mozilla Firefox},
    booktitle = {ICSM},
    year = {2011},
    pages = {333-342},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080800}
    }
  • T. Dhaliwal, F. Khomh, and Y. Zou, “Classifying field crash reports for fixing bugs: A case study of mozilla firefox,” in Icsm, 2011, pp. 333-342.
    [Bibtex]
    @InProceedings{DhaliwalClassifying2011-1,
    author = {Tejinder Dhaliwal and Foutse Khomh and Ying Zou},
    title = {Classifying field crash reports for fixing bugs: {A} case study of Mozilla Firefox},
    booktitle = {ICSM},
    pages = {333--342},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • B. Dit, L. Guerrouj, D. Poshyvanyk, and G. Antoniol, “Can better identifier splitting techniques help feature location?,” in Icpc, 2011, pp. 11-20.
    [Bibtex]
    @InProceedings{DitCan2011,
    author = {Bogdan Dit and Latifa Guerrouj and Denys Poshyvanyk and Giuliano Antoniol},
    title = {Can Better Identifier Splitting Techniques Help Feature Location?},
    booktitle = {ICPC},
    year = {2011},
    pages = {11-20},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.47}
    }
  • [PDF] B. Dit, L. Guerrouj, D. Poshyvanyk, and G. Antoniol, “Can better identifier splitting techniques help feature location?,” in Icpc, 2011, pp. 11-20.
    [Bibtex]
    @InProceedings{DitCan2011-1,
    author = {Bogdan Dit and Latifa Guerrouj and Denys Poshyvanyk and Giuliano Antoniol},
    title = {Can Better Identifier Splitting Techniques Help Feature Location?},
    booktitle = {ICPC},
    year = {2011},
    pages = {11-20},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.47},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/05970159.pdf}
    }
  • L. M. Eshkevari, V. Arnaoudova, M. D. Penta, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of identifier renamings,” in Msr, 2011, pp. 33-42.
    [Bibtex]
    @InProceedings{Eshkevariexploratory2011,
    author = {Laleh Mousavi Eshkevari and Venera Arnaoudova and Massimiliano Di Penta and Rocco Oliveto and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An exploratory study of identifier renamings},
    booktitle = {MSR},
    year = {2011},
    pages = {33-42},
    ee = {http://doi.acm.org/10.1145/1985441.1985449}
    }
  • L. M. Eshkevari, V. Arnaoudova, M. D. Penta, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of identifier renamings,” in Msr, 2011, pp. 33-42.
    [Bibtex]
    @InProceedings{Eshkevariexploratory2011-1,
    author = {Laleh Mousavi Eshkevari and Venera Arnaoudova and Massimiliano Di Penta and Rocco Oliveto and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An exploratory study of identifier renamings},
    booktitle = {MSR},
    year = {2011},
    pages = {33-42},
    ee = {http://doi.acm.org/10.1145/1985441.1985449},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, K. Martin, and P. Flora, “Modeling the performance of ultra-large-scale systems using layered simulations,” in Mesoca, 2011, pp. 1-10.
    [Bibtex]
    @InProceedings{FooModeling2011,
    author = {King Chun Foo and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan and Ying Zou and Kim Martin and Parminder Flora},
    title = {Modeling the performance of Ultra-Large-Scale systems using layered simulations},
    booktitle = {MESOCA},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/MESOCA.2011.6049040}
    }
  • A. Fourmigue, G. Beltrame, and G. Nicolescu, “A linear-time approach for the transient thermal simulation of liquid-cooled 3d ics,” in Proc. of the intl. conference hw/sw codesign and system synthesis, codes+isss, 2011, pp. 197-206.
    [Bibtex]
    @InProceedings{FourmigueLinear-Time2011,
    author = {A. Fourmigue and G. Beltrame and G. Nicolescu},
    title = {A Linear-Time Approach for the Transient Thermal Simulation of Liquid-Cooled 3D ICs},
    booktitle = {Proc. of the Intl. Conference HW/SW Codesign and System Synthesis, CODES+ISSS},
    year = {2011},
    pages = {197-206},
    month = oct
    }
  • A. Fourmigue, G. Beltrame, and G. Nicolescu, “Multi-granularity thermal evaluation of 3d mpsoc architectures,” in Proc. of design, automation and test in europe (date), 2011, pp. 575-578.
    [Bibtex]
    @InProceedings{FourmigueMulti-Granularity2011,
    title = {Multi-Granularity Thermal Evaluation of 3D MPSoC Architectures},
    optvolume = {1},
    booktitle = {Proc. of Design, Automation and Test in Europe (DATE)},
    author = {A. Fourmigue and G. Beltrame and G. Nicolescu},
    year = {2011},
    month = apr,
    pages = {575--578}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, E. M. Aboulhamid, and I. O’Connor, “Multi-granularity thermal evaluation of 3d mpsoc architectures,” in Date, 2011, pp. 575-578.
    [Bibtex]
    @InProceedings{FourmigueMulti-granularity2011-1,
    author = {Alain Fourmigue and Giovanni Beltrame and Gabriela Nicolescu and El Mostapha Aboulhamid and Ian O'Connor},
    title = {Multi-granularity thermal evaluation of 3D MPSoC architectures},
    booktitle = {DATE},
    year = {2011},
    pages = {575-578},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763287}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, and E. M. Aboulhamid, “A linear-time approach for the transient thermal simulation of liquid-cooled 3d ics,” in Codes+isss, 2011, pp. 197-206.
    [Bibtex]
    @InProceedings{Fourmiguelinear-time2011-1,
    author = {Alain Fourmigue and Giovanni Beltrame and Gabriela Nicolescu and El Mostapha Aboulhamid},
    title = {A linear-time approach for the transient thermal simulation of liquid-cooled 3d ics},
    booktitle = {CODES+ISSS},
    year = {2011},
    pages = {197-206},
    ee = {http://doi.acm.org/10.1145/2039370.2039402}
    }
  • M. Gaha, M. Gagnon, and F. Sirois, “A modern blackboard system,” in Web intelligence/iat workshops, 2011, pp. 163-166.
    [Bibtex]
    @InProceedings{GahaModern2011,
    author = {Mohamed Gaha and Michel Gagnon and Fr{\'e}d{\'e}ric Sirois},
    title = {A Modern Blackboard System},
    booktitle = {Web Intelligence/IAT Workshops},
    year = {2011},
    pages = {163-166},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI-IAT.2011.183}
    }
  • F. Gauthier, D. Letarte, T. Lavoie, and E. Merlo, “Extraction and comprehension of moodle’s access control model: a case study,” in Pst, 2011, pp. 44-51.
    [Bibtex]
    @InProceedings{GauthierExtraction2011,
    author = {Fran\c{c}ois Gauthier and Dominic Letarte and Thierry Lavoie and Ettore Merlo},
    title = {Extraction and comprehension of moodle's access control model: A case study},
    booktitle = {PST},
    year = {2011},
    pages = {44-51},
    ee = {http://dx.doi.org/10.1109/PST.2011.5971962}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Change impact analysis: an earthquake metaphor,” in Icpc, 2011, pp. 209-210.
    [Bibtex]
    @InProceedings{HassaineChange2011,
    author = {Salima Hassaine and Ferdaous Boughanmi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {Change Impact Analysis: An Earthquake Metaphor},
    booktitle = {ICPC},
    year = {2011},
    pages = {209-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.54}
    }
  • [PDF] S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Change impact analysis: an earthquake metaphor,” in Icpc, 2011, pp. 209-210.
    [Bibtex]
    @InProceedings{HassaineChange2011-1,
    author = {Salima Hassaine and Ferdaous Boughanmi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {Change Impact Analysis: An Earthquake Metaphor},
    booktitle = {ICPC},
    year = {2011},
    pages = {209-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.54},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/05970184.pdf}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “A seismology-inspired approach to study change propagation,” in Icsm, 2011, pp. 53-62.
    [Bibtex]
    @InProceedings{Hassaineseismology-inspired2011,
    author = {Salima Hassaine and Ferdaous Boughanmi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {A seismology-inspired approach to study change propagation},
    booktitle = {ICSM},
    year = {2011},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080772}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “A seismology-inspired approach to study change propagation,” in Icsm, 2011, pp. 53-62.
    [Bibtex]
    @InProceedings{Hassaineseismology-inspired2011-1,
    author = {Salima Hassaine and Ferdaous Boughanmi and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {A seismology-inspired approach to study change propagation},
    booktitle = {ICSM},
    year = {2011},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080772},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “An exploratory study of macro co-changes,” in Wcre, 2011, pp. 325-334.
    [Bibtex]
    @InProceedings{JaafarExploratory2011,
    author = {Fehmi Jaafar and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {An Exploratory Study of Macro Co-changes},
    booktitle = {WCRE},
    year = {2011},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.47}
    }
  • [PDF] F. Jaafar, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “An exploratory study of macro co-changes,” in Wcre, 2011, pp. 325-334.
    [Bibtex]
    @InProceedings{JaafarExploratory2011-1,
    author = {Fehmi Jaafar and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel and Giuliano Antoniol},
    title = {An Exploratory Study of Macro Co-changes},
    booktitle = {WCRE},
    year = {2011},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.47},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/06079858.pdf}
    }
  • M. B. Kelly, J. S. Alexander, B. Adams, and A. E. Hassan, “Recovering a balanced overview of topics in a software domain,” in Scam, 2011, pp. 135-144.
    [Bibtex]
    @InProceedings{KellyRecovering2011,
    author = {Matthew B. Kelly and Jason S. Alexander and Bram Adams and Ahmed E. Hassan},
    title = {Recovering a Balanced Overview of Topics in a Software Domain},
    booktitle = {SCAM},
    year = {2011},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.23}
    }
  • F. Khomh, B. Chan, Y. Zou, and A. E. Hassan, “An entropy evaluation approach for triaging field crashes: a case study of mozilla firefox,” in Wcre, 2011, pp. 261-270.
    [Bibtex]
    @InProceedings{KhomhEntropy2011,
    author = {Foutse Khomh and Brian Chan and Ying Zou and Ahmed E. Hassan},
    title = {An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox},
    booktitle = {WCRE},
    year = {2011},
    pages = {261-270},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.39}
    }
  • F. Khomh, B. Chan, Y. Zou, and A. E. Hassan, “An entropy evaluation approach for triaging field crashes: A case study of mozilla firefox,” in Wcre, 2011, pp. 261-270.
    [Bibtex]
    @InProceedings{KhomhEntropy2011-1,
    author = {Foutse Khomh and Brian Chan and Ying Zou and Ahmed E. Hassan},
    title = {An Entropy Evaluation Approach for Triaging Field Crashes: {A} Case Study of Mozilla Firefox},
    booktitle = {WCRE},
    pages = {261--270},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • F. Khomh, B. Chan, Y. Zou, A. Sinha, and D. Dietz, “Predicting post-release defects using pre-release field testing results,” in Icsm, 2011, pp. 253-262.
    [Bibtex]
    @InProceedings{KhomhPredicting2011,
    author = {Foutse Khomh and Brian Chan and Ying Zou and Anand Sinha and Dave Dietz},
    title = {Predicting post-release defects using pre-release field testing results},
    booktitle = {ICSM},
    year = {2011},
    pages = {253-262},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080792}
    }
  • F. Khomh, B. Chan, Y. Zou, A. Sinha, and D. Dietz, “Predicting post-release defects using pre-release field testing results,” in Icsm, 2011, pp. 253-262.
    [Bibtex]
    @InProceedings{KhomhPredicting2011-1,
    author = {Foutse Khomh and Brian Chan and Ying Zou and Anand Sinha and Dave Dietz},
    title = {Predicting post-release defects using pre-release field testing results},
    booktitle = {ICSM},
    pages = {253--262},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • M. Lavallée and P. N. Robillard, “Causes of premature aging during software development: an observational study,” in Evol/iwpse, 2011, pp. 61-70.
    [Bibtex]
    @InProceedings{LavalleeCauses2011,
    author = {Mathieu Lavall{\'e}e and Pierre N. Robillard},
    title = {Causes of premature aging during software development: an observational study},
    booktitle = {EVOL/IWPSE},
    year = {2011},
    pages = {61-70},
    ee = {http://doi.acm.org/10.1145/2024445.2024458}
    }
  • T. Lavoie and E. Merlo, “Automated type-3 clone oracle using levenshtein metric,” in Iwsc, 2011, pp. 34-40.
    [Bibtex]
    @InProceedings{LavoieAutomated2011,
    author = {Thierry Lavoie and Ettore Merlo},
    title = {Automated type-3 clone oracle using levenshtein metric},
    booktitle = {IWSC},
    year = {2011},
    pages = {34-40},
    ee = {http://doi.acm.org/10.1145/1985404.1985411}
    }
  • D. Letarte, F. Gauthier, and E. Merlo, “Security model evolution of php web applications,” in Icst, 2011, pp. 289-298.
    [Bibtex]
    @InProceedings{LetarteSecurity2011,
    author = {Dominic Letarte and Fran\c{c}ois Gauthier and Ettore Merlo},
    title = {Security Model Evolution of PHP Web Applications},
    booktitle = {ICST},
    year = {2011},
    pages = {289-298},
    ee = {http://dx.doi.org/10.1109/ICST.2011.36}
    }
  • S. McIntosh, B. Adams, A. E. Hassan, and Y. Zou, “Using indexed sequence diagrams to recover the behaviour of ajax applications,” in Wse, 2011, pp. 1-10.
    [Bibtex]
    @InProceedings{McIntoshUsing2011,
    author = {Shane McIntosh and Bram Adams and Ahmed E. Hassan and Ying Zou},
    title = {Using indexed sequence diagrams to recover the behaviour of AJAX applications},
    booktitle = {WSE},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/WSE.2011.6081813}
    }
  • S. McIntosh, B. Adams, T. H. D. Nguyen, Y. Kamei, and A. E. Hassan, “An empirical study of build maintenance effort,” in Icse, 2011, pp. 141-150.
    [Bibtex]
    @InProceedings{McIntoshempirical2011,
    author = {Shane McIntosh and Bram Adams and Thanh H. D. Nguyen and Yasutaka Kamei and Ahmed E. Hassan},
    title = {An empirical study of build maintenance effort},
    booktitle = {ICSE},
    year = {2011},
    pages = {141-150},
    ee = {http://doi.acm.org/10.1145/1985793.1985813}
    }
  • S. Medini, P. Galinier, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “A fast algorithm to locate concepts in execution traces,” in Ssbse, 2011, pp. 252-266.
    [Bibtex]
    @InProceedings{MediniFast2011,
    author = {Soumaya Medini and Philippe Galinier and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {A Fast Algorithm to Locate Concepts in Execution Traces},
    booktitle = {SSBSE},
    year = {2011},
    pages = {252-266},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_22}
    }
  • [PDF] S. Medini, P. Galinier, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “A fast algorithm to locate concepts in execution traces,” in Ssbse, 2011, pp. 252-266.
    [Bibtex]
    @InProceedings{MediniFast2011-1,
    author = {Soumaya Medini and Philippe Galinier and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {A Fast Algorithm to Locate Concepts in Execution Traces},
    booktitle = {SSBSE},
    year = {2011},
    pages = {252-266},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_22},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2011/chp3A1010072F978364223716422.pdf}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated verification of load tests using control charts,” in Apsec, 2011, pp. 282-289.
    [Bibtex]
    @InProceedings{NguyenAutomated2011,
    author = {Thanh H. D. Nguyen and Bram Adams and Zhen Ming Jiang and Ahmed E. Hassan and Mohamed N. Nasser and Parminder Flora},
    title = {Automated Verification of Load Tests Using Control Charts},
    booktitle = {APSEC},
    year = {2011},
    pages = {282-289},
    ee = {http://doi.ieeecomputersociety.org/10.1109/APSEC.2011.59}
    }
  • D. Romano, M. D. Penta, and G. Antoniol, “An approach for search based testing of null pointer exceptions,” in Icst, 2011, pp. 160-169.
    [Bibtex]
    @InProceedings{RomanoApproach2011,
    author = {Daniele Romano and Massimiliano Di Penta and Giuliano Antoniol},
    title = {An Approach for Search Based Testing of Null Pointer Exceptions},
    booktitle = {ICST},
    year = {2011},
    pages = {160-169},
    ee = {http://dx.doi.org/10.1109/ICST.2011.49}
    }
  • D. Romano, M. D. Penta, and G. Antoniol, “An approach for search based testing of null pointer exceptions,” in Icst, 2011, pp. 160-169.
    [Bibtex]
    @InProceedings{RomanoApproach2011-1,
    author = {Daniele Romano and Massimiliano Di Penta and Giuliano Antoniol},
    title = {An Approach for Search Based Testing of Null Pointer Exceptions},
    booktitle = {ICST},
    year = {2011},
    pages = {160-169},
    ee = {http://dx.doi.org/10.1109/ICST.2011.49, http://doi.ieeecomputersociety.org/10.1109/ICST.2011.49},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • W. Shang, Z. M. Jiang, B. Adams, A. E. Hassan, M. W. Godfrey, M. N. Nasser, and P. Flora, “An exploratory study of the evolution of communicated information about the execution of large software systems,” in Wcre, 2011, pp. 335-344.
    [Bibtex]
    @InProceedings{ShangExploratory2011,
    author = {Weiyi Shang and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan and Michael W. Godfrey and Mohamed N. Nasser and Parminder Flora},
    title = {An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems},
    booktitle = {WCRE},
    year = {2011},
    pages = {335-344},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.48}
    }
  • E. Shihab, A. Mockus, Y. Kamei, B. Adams, and A. E. Hassan, “High-impact defects: a study of breakage and surprise defects,” in Sigsoft fse, 2011, pp. 300-310.
    [Bibtex]
    @InProceedings{ShihabHigh-impact2011,
    author = {Emad Shihab and Audris Mockus and Yasutaka Kamei and Bram Adams and Ahmed E. Hassan},
    title = {High-impact defects: a study of breakage and surprise defects},
    booktitle = {SIGSOFT FSE},
    year = {2011},
    pages = {300-310},
    ee = {http://doi.acm.org/10.1145/2025113.2025155}
    }
  • M. D. Syer, B. Adams, Y. Zou, and A. E. Hassan, “Exploring the development of micro-apps: a case study on the blackberry and android platforms,” in Scam, 2011, pp. 55-64.
    [Bibtex]
    @InProceedings{SyerExploring2011,
    author = {Mark D. Syer and Bram Adams and Ying Zou and Ahmed E. Hassan},
    title = {Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms},
    booktitle = {SCAM},
    year = {2011},
    pages = {55-64},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.25}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Identifying performance deviations in thread pools,” in Icsm, 2011, pp. 83-92.
    [Bibtex]
    @InProceedings{SyerIdentifying2011,
    author = {Mark D. Syer and Bram Adams and Ahmed E. Hassan},
    title = {Identifying performance deviations in thread pools},
    booktitle = {ICSM},
    year = {2011},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080775}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Industrial case study on supporting the comprehension of system behaviour under load,” in Icpc, 2011, pp. 215-216.
    [Bibtex]
    @InProceedings{SyerIndustrial2011,
    author = {Mark D. Syer and Bram Adams and Ahmed E. Hassan},
    title = {Industrial Case Study on Supporting the Comprehension of System Behaviour under Load},
    booktitle = {ICPC},
    year = {2011},
    pages = {215-216},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.38}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Modeling the evolution of topics in source code histories,” in Msr, 2011, pp. 173-182.
    [Bibtex]
    @InProceedings{ThomasModeling2011,
    author = {Stephen W. Thomas and Bram Adams and Ahmed E. Hassan and Dorothea Blostein},
    title = {Modeling the evolution of topics in source code histories},
    booktitle = {MSR},
    year = {2011},
    pages = {173-182},
    ee = {http://doi.acm.org/10.1145/1985441.1985467}
    }
  • H. Xiao, B. Upadhyaya, F. Khomh, Y. Zou, J. Ng, and A. Lau, “An automatic approach for extracting process knowledge from the web,” in Icws, 2011, pp. 315-322.
    [Bibtex]
    @InProceedings{XiaoAutomatic2011,
    author = {Hua Xiao and Bipin Upadhyaya and Foutse Khomh and Ying Zou and Joanna Ng and Alex Lau},
    title = {An Automatic Approach for Extracting Process Knowledge from the Web},
    booktitle = {ICWS},
    year = {2011},
    pages = {315-322},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICWS.2011.85}
    }
  • H. Xiao, B. Upadhyaya, F. Khomh, Y. Zou, J. Ng, and A. Lau, “An automatic approach for extracting process knowledge from the web,” in Icws, 2011, pp. 315-322.
    [Bibtex]
    @InProceedings{XiaoAutomatic2011-1,
    author = {Hua Xiao and Bipin Upadhyaya and Foutse Khomh and Ying Zou and Joanna Ng and Alex Lau},
    title = {An Automatic Approach for Extracting Process Knowledge from the Web},
    booktitle = {ICWS},
    pages = {315--322},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “Security versus performance bugs: a case study on firefox,” in Msr, 2011, pp. 93-102.
    [Bibtex]
    @InProceedings{ZamanSecurity2011,
    author = {Shahed Zaman and Bram Adams and Ahmed E. Hassan},
    title = {Security versus performance bugs: a case study on Firefox},
    booktitle = {MSR},
    year = {2011},
    pages = {93-102},
    ee = {http://doi.acm.org/10.1145/1985441.1985457}
    }
  • X. Zhao, F. Khomh, and Y. Zou, “Improving the modifiability of the architecture of business applications,” in Qsic, 2011, pp. 176-185.
    [Bibtex]
    @InProceedings{ZhaoImproving2011,
    author = {Xulin Zhao and Foutse Khomh and Ying Zou},
    title = {Improving the Modifiability of the Architecture of Business Applications},
    booktitle = {QSIC},
    year = {2011},
    pages = {176-185},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2011.36}
    }
  • X. Zhao, F. Khomh, and Y. Zou, “Improving the modifiability of the architecture of business applications,” in Qsic, 2011, pp. 176-185.
    [Bibtex]
    @InProceedings{ZhaoImproving2011-1,
    author = {Xulin Zhao and Foutse Khomh and Ying Zou},
    title = {Improving the Modifiability of the Architecture of Business Applications},
    booktitle = {QSIC},
    pages = {176--185},
    publisher = {{IEEE} Computer Society},
    year = {2011}
    }

2010

  • B. Adams, Z. M. Jiang, and A. E. Hassan, “Identifying crosscutting concerns using historical code changes,” in Icse (1), 2010, pp. 305-314.
    [Bibtex]
    @InProceedings{AdamsIdentifying2010,
    author = {Bram Adams and Zhen Ming Jiang and Ahmed E. Hassan},
    title = {Identifying crosscutting concerns using historical code changes},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {305-314},
    ee = {http://doi.acm.org/10.1145/1806799.1806846}
    }
  • V. Arnaoudova, L. M. Eshkevari, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “Physical and conceptual identifier dispersion: measures and relation to fault proneness,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @InProceedings{ArnaoudovaPhysical2010,
    author = {Venera Arnaoudova and Laleh Mousavi Eshkevari and Rocco Oliveto and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Physical and conceptual identifier dispersion: Measures and relation to fault proneness},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609748}
    }
  • V. Arnaoudova, L. M. Eshkevari, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “Physical and conceptual identifier dispersion: measures and relation to fault proneness,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @InProceedings{ArnaoudovaPhysical2010-1,
    author = {Venera Arnaoudova and Laleh Mousavi Eshkevari and Rocco Oliveto and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Physical and conceptual identifier dispersion: Measures and relation to fault proneness},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609748},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Asadi, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A heuristic-based approach to identify concepts in execution traces,” in Csmr, 2010, pp. 31-40.
    [Bibtex]
    @InProceedings{AsadiHeuristic-Based2010,
    author = {Fatemeh Asadi and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Heuristic-Based Approach to Identify Concepts in Execution Traces},
    booktitle = {CSMR},
    year = {2010},
    pages = {31-40},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.17}
    }
  • [PDF] F. Asadi, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A heuristic-based approach to identify concepts in execution traces,” in Csmr, 2010, pp. 31-40.
    [Bibtex]
    @InProceedings{AsadiHeuristic-Based2010-1,
    author = {Fatemeh Asadi and Massimiliano Di Penta and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Heuristic-Based Approach to Identify Concepts in Execution Traces},
    booktitle = {CSMR},
    year = {2010},
    pages = {31-40},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.17},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/05714415.pdf}
    }
  • G. Bavota, R. Oliveto, A. D. Lucia, G. Antoniol, and Y. Guéhéneuc, “Playing with refactoring: identifying extract class opportunities through game theory,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @InProceedings{BavotaPlaying2010,
    author = {Gabriele Bavota and Rocco Oliveto and Andrea De Lucia and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Playing with refactoring: Identifying extract class opportunities through game theory},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609739}
    }
  • [PDF] G. Bavota, R. Oliveto, A. D. Lucia, G. Antoniol, and Y. Guéhéneuc, “Playing with refactoring: identifying extract class opportunities through game theory,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @InProceedings{BavotaPlaying2010-1,
    author = {Gabriele Bavota and Rocco Oliveto and Andrea De Lucia and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Playing with refactoring: Identifying extract class opportunities through game theory},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609739},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/05609739.pdf}
    }
  • G. Beltrame, L. Fossati, M. Zulianello, L. Henriques, and P. Braga, “Xluna: a real-time dependable kernel for embedded systems,” in Proc. of the ip based electronics system conference, (ipsoc), 2010.
    [Bibtex]
    @InProceedings{BeltramexLuna2010,
    title = {xLuna: A real-time dependable kernel for embedded systems},
    booktitle = {Proc. of the IP Based Electronics System Conference, (IPSOC)},
    author = {G. Beltrame and L. Fossati and M. Zulianello and L. Henriques and P. Braga},
    year = {2010},
    month = oct,
    optnote = {To appear}
    }
  • B. Bérard, J. Mullins, and M. Sassolas, “Quantifying opacity,” in Qest, 2010, pp. 263-272.
    [Bibtex]
    @InProceedings{BerardQuantifying2010,
    author = {B{\'e}atrice B{\'e}rard and John Mullins and Mathieu Sassolas},
    title = {Quantifying Opacity},
    booktitle = {QEST},
    year = {2010},
    pages = {263-272},
    ee = {http://dx.doi.org/10.1109/QEST.2010.40}
    }
  • N. Bettenburg and B. Adams, “Workshop on mining unstructured data (mud) because "mining unstructured data is like fishing in muddy waters"!,” in Wcre, 2010, pp. 277-278.
    [Bibtex]
    @InProceedings{BettenburgWorkshop2010,
    author = {Nicolas Bettenburg and Bram Adams},
    title = {Workshop on Mining Unstructured Data (MUD) because "Mining Unstructured Data is Like Fishing in Muddy Waters"!},
    booktitle = {WCRE},
    year = {2010},
    pages = {277-278},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.39}
    }
  • H. Boucheneb and K. Barkaoui, “On interleaving in \P,A\-time petri nets with strong semantics,” in Infinity, 2010, pp. 17-31.
    [Bibtex]
    @InProceedings{BouchenebOn2010,
    author = {Hanifa Boucheneb and Kamel Barkaoui},
    title = {On interleaving in \{P,A\}-Time Petri nets with strong semantics},
    booktitle = {INFINITY},
    year = {2010},
    pages = {17-31},
    ee = {http://dx.doi.org/10.4204/EPTCS.39.2}
    }
  • H. Boucheneb, A. Imine, and M. Najem, “Symbolic model-checking of optimistic replication algorithms,” in Ifm, 2010, pp. 89-104.
    [Bibtex]
    @InProceedings{BouchenebSymbolic2010,
    author = {Hanifa Boucheneb and Abdessamad Imine and Manal Najem},
    title = {Symbolic Model-Checking of Optimistic Replication Algorithms},
    booktitle = {IFM},
    year = {2010},
    pages = {89-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-16265-7_8}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Poly-co: an unsupervised co-reference detection system,” in Inlg, 2010.
    [Bibtex]
    @InProceedings{ChartonPoly-co2010,
    author = {Eric Charton and Michel Gagnon and Beno\^{\i}t Ozell},
    title = {Poly-co: An Unsupervised Co-reference Detection System},
    booktitle = {INLG},
    year = {2010},
    ee = {http://www.aclweb.org/anthology/W10-4228}
    }
  • M. C. Desmarais and I. Pelczer, “On the faithfulness of simulated student performance data,” in Edm, 2010, pp. 21-30.
    [Bibtex]
    @InProceedings{DesmaraisOn2010,
    author = {Michel C. Desmarais and Ildik{\'o} Pelczer},
    title = {On the Faithfulness of Simulated Student Performance Data},
    booktitle = {EDM},
    year = {2010},
    pages = {21-30},
    ee = {http://educationaldatamining.org/EDM2010/uploads/proc/edm2010_submission_56.pdf}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, and P. Flora, “Mining performance regression testing repositories for automated performance analysis,” in Qsic, 2010, pp. 32-41.
    [Bibtex]
    @InProceedings{FooMining2010,
    author = {King Chun Foo and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan and Ying Zou and Parminder Flora},
    title = {Mining Performance Regression Testing Repositories for Automated Performance Analysis},
    booktitle = {QSIC},
    year = {2010},
    pages = {32-41},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.35}
    }
  • N. Haderer, F. Khomh, and G. Antoniol, “SQUANER: A framework for monitoring the quality of software systems,” in Icsm, 2010, pp. 1-4.
    [Bibtex]
    @InProceedings{HadererSQUANER-2010,
    author = {Nicolas Haderer and Foutse Khomh and Giuliano Antoniol},
    title = {{SQUANER:} {A} framework for monitoring the quality of software systems},
    booktitle = {ICSM},
    pages = {1--4},
    publisher = {{IEEE} Computer Society},
    year = {2010}
    }
  • N. Haderer, F. Khomh, and G. Antoniol, “Squaner: a framework for monitoring the quality of software systems,” in Icsm, 2010, pp. 1-4.
    [Bibtex]
    @InProceedings{HadererSQUANER2010,
    author = {Nicolas Haderer and Foutse Khomh and Giuliano Antoniol},
    title = {SQUANER: A framework for monitoring the quality of software systems},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-4},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609684}
    }
  • [PDF] N. Haderer, F. Khomh, and G. Antoniol, “Squaner: a framework for monitoring the quality of software systems,” in Icsm, 2010, pp. 1-4.
    [Bibtex]
    @InProceedings{HadererSQUANER2010-1,
    author = {Nicolas Haderer and Foutse Khomh and Giuliano Antoniol},
    title = {SQUANER: A framework for monitoring the quality of software systems},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-4},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609684},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/05609684.pdf}
    }
  • S. Hassaine, F. Khomh, Y. -, and S. Hamel, “IDS: an immune-inspired approach for the detection of software design smells,” in Quatic, 2010, pp. 343-348.
    [Bibtex]
    @InProceedings{HassaineIDS-2010,
    author = {Salima Hassaine and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Sylvie Hamel},
    title = {{IDS:} An Immune-Inspired Approach for the Detection of Software Design Smells},
    booktitle = {QUATIC},
    pages = {343--348},
    publisher = {{IEEE} Computer Society},
    year = {2010}
    }
  • S. Hassaine, F. Khomh, Y. Guéhéneuc, and S. Hamel, “Ids: an immune-inspired approach for the detection of software design smells,” in Quatic, 2010, pp. 343-348.
    [Bibtex]
    @InProceedings{HassaineIDS2010,
    author = {Salima Hassaine and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel},
    title = {IDS: An Immune-Inspired Approach for the Detection of Software Design Smells},
    booktitle = {QUATIC},
    year = {2010},
    pages = {343-348},
    ee = {http://dx.doi.org/10.1109/QUATIC.2010.61}
    }
  • P. Heidari and H. Boucheneb, “Efficient method for checking the existence of a safety/ reachability controller for time petri nets,” in Acsd, 2010, pp. 201-210.
    [Bibtex]
    @InProceedings{HeidariEfficient2010,
    author = {Parisa Heidari and Hanifa Boucheneb},
    title = {Efficient Method for Checking the Existence of a Safety/ Reachability Controller for Time Petri Nets},
    booktitle = {ACSD},
    year = {2010},
    pages = {201-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2010.23}
    }
  • W. M. Ibrahim, N. Bettenburg, E. Shihab, B. Adams, and A. E. Hassan, “Should i contribute to this discussion?,” in Msr, 2010, pp. 181-190.
    [Bibtex]
    @InProceedings{IbrahimShould2010,
    author = {Walid M. Ibrahim and Nicolas Bettenburg and Emad Shihab and Bram Adams and Ahmed E. Hassan},
    title = {Should I contribute to this discussion?},
    booktitle = {MSR},
    year = {2010},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463345}
    }
  • Y. Kamei, S. Matsumoto, A. Monden, K. Matsumoto, B. Adams, and A. E. Hassan, “Revisiting common bug prediction findings using effort-aware models,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @InProceedings{KameiRevisiting2010,
    author = {Yasutaka Kamei and Shinsuke Matsumoto and Akito Monden and Ken-ichi Matsumoto and Bram Adams and Ahmed E. Hassan},
    title = {Revisiting common bug prediction findings using effort-aware models},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609530}
    }
  • N. Kerzazi and P. N. Robillard, “Multi-perspective software process modeling,” in Sera, 2010, pp. 85-92.
    [Bibtex]
    @InProceedings{KerzaziMulti-perspective2010,
    author = {Noureddine Kerzazi and Pierre N. Robillard},
    title = {Multi-perspective Software Process Modeling},
    booktitle = {SERA},
    year = {2010},
    pages = {85-92},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SERA.2010.21}
    }
  • G. Kniesel, A. Binun, P. Hegedus, L. J. Fülöp, A. Chatzigeorgiou, Y. Guéhéneuc, and N. Tsantalis, “Dpdx–towards a common result exchange format for design pattern detection tools,” in Csmr, 2010, pp. 232-235.
    [Bibtex]
    @InProceedings{KnieselDPDX-Towards2010,
    author = {G{\"u}nter Kniesel and Alexander Binun and P{\'e}ter Hegedus and Lajos Jeno F{\"u}l{\"o}p and Alexander Chatzigeorgiou and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Nikolaos Tsantalis},
    title = {DPDX--Towards a Common Result Exchange Format for Design Pattern Detection Tools},
    booktitle = {CSMR},
    year = {2010},
    pages = {232-235},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.40}
    }
  • S. Kpodjedo, P. Galinier, and G. Antoniol, “Enhancing a tabu algorithm for approximate graph matching by using similarity measures,” in Evocop, 2010, pp. 119-130.
    [Bibtex]
    @InProceedings{KpodjedoEnhancing2010,
    author = {Segla Kpodjedo and Philippe Galinier and Giuliano Antoniol},
    title = {Enhancing a Tabu Algorithm for Approximate Graph Matching by Using Similarity Measures},
    booktitle = {EvoCOP},
    year = {2010},
    pages = {119-130},
    ee = {http://dx.doi.org/10.1007/978-3-642-12139-5_11}
    }
  • S. Kpodjedo, P. Galinier, and G. Antoniol, “Enhancing a tabu algorithm for approximate graph matching by using similarity measures,” in Evocop, 2010, pp. 119-130.
    [Bibtex]
    @InProceedings{KpodjedoEnhancing2010-1,
    author = {Segla Kpodjedo and Philippe Galinier and Giuliano Antoniol},
    title = {Enhancing a Tabu Algorithm for Approximate Graph Matching by Using Similarity Measures},
    booktitle = {EvoCOP},
    year = {2010},
    pages = {119-130},
    ee = {http://dx.doi.org/10.1007/978-3-642-12139-5_11},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • T. Lavoie, M. Eilers-Smith, and E. Merlo, “Challenging cloning related problems with gpu-based algorithms,” in Iwsc, 2010, pp. 25-32.
    [Bibtex]
    @InProceedings{LavoieChallenging2010,
    author = {Thierry Lavoie and Michael Eilers-Smith and Ettore Merlo},
    title = {Challenging cloning related problems with GPU-based algorithms},
    booktitle = {IWSC},
    year = {2010},
    pages = {25-32},
    ee = {http://doi.acm.org/10.1145/1808901.1808905}
    }
  • N. Madani, L. Guerrouj, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Recognizing words from source code identifiers using speech recognition techniques,” in Csmr, 2010, pp. 68-77.
    [Bibtex]
    @InProceedings{MadaniRecognizing2010,
    author = {Nioosha Madani and Latifa Guerrouj and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques},
    booktitle = {CSMR},
    year = {2010},
    pages = {68-77},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.31}
    }
  • N. Madani, L. Guerrouj, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Recognizing words from source code identifiers using speech recognition techniques,” in Csmr, 2010, pp. 68-77.
    [Bibtex]
    @InProceedings{MadaniRecognizing2010-1,
    author = {Nioosha Madani and Latifa Guerrouj and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques},
    booktitle = {CSMR},
    year = {2010},
    pages = {68-77},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.31},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • H. Malik, Z. M. Jiang, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Automatic comparison of load tests to support the performance analysis of large enterprise systems,” in Csmr, 2010, pp. 222-231.
    [Bibtex]
    @InProceedings{MalikAutomatic2010,
    author = {Haroon Malik and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan and Parminder Flora and Gilbert Hamann},
    title = {Automatic Comparison of Load Tests to Support the Performance Analysis of Large Enterprise Systems},
    booktitle = {CSMR},
    year = {2010},
    pages = {222-231},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.39}
    }
  • H. Malik, B. Adams, and A. E. Hassan, “Pinpointing the subsystems responsible for the performance deviations in a load test,” in Issre, 2010, pp. 201-210.
    [Bibtex]
    @InProceedings{MalikPinpointing2010,
    author = {Haroon Malik and Bram Adams and Ahmed E. Hassan},
    title = {Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test},
    booktitle = {ISSRE},
    year = {2010},
    pages = {201-210},
    ee = {http://dx.doi.org/10.1109/ISSRE.2010.43}
    }
  • H. Malik, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Using load tests to automatically compare the subsystems of a large enterprise system,” in Compsac, 2010, pp. 117-126.
    [Bibtex]
    @InProceedings{MalikUsing2010,
    author = {Haroon Malik and Bram Adams and Ahmed E. Hassan and Parminder Flora and Gilbert Hamann},
    title = {Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System},
    booktitle = {COMPSAC},
    year = {2010},
    pages = {117-126},
    ee = {http://dx.doi.org/10.1109/COMPSAC.2010.18}
    }
  • S. McIntosh, B. Adams, and A. E. Hassan, “The evolution of ant build systems,” in Msr, 2010, pp. 42-51.
    [Bibtex]
    @InProceedings{McIntoshevolution2010,
    author = {Shane McIntosh and Bram Adams and Ahmed E. Hassan},
    title = {The evolution of ANT build systems},
    booktitle = {MSR},
    year = {2010},
    pages = {42-51},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463341}
    }
  • J. M. T. Moreno and M. Gagnon, “The cortex automatic summarization system at the qa@inex track 2010,” in Inex, 2010, pp. 290-294.
    [Bibtex]
    @InProceedings{MorenoCortex2010,
    author = {Juan Manuel Torres Moreno and Michel Gagnon},
    title = {The Cortex Automatic Summarization System at the QA@INEX Track 2010},
    booktitle = {INEX},
    year = {2010},
    pages = {290-294},
    ee = {http://dx.doi.org/10.1007/978-3-642-23577-1_26}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “A case study of bias in bug-fix datasets,” in Wcre, 2010, pp. 259-268.
    [Bibtex]
    @InProceedings{NguyenCase2010,
    author = {Thanh H. D. Nguyen and Bram Adams and Ahmed E. Hassan},
    title = {A Case Study of Bias in Bug-Fix Datasets},
    booktitle = {WCRE},
    year = {2010},
    pages = {259-268},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.37}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “Studying the impact of dependency network measures on software quality,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @InProceedings{NguyenStudying2010,
    author = {Thanh H. D. Nguyen and Bram Adams and Ahmed E. Hassan},
    title = {Studying the impact of dependency network measures on software quality},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609560}
    }
  • R. Oliveto, F. Khomh, G. Antoniol, and Y. Guéhéneuc, “Numerical signatures of antipatterns: an approach based on b-splines,” in Csmr, 2010, pp. 248-251.
    [Bibtex]
    @InProceedings{OlivetoNumerical2010,
    author = {Rocco Oliveto and Foutse Khomh and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Numerical Signatures of Antipatterns: An Approach Based on B-Splines},
    booktitle = {CSMR},
    year = {2010},
    pages = {248-251},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.47}
    }
  • [PDF] R. Oliveto, F. Khomh, G. Antoniol, and Y. Guéhéneuc, “Numerical signatures of antipatterns: an approach based on b-splines,” in Csmr, 2010, pp. 248-251.
    [Bibtex]
    @InProceedings{OlivetoNumerical2010-1,
    author = {Rocco Oliveto and Foutse Khomh and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Numerical Signatures of Antipatterns: An Approach Based on B-Splines},
    booktitle = {CSMR},
    year = {2010},
    pages = {248-251},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.47},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/05714444.pdf}
    }
  • R. Oliveto, F. Khomh, G. Antoniol, and Y. -, “Numerical signatures of antipatterns: an approach based on b-splines,” in Csmr, 2010, pp. 248-251.
    [Bibtex]
    @InProceedings{OlivetoNumerical2010-2,
    author = {Rocco Oliveto and Foutse Khomh and Giuliano Antoniol and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Numerical Signatures of Antipatterns: An Approach Based on B-Splines},
    booktitle = {CSMR},
    pages = {248--251},
    publisher = {{IEEE} Computer Society},
    year = {2010}
    }
  • M. D. Penta, D. M. Germán, and G. Antoniol, “Identifying licensing of jar archives using a code-search approach,” in Msr, 2010, pp. 151-160.
    [Bibtex]
    @InProceedings{PentaIdentifying2010,
    author = {Massimiliano Di Penta and Daniel M. Germ{\'a}n and Giuliano Antoniol},
    title = {Identifying licensing of jar archives using a code-search approach},
    booktitle = {MSR},
    year = {2010},
    pages = {151-160},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463282}
    }
  • [PDF] M. D. Penta, D. M. Germán, and G. Antoniol, “Identifying licensing of jar archives using a code-search approach,” in Msr, 2010, pp. 151-160.
    [Bibtex]
    @InProceedings{PentaIdentifying2010-1,
    author = {Massimiliano Di Penta and Daniel M. Germ{\'a}n and Giuliano Antoniol},
    title = {Identifying licensing of jar archives using a code-search approach},
    booktitle = {MSR},
    year = {2010},
    pages = {151-160},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463282},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/05463282.pdf}
    }
  • M. D. Penta, D. M. Germán, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of the evolution of software licensing,” in Icse (1), 2010, pp. 145-154.
    [Bibtex]
    @InProceedings{Pentaexploratory2010,
    author = {Massimiliano Di Penta and Daniel M. Germ{\'a}n and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An exploratory study of the evolution of software licensing},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {145-154},
    ee = {http://doi.acm.org/10.1145/1806799.1806824}
    }
  • [PDF] M. D. Penta, D. M. Germán, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of the evolution of software licensing,” in Icse (1), 2010, pp. 145-154.
    [Bibtex]
    @InProceedings{Pentaexploratory2010-1,
    author = {Massimiliano Di Penta and Daniel M. Germ{\'a}n and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An exploratory study of the evolution of software licensing},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {145-154},
    ee = {http://doi.acm.org/10.1145/1806799.1806824},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/p145-di_penta.pdf}
    }
  • L. Ruhlmann, B. Ozell, M. Gagnon, S. Bourgoin, and E. Charton, “Improving communication using 3d animation,” in Kes (4), 2010, pp. 410-419.
    [Bibtex]
    @InProceedings{RuhlmannImproving2010,
    author = {Laurent Ruhlmann and Beno\^{\i}t Ozell and Michel Gagnon and Steve Bourgoin and Eric Charton},
    title = {Improving Communication Using 3D Animation},
    booktitle = {KES (4)},
    year = {2010},
    pages = {410-419},
    ee = {http://dx.doi.org/10.1007/978-3-642-15384-6_44}
    }
  • G. M. K. Selim, L. Barbour, W. Shang, B. Adams, A. E. Hassan, and Y. Zou, “Studying the impact of clones on software defects,” in Wcre, 2010, pp. 13-21.
    [Bibtex]
    @InProceedings{SelimStudying2010,
    author = {Gehan M. K. Selim and Liliane Barbour and Weiyi Shang and Bram Adams and Ahmed E. Hassan and Ying Zou},
    title = {Studying the Impact of Clones on Software Defects},
    booktitle = {WCRE},
    year = {2010},
    pages = {13-21},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.11}
    }
  • W. Shang, B. Adams, and A. E. Hassan, “An experience report on scaling tools for mining software repositories using mapreduce,” in Ase, 2010, pp. 275-284.
    [Bibtex]
    @InProceedings{Shangexperience2010,
    author = {Weiyi Shang and Bram Adams and Ahmed E. Hassan},
    title = {An experience report on scaling tools for mining software repositories using MapReduce},
    booktitle = {ASE},
    year = {2010},
    pages = {275-284},
    ee = {http://doi.acm.org/10.1145/1858996.1859050}
    }
  • E. Shihab, A. Ihara, Y. Kamei, W. M. Ibrahim, M. Ohira, B. Adams, A. E. Hassan, and K. Matsumoto, “Predicting re-opened bugs: a case study on the eclipse project,” in Wcre, 2010, pp. 249-258.
    [Bibtex]
    @InProceedings{ShihabPredicting2010,
    author = {Emad Shihab and Akinori Ihara and Yasutaka Kamei and Walid M. Ibrahim and Masao Ohira and Bram Adams and Ahmed E. Hassan and Ken-ichi Matsumoto},
    title = {Predicting Re-opened Bugs: A Case Study on the Eclipse Project},
    booktitle = {WCRE},
    year = {2010},
    pages = {249-258},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.36}
    }
  • E. Shihab, Z. M. Jiang, B. Adams, A. E. Hassan, and R. Bowerman, “Prioritizing unit test creation for test-driven maintenance of legacy systems,” in Qsic, 2010, pp. 132-141.
    [Bibtex]
    @InProceedings{ShihabPrioritizing2010,
    author = {Emad Shihab and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan and Robert Bowerman},
    title = {Prioritizing Unit Test Creation for Test-Driven Maintenance of Legacy Systems},
    booktitle = {QSIC},
    year = {2010},
    pages = {132-141},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.74}
    }
  • E. Shihab, Z. M. Jiang, W. M. Ibrahim, B. Adams, and A. E. Hassan, “Understanding the impact of code and process metrics on post-release defects: a case study on the eclipse project,” in Esem, 2010.
    [Bibtex]
    @InProceedings{ShihabUnderstanding2010,
    author = {Emad Shihab and Zhen Ming Jiang and Walid M. Ibrahim and Bram Adams and Ahmed E. Hassan},
    title = {Understanding the impact of code and process metrics on post-release defects: a case study on the Eclipse project},
    booktitle = {ESEM},
    year = {2010},
    ee = {http://doi.acm.org/10.1145/1852786.1852792}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Validating the use of topic models for software evolution,” in Scam, 2010, pp. 55-64.
    [Bibtex]
    @InProceedings{ThomasValidating2010,
    author = {Stephen W. Thomas and Bram Adams and Ahmed E. Hassan and Dorothea Blostein},
    title = {Validating the Use of Topic Models for Software Evolution},
    booktitle = {SCAM},
    year = {2010},
    pages = {55-64},
    ee = {http://dx.doi.org/10.1109/SCAM.2010.13}
    }
  • W. Wu, Y. Guéhéneuc, G. Antoniol, and M. Kim, “Aura: a hybrid approach to identify framework evolution,” in Icse (1), 2010, pp. 325-334.
    [Bibtex]
    @InProceedings{WuAURA2010,
    author = {Wei Wu and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Miryung Kim},
    title = {AURA: a hybrid approach to identify framework evolution},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {325-334},
    ee = {http://doi.acm.org/10.1145/1806799.1806848}
    }
  • [PDF] W. Wu, Y. Guéhéneuc, G. Antoniol, and M. Kim, “Aura: a hybrid approach to identify framework evolution,” in Icse (1), 2010, pp. 325-334.
    [Bibtex]
    @InProceedings{WuAURA2010-1,
    author = {Wei Wu and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Miryung Kim},
    title = {AURA: a hybrid approach to identify framework evolution},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {325-334},
    ee = {http://doi.acm.org/10.1145/1806799.1806848},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2010/p325-wu.pdf}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Can syntactic and logical graphs help word sense disambiguation?,” in Lrec, 2010.
    [Bibtex]
    @InProceedings{ZouaqCan2010,
    author = {Amal Zouaq and Michel Gagnon and Beno\^{\i}t Ozell},
    title = {Can Syntactic and Logical Graphs help Word Sense Disambiguation?},
    booktitle = {LREC},
    year = {2010},
    ee = {http://www.lrec-conf.org/proceedings/lrec2010/summaries/374.html}
    }

2009

  • S. L. Abebe, S. Haiduc, A. Marcus, P. Tonella, and G. Antoniol, “Analyzing the evolution of the source code vocabulary,” in Csmr, 2009, pp. 189-198.
    [Bibtex]
    @InProceedings{AbebeAnalyzing2009,
    author = {Surafel Lemma Abebe and Sonia Haiduc and Andrian Marcus and Paolo Tonella and Giuliano Antoniol},
    title = {Analyzing the Evolution of the Source Code Vocabulary},
    booktitle = {CSMR},
    year = {2009},
    pages = {189-198},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.61}
    }
  • [PDF] S. L. Abebe, S. Haiduc, A. Marcus, P. Tonella, and G. Antoniol, “Analyzing the evolution of the source code vocabulary,” in Csmr, 2009, pp. 189-198.
    [Bibtex]
    @InProceedings{AbebeAnalyzing2009-1,
    author = {Surafel Lemma Abebe and Sonia Haiduc and Andrian Marcus and Paolo Tonella and Giuliano Antoniol},
    title = {Analyzing the Evolution of the Source Code Vocabulary},
    booktitle = {CSMR},
    year = {2009},
    pages = {189-198},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.61},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2009/04812752.pdf}
    }
  • B. Adams, W. D. Meuter, H. Tromp, and A. E. Hassan, “Can we refactor conditional compilation into aspects?,” in Aosd, 2009, pp. 243-254.
    [Bibtex]
    @InProceedings{AdamsCan2009,
    author = {Bram Adams and Wolfgang De Meuter and Herman Tromp and Ahmed E. Hassan},
    title = {Can we refactor conditional compilation into aspects?},
    booktitle = {AOSD},
    year = {2009},
    pages = {243-254},
    ee = {http://doi.acm.org/10.1145/1509239.1509274}
    }
  • B. Adams, “Co-evolution of source code and the build system,” in Icsm, 2009, pp. 461-464.
    [Bibtex]
    @InProceedings{AdamsCo-evolution2009,
    author = {Bram Adams},
    title = {Co-evolution of source code and the build system},
    booktitle = {ICSM},
    year = {2009},
    pages = {461-464},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306272}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “Measuring the progress of projects using the time dependence of code changes,” in Icsm, 2009, pp. 329-338.
    [Bibtex]
    @InProceedings{AlamMeasuring2009,
    author = {Omar Alam and Bram Adams and Ahmed E. Hassan},
    title = {Measuring the progress of projects using the time dependence of code changes},
    booktitle = {ICSM},
    year = {2009},
    pages = {329-338},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306313}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “A study of the time dependence of code changes,” in Wcre, 2009, pp. 21-30.
    [Bibtex]
    @InProceedings{AlamStudy2009,
    author = {Omar Alam and Bram Adams and Ahmed E. Hassan},
    title = {A Study of the Time Dependence of Code Changes},
    booktitle = {WCRE},
    year = {2009},
    pages = {21-30},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.25}
    }
  • G. Antoniol, R. Oliveto, and D. Poshyvanyk, “5$^{\mbox{th}}$ international workshop on traceability in emerging forms of software engineering (tefse 2009),” in Icse companion, 2009, pp. 472-473.
    [Bibtex]
    @InProceedings{Antoniol5th2009,
    author = {Giuliano Antoniol and Rocco Oliveto and Denys Poshyvanyk},
    title = {5$^{\mbox{th}}$ international workshop on Traceability in Emerging Forms of Software Engineering (TEFSE 2009)},
    booktitle = {ICSE Companion},
    year = {2009},
    pages = {472-473},
    ee = {http://dx.doi.org/10.1109/ICSE-COMPANION.2009.5071068}
    }
  • G. Antoniol, R. Oliveto, and D. Poshyvanyk, “5$^{\mbox{th}}$ international workshop on traceability in emerging forms of software engineering (tefse 2009),” in Icse companion, 2009, pp. 472-473.
    [Bibtex]
    @InProceedings{Antoniol5th2009-1,
    author = {Giuliano Antoniol and Rocco Oliveto and Denys Poshyvanyk},
    title = {5$^{\mbox{th}}$ international workshop on Traceability in Emerging Forms of Software Engineering (TEFSE 2009)},
    booktitle = {ICSE Companion},
    year = {2009},
    pages = {472-473},
    ee = {http://dx.doi.org/10.1109/ICSE-COMPANION.2009.5071068},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, “Keynote paper: search based software testing for software security: breaking code to make it safer,” in Icst workshops, 2009, pp. 87-100.
    [Bibtex]
    @InProceedings{AntoniolKeynote2009,
    author = {Giuliano Antoniol},
    title = {Keynote Paper: Search Based Software Testing for Software Security: Breaking Code to Make it Safer},
    booktitle = {ICST Workshops},
    year = {2009},
    pages = {87-100},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSTW.2009.12}
    }
  • G. Antoniol, “Keynote paper: search based software testing for software security: breaking code to make it safer,” in Icst workshops, 2009, pp. 87-100.
    [Bibtex]
    @InProceedings{AntoniolKeynote2009-1,
    author = {Giuliano Antoniol},
    title = {Keynote Paper: Search Based Software Testing for Software Security: Breaking Code to Make it Safer},
    booktitle = {ICST Workshops},
    year = {2009},
    pages = {87-100},
    ee = {http://dx.doi.org/10.1109/ICSTW.2009.12, http://doi.ieeecomputersociety.org/10.1109/ICSTW.2009.12},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Z. Awedikian, K. Ayari, and G. Antoniol, “Mc/dc automatic test input data generation,” in Gecco, 2009, pp. 1657-1664.
    [Bibtex]
    @InProceedings{AwedikianMCDC2009,
    author = {Zeina Awedikian and Kamel Ayari and Giuliano Antoniol},
    title = {MC/DC automatic test input data generation},
    booktitle = {GECCO},
    year = {2009},
    pages = {1657-1664},
    ee = {http://doi.acm.org/10.1145/1569901.1570123}
    }
  • Z. Awedikian, K. Ayari, and G. Antoniol, “Mc/dc automatic test input data generation,” in Gecco, 2009, pp. 1657-1664.
    [Bibtex]
    @InProceedings{AwedikianMCDC2009-1,
    author = {Zeina Awedikian and Kamel Ayari and Giuliano Antoniol},
    title = {MC/DC automatic test input data generation},
    booktitle = {GECCO},
    year = {2009},
    pages = {1657-1664},
    ee = {http://doi.acm.org/10.1145/1569901.1570123},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Beltrame, C. Bolchini, and A. Miele, “Multi-level fault modeling for transaction-level specifications,” in Acm great lakes symposium on vlsi, 2009, pp. 87-92.
    [Bibtex]
    @InProceedings{BeltrameMulti-level2009,
    author = {Giovanni Beltrame and Cristiana Bolchini and Antonio Miele},
    title = {Multi-level fault modeling for transaction-level specifications},
    booktitle = {ACM Great Lakes Symposium on VLSI},
    year = {2009},
    pages = {87-92},
    ee = {http://doi.acm.org/10.1145/1531542.1531565}
    }
  • G. Beltrame, C. Bolchini, and A. Miele, “Multi-level fault modeling for transaction-level specifications,” in Proc. of acm great lakes symposium on vlsi (glsvlsi), 2009, pp. 87-92.
    [Bibtex]
    @InProceedings{BeltrameMulti-level2009-1,
    title = {Multi-level fault modeling for transaction-level specifications},
    url = {http://portal.acm.org/citation.cfm?id=1531565},
    booktitle = {Proc. of ACM Great Lakes symposium on VLSI (GLSVLSI)},
    author = {Beltrame, G. and Bolchini, C. and Miele, A.},
    year = {2009},
    month = may,
    pages = {87--92}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “A real-time application design methodology for mpsocs,” in Date, 2009, pp. 767-772.
    [Bibtex]
    @InProceedings{Beltramereal-time2009,
    author = {Giovanni Beltrame and Luca Fossati and Donatella Sciuto},
    title = {A real-time application design methodology for MPSoCs},
    booktitle = {DATE},
    year = {2009},
    pages = {767-772},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5090609{\&}arnumber=5090767{\&}count=326{\&}index=153}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “A real-time application design methodology for mpsocs,” in Proc. of design, automation and test in europe (date), 2009, pp. 767-772.
    [Bibtex]
    @InProceedings{Beltramereal-time2009-1,
    author = {G. Beltrame and L. Fossati and D. Sciuto},
    title = {A real-time application design methodology for MPSoCs},
    booktitle = {Proc. of Design, Automation and Test in Europe (DATE)},
    year = {2009},
    month = mar,
    pages = {767-772}
    }
  • N. Bettenburg, W. Shang, W. M. Ibrahim, B. Adams, Y. Zou, and A. E. Hassan, “An empirical study on inconsistent changes to code clones at release level,” in Wcre, 2009, pp. 85-94.
    [Bibtex]
    @InProceedings{BettenburgEmpirical2009,
    author = {Nicolas Bettenburg and Weiyi Shang and Walid M. Ibrahim and Bram Adams and Ying Zou and Ahmed E. Hassan},
    title = {An Empirical Study on Inconsistent Changes to Code Clones at Release Level},
    booktitle = {WCRE},
    year = {2009},
    pages = {85-94},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.51}
    }
  • H. Boucheneb and A. Imine, “On model-checking optimistic replication algorithms,” in Fmoods/forte, 2009, pp. 73-89.
    [Bibtex]
    @InProceedings{BouchenebOn2009,
    author = {Hanifa Boucheneb and Abdessamad Imine},
    title = {On Model-Checking Optimistic Replication Algorithms},
    booktitle = {FMOODS/FORTE},
    year = {2009},
    pages = {73-89},
    ee = {http://dx.doi.org/10.1007/978-3-642-02138-1_5}
    }
  • S. Fu, B. Pi, Y. Zhou, M. C. Desmarais, W. Wang, S. Han, and X. Rao, “Cross-channel query recommendation on commercial mobile search engine: why, how and empirical evaluation,” in Pakdd, 2009, pp. 883-890.
    [Bibtex]
    @InProceedings{FuCross-Channel2009,
    author = {Shunkai Fu and Bingfeng Pi and Ying Zhou and Michel C. Desmarais and Weilei Wang and Song Han and Xunrong Rao},
    title = {Cross-Channel Query Recommendation on Commercial Mobile Search Engine: Why, How and Empirical Evaluation},
    booktitle = {PAKDD},
    year = {2009},
    pages = {883-890},
    ee = {http://dx.doi.org/10.1007/978-3-642-01307-2_92}
    }
  • S. Fu, S. Han, B. Pi, M. Desmarais, Y. Zhou, J. Zhuo, G. Zou, and W. Wang, “Large scale analysis of chinese mobile query behavior,” in Ike, 2009, pp. 258-264.
    [Bibtex]
    @InProceedings{FuLarge2009,
    author = {Shunkai Fu and Song Han and Bingfeng Pi and Michel Desmarais and Ying Zhou and Jianhui Zhuo and Gang Zou and Weilei Wang},
    title = {Large Scale Analysis of Chinese Mobile Query Behavior},
    booktitle = {IKE},
    year = {2009},
    pages = {258-264}
    }
  • S. Fu, B. Pi, M. Desmarais, Y. Zhou, W. Wang, and S. Han, “Query recommendation and its usefulness evaluation on mobile search engine,” in Smc, 2009, pp. 1292-1297.
    [Bibtex]
    @InProceedings{FuQuery2009,
    author = {Shunkai Fu and Bingfeng Pi and Michel Desmarais and Ying Zhou and Weilei Wang and Song Han},
    title = {Query Recommendation and Its Usefulness Evaluation on Mobile Search Engine},
    booktitle = {SMC},
    year = {2009},
    pages = {1292-1297},
    ee = {http://dx.doi.org/10.1109/ICSMC.2009.5345920}
    }
  • S. Fu, M. C. Desmarais, B. Pi, Y. Zhou, W. Wang, G. Zou, S. Han, and X. Rao, “Simple but effective porn query recognition by k-nn with semantic similarity measure,” in Apweb/waim, 2009, pp. 3-14.
    [Bibtex]
    @InProceedings{FuSimple2009,
    author = {Shunkai Fu and Michel C. Desmarais and Bingfeng Pi and Ying Zhou and Weilei Wang and Gang Zou and Song Han and Xunrong Rao},
    title = {Simple but Effective Porn Query Recognition by k-NN with Semantic Similarity Measure},
    booktitle = {APWeb/WAIM},
    year = {2009},
    pages = {3-14},
    ee = {http://dx.doi.org/10.1007/978-3-642-00672-2_3}
    }
  • O. Gendreau and P. N. Robillard, “Exploring knowledge flow in software project development,” in Eknow, 2009, pp. 99-104.
    [Bibtex]
    @InProceedings{GendreauExploring2009,
    author = {Olivier Gendreau and Pierre N. Robillard},
    title = {Exploring Knowledge Flow in Software Project Development},
    booktitle = {eKNOW},
    year = {2009},
    pages = {99-104},
    ee = {http://doi.ieeecomputersociety.org/10.1109/eKNOW.2009.30}
    }
  • D. M. Germán, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Code siblings: technical and legal implications of copying code between applications,” in Msr, 2009, pp. 81-90.
    [Bibtex]
    @InProceedings{GermanCode2009,
    author = {Daniel M. Germ{\'a}n and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Code siblings: Technical and legal implications of copying code between applications},
    booktitle = {MSR},
    year = {2009},
    pages = {81-90},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069483}
    }
  • D. M. Germán, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Code siblings: technical and legal implications of copying code between applications,” in Msr, 2009, pp. 81-90.
    [Bibtex]
    @InProceedings{GermanCode2009-1,
    author = {Daniel M. Germ{\'a}n and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Code siblings: Technical and legal implications of copying code between applications},
    booktitle = {MSR},
    year = {2009},
    pages = {81-90},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069483},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Y. Guéhéneuc, H. H. Kagdi, and J. I. Maletic, “Working session: using eye-tracking to understand program comprehension,” in Icpc, 2009, pp. 278-279.
    [Bibtex]
    @InProceedings{GueheneucWorking2009,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Huzefa H. Kagdi and Jonathan I. Maletic},
    title = {Working session: Using eye-tracking to understand program comprehension},
    booktitle = {ICPC},
    year = {2009},
    pages = {278-279},
    ee = {http://dx.doi.org/10.1109/ICPC.2009.5090057}
    }
  • S. Gueorguiev, M. Harman, and G. Antoniol, “Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering,” in Gecco, 2009, pp. 1673-1680.
    [Bibtex]
    @InProceedings{GueorguievSoftware2009,
    author = {Stefan Gueorguiev and Mark Harman and Giuliano Antoniol},
    title = {Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering},
    booktitle = {GECCO},
    year = {2009},
    pages = {1673-1680},
    ee = {http://doi.acm.org/10.1145/1569901.1570125}
    }
  • [PDF] S. Gueorguiev, M. Harman, and G. Antoniol, “Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering,” in Gecco, 2009, pp. 1673-1680.
    [Bibtex]
    @InProceedings{GueorguievSoftware2009-1,
    author = {Stefan Gueorguiev and Mark Harman and Giuliano Antoniol},
    title = {Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering},
    booktitle = {GECCO},
    year = {2009},
    pages = {1673-1680},
    ee = {http://doi.acm.org/10.1145/1569901.1570125},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2009/p1673-gueorguiev.pdf}
    }
  • S. Jeanmart, Y. Guéhéneuc, H. A. Sahraoui, and N. Habra, “Impact of the visitor pattern on program comprehension and maintenance,” in Esem, 2009, pp. 69-78.
    [Bibtex]
    @InProceedings{JeanmartImpact2009,
    author = {Sebastien Jeanmart and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Houari A. Sahraoui and Naji Habra},
    title = {Impact of the visitor pattern on program comprehension and maintenance},
    booktitle = {ESEM},
    year = {2009},
    pages = {69-78},
    ee = {http://doi.acm.org/10.1145/1671248.1671255}
    }
  • A. Jodoin and M. Desmarais, “L’environnement de développement dynamique (edd) pour le prototypage rapide d’interfaces graphiques,” in Ihm, 2009, pp. 111-117.
    [Bibtex]
    @InProceedings{JodoinLenvironnement2009,
    author = {Andr{\'e} Jodoin and Michel Desmarais},
    title = {L'environnement de d{\'e}veloppement dynamique (EDD) pour le prototypage rapide d'interfaces graphiques},
    booktitle = {IHM},
    year = {2009},
    pages = {111-117},
    ee = {http://doi.acm.org/10.1145/1629826.1629844}
    }
  • F. Khomh, S. Vaucher, Y. Guéhéneuc, and H. A. Sahraoui, “A bayesian approach for the detection of code and design smells,” in Qsic, 2009, pp. 305-314.
    [Bibtex]
    @InProceedings{KhomhBayesian2009,
    author = {Foutse Khomh and St{\'e}phane Vaucher and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Houari A. Sahraoui},
    title = {A Bayesian Approach for the Detection of Code and Design Smells},
    booktitle = {QSIC},
    year = {2009},
    pages = {305-314},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2009.47}
    }
  • F. Khomh, S. Vaucher, Y. -, and H. A. Sahraoui, “A bayesian approach for the detection of code and design smells,” in Qsic, 2009, pp. 305-314.
    [Bibtex]
    @InProceedings{KhomhBayesian2009-1,
    author = {Foutse Khomh and St{\'{e}}phane Vaucher and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Houari A. Sahraoui},
    title = {A Bayesian Approach for the Detection of Code and Design Smells},
    booktitle = {QSIC},
    pages = {305--314},
    publisher = {{IEEE} Computer Society},
    year = {2009}
    }
  • F. Khomh, M. D. Penta, and Y. Guéhéneuc, “An exploratory study of the impact of code smells on software change-proneness,” in Wcre, 2009, pp. 75-84.
    [Bibtex]
    @InProceedings{KhomhExploratory2009,
    author = {Foutse Khomh and Massimiliano Di Penta and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An Exploratory Study of the Impact of Code Smells on Software Change-proneness},
    booktitle = {WCRE},
    year = {2009},
    pages = {75-84},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.28}
    }
  • F. Khomh, M. D. Penta, and Y. -, “An exploratory study of the impact of code smells on software change-proneness,” in Wcre, 2009, pp. 75-84.
    [Bibtex]
    @InProceedings{KhomhExploratory2009-1,
    author = {Foutse Khomh and Massimiliano Di Penta and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {An Exploratory Study of the Impact of Code Smells on Software Change-proneness},
    booktitle = {WCRE},
    pages = {75--84},
    publisher = {{IEEE} Computer Society},
    year = {2009}
    }
  • F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Playing roles in design patterns: an empirical descriptive and analytic study,” in Icsm, 2009, pp. 83-92.
    [Bibtex]
    @InProceedings{KhomhPlaying2009,
    author = {Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Playing roles in design patterns: An empirical descriptive and analytic study},
    booktitle = {ICSM},
    year = {2009},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306327}
    }
  • F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Playing roles in design patterns: an empirical descriptive and analytic study,” in Icsm, 2009, pp. 83-92.
    [Bibtex]
    @InProceedings{KhomhPlaying2009-1,
    author = {Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Playing roles in design patterns: An empirical descriptive and analytic study},
    booktitle = {ICSM},
    year = {2009},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306327},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Khomh, Y. -, and G. Antoniol, “Playing roles in design patterns: an empirical descriptive and analytic study,” in Icsm, 2009, pp. 83-92.
    [Bibtex]
    @InProceedings{KhomhPlaying2009-2,
    author = {Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Giuliano Antoniol},
    title = {Playing roles in design patterns: An empirical descriptive and analytic study},
    booktitle = {ICSM},
    pages = {83--92},
    publisher = {{IEEE} Computer Society},
    year = {2009}
    }
  • F. Khomh, “SQUAD: software quality understanding through the analysis of design,” in Wcre, 2009, pp. 303-306.
    [Bibtex]
    @InProceedings{KhomhSQUAD-2009,
    author = {Foutse Khomh},
    title = {{SQUAD:} Software Quality Understanding through the Analysis of Design},
    booktitle = {WCRE},
    pages = {303--306},
    publisher = {{IEEE} Computer Society},
    year = {2009}
    }
  • F. Khomh, “Squad: software quality understanding through the analysis of design,” in Wcre, 2009, pp. 303-306.
    [Bibtex]
    @InProceedings{KhomhSQUAD2009,
    author = {Foutse Khomh},
    title = {SQUAD: Software Quality Understanding through the Analysis of Design},
    booktitle = {WCRE},
    year = {2009},
    pages = {303-306},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.22}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Recovering the evolution stable part using an ecgm algorithm: is there a tunnel in mozilla?,” in Csmr, 2009, pp. 179-188.
    [Bibtex]
    @InProceedings{KpodjedoRecovering2009,
    author = {Segla Kpodjedo and Filippo Ricca and Philippe Galinier and Giuliano Antoniol},
    title = {Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla?},
    booktitle = {CSMR},
    year = {2009},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.24}
    }
  • [PDF] S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Recovering the evolution stable part using an ecgm algorithm: is there a tunnel in mozilla?,” in Csmr, 2009, pp. 179-188.
    [Bibtex]
    @InProceedings{KpodjedoRecovering2009-1,
    author = {Segla Kpodjedo and Filippo Ricca and Philippe Galinier and Giuliano Antoniol},
    title = {Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla?},
    booktitle = {CSMR},
    year = {2009},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.24},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2009/04812751.pdf}
    }
  • D. Letarte and E. Merlo, “Extraction of inter-procedural simple role privilege models from php code,” in Wcre, 2009, pp. 187-191.
    [Bibtex]
    @InProceedings{LetarteExtraction2009,
    author = {Dominic Letarte and Ettore Merlo},
    title = {Extraction of Inter-procedural Simple Role Privilege Models from PHP Code},
    booktitle = {WCRE},
    year = {2009},
    pages = {187-191},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.32}
    }
  • S. Marr, M. Haupt, S. Timbermont, B. Adams, T. D’Hondt, P. Costanza, and W. D. Meuter, “Virtual machine support for many-core architectures: decoupling abstract from concrete concurrency models,” in Places, 2009, pp. 63-77.
    [Bibtex]
    @InProceedings{MarrVirtual2009,
    author = {Stefan Marr and Michael Haupt and Stijn Timbermont and Bram Adams and Theo D'Hondt and Pascal Costanza and Wolfgang De Meuter},
    title = {Virtual Machine Support for Many-Core Architectures: Decoupling Abstract from Concrete Concurrency Models},
    booktitle = {PLACES},
    year = {2009},
    pages = {63-77},
    ee = {http://dx.doi.org/10.4204/EPTCS.17.6}
    }
  • E. Merlo and T. Lavoie, “Computing structural types of clone syntactic blocks,” in Wcre, 2009, pp. 274-278.
    [Bibtex]
    @InProceedings{MerloComputing2009,
    author = {Ettore Merlo and Thierry Lavoie},
    title = {Computing Structural Types of Clone Syntactic Blocks},
    booktitle = {WCRE},
    year = {2009},
    pages = {274-278},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.33}
    }
  • H. Rakkay, H. Boucheneb, and O. H. Roux, “Time arc petri nets and their analysis,” in Acsd, 2009, pp. 138-147.
    [Bibtex]
    @InProceedings{RakkayTime2009,
    author = {Hind Rakkay and Hanifa Boucheneb and Olivier H. Roux},
    title = {Time Arc Petri Nets and Their Analysis},
    booktitle = {ACSD},
    year = {2009},
    pages = {138-147},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2009.21}
    }
  • W. Shang, Z. M. Jiang, B. Adams, and A. E. Hassan, “Mapreduce as a general framework to support research in mining software repositories (msr),” in Msr, 2009, pp. 21-30.
    [Bibtex]
    @InProceedings{ShangMapReduce2009,
    author = {Weiyi Shang and Zhen Ming Jiang and Bram Adams and Ahmed E. Hassan},
    title = {MapReduce as a general framework to support research in Mining Software Repositories (MSR)},
    booktitle = {MSR},
    year = {2009},
    pages = {21-30},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069477}
    }
  • E. Shihab, N. Bettenburg, B. Adams, and A. E. Hassan, “On the central role of mailing lists in open source projects: an exploratory study,” in Jsai-isai workshops, 2009, pp. 91-103.
    [Bibtex]
    @InProceedings{ShihabOn2009,
    author = {Emad Shihab and Nicolas Bettenburg and Bram Adams and Ahmed E. Hassan},
    title = {On the Central Role of Mailing Lists in Open Source Projects: An Exploratory Study},
    booktitle = {JSAI-isAI Workshops},
    year = {2009},
    pages = {91-103},
    ee = {http://dx.doi.org/10.1007/978-3-642-14888-0_9}
    }
  • S. Vaucher, F. Khomh, N. Moha, and Y. Guéhéneuc, “Tracking design smells: lessons from a study of god classes,” in Wcre, 2009, pp. 145-154.
    [Bibtex]
    @InProceedings{VaucherTracking2009,
    author = {St{\'e}phane Vaucher and Foutse Khomh and Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Tracking Design Smells: Lessons from a Study of God Classes},
    booktitle = {WCRE},
    year = {2009},
    pages = {145-154},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.23}
    }
  • S. Vaucher, F. Khomh, N. Moha, and Y. -, “Tracking design smells: lessons from a study of god classes,” in Wcre, 2009, pp. 145-154.
    [Bibtex]
    @InProceedings{VaucherTracking2009-1,
    author = {St{\'{e}}phane Vaucher and Foutse Khomh and Naouel Moha and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Tracking Design Smells: Lessons from a Study of God Classes},
    booktitle = {WCRE},
    pages = {145--154},
    publisher = {{IEEE} Computer Society},
    year = {2009}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Unsupervised and open ontology-based semantic analysis,” in Ltc, 2009, pp. 245-256.
    [Bibtex]
    @InProceedings{ZouaqUnsupervised2009,
    author = {Amal Zouaq and Michel Gagnon and Beno\^{\i}t Ozell},
    title = {Unsupervised and Open Ontology-Based Semantic Analysis},
    booktitle = {LTC},
    year = {2009},
    pages = {245-256},
    ee = {http://dx.doi.org/10.1007/978-3-642-20095-3_23}
    }

2008

  • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. Guéhéneuc, “Is it a bug or an enhancement?: a text-based approach to classify change requests,” in Cascon, 2008, p. 23.
    [Bibtex]
    @InProceedings{AntoniolIs2008,
    author = {Giuliano Antoniol and Kamel Ayari and Massimiliano Di Penta and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Is it a bug or an enhancement?: a text-based approach to classify change requests},
    booktitle = {CASCON},
    year = {2008},
    pages = {23},
    ee = {http://doi.acm.org/10.1145/1463788.1463819}
    }
  • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. Guéhéneuc, “Is it a bug or an enhancement?: a text-based approach to classify change requests,” in Cascon, 2008, p. 23.
    [Bibtex]
    @InProceedings{AntoniolIs2008-1,
    author = {Giuliano Antoniol and Kamel Ayari and Massimiliano Di Penta and Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Is it a bug or an enhancement?: a text-based approach to classify change requests},
    booktitle = {CASCON},
    year = {2008},
    pages = {23},
    ee = {http://doi.acm.org/10.1145/1463788.1463819},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. -, “Is it a bug or an enhancement?: a text-based approach to classify change requests,” in Cascon, 2008, p. 23.
    [Bibtex]
    @InProceedings{AntoniolIs2008-2,
    author = {Giuliano Antoniol and Kamel Ayari and Massimiliano Di Penta and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Is it a bug or an enhancement?: a text-based approach to classify change requests},
    booktitle = {CASCON},
    pages = {23},
    publisher = {IBM},
    year = {2008}
    }
  • G. Antoniol, J. H. Hayes, Y. Guéhéneuc, and M. D. Penta, “Reuse or rewrite: combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date,” in Icsm, 2008, pp. 147-156.
    [Bibtex]
    @InProceedings{AntoniolReuse2008,
    author = {Giuliano Antoniol and Jane Huffman Hayes and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Massimiliano Di Penta},
    title = {Reuse or rewrite: Combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date},
    booktitle = {ICSM},
    year = {2008},
    pages = {147-156},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658063}
    }
  • G. Antoniol, J. H. Hayes, Y. Guéhéneuc, and M. D. Penta, “Reuse or rewrite: combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date,” in Icsm, 2008, pp. 147-156.
    [Bibtex]
    @InProceedings{AntoniolReuse2008-1,
    author = {Giuliano Antoniol and Jane Huffman Hayes and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Massimiliano Di Penta},
    title = {Reuse or rewrite: Combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date},
    booktitle = {ICSM},
    year = {2008},
    pages = {147-156},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658063},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • K. Barkaoui, H. Boucheneb, and A. Hicheur, “Modelling and analysis of time-constrained flexible workflows with time recursive ecatnets,” in Ws-fm, 2008, pp. 19-36.
    [Bibtex]
    @InProceedings{BarkaouiModelling2008,
    author = {Kamel Barkaoui and Hanifa Boucheneb and Awatef Hicheur},
    title = {Modelling and Analysis of Time-Constrained Flexible Workflows with Time Recursive ECATNets},
    booktitle = {WS-FM},
    year = {2008},
    pages = {19-36},
    ee = {http://dx.doi.org/10.1007/978-3-642-01364-5_2}
    }
  • K. Barkaoui, R. B. Ayed, H. Boucheneb, and A. Hicheur, “Verification of workflow processes under multilevel security considerations,” in Crisis, 2008, pp. 77-84.
    [Bibtex]
    @InProceedings{BarkaouiVerification2008,
    author = {Kamel Barkaoui and Rahma Ben Ayed and Hanifa Boucheneb and Awatef Hicheur},
    title = {Verification of Workflow processes under multilevel security considerations},
    booktitle = {CRiSIS},
    year = {2008},
    pages = {77-84},
    ee = {http://dx.doi.org/10.1109/CRISIS.2008.4757466}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design,” in Codes+isss, 2008, pp. 7-12.
    [Bibtex]
    @InProceedings{BeltrameConcurrency2008,
    author = {Giovanni Beltrame and Luca Fossati and Donatella Sciuto},
    title = {Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design},
    booktitle = {CODES+ISSS},
    year = {2008},
    pages = {7-12},
    ee = {http://doi.acm.org/10.1145/1450135.1450138}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design,” in Proc. of the intl. conference hw/sw codesign and system synthesis, codes+isss, 2008, pp. 7-12.
    [Bibtex]
    @InProceedings{BeltrameConcurrency2008-1,
    author = {G. Beltrame and L. Fossati and D. Sciuto},
    title = {Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design},
    booktitle = {Proc. of the Intl. Conference HW/SW Codesign and System Synthesis, CODES+ISSS},
    year = {2008},
    month = oct,
    pages = {7-12},
    optnote = {Best Paper Candidate}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “High-level modeling and exploration of reconfigurable mpsocs,” in Ahs, 2008, pp. 330-337.
    [Bibtex]
    @InProceedings{BeltrameHigh-Level2008,
    author = {Giovanni Beltrame and Luca Fossati and Donatella Sciuto},
    title = {High-Level Modeling and Exploration of Reconfigurable MPSoCs},
    booktitle = {AHS},
    year = {2008},
    pages = {330-337},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AHS.2008.15}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “High-level modeling and exploration of reconfigurable mpsocs,” in Proc. of the nasa/esa adaptive hardware and systems conference (ahs), 2008, pp. 330-337.
    [Bibtex]
    @InProceedings{BeltrameHigh-Level2008-1,
    title = {High-Level Modeling and Exploration of Reconfigurable MPSoCs},
    booktitle = {Proc. of the NASA/ESA Adaptive Hardware and Systems Conference (AHS)},
    author = {G. Beltrame and L. Fossati and D. Sciuto},
    year = {2008},
    month = jun,
    pages = {330--337}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “Resp: a non-intrusive transaction-level reflective mpsoc simulation platform for design space exploration,” in Asp-dac, 2008, pp. 673-678.
    [Bibtex]
    @InProceedings{BeltrameReSP2008,
    author = {Giovanni Beltrame and Cristiana Bolchini and Luca Fossati and Antonio Miele and Donatella Sciuto},
    title = {ReSP: A non-intrusive Transaction-Level Reflective MPSoC Simulation Platform for design space exploration},
    booktitle = {ASP-DAC},
    year = {2008},
    pages = {673-678},
    ee = {http://dx.doi.org/10.1109/ASPDAC.2008.4484036}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “Resp: a non-intrusive transaction-level reflective mpsoc simulation platform for design space exploration,” in Proc. of the asia and south pacific design automation conference (aspdac), 2008, pp. 673-678.
    [Bibtex]
    @InProceedings{BeltrameReSP2008-1,
    title = {ReSP: A non-intrusive Transaction-Level Reflective MPSoC Simulation Platform for design space exploration},
    shorttitle = {ReSP},
    booktitle = {Proc. of the Asia and South Pacific Design Automation Conference (ASPDAC)},
    author = {G. Beltrame and C. Bolchini and L. Fossati and A. Miele and D. Sciuto},
    year = {2008},
    month = jan,
    pages = {673--678},
    note = {Best Paper Candidate}
    }
  • G. Beltrame and L. Fossati, “Resp: a design and validation tool for data systems,” in Proc of the eurospace conference on data systems for aerospace (dasia), 2008.
    [Bibtex]
    @InProceedings{BeltrameReSP2008-2,
    title = {ReSP: A design and validation tool for Data Systems},
    booktitle = {Proc of the Eurospace Conference on Data Systems for Aerospace (DASIA)},
    author = {G. Beltrame and L. Fossati},
    month = mar,
    year = {2008}
    }
  • H. Boucheneb and K. Barkaoui, “Relevant timed schedules / clock valuations for constructing time petri net reachability graphs,” in Formats, 2008, pp. 265-279.
    [Bibtex]
    @InProceedings{BouchenebRelevant2008,
    author = {Hanifa Boucheneb and Kamel Barkaoui},
    title = {Relevant Timed Schedules / Clock Valuations for Constructing Time Petri Net Reachability Graphs},
    booktitle = {FORMATS},
    year = {2008},
    pages = {265-279},
    ee = {http://dx.doi.org/10.1007/978-3-540-85778-5_19}
    }
  • S. Denier and Y. Guéhéneuc, “Mendel: a model, metrics, and rules to understand class hierarchies,” in Icpc, 2008, pp. 143-152.
    [Bibtex]
    @InProceedings{DenierMendel2008,
    author = {Simon Denier and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Mendel: A Model, Metrics, and Rules to Understand Class Hierarchies},
    booktitle = {ICPC},
    year = {2008},
    pages = {143-152},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.37}
    }
  • M. C. Desmarais, A. Villarreal, and M. Gagnon, “Adaptive test design with a naive bayes framework,” in Edm, 2008, pp. 48-56.
    [Bibtex]
    @InProceedings{DesmaraisAdaptive2008,
    author = {Michel C. Desmarais and Alejandro Villarreal and Michel Gagnon},
    title = {Adaptive Test Design with a Naive Bayes Framework},
    booktitle = {EDM},
    year = {2008},
    pages = {48-56},
    ee = {http://www.educationaldatamining.org/EDM2008/uploads/proc/5_Desmarais_17.pdf}
    }
  • M. Desmarais, “Just-in-time knowledge for effective hybrid learning,” in Ichl, 2008, pp. 31-39.
    [Bibtex]
    @InProceedings{DesmaraisJust-in-Time2008,
    author = {Michel Desmarais},
    title = {Just-in-Time Knowledge for Effective Hybrid Learning},
    booktitle = {ICHL},
    year = {2008},
    pages = {31-39},
    ee = {http://dx.doi.org/10.1007/978-3-540-85170-7_3}
    }
  • M. Eaddy, A. V. Aho, G. Antoniol, and Y. Guéhéneuc, “Cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis,” in Icpc, 2008, pp. 53-62.
    [Bibtex]
    @InProceedings{EaddyCERBERUS2008,
    author = {Marc Eaddy and Alfred V. Aho and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis},
    booktitle = {ICPC},
    year = {2008},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.39}
    }
  • M. Eaddy, A. V. Aho, G. Antoniol, and Y. Guéhéneuc, “Cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis,” in Icpc, 2008, pp. 53-62.
    [Bibtex]
    @InProceedings{EaddyCERBERUS2008-1,
    author = {Marc Eaddy and Alfred V. Aho and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis},
    booktitle = {ICPC},
    year = {2008},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.39},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Falcone, Y. Guéhéneuc, C. F. J. Lange, Z. Porkoláb, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2008, pp. 77-86.
    [Bibtex]
    @InProceedings{FalconeQuantitative2008,
    author = {Giovanni Falcone and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Christian F. J. Lange and Zolt{\'a}n Porkol{\'a}b and Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2008},
    pages = {77-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-02047-6_9}
    }
  • S. Fu and M. Desmarais, “Fast markov blanket discovery algorithm via local learning within single pass,” in Canadian conference on ai, 2008, pp. 96-107.
    [Bibtex]
    @InProceedings{FuFast2008,
    author = {Shunkai Fu and Michel Desmarais},
    title = {Fast Markov Blanket Discovery Algorithm Via Local Learning within Single Pass},
    booktitle = {Canadian Conference on AI},
    year = {2008},
    pages = {96-107},
    ee = {http://dx.doi.org/10.1007/978-3-540-68825-9_10}
    }
  • S. Fu, M. Desmarais, and F. Li, “One-pass learning algorithm for fast recovery of bayesian network,” in Flairs conference, 2008, pp. 53-58.
    [Bibtex]
    @InProceedings{FuOne-Pass2008,
    author = {Shunkai Fu and Michel Desmarais and Fan Li},
    title = {One-Pass Learning Algorithm for Fast Recovery of Bayesian Network},
    booktitle = {FLAIRS Conference},
    year = {2008},
    pages = {53-58},
    ee = {http://www.aaai.org/Library/FLAIRS/2008/flairs08-020.php}
    }
  • S. Fu and M. Desmarais, “Tradeoff analysis of different markov blanket local learning approaches,” in Pakdd, 2008, pp. 562-571.
    [Bibtex]
    @InProceedings{FuTradeoff2008,
    author = {Shunkai Fu and Michel Desmarais},
    title = {Tradeoff Analysis of Different Markov Blanket Local Learning Approaches},
    booktitle = {PAKDD},
    year = {2008},
    pages = {562-571},
    ee = {http://dx.doi.org/10.1007/978-3-540-68125-0_51}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Semantics for model-based validation of continuous/discrete systems,” in Date, 2008, pp. 498-503.
    [Bibtex]
    @InProceedings{GheorgheSemantics2008,
    author = {Luiza Gheorghe and Faouzi Bouchhima and Gabriela Nicolescu and Hanifa Boucheneb},
    title = {Semantics for Model-Based Validation of Continuous/Discrete Systems},
    booktitle = {DATE},
    year = {2008},
    pages = {498-503},
    ee = {http://dx.doi.org/10.1109/DATE.2008.4484730}
    }
  • J. H. Hayes, G. Antoniol, and Y. Guéhéneuc, “Prereqir: recovering pre-requirements via cluster analysis,” in Wcre, 2008, pp. 165-174.
    [Bibtex]
    @InProceedings{HayesPREREQIR2008,
    author = {Jane Huffman Hayes and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {PREREQIR: Recovering Pre-Requirements via Cluster Analysis},
    booktitle = {WCRE},
    year = {2008},
    pages = {165-174},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.36}
    }
  • [PDF] J. H. Hayes, G. Antoniol, and Y. Guéhéneuc, “Prereqir: recovering pre-requirements via cluster analysis,” in Wcre, 2008, pp. 165-174.
    [Bibtex]
    @InProceedings{HayesPREREQIR2008-1,
    author = {Jane Huffman Hayes and Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {PREREQIR: Recovering Pre-Requirements via Cluster Analysis},
    booktitle = {WCRE},
    year = {2008},
    pages = {165-174},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.36},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2008/04656406.pdf}
    }
  • B. Kenmei, G. Antoniol, and M. D. Penta, “Trend analysis and issue prediction in large-scale open source systems,” in Csmr, 2008, pp. 73-82.
    [Bibtex]
    @InProceedings{KenmeiTrend2008,
    author = {B{\'e}n{\'e}dicte Kenmei and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Trend Analysis and Issue Prediction in Large-Scale Open Source Systems},
    booktitle = {CSMR},
    year = {2008},
    pages = {73-82},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493302}
    }
  • [PDF] B. Kenmei, G. Antoniol, and M. D. Penta, “Trend analysis and issue prediction in large-scale open source systems,” in Csmr, 2008, pp. 73-82.
    [Bibtex]
    @InProceedings{KenmeiTrend2008-1,
    author = {B{\'e}n{\'e}dicte Kenmei and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Trend Analysis and Issue Prediction in Large-Scale Open Source Systems},
    booktitle = {CSMR},
    year = {2008},
    pages = {73-82},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493302},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2008/04493302.pdf}
    }
  • F. Khomh and Y. Guéhéneuc, “Do design patterns impact software quality positively?,” in Csmr, 2008, pp. 274-278.
    [Bibtex]
    @InProceedings{KhomhDo2008,
    author = {Foutse Khomh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Do Design Patterns Impact Software Quality Positively?},
    booktitle = {CSMR},
    year = {2008},
    pages = {274-278},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493325}
    }
  • F. Khomh and Y. -, “Do design patterns impact software quality positively?,” in Csmr, 2008, pp. 274-278.
    [Bibtex]
    @InProceedings{KhomhDo2008-1,
    author = {Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc},
    title = {Do Design Patterns Impact Software Quality Positively?},
    booktitle = {CSMR},
    pages = {274--278},
    publisher = {{IEEE} Computer Society},
    year = {2008}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Error correcting graph matching application to software evolution,” in Wcre, 2008, pp. 289-293.
    [Bibtex]
    @InProceedings{KpodjedoError2008,
    author = {Segla Kpodjedo and Filippo Ricca and Philippe Galinier and Giuliano Antoniol},
    title = {Error Correcting Graph Matching Application to Software Evolution},
    booktitle = {WCRE},
    year = {2008},
    pages = {289-293},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.48}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Error correcting graph matching application to software evolution,” in Wcre, 2008, pp. 289-293.
    [Bibtex]
    @InProceedings{KpodjedoError2008-1,
    author = {Segla Kpodjedo and Filippo Ricca and Philippe Galinier and Giuliano Antoniol},
    title = {Error Correcting Graph Matching Application to Software Evolution},
    booktitle = {WCRE},
    year = {2008},
    pages = {289-293},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.48},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • N. Moha, Y. Guéhéneuc, A. L. Meur, and L. Duchien, “A domain analysis to specify design defects and generate detection algorithms,” in Fase, 2008, pp. 276-291.
    [Bibtex]
    @InProceedings{MohaDomain2008,
    author = {Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Anne-Fran\c{c}oise Le Meur and Laurence Duchien},
    title = {A Domain Analysis to Specify Design Defects and Generate Detection Algorithms},
    booktitle = {FASE},
    year = {2008},
    pages = {276-291},
    ee = {http://dx.doi.org/10.1007/978-3-540-78743-3_20}
    }
  • N. Moha, F. Khomh, Y. -, L. Duchien, and A. -, “Génération automatique d’algorithmes de détection des défauts de conception,” in Lmo, 2008, pp. 93-106.
    [Bibtex]
    @InProceedings{MohaGeneration2008,
    author = {Naouel Moha and Foutse Khomh and Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Laurence Duchien and Anne{-}Fran{\c{c}}oise Le Meur},
    title = {G{\'{e}}n{\'{e}}ration automatique d'algorithmes de d{\'{e}}tection des d{\'{e}}fauts de conception},
    booktitle = {LMO},
    series = {RNTI},
    volume = {L-1},
    pages = {93--106},
    publisher = {C{\'{e}}padu{\`{e}}s-{\'{E}}ditions},
    year = {2008}
    }
  • N. Moha, A. R. Hacene, P. Valtchev, and Y. Guéhéneuc, “Refactorings of design defects using relational concept analysis,” in Icfca, 2008, pp. 289-304.
    [Bibtex]
    @InProceedings{MohaRefactorings2008,
    author = {Naouel Moha and Amine Rouane Hacene and Petko Valtchev and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Refactorings of Design Defects Using Relational Concept Analysis},
    booktitle = {ICFCA},
    year = {2008},
    pages = {289-304},
    ee = {http://dx.doi.org/10.1007/978-3-540-78137-0_21}
    }
  • M. D. Penta, L. Cerulo, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the relationships between design pattern roles and class change proneness,” in Icsm, 2008, pp. 217-226.
    [Bibtex]
    @InProceedings{Pentaempirical2008,
    author = {Massimiliano Di Penta and Luigi Cerulo and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An empirical study of the relationships between design pattern roles and class change proneness},
    booktitle = {ICSM},
    year = {2008},
    pages = {217-226},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658070}
    }
  • [PDF] M. D. Penta, L. Cerulo, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the relationships between design pattern roles and class change proneness,” in Icsm, 2008, pp. 217-226.
    [Bibtex]
    @InProceedings{Pentaempirical2008-1,
    author = {Massimiliano Di Penta and Luigi Cerulo and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {An empirical study of the relationships between design pattern roles and class change proneness},
    booktitle = {ICSM},
    year = {2008},
    pages = {217-226},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658070},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2008/04658070.pdf}
    }
  • S. Schulz, G. Beltrame, and D. M. Codinachs, “Smart behavioral netlist simulation for seu protection verification,” in Proc. of the workshop on radiation effects on components and systems (radecs), 2008, pp. 406-411.
    [Bibtex]
    @InProceedings{SchulzSmart2008,
    title = {Smart Behavioral Netlist Simulation for SEU Protection Verification},
    booktitle = {Proc. of the Workshop on Radiation Effects on Components and Systems (RADECS)},
    author = {S. Schulz and G. Beltrame and D. M. Codinachs},
    year = {2008},
    month = sep,
    pages = {406-411}
    }

2007

  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Design recovery and maintenance of build systems,” in Icsm, 2007, pp. 114-123.
    [Bibtex]
    @InProceedings{AdamsDesign2007,
    author = {Bram Adams and Herman Tromp and Kris De Schutter and Wolfgang De Meuter},
    title = {Design recovery and maintenance of build systems},
    booktitle = {ICSM},
    year = {2007},
    pages = {114-123},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362624}
    }
  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Makao,” in Icsm, 2007, pp. 517-518.
    [Bibtex]
    @InProceedings{AdamsMAKAO2007,
    author = {Bram Adams and Herman Tromp and Kris De Schutter and Wolfgang De Meuter},
    title = {MAKAO},
    booktitle = {ICSM},
    year = {2007},
    pages = {517-518},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362678}
    }
  • B. Adams and K. D. Schutter, “An aspect for idiom-based exception handling: (using local continuation join points, join point properties, annotations and type parameters),” in Splat, 2007, p. 1.
    [Bibtex]
    @InProceedings{Adamsaspect2007,
    author = {Bram Adams and Kris De Schutter},
    title = {An aspect for idiom-based exception handling: (using local continuation join points, join point properties, annotations and type parameters)},
    booktitle = {SPLAT},
    year = {2007},
    pages = {1},
    ee = {http://doi.acm.org/10.1145/1233843.1233844}
    }
  • G. Antoniol, Y. Guéhéneuc, E. Merlo, and P. Tonella, “Mining the lexicon used by programmers during sofware evolution,” in Icsm, 2007, pp. 14-23.
    [Bibtex]
    @InProceedings{AntoniolMining2007,
    author = {Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Ettore Merlo and Paolo Tonella},
    title = {Mining the Lexicon Used by Programmers during Sofware Evolution},
    booktitle = {ICSM},
    year = {2007},
    pages = {14-23},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362614}
    }
  • G. Antoniol, Y. Guéhéneuc, E. Merlo, and P. Tonella, “Mining the lexicon used by programmers during sofware evolution,” in Icsm, 2007, pp. 14-23.
    [Bibtex]
    @InProceedings{AntoniolMining2007-1,
    author = {Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Ettore Merlo and Paolo Tonella},
    title = {Mining the Lexicon Used by Programmers during Sofware Evolution},
    booktitle = {ICSM},
    year = {2007},
    pages = {14-23},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362614},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, “Requiem for software evolution research: a few steps toward the creative age,” in Iwpse, 2007, pp. 1-3.
    [Bibtex]
    @InProceedings{AntoniolRequiem2007,
    author = {Giuliano Antoniol},
    title = {Requiem for software evolution research: a few steps toward the creative age},
    booktitle = {IWPSE},
    year = {2007},
    pages = {1-3},
    ee = {http://doi.acm.org/10.1145/1294948.1294950}
    }
  • [PDF] G. Antoniol, “Requiem for software evolution research: a few steps toward the creative age,” in Iwpse, 2007, pp. 1-3.
    [Bibtex]
    @InProceedings{AntoniolRequiem2007-1,
    author = {Giuliano Antoniol},
    title = {Requiem for software evolution research: a few steps toward the creative age},
    booktitle = {IWPSE},
    year = {2007},
    pages = {1-3},
    ee = {http://doi.acm.org/10.1145/1294948.1294950},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2007/p1-antoniol.pdf}
    }
  • K. Ayari, S. Bouktif, and G. Antoniol, “Automatic mutation test input data generation via ant colony,” in Gecco, 2007, pp. 1074-1081.
    [Bibtex]
    @InProceedings{AyariAutomatic2007,
    author = {Kamel Ayari and Salah Bouktif and Giuliano Antoniol},
    title = {Automatic mutation test input data generation via ant colony},
    booktitle = {GECCO},
    year = {2007},
    pages = {1074-1081},
    ee = {http://doi.acm.org/10.1145/1276958.1277172}
    }
  • K. Ayari, S. Bouktif, and G. Antoniol, “Automatic mutation test input data generation via ant colony,” in Gecco, 2007, pp. 1074-1081.
    [Bibtex]
    @InProceedings{AyariAutomatic2007-1,
    author = {Kamel Ayari and Salah Bouktif and Giuliano Antoniol},
    title = {Automatic mutation test input data generation via ant colony},
    booktitle = {GECCO},
    year = {2007},
    pages = {1074-1081},
    ee = {http://doi.acm.org/10.1145/1276958.1277172},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • K. Ayari, P. Meshkinfam, G. Antoniol, and M. D. Penta, “Threats on building models from cvs and bugzilla repositories: the mozilla case study,” in Cascon, 2007, pp. 215-228.
    [Bibtex]
    @InProceedings{AyariThreats2007,
    author = {Kamel Ayari and Peyman Meshkinfam and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Threats on building models from CVS and Bugzilla repositories: the Mozilla case study},
    booktitle = {CASCON},
    year = {2007},
    pages = {215-228},
    ee = {http://doi.acm.org/10.1145/1321211.1321234}
    }
  • [PDF] K. Ayari, P. Meshkinfam, G. Antoniol, and M. D. Penta, “Threats on building models from cvs and bugzilla repositories: the mozilla case study,” in Cascon, 2007, pp. 215-228.
    [Bibtex]
    @InProceedings{AyariThreats2007-1,
    author = {Kamel Ayari and Peyman Meshkinfam and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Threats on building models from CVS and Bugzilla repositories: the Mozilla case study},
    booktitle = {CASCON},
    year = {2007},
    pages = {215-228},
    ee = {http://doi.acm.org/10.1145/1321211.1321234},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2007/p215-ayari.pdf}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “A framework for reliability assessment and enhancement in multi-processor systems-on-chip,” in Dft, 2007, pp. 132-141.
    [Bibtex]
    @InProceedings{BeltrameFramework2007,
    author = {Giovanni Beltrame and Cristiana Bolchini and Luca Fossati and Antonio Miele and Donatella Sciuto},
    title = {A Framework for Reliability Assessment and Enhancement in Multi-Processor Systems-On-Chip},
    booktitle = {DFT},
    year = {2007},
    pages = {132-141},
    ee = {http://doi.ieeecomputersociety.org/10.1109/DFT.2007.35}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “A framework for reliability assessment and enhancement in multi-processor systems-on-chip,” in Proc. of the 22nd ieee intl. symposium on defect and fault-tolerance in vlsi systems, 2007. (dft), 2007, pp. 132-142.
    [Bibtex]
    @InProceedings{BeltrameFramework2007-1,
    title = {A Framework for Reliability Assessment and Enhancement in Multi-Processor Systems-On-Chip},
    booktitle = {Proc. of the 22nd IEEE Intl. Symposium on Defect and Fault-Tolerance in VLSI Systems, 2007. (DFT)},
    author = {G. Beltrame and C. Bolchini and L. Fossati and A. Miele and D. Sciuto},
    year = {2007},
    month = may,
    pages = {132--142}
    }
  • D. Boteanu, J. M. Fernandez, J. McHugh, and J. Mullins, “Queue management as a dos counter-measure?,” in Isc, 2007, pp. 263-280.
    [Bibtex]
    @InProceedings{BoteanuQueue2007,
    author = {Daniel Boteanu and Jos{\'e} M. Fernandez and John McHugh and John Mullins},
    title = {Queue Management as a DoS Counter-Measure?},
    booktitle = {ISC},
    year = {2007},
    pages = {263-280},
    ee = {http://dx.doi.org/10.1007/978-3-540-75496-1_18}
    }
  • H. Boucheneb and H. Rakkay, “A more efficient time petri net state space abstraction preserving linear properties,” in Acsd, 2007, pp. 61-70.
    [Bibtex]
    @InProceedings{Bouchenebmore2007,
    author = {Hanifa Boucheneb and Hind Rakkay},
    title = {A more efficient time Petri net state space abstraction preserving linear properties},
    booktitle = {ACSD},
    year = {2007},
    pages = {61-70},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2007.41}
    }
  • S. Demeyer, Y. Guéhéneuc, A. Keller, C. F. J. Lange, K. Mens, A. Kuhn, and M. Kuhlemann, “Object-oriented reengineering,” in Ecoop workshops, 2007, pp. 142-153.
    [Bibtex]
    @InProceedings{DemeyerObject-Oriented2007,
    author = {Serge Demeyer and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Anne Keller and Christian F. J. Lange and Kim Mens and Adrian Kuhn and Martin Kuhlemann},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {142-153},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_14}
    }
  • S. Fu and M. Desmarais, “Local learning algorithm for markov blanket discovery,” in Australian conference on artificial intelligence, 2007, pp. 68-79.
    [Bibtex]
    @InProceedings{FuLocal2007,
    author = {Shunkai Fu and Michel Desmarais},
    title = {Local Learning Algorithm for Markov Blanket Discovery},
    booktitle = {Australian Conference on Artificial Intelligence},
    year = {2007},
    pages = {68-79},
    ee = {http://dx.doi.org/10.1007/978-3-540-76928-6_9}
    }
  • M. Gagnon, “Ontology-based integration of data sources,” in Fusion, 2007, pp. 1-8.
    [Bibtex]
    @InProceedings{GagnonOntology-based2007,
    author = {Michel Gagnon},
    title = {Ontology-based integration of data sources},
    booktitle = {FUSION},
    year = {2007},
    pages = {1-8},
    ee = {http://dx.doi.org/10.1109/ICIF.2007.4408086}
    }
  • O. Gendreau and P. N. Robillard, “Knowledge conversion in software development,” in Seke, 2007, pp. 392-395.
    [Bibtex]
    @InProceedings{GendreauKnowledge2007,
    author = {Olivier Gendreau and Pierre N. Robillard},
    title = {Knowledge Conversion in Software Development},
    booktitle = {SEKE},
    year = {2007},
    pages = {392-395}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “A formalization of global simulation models for continuous/discrete systems,” in Scsc, 2007, pp. 559-566.
    [Bibtex]
    @InProceedings{Gheorgheformalization2007,
    author = {Luiza Gheorghe and Faouzi Bouchhima and Gabriela Nicolescu and Hanifa Boucheneb},
    title = {A formalization of global simulation models for continuous/discrete systems},
    booktitle = {SCSC},
    year = {2007},
    pages = {559-566},
    ee = {http://doi.acm.org/10.1145/1357910.1357998}
    }
  • Y. Guéhéneuc, “Ptidej: a flexible reverse engineering tool suite,” in Icsm, 2007, pp. 529-530.
    [Bibtex]
    @InProceedings{GueheneucPtidej2007,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Ptidej: A Flexible Reverse Engineering Tool Suite},
    booktitle = {ICSM},
    year = {2007},
    pages = {529-530},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362684}
    }
  • Y. Guéhéneuc, C. F. J. Lange, H. A. Sahraoui, G. Falcone, M. Lanza, C. Calero, and F. B. e Abreu, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2007, pp. 166-170.
    [Bibtex]
    @InProceedings{GueheneucQuantitative2007,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Christian F. J. Lange and Houari A. Sahraoui and Giovanni Falcone and Michele Lanza and Coral Calero and Fernando Brito e Abreu},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {166-170},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_16}
    }
  • S. Hardy and P. N. Robillard, “Visualization of the simulation data of biochemical network models: a painted petri net approach,” in Scsc, 2007, pp. 802-808.
    [Bibtex]
    @InProceedings{HardyVisualization2007,
    author = {Simon Hardy and Pierre N. Robillard},
    title = {Visualization of the simulation data of biochemical network models: a painted Petri net approach},
    booktitle = {SCSC},
    year = {2007},
    pages = {802-808},
    ee = {http://doi.acm.org/10.1145/1357910.1358033}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Automated protection of php applications against sql-injection attacks,” in Csmr, 2007, pp. 191-202.
    [Bibtex]
    @InProceedings{MerloAutomated2007,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {Automated Protection of PHP Applications Against SQL-injection Attacks},
    booktitle = {CSMR},
    year = {2007},
    pages = {191-202},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.16}
    }
  • [PDF] E. Merlo, D. Letarte, and G. Antoniol, “Automated protection of php applications against sql-injection attacks,” in Csmr, 2007, pp. 191-202.
    [Bibtex]
    @InProceedings{MerloAutomated2007-1,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {Automated Protection of PHP Applications Against SQL-injection Attacks},
    booktitle = {CSMR},
    year = {2007},
    pages = {191-202},
    ee = {http://dx.doi.org/10.1109/CSMR.2007.16, http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.16},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2007/04145037.pdf}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Sql-injection security evolution analysis in php,” in Wse, 2007, pp. 45-49.
    [Bibtex]
    @InProceedings{MerloSQL-Injection2007,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {SQL-Injection Security Evolution Analysis in PHP},
    booktitle = {WSE},
    year = {2007},
    pages = {45-49},
    ee = {http://dx.doi.org/10.1109/WSE.2007.4380243}
    }
  • [PDF] E. Merlo, D. Letarte, and G. Antoniol, “Sql-injection security evolution analysis in php,” in Wse, 2007, pp. 45-49.
    [Bibtex]
    @InProceedings{MerloSQL-Injection2007-1,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {SQL-Injection Security Evolution Analysis in PHP},
    booktitle = {WSE},
    year = {2007},
    pages = {45-49},
    ee = {http://dx.doi.org/10.1109/WSE.2007.4380243},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2007/04380243.pdf}
    }
  • J. Migneault, J. Robert, M. C. Desmarais, and S. Caron, “Comparing voice with touch screen for controlling the instructor’s operating station of a flight simulator,” in Smc, 2007, pp. 3662-3667.
    [Bibtex]
    @InProceedings{MigneaultComparing2007,
    author = {Jo{\"e}l Migneault and Jean-Marc Robert and Michel C. Desmarais and Sylvain Caron},
    title = {Comparing voice with touch screen for controlling the instructor's operating station of a flight simulator},
    booktitle = {SMC},
    year = {2007},
    pages = {3662-3667},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414002}
    }
  • N. Moha and Y. Guéhéneuc, “Decor: a tool for the detection of design defects,” in Ase, 2007, pp. 527-528.
    [Bibtex]
    @InProceedings{MohaDecor2007,
    author = {Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Decor: a tool for the detection of design defects},
    booktitle = {ASE},
    year = {2007},
    pages = {527-528},
    ee = {http://doi.acm.org/10.1145/1321631.1321727}
    }
  • N. Moha and Y. Guéhéneuc, “P<scp>tidej</scp> and d<scp>ecor</scp>: identification of design patterns and design defects,” in Oopsla companion, 2007, pp. 868-869.
    [Bibtex]
    @InProceedings{MohaPlt2007,
    author = {Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {P{\&}lt;scp{\&}gt;TIDEJ{\&}lt;/scp{\&}gt; and D{\&}lt;scp{\&}gt;ECOR{\&}lt;/scp{\&}gt;: identification of design patterns and design defects},
    booktitle = {OOPSLA Companion},
    year = {2007},
    pages = {868-869},
    ee = {http://doi.acm.org/10.1145/1297846.1297930}
    }
  • J. Mullins and R. Oarga, “Model checking of extended ocl constraints on uml models in socle,” in Fmoods, 2007, pp. 59-75.
    [Bibtex]
    @InProceedings{MullinsModel2007,
    author = {John Mullins and Raveca Oarga},
    title = {Model Checking of Extended OCL Constraints on UML Models in SOCLe},
    booktitle = {FMOODS},
    year = {2007},
    pages = {59-75},
    ee = {http://dx.doi.org/10.1007/978-3-540-72952-5_4}
    }
  • R. Oliveto, G. Antoniol, A. Marcus, and J. H. Hayes, “Software artefact traceability: the never-ending challenge,” in Icsm, 2007, pp. 485-488.
    [Bibtex]
    @InProceedings{OlivetoSoftware2007,
    author = {Rocco Oliveto and Giuliano Antoniol and Andrian Marcus and Jane Huffman Hayes},
    title = {Software Artefact Traceability: the Never-Ending Challenge},
    booktitle = {ICSM},
    year = {2007},
    pages = {485-488},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362664}
    }
  • [PDF] R. Oliveto, G. Antoniol, A. Marcus, and J. H. Hayes, “Software artefact traceability: the never-ending challenge,” in Icsm, 2007, pp. 485-488.
    [Bibtex]
    @InProceedings{OlivetoSoftware2007-1,
    author = {Rocco Oliveto and Giuliano Antoniol and Andrian Marcus and Jane Huffman Hayes},
    title = {Software Artefact Traceability: the Never-Ending Challenge},
    booktitle = {ICSM},
    year = {2007},
    pages = {485-488},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362664},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2007/04362664.pdf}
    }
  • M. D. Penta, M. Harman, G. Antoniol, and F. Qureshi, “The effect of communication overhead on software maintenance project staffing: a search-based approach,” in Icsm, 2007, pp. 315-324.
    [Bibtex]
    @InProceedings{PentaEffect2007,
    author = {Massimiliano Di Penta and Mark Harman and Giuliano Antoniol and Fahim Qureshi},
    title = {The Effect of Communication Overhead on Software Maintenance Project Staffing: a Search-Based Approach},
    booktitle = {ICSM},
    year = {2007},
    pages = {315-324},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362644}
    }
  • M. D. Penta, M. Harman, G. Antoniol, and F. Qureshi, “The effect of communication overhead on software maintenance project staffing: a search-based approach,” in Icsm, 2007, pp. 315-324.
    [Bibtex]
    @InProceedings{PentaEffect2007-1,
    author = {Massimiliano Di Penta and Mark Harman and Giuliano Antoniol and Fahim Qureshi},
    title = {The Effect of Communication Overhead on Software Maintenance Project Staffing: a Search-Based Approach},
    booktitle = {ICSM},
    year = {2007},
    pages = {315-324},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362644},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Gesture-based interactions with virtually embodied wearable computer software processes competing for user attention,” in Smc, 2007, pp. 2533-2538.
    [Bibtex]
    @InProceedings{PlouznikoffGesture-based2007,
    author = {Nicolas Plouznikoff and Alexandre Plouznikoff and Michel Desmarais and Jean-Marc Robert},
    title = {Gesture-based interactions with virtually embodied wearable computer software processes competing for user attention},
    booktitle = {SMC},
    year = {2007},
    pages = {2533-2538},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414047}
    }

2006

  • F. B. e Abreu, C. Calero, Y. Guéhéneuc, M. Lanza, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2006, pp. 87-96.
    [Bibtex]
    @InProceedings{AbreuQuantitative2006,
    author = {Fernando Brito e Abreu and Coral Calero and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Michele Lanza and Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {87-96},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_10}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, P. G. Paulin, and E. Bensoudane, “An application mapping methodology and case study for multi-processor on-chip architectures,” in Vlsi-soc, 2006, pp. 146-151.
    [Bibtex]
    @InProceedings{BeltrameApplication2006,
    author = {Giovanni Beltrame and Donatella Sciuto and Cristina Silvano and Pierre G. Paulin and Essaid Bensoudane},
    title = {An Application Mapping Methodology and Case Study for Multi-Processor On-Chip Architectures},
    booktitle = {VLSI-SoC},
    year = {2006},
    pages = {146-151},
    ee = {http://dx.doi.org/10.1109/VLSISOC.2006.313219}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, P. Paulin, and E. Bensoudane, “An application mapping methodology and case study for multi-processor on-chip architectures,” in Proc. ifip intl. conference on very large scale integration (vlsi-soc), 2006, pp. 146-151.
    [Bibtex]
    @InProceedings{BeltrameApplication2006-1,
    title = {An Application Mapping Methodology and Case Study for Multi-Processor On-Chip Architectures},
    booktitle = {Proc. IFIP Intl. Conference on Very Large Scale Integration (VLSI-SoC)},
    author = {G. Beltrame and D. Sciuto and C. Silvano and P. Paulin and E. Bensoudane},
    year = {2006},
    month = sep,
    pages = {146--151}
    }
  • G. Beltrame, D. Bruschi, D. Sciuto, and C. Silvano, “Decision-theoretic exploration of multiprocessor platforms,” in Codes+isss, 2006, pp. 205-210.
    [Bibtex]
    @InProceedings{BeltrameDecision-theoretic2006,
    author = {Giovanni Beltrame and Dario Bruschi and Donatella Sciuto and Cristina Silvano},
    title = {Decision-theoretic exploration of multiProcessor platforms},
    booktitle = {CODES+ISSS},
    year = {2006},
    pages = {205-210},
    ee = {http://doi.acm.org/10.1145/1176254.1176305}
    }
  • G. Beltrame, D. Bruschi, D. Sciuto, and C. Silvano, “Decision-theoretic exploration of multi-processor platforms,” in Proceedings of the 4th intl. conference hw/sw codesign and system synthesis (codes+isss), 2006, pp. 205-210.
    [Bibtex]
    @InProceedings{BeltrameDecision-theoretic2006-1,
    title = {Decision-theoretic exploration of multi-Processor platforms},
    booktitle = {Proceedings of the 4th Intl. Conference HW/SW Codesign and System Synthesis (CODES+ISSS)},
    author = {G. Beltrame and D. Bruschi and D. Sciuto and C. Silvano},
    year = {2006},
    month = oct,
    pages = {205--210}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, D. Lyonnard, and C. Pilkington, “Exploiting tlm and object introspection for system-level simulation,” in Date, 2006, pp. 100-105.
    [Bibtex]
    @InProceedings{BeltrameExploiting2006,
    author = {Giovanni Beltrame and Donatella Sciuto and Cristina Silvano and Damien Lyonnard and Chuck Pilkington},
    title = {Exploiting TLM and object introspection for system-level simulation},
    booktitle = {DATE},
    year = {2006},
    pages = {100-105},
    ee = {http://doi.acm.org/10.1145/1131515}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, D. Lyonnard, and C. Pilkington, “Exploiting tlm and object introspection for system-level simulation,” in Proc. of design, automation and test in europe (date), 2006, pp. 1-6.
    [Bibtex]
    @InProceedings{BeltrameExploiting2006-1,
    title = {Exploiting TLM and Object Introspection for System-Level Simulation},
    volume = {1},
    booktitle = {Proc. of Design, Automation and Test in Europe (DATE)},
    author = {G. Beltrame and D. Sciuto and C. Silvano and D. Lyonnard and C. Pilkington},
    year = {2006},
    month = mar,
    pages = {1--6}
    }
  • S. Bouktif, Y. Guéhéneuc, and G. Antoniol, “Extracting change-patterns from cvs repositories,” in Wcre, 2006, pp. 221-230.
    [Bibtex]
    @InProceedings{BouktifExtracting2006,
    author = {Salah Bouktif and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Extracting Change-patterns from CVS Repositories},
    booktitle = {WCRE},
    year = {2006},
    pages = {221-230},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.27}
    }
  • [PDF] S. Bouktif, Y. Guéhéneuc, and G. Antoniol, “Extracting change-patterns from cvs repositories,” in Wcre, 2006, pp. 221-230.
    [Bibtex]
    @InProceedings{BouktifExtracting2006-1,
    author = {Salah Bouktif and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Extracting Change-patterns from CVS Repositories},
    booktitle = {WCRE},
    year = {2006},
    pages = {221-230},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.27},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/04023992.pdf}
    }
  • S. Bouktif, G. Antoniol, and E. Merlo, “A feedback based quality assessment to support open source software evolution: the grass case study,” in Icsm, 2006, pp. 155-165.
    [Bibtex]
    @InProceedings{BouktifFeedback2006,
    author = {Salah Bouktif and Giuliano Antoniol and Ettore Merlo},
    title = {A Feedback Based Quality Assessment to Support Open Source Software Evolution: the GRASS Case Study},
    booktitle = {ICSM},
    year = {2006},
    pages = {155-165},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2006.5}
    }
  • [PDF] S. Bouktif, G. Antoniol, and E. Merlo, “A feedback based quality assessment to support open source software evolution: the grass case study,” in Icsm, 2006, pp. 155-165.
    [Bibtex]
    @InProceedings{BouktifFeedback2006-1,
    author = {Salah Bouktif and Giuliano Antoniol and Ettore Merlo},
    title = {A Feedback Based Quality Assessment to Support Open Source Software Evolution: the GRASS Case Study},
    booktitle = {ICSM},
    year = {2006},
    pages = {155-165},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2006.5},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/04021333.pdf}
    }
  • S. Bouktif, H. A. Sahraoui, and G. Antoniol, “Simulated annealing for improving software quality prediction,” in Gecco, 2006, pp. 1893-1900.
    [Bibtex]
    @InProceedings{BouktifSimulated2006,
    author = {Salah Bouktif and Houari A. Sahraoui and Giuliano Antoniol},
    title = {Simulated annealing for improving software quality prediction},
    booktitle = {GECCO},
    year = {2006},
    pages = {1893-1900},
    ee = {http://doi.acm.org/10.1145/1143997.1144313}
    }
  • [PDF] S. Bouktif, H. A. Sahraoui, and G. Antoniol, “Simulated annealing for improving software quality prediction,” in Gecco, 2006, pp. 1893-1900.
    [Bibtex]
    @InProceedings{BouktifSimulated2006-1,
    author = {Salah Bouktif and Houari A. Sahraoui and Giuliano Antoniol},
    title = {Simulated annealing for improving software quality prediction},
    booktitle = {GECCO},
    year = {2006},
    pages = {1893-1900},
    ee = {http://doi.acm.org/10.1145/1143997.1144313},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/p1893-bouktif.pdf}
    }
  • S. Bouktif, G. Antoniol, E. Merlo, and M. Neteler, “A novel approach to optimize clone refactoring activity,” in Gecco, 2006, pp. 1885-1892.
    [Bibtex]
    @InProceedings{Bouktifnovel2006,
    author = {Salah Bouktif and Giuliano Antoniol and Ettore Merlo and Markus Neteler},
    title = {A novel approach to optimize clone refactoring activity},
    booktitle = {GECCO},
    year = {2006},
    pages = {1885-1892},
    ee = {http://doi.acm.org/10.1145/1143997.1144312}
    }
  • [PDF] S. Bouktif, G. Antoniol, E. Merlo, and M. Neteler, “A novel approach to optimize clone refactoring activity,” in Gecco, 2006, pp. 1885-1892.
    [Bibtex]
    @InProceedings{Bouktifnovel2006-1,
    author = {Salah Bouktif and Giuliano Antoniol and Ettore Merlo and Markus Neteler},
    title = {A novel approach to optimize clone refactoring activity},
    booktitle = {GECCO},
    year = {2006},
    pages = {1885-1892},
    ee = {http://doi.acm.org/10.1145/1143997.1144312},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/p1885-bouktif.pdf}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “Some remarks on the certificates registration of the electronic commerce protocol set,” in Aict/iciw, 2006, p. 119.
    [Bibtex]
    @InProceedings{BrlekSome2006,
    author = {Srecko Brlek and Sardaouna Hamadou and John Mullins},
    title = {Some Remarks on the Certificates Registration of the Electronic Commerce Protocol SET},
    booktitle = {AICT/ICIW},
    year = {2006},
    pages = {119},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AICT-ICIW.2006.176}
    }
  • M. Desmarais and M. Gagnon, “Bayesian student models based on item to item knowledge structures,” in Ec-tel, 2006, pp. 111-124.
    [Bibtex]
    @InProceedings{DesmaraisBayesian2006,
    author = {Michel Desmarais and Michel Gagnon},
    title = {Bayesian Student Models Based on Item to Item Knowledge Structures},
    booktitle = {EC-TEL},
    year = {2006},
    pages = {111-124},
    ee = {http://dx.doi.org/10.1007/11876663_11}
    }
  • M. Dulipovici and P. N. Robillard, “Vector-based method for measuring and comparing software requirements implementation,” in Acst, 2006, pp. 292-297.
    [Bibtex]
    @InProceedings{DulipoviciVector-based2006,
    author = {Mihaela Dulipovici and Pierre N. Robillard},
    title = {Vector-based method for measuring and comparing software requirements implementation},
    booktitle = {ACST},
    year = {2006},
    pages = {292-297}
    }
  • F. A. Fontana, C. Raibulet, Y. Guéhéneuc, G. Antoniol, and J. M. Smith, “Design pattern detection for reverse engineering,” in Wcre, 2006, p. 316.
    [Bibtex]
    @InProceedings{FontanaDesign2006,
    author = {Francesca Arcelli Fontana and Claudia Raibulet and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol and Jason McC. Smith},
    title = {Design Pattern Detection for Reverse Engineering},
    booktitle = {WCRE},
    year = {2006},
    pages = {316},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.23}
    }
  • M. Gagnon and L. D. Sylva, “Text compression by syntactic pruning,” in Canadian conference on ai, 2006, pp. 312-323.
    [Bibtex]
    @InProceedings{GagnonText2006,
    author = {Michel Gagnon and Lyne Da Sylva},
    title = {Text Compression by Syntactic Pruning},
    booktitle = {Canadian Conference on AI},
    year = {2006},
    pages = {312-323},
    ee = {http://dx.doi.org/10.1007/11766247_27}
    }
  • M. Gagnon, E. M. P. de Coelho, and R. A. Finger, “Towards a formalization of tense and aspect for the generation of portuguese sentences,” in Propor, 2006, pp. 229-232.
    [Bibtex]
    @InProceedings{GagnonTowards2006,
    author = {Michel Gagnon and Eliana de Mattos Pinto Coelho and Roger Antonio Finger},
    title = {Towards a Formalization of Tense and Aspect for the Generation of Portuguese Sentences},
    booktitle = {PROPOR},
    year = {2006},
    pages = {229-232},
    ee = {http://dx.doi.org/10.1007/11751984_28}
    }
  • S. Galice, M. Minier, J. Mullins, and S. Ubéda, “Cryptographic protocol to establish trusted history of interactions,” in Esas, 2006, pp. 136-149.
    [Bibtex]
    @InProceedings{GaliceCryptographic2006,
    author = {Samuel Galice and Marine Minier and John Mullins and St{\'e}phane Ub{\'e}da},
    title = {Cryptographic Protocol to Establish Trusted History of Interactions},
    booktitle = {ESAS},
    year = {2006},
    pages = {136-149},
    ee = {http://dx.doi.org/10.1007/11964254_13}
    }
  • S. Galice, V. Legrand, M. Minier, J. Mullins, and S. Ubéda, “A history-based framework to build trust management systems,” in Securecomm, 2006, pp. 1-7.
    [Bibtex]
    @InProceedings{GaliceHistory-Based2006,
    author = {Samuel Galice and V{\'e}ronique Legrand and Marine Minier and John Mullins and St{\'e}phane Ub{\'e}da},
    title = {A History-Based Framework to Build Trust Management Systems},
    booktitle = {SecureComm},
    year = {2006},
    pages = {1-7},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SECCOMW.2006.359580}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Formal definitions of simulation interfaces in a continuous/discrete co-simulation tool,” in Ieee international workshop on rapid system prototyping, 2006, pp. 186-192.
    [Bibtex]
    @InProceedings{GheorgheFormal2006,
    author = {Luiza Gheorghe and Faouzi Bouchhima and Gabriela Nicolescu and Hanifa Boucheneb},
    title = {Formal Definitions of Simulation Interfaces in a Continuous/Discrete Co-Simulation Tool},
    booktitle = {IEEE International Workshop on Rapid System Prototyping},
    year = {2006},
    pages = {186-192},
    ee = {http://doi.ieeecomputersociety.org/10.1109/RSP.2006.18}
    }
  • Y. Guéhéneuc, K. Mens, and R. Wuyts, “A comparative framework for design recovery tools,” in Csmr, 2006, pp. 123-134.
    [Bibtex]
    @InProceedings{GueheneucComparative2006,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Kim Mens and Roel Wuyts},
    title = {A Comparative Framework for Design Recovery Tools},
    booktitle = {CSMR},
    year = {2006},
    pages = {123-134},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.1}
    }
  • Y. Guéhéneuc, “Taupe: towards understanding program comprehension,” in Cascon, 2006, pp. 1-13.
    [Bibtex]
    @InProceedings{GueheneucTAUPE2006,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {TAUPE: towards understanding program comprehension},
    booktitle = {CASCON},
    year = {2006},
    pages = {1-13},
    ee = {http://doi.acm.org/10.1145/1188966.1188968}
    }
  • R. Hadjidj and H. Boucheneb, “On-the-fly tctl model checking for time petri nets using state class graphs,” in Acsd, 2006, pp. 111-122.
    [Bibtex]
    @InProceedings{HadjidjOn-the-fly2006,
    author = {Rachid Hadjidj and Hanifa Boucheneb},
    title = {On-the-fly TCTL model checking for Time Petri Nets using state class graphs},
    booktitle = {ACSD},
    year = {2006},
    pages = {111-122},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2006.18}
    }
  • A. Jodoin, R. L’Archevêque, P. Allard, M. Desmarais, and L. Granger, “Un environnement de développement dynamique qui intègre des composants graphiques actifs,” in Ihm, 2006, pp. 293-294.
    [Bibtex]
    @InProceedings{Jodoinenvironnement2006,
    author = {Andr{\'e} Jodoin and R{\'e}gent L'Archev{\^e}que and Pierre Allard and Michel Desmarais and Louis Granger},
    title = {Un environnement de d{\'e}veloppement dynamique qui int{\`e}gre des composants graphiques actifs},
    booktitle = {IHM},
    year = {2006},
    pages = {293-294},
    ee = {http://doi.acm.org/10.1145/1132736.1132789}
    }
  • O. Kaczor, Y. Guéhéneuc, and S. Hamel, “Efficient identification of design patterns with bit-vector algorithm,” in Csmr, 2006, pp. 175-184.
    [Bibtex]
    @InProceedings{KaczorEfficient2006,
    author = {Olivier Kaczor and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Sylvie Hamel},
    title = {Efficient Identification of Design Patterns with Bit-vector Algorithm},
    booktitle = {CSMR},
    year = {2006},
    pages = {175-184},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.25}
    }
  • R. Koschke, A. Walenstein, and E. Merlo, “06301 abstracts collection — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @InProceedings{Koschke063012006,
    author = {Rainer Koschke and Andrew Walenstein and Ettore Merlo},
    title = {06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/972}
    }
  • E. Merlo, “Detection of plagiarism in university projects using metrics-based spectral similarity,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @InProceedings{MerloDetection2006,
    author = {Ettore Merlo},
    title = {Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/986}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Insider and ousider threat-sensitive sql injection vulnerability analysis in php,” in Wcre, 2006, pp. 147-156.
    [Bibtex]
    @InProceedings{MerloInsider2006,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP},
    booktitle = {WCRE},
    year = {2006},
    pages = {147-156},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.33}
    }
  • [PDF] E. Merlo, D. Letarte, and G. Antoniol, “Insider and ousider threat-sensitive sql injection vulnerability analysis in php,” in Wcre, 2006, pp. 147-156.
    [Bibtex]
    @InProceedings{MerloInsider2006-1,
    author = {Ettore Merlo and Dominic Letarte and Giuliano Antoniol},
    title = {Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP},
    booktitle = {WCRE},
    year = {2006},
    pages = {147-156},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.33},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/04023985.pdf}
    }
  • N. Moha, Y. Guéhéneuc, and P. Leduc, “Automatic generation of detection algorithms for design defects,” in Ase, 2006, pp. 297-300.
    [Bibtex]
    @InProceedings{MohaAutomatic2006,
    author = {Naouel Moha and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Pierre Leduc},
    title = {Automatic Generation of Detection Algorithms for Design Defects},
    booktitle = {ASE},
    year = {2006},
    pages = {297-300},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ASE.2006.22}
    }
  • N. Moha, J. Rezgui, Y. Guéhéneuc, P. Valtchev, and G. El-Boussaidi, “Using fca to suggest refactorings to correct design defects,” in Cla, 2006, pp. 269-275.
    [Bibtex]
    @InProceedings{MohaUsing2006,
    author = {Naouel Moha and Jihene Rezgui and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Petko Valtchev and Ghizlane El-Boussaidi},
    title = {Using FCA to Suggest Refactorings to Correct Design Defects},
    booktitle = {CLA},
    year = {2006},
    pages = {269-275},
    ee = {http://dx.doi.org/10.1007/978-3-540-78921-5_20}
    }
  • N. Moha, D. -L. Huynh, and Y. Guéhéneuc, “Une taxonomie et un métamodèle pour la détection des défauts de conception,” in Lmo, 2006, pp. 201-216.
    [Bibtex]
    @InProceedings{Mohataxonomie2006,
    author = {Naouel Moha and D.-L. Huynh and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Une taxonomie et un m{\'e}tamod{\`e}le pour la d{\'e}tection des d{\'e}fauts de conception},
    booktitle = {LMO},
    year = {2006},
    pages = {201-216}
    }
  • A. Plouznikoff, N. Plouznikoff, J. Robert, and M. Desmarais, “Enhancing human-machine interactions: virtual interface alteration through wearable computers,” in Chi, 2006, pp. 373-376.
    [Bibtex]
    @InProceedings{PlouznikoffEnhancing2006,
    author = {Alexandre Plouznikoff and Nicolas Plouznikoff and Jean-Marc Robert and Michel Desmarais},
    title = {Enhancing human-machine interactions: virtual interface alteration through wearable computers},
    booktitle = {CHI},
    year = {2006},
    pages = {373-376},
    ee = {http://doi.acm.org/10.1145/1124772.1124828}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Support mobile à la tâche: médiation utilisateur – monde réel par l’intermédiaire d’un ordinateur porté,” in Ihm, 2006, pp. 107-114.
    [Bibtex]
    @InProceedings{PlouznikoffSupport2006,
    author = {Nicolas Plouznikoff and Alexandre Plouznikoff and Michel Desmarais and Jean-Marc Robert},
    title = {Support mobile {\`a} la t{\^a}che: m{\'e}diation utilisateur - monde r{\'e}el par l'interm{\'e}diaire d'un ordinateur port{\'e}},
    booktitle = {IHM},
    year = {2006},
    pages = {107-114},
    ee = {http://doi.acm.org/10.1145/1132736.1132750}
    }
  • D. Poshyvanyk, A. Marcus, V. Rajlich, Y. Guéhéneuc, and G. Antoniol, “Combining probabilistic ranking and latent semantic indexing for feature identification,” in Icpc, 2006, pp. 137-148.
    [Bibtex]
    @InProceedings{PoshyvanykCombining2006,
    author = {Denys Poshyvanyk and Andrian Marcus and V{\'a}clav Rajlich and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification},
    booktitle = {ICPC},
    year = {2006},
    pages = {137-148},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2006.17}
    }
  • [PDF] D. Poshyvanyk, A. Marcus, V. Rajlich, Y. Guéhéneuc, and G. Antoniol, “Combining probabilistic ranking and latent semantic indexing for feature identification,” in Icpc, 2006, pp. 137-148.
    [Bibtex]
    @InProceedings{PoshyvanykCombining2006-1,
    author = {Denys Poshyvanyk and Andrian Marcus and V{\'a}clav Rajlich and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification},
    booktitle = {ICPC},
    year = {2006},
    pages = {137-148},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2006.17},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2006/01631116.pdf}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Scenario-driven dynamic analysis for comprehending large software systems,” in Csmr, 2006, pp. 71-80.
    [Bibtex]
    @InProceedings{SalahScenario-Driven2006,
    author = {Maher Salah and Spiros Mancoridis and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems},
    booktitle = {CSMR},
    year = {2006},
    pages = {71-80},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.47}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Scenario-driven dynamic analysis for comprehending large software systems,” in Csmr, 2006, pp. 71-80.
    [Bibtex]
    @InProceedings{SalahScenario-Driven2006-1,
    author = {Maher Salah and Spiros Mancoridis and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems},
    booktitle = {CSMR},
    year = {2006},
    pages = {71-80},
    ee = {http://dx.doi.org/10.1109/CSMR.2006.47, http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.47},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • K. D. Schutter and B. Adams, “Face-off: aop+lmp vs. legacy software,” in Aspects for legacy applications, 2006.
    [Bibtex]
    @InProceedings{SchutterFace-off2006,
    author = {Kris De Schutter and Bram Adams},
    title = {Face-off: AOP+LMP vs. legacy software},
    booktitle = {Aspects For Legacy Applications},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/888}
    }
  • A. Walenstein, R. Koschke, and E. Merlo, “06301 summary — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @InProceedings{Walenstein063012006,
    author = {Andrew Walenstein and Rainer Koschke and Ettore Merlo},
    title = {06301 Summary -- Duplication, Redundancy, and Similarity in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/971}
    }
  • A. Walenstein, J. R. Cordy, W. S. Evans, A. E. Hassan, T. Kamiya, C. Kapser, and E. Merlo, “06301 working session summary: presentation and visualization of redundant code,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @InProceedings{Walenstein063012006-1,
    author = {Andrew Walenstein and James R. Cordy and William S. Evans and Ahmed E. Hassan and Toshihiro Kamiya and Cory Kapser and Ettore Merlo},
    title = {06301 Working Session Summary: Presentation and Visualization of Redundant Code},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/966}
    }
  • R. Wuyts, S. Demeyer, Y. Guéhéneuc, K. Mens, and S. Ducasse, “Object-oriented reengineering,” in Ecoop workshops, 2006, pp. 69-71.
    [Bibtex]
    @InProceedings{WuytsObject-Oriented2006,
    author = {Roel Wuyts and Serge Demeyer and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Kim Mens and St{\'e}phane Ducasse},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {69-71},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_8}
    }
  • A. Zaidman, S. Demeyer, B. Adams, K. D. Schutter, G. Hoffman, and B. D. Ruyck, “Regaining lost knowledge through dynamic analysis and aspect orientation,” in Csmr, 2006, pp. 91-102.
    [Bibtex]
    @InProceedings{ZaidmanRegaining2006,
    author = {Andy Zaidman and Serge Demeyer and Bram Adams and Kris De Schutter and Ghislain Hoffman and Bernard De Ruyck},
    title = {Regaining Lost Knowledge through Dynamic Analysis and Aspect Orientation},
    booktitle = {CSMR},
    year = {2006},
    pages = {91-102},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.45}
    }

2005

  • G. Antoniol, V. F. Rollo, and G. Venturi, “Detecting groups of co-changing files in cvs repositories,” in Iwpse, 2005, pp. 23-32.
    [Bibtex]
    @InProceedings{AntoniolDetecting2005,
    author = {Giuliano Antoniol and Vincenzo Fabio Rollo and Gabriele Venturi},
    title = {Detecting groups of co-changing files in CVS repositories},
    booktitle = {IWPSE},
    year = {2005},
    pages = {23-32},
    ee = {http://doi.ieeecomputersociety.org/10.1109/IWPSE.2005.11}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Detecting groups of co-changing files in cvs repositories,” in Iwpse, 2005, pp. 23-32.
    [Bibtex]
    @InProceedings{AntoniolDetecting2005-1,
    author = {Giuliano Antoniol and Vincenzo Fabio Rollo and Gabriele Venturi},
    title = {Detecting groups of co-changing files in CVS repositories},
    booktitle = {IWPSE},
    year = {2005},
    pages = {23-32},
    ee = {http://doi.ieeecomputersociety.org/10.1109/IWPSE.2005.11},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol and Y. Guéhéneuc, “Feature identification: a novel approach and a case study,” in Icsm, 2005, pp. 357-366.
    [Bibtex]
    @InProceedings{AntoniolFeature2005,
    author = {Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Feature Identification: A Novel Approach and a Case Study},
    booktitle = {ICSM},
    year = {2005},
    pages = {357-366},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.48}
    }
  • G. Antoniol and Y. Guéhéneuc, “Feature identification: a novel approach and a case study,” in Icsm, 2005, pp. 357-366.
    [Bibtex]
    @InProceedings{AntoniolFeature2005-1,
    author = {Giuliano Antoniol and Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Feature Identification: A Novel Approach and a Case Study},
    booktitle = {ICSM},
    year = {2005},
    pages = {357-366},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.48},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories,” in Msr, 2005.
    [Bibtex]
    @InProceedings{AntoniolLinear2005-1,
    author = {Giuliano Antoniol and Vincenzo Fabio Rollo and Gabriele Venturi},
    title = {Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories},
    booktitle = {MSR},
    year = {2005},
    ee = {http://doi.acm.org/10.1145/1083142.1083156}
    }
  • G. Antoniol, M. Ceccarelli, and A. Petrosino, “Microarray image addressing based on the radon transform,” in Icip (1), 2005, pp. 13-16.
    [Bibtex]
    @InProceedings{AntoniolMicroarray2005,
    author = {Giuliano Antoniol and Michele Ceccarelli and Alfredo Petrosino},
    title = {Microarray image addressing based on the Radon transform},
    booktitle = {ICIP (1)},
    year = {2005},
    pages = {13-16},
    ee = {http://dx.doi.org/10.1109/ICIP.2005.1529675}
    }
  • [PDF] G. Antoniol, M. Ceccarelli, and A. Petrosino, “Microarray image addressing based on the radon transform,” in Icip (1), 2005, pp. 13-16.
    [Bibtex]
    @InProceedings{AntoniolMicroarray2005-1,
    author = {Giuliano Antoniol and Michele Ceccarelli and Alfredo Petrosino},
    title = {Microarray image addressing based on the Radon transform},
    booktitle = {ICIP (1)},
    year = {2005},
    pages = {13-16},
    ee = {http://dx.doi.org/10.1109/ICIP.2005.1529675},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2005/01529675.pdf}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques applied to optimization of project planning for a massive maintenance project,” in Icsm, 2005, pp. 240-249.
    [Bibtex]
    @InProceedings{AntoniolSearch-Based2005,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Mark Harman},
    title = {Search-Based Techniques Applied to Optimization of Project Planning for a Massive Maintenance Project},
    booktitle = {ICSM},
    year = {2005},
    pages = {240-249},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.79}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques applied to optimization of project planning for a massive maintenance project,” in Icsm, 2005, pp. 240-249.
    [Bibtex]
    @InProceedings{AntoniolSearch-Based2005-1,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Mark Harman},
    title = {Search-Based Techniques Applied to Optimization of Project Planning for a Massive Maintenance Project},
    booktitle = {ICSM},
    year = {2005},
    pages = {240-249},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.79},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • M. Desmarais and X. Pu, “Computer adaptive testing: comparison of a probabilistic network approach with item response theory,” in User modeling, 2005, pp. 392-396.
    [Bibtex]
    @InProceedings{DesmaraisComputer2005,
    author = {Michel Desmarais and Xiaoming Pu},
    title = {Computer Adaptive Testing: Comparison of a Probabilistic Network Approach with Item Response Theory},
    booktitle = {User Modeling},
    year = {2005},
    pages = {392-396},
    ee = {http://dx.doi.org/10.1007/11527886_51}
    }
  • M. Desmarais, S. Fu, and X. Pu, “Tradeoff analysis between knowledge assessment approaches,” in Aied, 2005, pp. 209-216.
    [Bibtex]
    @InProceedings{DesmaraisTradeoff2005,
    author = {Michel Desmarais and Shunkai Fu and Xiaoming Pu},
    title = {Tradeoff analysis between knowledge assessment approaches},
    booktitle = {AIED},
    year = {2005},
    pages = {209-216},
    ee = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1311}
    }
  • M. Desmarais, “Web log session analyzer: integrating parsing and logic programming into a data mart architecture,” in Web intelligence, 2005, pp. 794-797.
    [Bibtex]
    @InProceedings{DesmaraisWeb2005,
    author = {Michel Desmarais},
    title = {Web Log Session Analyzer: Integrating Parsing and Logic Programming into a Data Mart Architecture},
    booktitle = {Web Intelligence},
    year = {2005},
    pages = {794-797},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI.2005.159}
    }
  • A. Fellah and J. Mullins, “Admissible interference by typing for cryptographic protocols,” in Icics, 2005, pp. 123-135.
    [Bibtex]
    @InProceedings{FellahAdmissible2005,
    author = {Alaaeddine Fellah and John Mullins},
    title = {Admissible Interference by Typing for Cryptographic Protocols},
    booktitle = {ICICS},
    year = {2005},
    pages = {123-135},
    ee = {http://dx.doi.org/10.1007/11602897_11}
    }
  • C. D. Grosso, G. Antoniol, M. D. Penta, P. Galinier, and E. Merlo, “Improving network applications security: a new heuristic to generate stress testing data,” in Gecco, 2005, pp. 1037-1043.
    [Bibtex]
    @InProceedings{GrossoImproving2005,
    author = {Concettina Del Grosso and Giuliano Antoniol and Massimiliano Di Penta and Philippe Galinier and Ettore Merlo},
    title = {Improving network applications security: a new heuristic to generate stress testing data},
    booktitle = {GECCO},
    year = {2005},
    pages = {1037-1043},
    ee = {http://doi.acm.org/10.1145/1068009.1068185}
    }
  • C. D. Grosso, G. Antoniol, M. D. Penta, P. Galinier, and E. Merlo, “Improving network applications security: a new heuristic to generate stress testing data,” in Gecco, 2005, pp. 1037-1043.
    [Bibtex]
    @InProceedings{GrossoImproving2005-1,
    author = {Concettina Del Grosso and Giuliano Antoniol and Massimiliano Di Penta and Philippe Galinier and Ettore Merlo},
    title = {Improving network applications security: a new heuristic to generate stress testing data},
    booktitle = {GECCO},
    year = {2005},
    pages = {1037-1043},
    ee = {http://doi.acm.org/10.1145/1068009.1068185},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • Y. Guéhéneuc and G. Antoniol, “Report on the 1st international workshop on design pattern theory and practice,” in Step, 2005, pp. 193-195.
    [Bibtex]
    @InProceedings{GueheneucReport2005,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Report on the 1st International Workshop on Design Pattern Theory and Practice},
    booktitle = {STEP},
    year = {2005},
    pages = {193-195},
    ee = {http://doi.ieeecomputersociety.org/10.1109/STEP.2005.20}
    }
  • Y. Guéhéneuc and G. Antoniol, “Report on the 1st international workshop on design pattern theory and practice,” in Step, 2005, pp. 193-195.
    [Bibtex]
    @InProceedings{GueheneucReport2005-1,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and Giuliano Antoniol},
    title = {Report on the 1st International Workshop on Design Pattern Theory and Practice},
    booktitle = {STEP},
    year = {2005},
    pages = {193-195},
    ee = {http://doi.ieeecomputersociety.org/10.1109/STEP.2005.20},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • R. Hadjidj and H. Boucheneb, “Much compact time petri net state class spaces useful to restore ctl* properties,” in Acsd, 2005, pp. 224-233.
    [Bibtex]
    @InProceedings{HadjidjMuch2005,
    author = {Rachid Hadjidj and Hanifa Boucheneb},
    title = {Much Compact Time Petri Net State Class Spaces Useful to Restore CTL* Properties},
    booktitle = {ACSD},
    year = {2005},
    pages = {224-233},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2005.28}
    }
  • J. I. Maletic, G. Antoniol, J. Cleland-Huang, and J. H. Hayes, “3rd international workshop on traceability in emerging forms of software engineering (tefse 2005),” in Ase, 2005, p. 462.
    [Bibtex]
    @InProceedings{Maletic3rd2005,
    author = {Jonathan I. Maletic and Giuliano Antoniol and Jane Cleland-Huang and Jane Huffman Hayes},
    title = {3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005)},
    booktitle = {ASE},
    year = {2005},
    pages = {462},
    ee = {http://doi.acm.org/10.1145/1101908.1102002}
    }
  • J. I. Maletic, G. Antoniol, J. Cleland-Huang, and J. H. Hayes, “3rd international workshop on traceability in emerging forms of software engineering (tefse 2005),” in Ase, 2005, p. 462.
    [Bibtex]
    @InProceedings{Maletic3rd2005-1,
    author = {Jonathan I. Maletic and Giuliano Antoniol and Jane Cleland-Huang and Jane Huffman Hayes},
    title = {3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005)},
    booktitle = {ASE},
    year = {2005},
    pages = {462},
    ee = {http://doi.acm.org/10.1145/1101908.1102002},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • A. Ouardani, S. Pierre, and H. Boucheneb, “A secure protocol for mobile agents in hostile environment,” in Mata, 2005, pp. 192-202.
    [Bibtex]
    @InProceedings{OuardaniSecure2005,
    author = {Abdelhamid Ouardani and Samuel Pierre and Hanifa Boucheneb},
    title = {A Secure Protocol for Mobile Agents in Hostile Environment},
    booktitle = {MATA},
    year = {2005},
    pages = {192-202},
    ee = {http://dx.doi.org/10.1007/11569510_19}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Towards employing use-cases and dynamic analysis to comprehend mozilla,” in Icsm, 2005, pp. 639-642.
    [Bibtex]
    @InProceedings{SalahTowards2005,
    author = {Maher Salah and Spiros Mancoridis and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla},
    booktitle = {ICSM},
    year = {2005},
    pages = {639-642},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.94}
    }
  • [PDF] M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Towards employing use-cases and dynamic analysis to comprehend mozilla,” in Icsm, 2005, pp. 639-642.
    [Bibtex]
    @InProceedings{SalahTowards2005-1,
    author = {Maher Salah and Spiros Mancoridis and Giuliano Antoniol and Massimiliano Di Penta},
    title = {Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla},
    booktitle = {ICSM},
    year = {2005},
    pages = {639-642},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.94},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2005/01510163.pdf}
    }

2004

  • [PDF] G. Antoniol, M. D. Penta, and E. Merlo, “An automatic approach to identify class evolution discontinuities,” in Iwpse, 2004, pp. 31-40.
    [Bibtex]
    @InProceedings{AntoniolAutomatic2004,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Ettore Merlo},
    title = {An Automatic Approach to identify Class Evolution Discontinuities},
    booktitle = {IWPSE},
    year = {2004},
    pages = {31-40},
    ee = {http://doi.ieeecomputersociety.org/10.1109/IWPSE.2004.1334766},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2004/01334766.pdf}
    }
  • G. Antoniol and M. D. Penta, “A distributed architecture for dynamic analyses on user-profile data,” in Csmr, 2004, pp. 319-328.
    [Bibtex]
    @InProceedings{AntoniolDistributed2004,
    author = {Giuliano Antoniol and Massimiliano Di Penta},
    title = {A Distributed Architecture for Dynamic Analyses on User-Profile Data},
    booktitle = {CSMR},
    year = {2004},
    pages = {319-328},
    ee = {http://dx.doi.org/10.1109/CSMR.2004.1281434, http://doi.ieeecomputersociety.org/10.1109/CSMR.2004.1281434},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] G. Antoniol, M. Ceccarelli, P. Petrillo, and A. Petrosino, “An ica approach to unsupervised change detection in multispectral images,” in Wirn, 2004, pp. 299-311.
    [Bibtex]
    @InProceedings{AntoniolICA2004,
    author = {Giuliano Antoniol and Michele Ceccarelli and P. Petrillo and Alfredo Petrosino},
    title = {An ICA Approach to Unsupervised Change Detection in Multispectral Images},
    booktitle = {WIRN},
    year = {2004},
    pages = {299-311},
    ee = {http://dx.doi.org/10.1007/1-4020-3432-6_35},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2004/chp3A1010072F140203432635.pdf}
    }
  • [PDF] G. Antoniol and M. Ceccarelli, “A markov random field approach to microarray image gridding,” in Icpr (3), 2004, pp. 550-553.
    [Bibtex]
    @InProceedings{AntoniolMarkov2004,
    author = {Giuliano Antoniol and Michele Ceccarelli},
    title = {A Markov Random Field Approach to Microarray Image Gridding},
    booktitle = {ICPR (3)},
    year = {2004},
    pages = {550-553},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPR.2004.50},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2004/01334588.pdf}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “A robust search-based approach to project management in the presence of abandonment, rework, error and uncertainty,” in Ieee metrics, 2004, pp. 172-183.
    [Bibtex]
    @InProceedings{AntoniolRobust2004,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Mark Harman},
    title = {A Robust Search-Based Approach to Project Management in the Presence of Abandonment, Rework, Error and Uncertainty},
    booktitle = {IEEE METRICS},
    year = {2004},
    pages = {172-183},
    ee = {http://doi.ieeecomputersociety.org/10.1109/METRIC.2004.1357901},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques for optimizing software project resource allocation,” in Gecco (2), 2004, pp. 1425-1426.
    [Bibtex]
    @InProceedings{AntoniolSearch-Based2004,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Mark Harman},
    title = {Search-Based Techniques for Optimizing Software Project Resource Allocation},
    booktitle = {GECCO (2)},
    year = {2004},
    pages = {1425-1426},
    ee = {http://dx.doi.org/10.1007/978-3-540-24855-2_162},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, M. D. Penta, and M. Zazzara, “Understanding web applications through dynamic analysis,” in Iwpc, 2004, pp. 120-131.
    [Bibtex]
    @InProceedings{AntoniolUnderstanding2004,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Michele Zazzara},
    title = {Understanding Web Applications through Dynamic Analysis},
    booktitle = {IWPC},
    year = {2004},
    pages = {120-131},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WPC.2004.1311054},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Beltrame, G. Palermo, D. Sciuto, and C. Silvano, “Plug-in of power models in the stepnp exploration platform: analysis of power/performance trade-offs,” in Proc. of the intl. conference on compilers, architecture, and synthesis for embedded systems (cases), 2004, pp. 85-92.
    [Bibtex]
    @InProceedings{BeltramePlug-in2004,
    author = {G. Beltrame and G. Palermo and D. Sciuto and C. Silvano},
    title = {Plug-in of power models in the StepNP exploration platform: analysis of power/performance trade-offs},
    booktitle = {Proc. of the Intl. Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES)},
    year = {2004},
    month = sep,
    pages = {85-92}
    }
  • E. Merlo, G. Antoniol, M. D. Penta, and V. F. Rollo, “Linear complexity object-oriented similarity for clone detection and software evolution analyses,” in Icsm, 2004, pp. 412-416.
    [Bibtex]
    @InProceedings{MerloLinear2004,
    author = {Ettore Merlo and Giuliano Antoniol and Massimiliano Di Penta and Vincenzo Fabio Rollo},
    title = {Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses},
    booktitle = {ICSM},
    year = {2004},
    pages = {412-416},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2004.1357826},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

2003

  • G. Antoniol, M. Ceccarelli, V. F. Rollo, W. Longo, T. Nutile, M. Ciullo, E. Colonna, A. Calabria, M. Astore, A. Lembo, P. Toriello, and G. M. Persico, “Browsing large pedigrees to study of the isolated populations in the "parco nazionale del cilento e vallo di diano",” in Wirn, 2003, pp. 258-268.
    [Bibtex]
    @InProceedings{AntoniolBrowsing2003,
    author = {Giuliano Antoniol and Michele Ceccarelli and Vincenzo Fabio Rollo and Wanda Longo and Teresa Nutile and Marina Ciullo and Enza Colonna and Antonietta Calabria and Maria Astore and Anna Lembo and Paola Toriello and M. Grazia Persico},
    title = {Browsing Large Pedigrees to Study of the Isolated Populations in the "Parco Nazionale del Cilento e Vallo di Diano"},
    booktitle = {WIRN},
    year = {2003},
    pages = {258-268},
    ee = {http://dx.doi.org/10.1007/978-3-540-45216-4_29},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, M. Ceccarelli, A. Maratea, and F. Russo, “Classification of digital terrain models through fuzzy clustering: an application,” in Wilf, 2003, pp. 174-182.
    [Bibtex]
    @InProceedings{AntoniolClassification2003,
    author = {Giuliano Antoniol and Michele Ceccarelli and Antonio Maratea and F. Russo},
    title = {Classification of Digital Terrain Models Through Fuzzy Clustering: An Application},
    booktitle = {WILF},
    year = {2003},
    pages = {174-182},
    ee = {http://dx.doi.org/10.1007/10983652_22},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol and M. D. Penta, “Library miniaturization using static and dynamic information,” in Icsm, 2003, p. 235-.
    [Bibtex]
    @InProceedings{AntoniolLibrary2003,
    author = {Giuliano Antoniol and Massimiliano Di Penta},
    title = {Library Miniaturization Using Static and Dynamic Information},
    booktitle = {ICSM},
    year = {2003},
    pages = {235-},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2003.1235426},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, M. D. Penta, and M. Neteler, “Moving to smaller libraries via clustering and genetic algorithms,” in Csmr, 2003, pp. 307-316.
    [Bibtex]
    @InProceedings{AntoniolMoving2003,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Markus Neteler},
    title = {Moving to Smaller Libraries via Clustering and Genetic Algorithms},
    booktitle = {CSMR},
    year = {2003},
    pages = {307-316},
    ee = {http://dx.doi.org/10.1109/CSMR.2003.1192439, http://doi.ieeecomputersociety.org/10.1109/CSMR.2003.1192439},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] G. Antoniol, M. D. Penta, G. Masone, and U. Villano, “Xogastan: xml-oriented gcc ast analysis and transformations,” in Scam, 2003, pp. 173-182.
    [Bibtex]
    @InProceedings{AntoniolXOgastan2003,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Gianluca Masone and Umberto Villano},
    title = {XOgastan: XML-Oriented gcc AST Analysis and Transformations},
    booktitle = {SCAM},
    year = {2003},
    pages = {173-182},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2003.1238043},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2003/01238043.pdf}
    }
  • G. Antoniol, M. D. Penta, and E. Merlo, “Yaab (yet another ast browser): using ocl to navigate asts,” in Iwpc, 2003, p. 13-.
    [Bibtex]
    @InProceedings{AntoniolYAAB2003,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Ettore Merlo},
    title = {YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs},
    booktitle = {IWPC},
    year = {2003},
    pages = {13-},
    ee = {http://computer.org/proceedings/iwpc/1883/18830013abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] P. Brunelle, E. Merlo, and G. Antoniol, “Investigating java type analyses for the receiver-classes testing criterion,” in Issre, 2003, pp. 419-429.
    [Bibtex]
    @InProceedings{BrunelleInvestigating2003,
    author = {Pierre-Luc Brunelle and Ettore Merlo and Giuliano Antoniol},
    title = {Investigating Java Type Analyses for the Receiver-Classes Testing Criterion},
    booktitle = {ISSRE},
    year = {2003},
    pages = {419-429},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ISSRE.2003.1251063},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2003/01251063.pdf}
    }
  • [PDF] E. Merlo, G. Antoniol, and P. Brunelle, “Fast flow analysis to compute fuzzy estimates of risk levels,” in Csmr, 2003, p. 351-.
    [Bibtex]
    @InProceedings{MerloFast2003,
    author = {Ettore Merlo and Giuliano Antoniol and Pierre-Luc Brunelle},
    title = {Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels},
    booktitle = {CSMR},
    year = {2003},
    pages = {351-},
    ee = {http://dx.doi.org/10.1109/CSMR.2003.1192443, http://doi.ieeecomputersociety.org/10.1109/CSMR.2003.1192443},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2003/01192443.pdf}
    }

2002

  • [PDF] G. Antoniol, L. C. Briand, M. D. Penta, and Y. Labiche, “A case study using the round-trip strategy for state-based class testing,” in Issre, 2002, pp. 269-279.
    [Bibtex]
    @InProceedings{AntoniolCase2002,
    author = {Giuliano Antoniol and Lionel C. Briand and Massimiliano Di Penta and Yvan Labiche},
    title = {A Case Study Using the Round-Trip Strategy for State-Based Class Testing},
    booktitle = {ISSRE},
    year = {2002},
    pages = {269-279},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ISSRE.2002.1173268},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2002/01173268.pdf}
    }
  • G. Beltrame, C. Brandolese, W. Fornaciari, F. Salice, D. Sciuto, and V. Trianni, “Modeling assembly instruction timing in superscalar architectures,” in Proc. of the 15th intl. symposium on system synthesis (isss), 2002, 2002, pp. 132-137.
    [Bibtex]
    @InProceedings{BeltrameModeling2002,
    title = {Modeling assembly instruction timing in superscalar architectures},
    booktitle = {Proc. of the 15th Intl. Symposium on System Synthesis (ISSS), 2002},
    author = {G. Beltrame and C. Brandolese and W. Fornaciari and F. Salice and D. Sciuto and V. Trianni},
    year = {2002},
    pages = {132--137}
    }
  • [PDF] E. Merlo, M. Dagenais, P. Bachand, J. S. Sormani, S. Gradara, and G. Antoniol, “Investigating large software system evolution: the linux kernel,” in Compsac, 2002, pp. 421-426.
    [Bibtex]
    @InProceedings{MerloInvestigating2002,
    author = {Ettore Merlo and Michel Dagenais and P. Bachand and J. S. Sormani and Sara Gradara and Giuliano Antoniol},
    title = {Investigating Large Software System Evolution: The Linux Kernel},
    booktitle = {COMPSAC},
    year = {2002},
    pages = {421-426},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CMPSAC.2002.1045038},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2002/01045038.pdf}
    }
  • M. D. Penta, M. Neteler, G. Antoniol, and E. Merlo, “Knowledge-based library re-factoring for an open source project,” in Wcre, 2002, pp. 319-328.
    [Bibtex]
    @InProceedings{PentaKnowledge-Based2002,
    author = {Massimiliano Di Penta and Markus Neteler and Giuliano Antoniol and Ettore Merlo},
    title = {Knowledge-Based Library Re-Factoring for an Open Source Project},
    booktitle = {WCRE},
    year = {2002},
    pages = {319-328},
    ee = {http://computer.org/proceedings/wcre/1799/17990319abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • M. D. Penta, S. Gradara, and G. Antoniol, “Traceability recovery in rad software systems,” in Iwpc, 2002, pp. 207-218.
    [Bibtex]
    @InProceedings{PentaTraceability2002,
    author = {Massimiliano Di Penta and Sara Gradara and Giuliano Antoniol},
    title = {Traceability Recovery in RAD Software Systems},
    booktitle = {IWPC},
    year = {2002},
    pages = {207-218},
    ee = {http://computer.org/proceedings/iwpc/1495/14950207abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

2001

  • [PDF] G. Antoniol, U. Villano, M. D. Penta, G. Casazza, and E. Merlo, “Identifying clones in the linux kernel,” in Scam, 2001, pp. 92-99.
    [Bibtex]
    @InProceedings{AntoniolIdentifying2001,
    author = {Giuliano Antoniol and Umberto Villano and Massimiliano Di Penta and Gerardo Casazza and Ettore Merlo},
    title = {Identifying Clones in the Linux Kernel},
    booktitle = {SCAM},
    year = {2001},
    pages = {92-99},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2001.10003},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2001/00972670.pdf}
    }
  • G. Antoniol, M. D. Penta, G. Casazza, and E. Merlo, “A method to re-organize legacy systems via concept analysis,” in Iwpc, 2001, pp. 281-292.
    [Bibtex]
    @InProceedings{AntoniolMethod2001,
    author = {Giuliano Antoniol and Massimiliano Di Penta and Gerardo Casazza and Ettore Merlo},
    title = {A Method to Re-Organize Legacy Systems via Concept Analysis},
    booktitle = {IWPC},
    year = {2001},
    pages = {281-292},
    ee = {http://computer.org/proceedings/iwpc/1131/11310281abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Casazza, M. D. Penta, and E. Merlo, “Modeling clones evolution through time series,” in Icsm, 2001, pp. 273-280.
    [Bibtex]
    @InProceedings{AntoniolModeling2001,
    author = {Giuliano Antoniol and Gerardo Casazza and Massimiliano Di Penta and Ettore Merlo},
    title = {Modeling Clones Evolution through Time Series},
    booktitle = {ICSM},
    year = {2001},
    pages = {273-280},
    ee = {http://computer.org/proceedings/icsm/1189/11890273abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] G. Antoniol, G. Casazza, G. D. A. Lucca, M. D. Penta, and E. Merlo, “Predicting web site access: an application of time series,” in Wse, 2001, pp. 57-61.
    [Bibtex]
    @InProceedings{AntoniolPredicting2001,
    author = {Giuliano Antoniol and Gerardo Casazza and Giuseppe A. Di Lucca and Massimiliano Di Penta and Ettore Merlo},
    title = {Predicting Web Site Access: An Application of Time Series},
    booktitle = {WSE},
    year = {2001},
    pages = {57-61},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WSE.2001.988786},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {2001/00988786.pdf}
    }
  • G. Antoniol, G. Casazza, G. D. A. Lucca, M. D. Penta, and F. Rago, “A queue theory-based approach to staff software maintenance centers,” in Icsm, 2001, pp. 510-519.
    [Bibtex]
    @InProceedings{AntoniolQueue2001,
    author = {Giuliano Antoniol and Gerardo Casazza and Giuseppe A. Di Lucca and Massimiliano Di Penta and Francesco Rago},
    title = {A Queue Theory-Based Approach to Staff Software Maintenance Centers},
    booktitle = {ICSM},
    year = {2001},
    pages = {510-519},
    ee = {http://computer.org/proceedings/icsm/1189/11890510abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • T. Barbieri, F. Garzotto, G. Beltrame, L. Ceresoli, M. Gritti, and D. Misani, “From dust to stardust: a collaborative 3d virtual museum of computer science,” in Proc. of the intl. cultural heritage informatics meeting conference (ichim), 2001, pp. 341-345.
    [Bibtex]
    @InProceedings{BarbieriFrom2001,
    author = {T. Barbieri and F. Garzotto and G. Beltrame and L. Ceresoli and M. Gritti and D. Misani},
    title = {From Dust to Stardust: A Collaborative 3D Virtual Museum of Computer Science},
    booktitle = {Proc. of the Intl. Cultural Heritage Informatics Meeting Conference (ICHIM)},
    year = {2001},
    pages = {341-345}
    }
  • G. Beltrame, C. Brandolese, W. Fornaciari, F. Salice, D. Sciuto, and V. Trianni, “Dynamic modeling of inter-instruction effects for execution time estimation,” in Proceedings of the 14th intl. symposium on system synthesis (isss), 2001, pp. 136-141.
    [Bibtex]
    @InProceedings{BeltrameDynamic2001,
    title = {Dynamic modeling of inter-instruction effects for execution time estimation},
    booktitle = {Proceedings of the 14th Intl. Symposium on System Synthesis (ISSS)},
    author = {G. Beltrame and C. Brandolese and W. Fornaciari and F. Salice and D. Sciuto and V. Trianni},
    year = {2001},
    month = oct,
    pages = {136--141}
    }
  • G. Beltrame, C. Brandolese, W. Fornaciari, F. Salice, D. Sciuto, and V. Trianni, “An assembly-level execution-time model for pipelined architectures,” in Proceedings of the ieee/acm intl. conference on computer aided design (iccad), 2001, pp. 195-200.
    [Bibtex]
    @InProceedings{Beltrameassembly-level2001,
    title = {An assembly-level execution-time model for pipelined architectures},
    booktitle = {Proceedings of the IEEE/ACM Intl. Conference on Computer Aided Design (ICCAD)},
    author = {G. Beltrame and C. Brandolese and W. Fornaciari and F. Salice and D. Sciuto and V. Trianni},
    year = {2001},
    month = nov,
    pages = {195--200}
    }
  • G. D. A. Lucca, M. D. Penta, G. Antoniol, and G. Casazza, “An approach for reverse engineering of web-based application,” in Wcre, 2001, pp. 231-240.
    [Bibtex]
    @InProceedings{LuccaApproach2001,
    author = {Giuseppe A. Di Lucca and Massimiliano Di Penta and Giuliano Antoniol and Gerardo Casazza},
    title = {An Approach for Reverse Engineering of Web-Based Application},
    booktitle = {WCRE},
    year = {2001},
    pages = {231-240},
    ee = {http://computer.org/proceedings/wcre/1303/13030231abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • B. Malenfant, G. Antoniol, E. Merlo, and M. Dagenais, “Flow analysis to detect blocked statements,” in Icsm, 2001, p. 62-.
    [Bibtex]
    @InProceedings{MalenfantFlow2001,
    author = {Bruno Malenfant and Giuliano Antoniol and Ettore Merlo and Michel Dagenais},
    title = {Flow Analysis to Detect Blocked Statements},
    booktitle = {ICSM},
    year = {2001},
    pages = {62-},
    ee = {http://computer.org/proceedings/icsm/1189/11890062abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • M. D. Penta, G. Casazza, G. Antoniol, and E. Merlo, “Modeling web maintenance centers through queue models,” in Csmr, 2001, pp. 131-138.
    [Bibtex]
    @InProceedings{PentaModeling2001,
    author = {Massimiliano Di Penta and Gerardo Casazza and Giuliano Antoniol and Ettore Merlo},
    title = {Modeling Web Maintenance Centers through Queue Models},
    booktitle = {CSMR},
    year = {2001},
    pages = {131-138},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

2000

  • G. Antoniol, G. Casazza, A. Cimitile, and M. Tortorella, “An approach to limit the wynot problem,” in Icsm, 2000, pp. 207-215.
    [Bibtex]
    @InProceedings{AntoniolApproach2000,
    author = {Giuliano Antoniol and Gerardo Casazza and Aniello Cimitile and Maria Tortorella},
    title = {An Approach to Limit the Wynot Problem},
    booktitle = {ICSM},
    year = {2000},
    pages = {207-215},
    ee = {http://computer.org/proceedings/icsm/0753/07530207abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Casazza, and E. Merlo, “Identification of lower-level artifacts,” in Iwpc, 2000, p. 253.
    [Bibtex]
    @InProceedings{AntoniolIdentification2000,
    author = {Giuliano Antoniol and Gerardo Casazza and Ettore Merlo},
    title = {Identification of Lower-Level Artifacts},
    booktitle = {IWPC},
    year = {2000},
    pages = {253},
    ee = {http://computer.org/proceedings/iwpc/0656/06560253abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Canfora, G. Casazza, and A. D. Lucia, “Identifying the starting impact set of a maintenance request: a case study,” in Csmr, 2000, pp. 227-230.
    [Bibtex]
    @InProceedings{AntoniolIdentifying2000,
    author = {Giuliano Antoniol and Gerardo Canfora and Gerardo Casazza and Andrea De Lucia},
    title = {Identifying the Starting Impact Set of a Maintenance Request: A Case Study},
    booktitle = {CSMR},
    year = {2000},
    pages = {227-230},
    ee = {http://www.computer.org/proceedings/csmr/0546/05460227abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Canfora, G. Casazza, and A. D. Lucia, “Information retrieval models for recovering traceability links between code and documentation,” in Icsm, 2000, p. 40-.
    [Bibtex]
    @InProceedings{AntoniolInformation2000,
    author = {Giuliano Antoniol and Gerardo Canfora and Gerardo Casazza and Andrea De Lucia},
    title = {Information Retrieval Models for Recovering Traceability Links between Code and Documentation},
    booktitle = {ICSM},
    year = {2000},
    pages = {40-},
    ee = {http://computer.org/proceedings/icsm/0753/07530040abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Casazza, and A. Cimitile, “Traceability recovery by modeling programmer behavior,” in Wcre, 2000, pp. 240-247.
    [Bibtex]
    @InProceedings{AntoniolTraceability2000,
    author = {Giuliano Antoniol and Gerardo Casazza and Aniello Cimitile},
    title = {Traceability Recovery by Modeling Programmer Behavior},
    booktitle = {WCRE},
    year = {2000},
    pages = {240-247},
    ee = {http://computer.org/proceedings/wcre/0881/08810240abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Canfora, A. D. Lucia, G. Casazza, and E. Merlo, “Tracing object-oriented code into functional requirements,” in Iwpc, 2000, pp. 79-86.
    [Bibtex]
    @InProceedings{AntoniolTracing2000,
    author = {Giuliano Antoniol and Gerardo Canfora and Andrea De Lucia and Gerardo Casazza and Ettore Merlo},
    title = {Tracing Object-Oriented Code into Functional Requirements},
    booktitle = {IWPC},
    year = {2000},
    pages = {79-86},
    ee = {http://computer.org/proceedings/iwpc/0656/06560079abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1999

  • [PDF] G. Antoniol, G. Canfora, and A. D. Lucia, “Estimating the size of changes for evolving object oriented systems: a case study,” in Ieee metrics, 1999, p. 250-.
    [Bibtex]
    @InProceedings{AntoniolEstimating1999,
    author = {Giuliano Antoniol and Gerardo Canfora and Andrea De Lucia},
    title = {Estimating the Size of Changes for Evolving Object Oriented Systems: A Case Study},
    booktitle = {IEEE METRICS},
    year = {1999},
    pages = {250-},
    ee = {http://doi.ieeecomputersociety.org/10.1109/METRIC.1999.809746},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1999/00809746.pdf}
    }
  • G. Antoniol, A. Potrich, P. Tonella, and R. Fiutem, “Evolving object oriented design to improve code traceability,” in Iwpc, 1999, p. 151-.
    [Bibtex]
    @InProceedings{AntoniolEvolving1999,
    author = {Giuliano Antoniol and Alessandra Potrich and Paolo Tonella and Roberto Fiutem},
    title = {Evolving Object Oriented Design to Improve Code Traceability},
    booktitle = {IWPC},
    year = {1999},
    pages = {151-},
    ee = {http://computer.org/proceedings/iwpc/0179/01790151abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] G. Antoniol, F. Calzolari, and P. Tonella, “Impact of function pointers on the call graph,” in Csmr, 1999, pp. 51-61.
    [Bibtex]
    @InProceedings{AntoniolImpact1999,
    author = {Giuliano Antoniol and F. Calzolari and Paolo Tonella},
    title = {Impact of Function Pointers on the Call Graph},
    booktitle = {CSMR},
    year = {1999},
    pages = {51-61},
    ee = {http://dx.doi.org/10.1109/CSMR.1999.756682, http://doi.ieeecomputersociety.org/10.1109/CSMR.1999.756682},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1999/00756682.pdf}
    }
  • G. Antoniol, G. Canfora, and A. D. Lucia, “Maintaining traceability during object-oriented software evolution: a case study,” in Icsm, 1999, pp. 211-219.
    [Bibtex]
    @InProceedings{AntoniolMaintaining1999,
    author = {Giuliano Antoniol and Gerardo Canfora and Andrea De Lucia},
    title = {Maintaining Traceability During Object-Oriented Software Evolution: A Case Study},
    booktitle = {ICSM},
    year = {1999},
    pages = {211-219},
    ee = {http://computer.org/proceedings/icsm/0016/00160211abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, G. Canfora, A. D. Lucia, and E. Merlo, “Recovering code to documentation links in oo systems,” in Wcre, 1999, pp. 136-144.
    [Bibtex]
    @InProceedings{AntoniolRecovering1999,
    author = {Giuliano Antoniol and Gerardo Canfora and Andrea De Lucia and Ettore Merlo},
    title = {Recovering Code to Documentation Links in OO Systems},
    booktitle = {WCRE},
    year = {1999},
    pages = {136-144},
    ee = {http://computer.org/proceedings/wcre/0303/03030136abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • S. Lapierre, E. Merlo, G. Savard, G. Antoniol, R. Fiutem, and P. Tonella, “Automatic unit test data generation using mixed-integer linear programming and execution trees,” in Icsm, 1999, pp. 189-198.
    [Bibtex]
    @InProceedings{LapierreAutomatic1999,
    author = {S{\'e}bastien Lapierre and Ettore Merlo and Gilles Savard and Giuliano Antoniol and Roberto Fiutem and Paolo Tonella},
    title = {Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees},
    booktitle = {ICSM},
    year = {1999},
    pages = {189-198},
    ee = {http://computer.org/proceedings/icsm/0016/00160189abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] E. Merlo and G. Antoniol, “A static measure of a subset of intra-procedural data flow testing coverage based on node coverage,” in Cascon, 1999, p. 7.
    [Bibtex]
    @InProceedings{Merlostatic1999,
    author = {Ettore Merlo and Giuliano Antoniol},
    title = {A static measure of a subset of intra-procedural data flow testing coverage based on node coverage},
    booktitle = {CASCON},
    year = {1999},
    pages = {7},
    ee = {http://doi.acm.org/10.1145/781995.782002},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1999/p7-merlo.pdf}
    }
  • P. Tonella and G. Antoniol, “Object-oriented design pattern inference,” in Icsm, 1999, p. 230-.
    [Bibtex]
    @InProceedings{TonellaObject-Oriented1999,
    author = {Paolo Tonella and Giuliano Antoniol},
    title = {Object-Oriented Design Pattern Inference},
    booktitle = {ICSM},
    year = {1999},
    pages = {230-},
    ee = {http://computer.org/proceedings/icsm/0016/00160230abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1998

  • G. Antoniol, F. Calzolari, L. Cristoforetti, R. Fiutem, and G. Caldiera, “Adapting function points to object-oriented information systems,” in Caise, 1998, pp. 59-76.
    [Bibtex]
    @InProceedings{AntoniolAdapting1998,
    author = {Giuliano Antoniol and F. Calzolari and L. Cristoforetti and Roberto Fiutem and Gianluigi Caldiera},
    title = {Adapting Function Points to Object-Oriented Information Systems},
    booktitle = {CAiSE},
    year = {1998},
    pages = {59-76},
    ee = {http://dx.doi.org/10.1007/BFb0054219},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, R. Fiutem, and L. Cristoforetti, “Design pattern recovery in object-oriented software,” in Iwpc, 1998, p. 153-.
    [Bibtex]
    @InProceedings{AntoniolDesign1998,
    author = {Giuliano Antoniol and Roberto Fiutem and L. Cristoforetti},
    title = {Design Pattern Recovery in Object-Oriented Software},
    booktitle = {IWPC},
    year = {1998},
    pages = {153-},
    ee = {http://dlib2.computer.org/conferen/iwpc/8560/pdf/85600153.pdf},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • [PDF] G. Antoniol, R. Fiutem, and L. Cristoforetti, “Using metrics to identify design patterns in object-oriented software,” in Ieee metrics, 1998, p. 23-.
    [Bibtex]
    @InProceedings{AntoniolUsing1998,
    author = {Giuliano Antoniol and Roberto Fiutem and L. Cristoforetti},
    title = {Using Metrics to Identify Design Patterns in Object-Oriented Software},
    booktitle = {IEEE METRICS},
    year = {1998},
    pages = {23-},
    ee = {http://doi.ieeecomputersociety.org/10.1109/METRIC.1998.731224},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1998/00731224.pdf}
    }
  • G. Caldiera, G. Antoniol, R. Fiutem, and C. J. Lokan, “Definition and experimental evaluation of function points for object-oriented systems,” in Ieee metrics, 1998, p. 167-.
    [Bibtex]
    @InProceedings{CaldieraDefinition1998,
    author = {Gianluigi Caldiera and Giuliano Antoniol and Roberto Fiutem and Christopher J. Lokan},
    title = {Definition and Experimental Evaluation of Function Points for Object-Oriented Systems},
    booktitle = {IEEE METRICS},
    year = {1998},
    pages = {167-},
    ee = {http://doi.ieeecomputersociety.org/10.1109/METRIC.1998.731242},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Calzolari, P. Tonella, and G. Antoniol, “Dynamic model for maintenance and testing effort,” in Icsm, 1998, pp. 104-112.
    [Bibtex]
    @InProceedings{CalzolariDynamic1998,
    author = {F. Calzolari and Paolo Tonella and Giuliano Antoniol},
    title = {Dynamic Model for Maintenance and Testing Effort},
    booktitle = {ICSM},
    year = {1998},
    pages = {104-112},
    ee = {http://computer.org/proceedings/icsm/8779/87790104abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • F. Calzolari, P. Tonella, and G. Antoniol, “Modeling maintenance effort by means of dynamic systems,” in Csmr, 1998, pp. 150-156.
    [Bibtex]
    @InProceedings{CalzolariModeling1998,
    author = {F. Calzolari and Paolo Tonella and Giuliano Antoniol},
    title = {Modeling Maintenance Effort by Means of Dynamic Systems},
    booktitle = {CSMR},
    year = {1998},
    pages = {150-156},
    ee = {http://dx.doi.org/10.1109/CSMR.1998.665787, http://doi.ieeecomputersociety.org/10.1109/CSMR.1998.665787},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • R. Fiutem and G. Antoniol, “Identifying design-code inconsistencies in object-oriented software: a case study,” in Icsm, 1998, p. 94-.
    [Bibtex]
    @InProceedings{FiutemIdentifying1998,
    author = {Roberto Fiutem and Giuliano Antoniol},
    title = {Identifying Design-Code Inconsistencies in Object-Oriented Software: A Case Study},
    booktitle = {ICSM},
    year = {1998},
    pages = {94-},
    ee = {http://computer.org/proceedings/icsm/8779/87790094abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1997

  • [PDF] G. Antoniol, R. Fiutem, G. Lutteri, P. Tonella, S. Zanfei, and E. Merlo, “Program understanding and maintenance with the canto environment,” in Icsm, 1997, p. 72-.
    [Bibtex]
    @InProceedings{AntoniolProgram1997,
    author = {Giuliano Antoniol and Roberto Fiutem and G. Lutteri and Paolo Tonella and S. Zanfei and Ettore Merlo},
    title = {Program Understanding and Maintenance with the CANTO Environment},
    booktitle = {ICSM},
    year = {1997},
    pages = {72-},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.1997.624233},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1997/05726937.pdf}
    }
  • [PDF] P. Tonella, G. Antoniol, R. Fiutem, and E. Merlo, “Flow insensitive c++ pointers and polymorphism analysis and its application to slicing,” in Icse, 1997, pp. 433-443.
    [Bibtex]
    @InProceedings{TonellaFlow1997,
    author = {Paolo Tonella and Giuliano Antoniol and Roberto Fiutem and Ettore Merlo},
    title = {Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing},
    booktitle = {ICSE},
    year = {1997},
    pages = {433-443},
    ee = {http://doi.acm.org/10.1145/253228.253371},
    bibsource = {DBLP, http://dblp.uni-trier.de},
    pdf = {1997/p433-tonella.pdf}
    }
  • P. Tonella, G. Antoniol, R. Fiutem, and E. Merlo, “Points-to analysis for program understanding,” in Wpc, 1997, p. 90-.
    [Bibtex]
    @InProceedings{TonellaPoints-to1997,
    author = {Paolo Tonella and Giuliano Antoniol and Roberto Fiutem and Ettore Merlo},
    title = {Points-to Analysis for Program Understanding},
    booktitle = {WPC},
    year = {1997},
    pages = {90-},
    ee = {http://computer.org/proceedings/wpc/7993/79930090abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • P. Tonella, G. Antoniol, R. Fiutem, and E. Merlo, “Variable precision reaching definitions analysis for software maintenance,” in Csmr, 1997, pp. 60-67.
    [Bibtex]
    @InProceedings{TonellaVariable1997,
    author = {Paolo Tonella and Giuliano Antoniol and Roberto Fiutem and Ettore Merlo},
    title = {Variable Precision Reaching Definitions Analysis for Software Maintenance},
    booktitle = {CSMR},
    year = {1997},
    pages = {60-67},
    ee = {http://dx.doi.org/10.1109/CSMR.1997.583007, http://doi.ieeecomputersociety.org/10.1109/CSMR.1997.583007},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1996

  • R. Fiutem, P. Tonella, G. Antoniol, and E. Merlo, “A cliche-based environment to support architectural reverse engineering,” in Wcre, 1996, pp. 277-286.
    [Bibtex]
    @InProceedings{FiutemCliche-Based1996,
    author = {Roberto Fiutem and Paolo Tonella and Giuliano Antoniol and Ettore Merlo},
    title = {A Cliche-Based Environment to Support Architectural Reverse Engineering},
    booktitle = {WCRE},
    year = {1996},
    pages = {277-286},
    ee = {http://computer.org/proceedings/wcre/7674/76740277abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • R. Fiutem, P. Tonella, G. Antoniol, and E. Merlo, “A cliche’-based environment to support architectural reverse engineering,” in Icsm, 1996, pp. 319-328.
    [Bibtex]
    @InProceedings{FiutemCliche-Based1996-1,
    author = {Roberto Fiutem and Paolo Tonella and Giuliano Antoniol and Ettore Merlo},
    title = {A Cliche'-Based Environment to Support Architectural Reverse Engineering},
    booktitle = {ICSM},
    year = {1996},
    pages = {319-328},
    ee = {http://computer.org/proceedings/icsm/7677/76770319abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • R. Fiutem, E. Merlo, G. Antoniol, and P. Tonella, “Understanding the architecture of software systems,” in Wpc, 1996, p. 187-.
    [Bibtex]
    @InProceedings{FiutemUnderstanding1996,
    author = {Roberto Fiutem and Ettore Merlo and Giuliano Antoniol and Paolo Tonella},
    title = {Understanding the architecture of software systems},
    booktitle = {WPC},
    year = {1996},
    pages = {187-},
    ee = {http://computer.org/proceedings/wpc/7283/72830187abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • P. Tonella, R. Fiutem, G. Antoniol, and E. Merlo, “Augmenting pattern-based architectural recovery with flow analysis: mosaic -a case study,” in Wcre, 1996, pp. 198-207.
    [Bibtex]
    @InProceedings{TonellaAugmenting1996,
    author = {Paolo Tonella and Roberto Fiutem and Giuliano Antoniol and Ettore Merlo},
    title = {Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study},
    booktitle = {WCRE},
    year = {1996},
    pages = {198-207},
    ee = {http://computer.org/proceedings/wcre/7674/76740198abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1995

  • G. Antoniol, R. Fiutem, E. Merlo, and P. Tonella, “Application and user interface migration from basic to visual c++,” in Icsm, 1995, p. 76-.
    [Bibtex]
    @InProceedings{AntoniolApplication1995,
    author = {Giuliano Antoniol and Roberto Fiutem and Ettore Merlo and Paolo Tonella},
    title = {Application and user interface migration from BASIC to Visual C++},
    booktitle = {ICSM},
    year = {1995},
    pages = {76-},
    ee = {http://computer.org/proceedings/icsm/7141/71410076abs.htm},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1994

  • B. Angelini, G. Antoniol, F. Brugnara, M. Cettolo, M. Federico, R. Fiutem, and G. Lazzari, “Radiological reporting by speech recognition: the a.re.s. system,” in Icslp, 1994.
    [Bibtex]
    @InProceedings{AngeliniRadiological1994,
    author = {Bianca Angelini and Giuliano Antoniol and Fabio Brugnara and Mauro Cettolo and Marcello Federico and Roberto Fiutem and Gianni Lazzari},
    title = {Radiological reporting by speech recognition: the a.re.s. system},
    booktitle = {ICSLP},
    year = {1994},
    ee = {http://www.isca-speech.org/archive/icslp_1994/i94_1267.html},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, F. Brugnara, M. Cettolo, and M. Federico, “Language model estimations and representations for real-time continuous speech recognition,” in Icslp, 1994.
    [Bibtex]
    @InProceedings{AntoniolLanguage1994,
    author = {Giuliano Antoniol and Fabio Brugnara and Mauro Cettolo and Marcello Federico},
    title = {Language model estimations and representations for real-time continuous speech recognition},
    booktitle = {ICSLP},
    year = {1994},
    ee = {http://www.isca-speech.org/archive/icslp_1994/i94_0859.html},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1993

  • G. Antoniol, R. Fiutem, R. Flor, and G. Lazzari, “Radiological reporting based on voice recognition,” in Ewhci, 1993, pp. 242-253.
    [Bibtex]
    @InProceedings{AntoniolRadiological1993,
    author = {Giuliano Antoniol and Roberto Fiutem and R. Flor and Gianni Lazzari},
    title = {Radiological Reporting Based on Voice Recognition},
    booktitle = {EWHCI},
    year = {1993},
    pages = {242-253},
    ee = {http://dx.doi.org/10.1007/3-540-57433-6_53},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, M. Cettolo, and M. Federico, “Techniques for robust recognition in restricted domains,” in Eurospeech, 1993.
    [Bibtex]
    @InProceedings{AntoniolTechniques1993,
    author = {Giuliano Antoniol and Mauro Cettolo and Marcello Federico},
    title = {Techniques for robust recognition in restricted domains},
    booktitle = {EUROSPEECH},
    year = {1993},
    ee = {http://www.isca-speech.org/archive/eurospeech_1993/e93_2219.html},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

1991

  • G. Antoniol, F. Brugnara, and D. Giuliani, “Admissible strategies for acoustic matching with a large vocabulary,” in Eurospeech, 1991.
    [Bibtex]
    @InProceedings{AntoniolAdmissible1991,
    author = {Giuliano Antoniol and Fabio Brugnara and Diego Giuliani},
    title = {Admissible strategies for acoustic matching with a large vocabulary},
    booktitle = {EUROSPEECH},
    year = {1991},
    ee = {http://www.isca-speech.org/archive/eurospeech_1991/e91_0589.html},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • G. Antoniol, F. Brugnara, D. F. Palma, G. Lazzari, and E. Moser, “A. re. s. : an interface for automatic reporting by speech,” in Eurospeech, 1991.
    [Bibtex]
    @InProceedings{AntoniolRE1991,
    author = {Giuliano Antoniol and Fabio Brugnara and F. Dalla Palma and Gianni Lazzari and E. Moser},
    title = {A. RE. s. : an interface for automatic reporting by speech},
    booktitle = {EUROSPEECH},
    year = {1991},
    ee = {http://www.isca-speech.org/archive/eurospeech_1991/e91_0973.html},
    bibsource = {DBLP, http://dblp.uni-trier.de}
    }

Recent Tweets