In Proceedings

Conference publications:

2013

  • M. Mäntylä, F. Khomh, B. Adams, E. Engstrom, and K. Petersen, “On rapid releases and software testing,” in Icsm, 2013, pp. 20-29.
    [Bibtex]
    @inproceedings{MantylaKAEP13,
    author = {Mika M{\"a}ntyl{\"a} and
    Foutse Khomh and
    Bram Adams and
    Emelie Engstrom and
    Kai Petersen},
    title = {On Rapid Releases and Software Testing},
    booktitle = {ICSM},
    year = {2013},
    pages = {20-29},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.13},
    crossref = {DBLP:conf/icsm/2013},
    }
  • S. E. S. Taba, F. Khomh, Y. Zou, A. E. Hassan, and M. Nagappan, “Predicting bugs using antipatterns,” in Icsm, 2013, pp. 270-279.
    [Bibtex]
    @inproceedings{TabaKZHN13,
    author = {Seyyed Ehsan Salamati Taba and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan and
    Meiyappan Nagappan},
    title = {Predicting Bugs Using Antipatterns},
    booktitle = {ICSM},
    year = {2013},
    pages = {270-279},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.38},
    crossref = {DBLP:conf/icsm/2013},
    }
  • F. Zhang, A. Mockus, Y. Zou, F. Khomh, and A. E. Hassan, “How does context affect the distribution of software maintainability metrics?,” in Icsm, 2013, pp. 350-359.
    [Bibtex]
    @inproceedings{ZhangMZKH13,
    author = {Feng Zhang and
    Audris Mockus and
    Ying Zou and
    Foutse Khomh and
    Ahmed E. Hassan},
    title = {How Does Context Affect the Distribution of Software Maintainability
    Metrics?},
    booktitle = {ICSM},
    year = {2013},
    pages = {350-359},
    ee = {http://dx.doi.org/10.1109/ICSM.2013.46},
    crossref = {DBLP:conf/icsm/2013},
    }
  • E. Merlo, T. Lavoie, P. Potvin, and P. Busnel, “Large scale multi-language clone analysis in a telecommunication industrial setting,” in Iwsc, 2013, pp. 69-75.
    [Bibtex]
    @inproceedings{conf/iwsc/MerloLPB13,
    author = {Ettore Merlo and
    Thierry Lavoie and
    Pascal Potvin and
    Pierre Busnel},
    title = {Large scale multi-language clone analysis in a telecommunication
    industrial setting},
    booktitle = {IWSC},
    year = {2013},
    pages = {69-75},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613046},
    crossref = {DBLP:conf/iwsc/2013}
    }
  • M. Nayrolles, F. Palma, N. Moha, and Y. Guéhéneuc, “Soda: a tool support for the detection of soa antipatterns,” in Icsoc workshops, 2013, pp. 451-455.
    [Bibtex]
    @inproceedings{conf/icsoc/NayrollesPMG13,
    author = {Mathieu Nayrolles and
    Francis Palma and
    Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Soda: A Tool Support for the Detection of SOA Antipatterns},
    booktitle = {ICSOC Workshops},
    year = {2013},
    pages = {451-455},
    ee = {http://dx.doi.org/10.1007/978-3-642-37804-1_51},
    crossref = {DBLP:conf/icsoc/2012w}
    }
  • T. Lavoie and E. Merlo, “How much really changes? a case study of firefox version evolution using a clone detector,” in Iwsc, 2013, pp. 83-89.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM13,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {How much really changes? A case study of firefox version
    evolution using a clone detector},
    booktitle = {IWSC},
    year = {2013},
    pages = {83-89},
    ee = {http://dx.doi.org/10.1109/IWSC.2013.6613048},
    crossref = {DBLP:conf/iwsc/2013}
    }
  • V. Arnaoudova, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A new family of software anti-patterns: linguistic anti-patterns,” in Csmr, 2013, pp. 187-196.
    [Bibtex]
    @inproceedings{conf/csmr/ArnaoudovaPAG13,
    author = {Venera Arnaoudova and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A New Family of Software Anti-patterns: Linguistic Anti-patterns},
    booktitle = {CSMR},
    year = {2013},
    pages = {187-196},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.28},
    crossref = {DBLP:conf/csmr/2013}
    }
  • W. Shang, Z. M. Jiang, H. Hemmati, B. Adams, A. E. Hassan, and P. Martin, “Assisting developers of big data analytics applications when deploying on hadoop clouds,” in Icse, 2013, pp. 402-411.
    [Bibtex]
    @inproceedings{conf/icse/ShangJHAHM13,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Hadi Hemmati and
    Bram Adams and
    Ahmed E. Hassan and
    Patrick Martin},
    title = {Assisting developers of big data analytics applications
    when deploying on hadoop clouds},
    booktitle = {ICSE},
    year = {2013},
    pages = {402-411},
    ee = {http://dl.acm.org/citation.cfm?id=2486842},
    crossref = {DBLP:conf/icse/2013}
    }
  • S. Wang, F. Khomh, and Y. Zou, “Improving bug localization using correlations in crash reports,” in Msr, 2013, pp. 247-256.
    [Bibtex]
    @inproceedings{conf/msr/WangKZ13,
    author = {Shaohua Wang and
    Foutse Khomh and
    Ying Zou},
    title = {Improving bug localization using correlations in crash reports},
    booktitle = {MSR},
    year = {2013},
    pages = {247-256},
    ee = {http://dl.acm.org/citation.cfm?id=2487135},
    crossref = {DBLP:conf/msr/2013}
    }
  • F. Jaafar, S. Hassaine, Y. Guéhéneuc, S. Hamel, and B. Adams, “On the relationship between program evolution and fault-proneness: an empirical study,” in Csmr, 2013, pp. 15-24.
    [Bibtex]
    @inproceedings{conf/csmr/JaafarHGHA13,
    author = {Fehmi Jaafar and
    Salima Hassaine and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Bram Adams},
    title = {On the Relationship between Program Evolution and Fault-Proneness:
    An Empirical Study},
    booktitle = {CSMR},
    year = {2013},
    pages = {15-24},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.12},
    crossref = {DBLP:conf/csmr/2013}
    }
  • D. M. Germán, B. Adams, and A. E. Hassan, “The evolution of the r software ecosystem,” in Csmr, 2013, pp. 243-252.
    [Bibtex]
    @inproceedings{conf/csmr/GermanAH13,
    author = {Daniel M. Germ{\'a}n and
    Bram Adams and
    Ahmed E. Hassan},
    title = {The Evolution of the R Software Ecosystem},
    booktitle = {CSMR},
    year = {2013},
    pages = {243-252},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.33},
    crossref = {DBLP:conf/csmr/2013}
    }
  • F. Gauthier and E. Merlo, “Semantic smells and errors in access control models: a case study in php,” in Icse, 2013, pp. 1169-1172.
    [Bibtex]
    @inproceedings{conf/icse/GauthierM04,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Semantic smells and errors in access control models: a case
    study in PHP},
    booktitle = {ICSE},
    year = {2013},
    pages = {1169-1172},
    ee = {http://dl.acm.org/citation.cfm?id=2486952},
    crossref = {DBLP:conf/icse/2013}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Towards understanding how developers spend their effort during maintenance activities,” in Wcre, 2013, pp. 152-161.
    [Bibtex]
    @inproceedings{conf/wcre/SohKGA13,
    author = {Z{\'e}phyrin Soh and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Towards understanding how developers spend their effort
    during maintenance activities},
    booktitle = {WCRE},
    year = {2013},
    pages = {152-161},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671290},
    crossref = {DBLP:conf/wcre/2013}
    }
  • J. Panerati, F. Sironi, M. Carminati, M. Maggio, G. Beltrame, P. J. Gmytrasiewicz, D. Sciuto, and M. D. Santambrogio, “On self-adaptive resource allocation through reinforcement learning,” in Ahs, 2013, pp. 23-30.
    [Bibtex]
    @inproceedings{conf/ahs/PaneratiSCMBGSS13,
    author = {Jacopo Panerati and
    Filippo Sironi and
    Matteo Carminati and
    Martina Maggio and
    Giovanni Beltrame and
    Piotr J. Gmytrasiewicz and
    Donatella Sciuto and
    Marco D. Santambrogio},
    title = {On self-adaptive resource allocation through reinforcement
    learning},
    booktitle = {AHS},
    year = {2013},
    pages = {23-30},
    ee = {http://dx.doi.org/10.1109/AHS.2013.6604222},
    crossref = {DBLP:conf/ahs/2013}
    }
  • Z. Soh, F. Khomh, Y. Guéhéneuc, G. Antoniol, and B. Adams, “On the effect of program exploration on maintenance tasks,” in Wcre, 2013, pp. 391-400.
    [Bibtex]
    @inproceedings{conf/wcre/SohKGAA13,
    author = {Z{\'e}phyrin Soh and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Bram Adams},
    title = {On the effect of program exploration on maintenance tasks},
    booktitle = {WCRE},
    year = {2013},
    pages = {391-400},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671314},
    crossref = {DBLP:conf/wcre/2013}
    }
  • R. Hadjidj and H. Boucheneb, “Rt-studio: a tool for modular design and analysis of realtime systems using interpreted time petri nets,” in Pnse+modpe, 2013, pp. 247-254.
    [Bibtex]
    @inproceedings{conf/apn/HadjidjB13,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {RT-Studio: A Tool for Modular Design and Analysis of Realtime
    Systems Using Interpreted Time Petri Nets},
    booktitle = {PNSE+ModPE},
    year = {2013},
    pages = {247-254},
    ee = {http://ceur-ws.org/Vol-989/paper22.pdf},
    crossref = {DBLP:conf/apn/2013pnse}
    }
  • E. Duclos, S. L. Digabel, Y. Guéhéneuc, and B. Adams, “Acre: an automated aspect creator for testing c++ applications,” in Csmr, 2013, pp. 121-130.
    [Bibtex]
    @inproceedings{conf/csmr/DuclosDGA13,
    author = {Etienne Duclos and
    S{\'e}bastien Le Digabel and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Bram Adams},
    title = {ACRE: An Automated Aspect Creator for Testing C++ Applications},
    booktitle = {CSMR},
    year = {2013},
    pages = {121-130},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.22},
    crossref = {DBLP:conf/csmr/2013}
    }
  • Z. Sharafi, A. Marchetto, A. Susi, G. Antoniol, and Y. Guéhéneuc, “An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension,” in Icpc, 2013, pp. 33-42.
    [Bibtex]
    @inproceedings{conf/iwpc/SharafiMSAG13,
    author = {Zohreh Sharafi and
    Alessandro Marchetto and
    Angelo Susi and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An empirical study on the efficiency of graphical vs. textual
    representations in requirements comprehension},
    booktitle = {ICPC},
    year = {2013},
    pages = {33-42},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2013.6613831},
    crossref = {DBLP:conf/iwpc/2013}
    }
  • O. Gendreau and P. N. Robillard, “A process practice to validate the quality of reused component documentation: a case study involving open-source components,” in Icssp, 2013, pp. 61-69.
    [Bibtex]
    @inproceedings{conf/ispw/GendreauR13,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {A process practice to validate the quality of reused component
    documentation: a case study involving open-source components},
    booktitle = {ICSSP},
    year = {2013},
    pages = {61-69},
    ee = {http://doi.acm.org/10.1145/2486046.2486059},
    crossref = {DBLP:conf/ispw/2013}
    }
  • Y. Jiang, B. Adams, and D. M. Germán, “Will my patch make it? and how fast?: case study on the linux kernel,” in Msr, 2013, pp. 101-110.
    [Bibtex]
    @inproceedings{conf/msr/JiangAG13,
    author = {Yujuan Jiang and
    Bram Adams and
    Daniel M. Germ{\'a}n},
    title = {Will my patch make it? and how fast?: case study on the
    Linux kernel},
    booktitle = {MSR},
    year = {2013},
    pages = {101-110},
    ee = {http://dl.acm.org/citation.cfm?id=2487111},
    crossref = {DBLP:conf/msr/2013}
    }
  • M. Gagnon, A. Zouaq, and L. Jean-Louis, “Can we use linked data semantic annotators for the extraction of domain-relevant expressions?,” in Www (companion volume), 2013, pp. 1239-1246.
    [Bibtex]
    @inproceedings{conf/www/GagnonZJ13,
    author = {Michel Gagnon and
    Amal Zouaq and
    Ludovic Jean-Louis},
    title = {Can we use linked data semantic annotators for the extraction
    of domain-relevant expressions?},
    booktitle = {WWW (Companion Volume)},
    year = {2013},
    pages = {1239-1246},
    ee = {http://dl.acm.org/citation.cfm?id=2488157},
    crossref = {DBLP:conf/www/2013c}
    }
  • S. Xie, F. Khomh, and Y. Zou, “An empirical study of the fault-proneness of clone mutation and clone migration,” in Msr, 2013, pp. 149-158.
    [Bibtex]
    @inproceedings{conf/msr/XieKZ13,
    author = {Shuai Xie and
    Foutse Khomh and
    Ying Zou},
    title = {An empirical study of the fault-proneness of clone mutation
    and clone migration},
    booktitle = {MSR},
    year = {2013},
    pages = {149-158},
    ee = {http://dl.acm.org/citation.cfm?id=2487118},
    crossref = {DBLP:conf/msr/2013}
    }
  • H. Boucheneb, D. Lime, and O. H. Roux, “On multi-enabledness in time petri nets,” in Petri nets, 2013, pp. 130-149.
    [Bibtex]
    @inproceedings{conf/apn/BouchenebLR13,
    author = {Hanifa Boucheneb and
    Didier Lime and
    Olivier H. Roux},
    title = {On Multi-enabledness in Time Petri Nets},
    booktitle = {Petri Nets},
    year = {2013},
    pages = {130-149},
    ee = {http://dx.doi.org/10.1007/978-3-642-38697-8_8},
    crossref = {DBLP:conf/apn/2013}
    }
  • M. C. Desmarais and R. Naceur, “A matrix factorization method for mapping items to skills and for enhancing expert-based q-matrices,” in Aied, 2013, pp. 441-450.
    [Bibtex]
    @inproceedings{conf/aied/DesmaraisN13,
    author = {Michel C. Desmarais and
    Rhouma Naceur},
    title = {A Matrix Factorization Method for Mapping Items to Skills
    and for Enhancing Expert-Based Q-Matrices},
    booktitle = {AIED},
    year = {2013},
    pages = {441-450},
    ee = {http://dx.doi.org/10.1007/978-3-642-39112-5_45},
    crossref = {DBLP:conf/aied/2013}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Constraint-based fitness function for search-based software testing,” in Cpaior, 2013, pp. 378-385.
    [Bibtex]
    @inproceedings{conf/cpaior/SaktiGP13,
    author = {Abdelilah Sakti and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Constraint-Based Fitness Function for Search-Based Software
    Testing},
    booktitle = {CPAIOR},
    year = {2013},
    pages = {378-385},
    ee = {http://dx.doi.org/10.1007/978-3-642-38171-3_29},
    crossref = {DBLP:conf/cpaior/2013}
    }
  • B. Adams, C. Bird, F. Khomh, and K. Moir, “1st international workshop on release engineering (releng 2013),” in Icse, 2013, pp. 1545-1546.
    [Bibtex]
    @inproceedings{conf/icse/AdamsBKM04,
    author = {Bram Adams and
    Christian Bird and
    Foutse Khomh and
    Kim Moir},
    title = {1st international workshop on release engineering (RELENG
    2013)},
    booktitle = {ICSE},
    year = {2013},
    pages = {1545-1546},
    ee = {http://dl.acm.org/citation.cfm?id=2487076},
    crossref = {DBLP:conf/icse/2013}
    }
  • A. Spaeth and M. C. Desmarais, “Combining collaborative filtering and text similarity for expert profile recommendations in social websites,” in Umap, 2013, pp. 178-189.
    [Bibtex]
    @inproceedings{conf/um/SpaethD13,
    author = {Alexandre Spaeth and
    Michel C. Desmarais},
    title = {Combining Collaborative Filtering and Text Similarity for
    Expert Profile Recommendations in Social Websites},
    booktitle = {UMAP},
    year = {2013},
    pages = {178-189},
    ee = {http://dx.doi.org/10.1007/978-3-642-38844-6_15},
    crossref = {DBLP:conf/um/2013}
    }
  • A. Sabane, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A study on the relation between antipatterns and the cost of class unit testing,” in Csmr, 2013, pp. 167-176.
    [Bibtex]
    @inproceedings{conf/csmr/SabanePAG13,
    author = {Aminata Sabane and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Study on the Relation between Antipatterns and the Cost
    of Class Unit Testing},
    booktitle = {CSMR},
    year = {2013},
    pages = {167-176},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2013.26},
    crossref = {DBLP:conf/csmr/2013}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and F. Khomh, “Mining the relationship between anti-patterns dependencies and fault-proneness,” in Wcre, 2013, pp. 351-360.
    [Bibtex]
    @inproceedings{conf/wcre/JaafarGHK13,
    author = {Fehmi Jaafar and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Foutse Khomh},
    title = {Mining the relationship between anti-patterns dependencies
    and fault-proneness},
    booktitle = {WCRE},
    year = {2013},
    pages = {351-360},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2013.6671310},
    crossref = {DBLP:conf/wcre/2013}
    }
  • Y. Ton-That, P. N. Robillard, and M. Lavallée, “Episode measurement method: a data collection technique for observing team processes,” in Icssp, 2013, pp. 108-117.
    [Bibtex]
    @inproceedings{conf/ispw/Ton-ThatRL13,
    author = {Yvan Ton-That and
    Pierre N. Robillard and
    Mathieu Lavall{\'e}e},
    title = {Episode measurement method: a data collection technique
    for observing team processes},
    booktitle = {ICSSP},
    year = {2013},
    pages = {108-117},
    ee = {http://doi.acm.org/10.1145/2486046.2486066},
    crossref = {DBLP:conf/ispw/2013}
    }
  • A. Fourmigue, G. Beltrame, and G. Nicolescu, “Explicit transient thermal simulation of liquid-cooled 3d ics,” in Date, 2013, pp. 1385-1390.
    [Bibtex]
    @inproceedings{conf/date/FourmigueBN13,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu},
    title = {Explicit transient thermal simulation of liquid-cooled 3D
    ICs},
    booktitle = {DATE},
    year = {2013},
    pages = {1385-1390},
    ee = {http://dl.acm.org/citation.cfm?id=2485618},
    crossref = {DBLP:conf/date/2013}
    }
  • A. Randolph, A. Imine, H. Boucheneb, and A. Quintero, “Specification and verification using alloy of optimistic access control for distributed collaborative editors,” in Fmics, 2013, pp. 184-198.
    [Bibtex]
    @inproceedings{conf/fmics/RandolphIBQ13,
    author = {Aurel Randolph and
    Abdessamad Imine and
    Hanifa Boucheneb and
    Alejandro Quintero},
    title = {Specification and Verification Using Alloy of Optimistic
    Access Control for Distributed Collaborative Editors},
    booktitle = {FMICS},
    year = {2013},
    pages = {184-198},
    ee = {http://dx.doi.org/10.1007/978-3-642-41010-9_13},
    crossref = {DBLP:conf/fmics/2013}
    }

2012

  • H. Boucheneb and K. Barkaoui, “Reachability analysis of p-time petri nets with parametric markings,” in Acsd, 2012, pp. 72-81.
    [Bibtex]
    @inproceedings{conf/acsd/BouchenebB12,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Reachability Analysis of P-time Petri Nets with Parametric
    Markings},
    booktitle = {ACSD},
    year = {2012},
    pages = {72-81},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2012.23},
    crossref = {DBLP:conf/acsd/2012}
    }
  • I. M. J. Ruiz, M. Nagappan, B. Adams, and A. E. Hassan, “Understanding reuse in the android market,” in Icpc, 2012, pp. 113-122.
    [Bibtex]
    @inproceedings{conf/iwpc/RuizNAH12,
    author = {Israel J. Mojica Ruiz and
    Meiyappan Nagappan and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Understanding reuse in the Android Market},
    booktitle = {ICPC},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240477},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • F. Abouzaid, J. Mullins, M. Mazzara, and N. Dragoni, “Modelling and analysis of dynamic reconfiguration in bp-calculus,” in Kes-amsta, 2012, pp. 534-543.
    [Bibtex]
    @inproceedings{conf/kesamsta/AbouzaidMMD12,
    author = {Faisal Abouzaid and
    John Mullins and
    Manuel Mazzara and
    Nicola Dragoni},
    title = {Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus},
    booktitle = {KES-AMSTA},
    year = {2012},
    pages = {534-543},
    ee = {http://dx.doi.org/10.1007/978-3-642-30947-2_58},
    crossref = {DBLP:conf/kesamsta/2012}
    }
  • B. Upadhyaya, F. Khomh, Y. Zou, A. Lau, and J. Ng, “A concept analysis approach for guiding users in service discovery,” in Soca, 2012, pp. 1-8.
    [Bibtex]
    @inproceedings{conf/soca/UpadhyayaKZLN12,
    author = {Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou and
    Alex Lau and
    Joanna Ng},
    title = {A concept analysis approach for guiding users in service
    discovery},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-8},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449462},
    crossref = {DBLP:conf/soca/2012}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study on factors impacting bug fixing time,” in Wcre, 2012, pp. 225-234.
    [Bibtex]
    @inproceedings{conf/wcre/ZhangKZH12,
    author = {Feng Zhang and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study on Factors Impacting Bug Fixing Time},
    booktitle = {WCRE},
    year = {2012},
    pages = {225-234},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.32},
    crossref = {DBLP:conf/wcre/2012}
    }
  • A. Randolph, H. Boucheneb, A. Imine, and A. Quintero, “On consistency of operational transformation approach,” in Infinity, 2012, pp. 45-59.
    [Bibtex]
    @inproceedings{journals/corr/abs-1302-3292,
    author = {Aurel Randolph and
    Hanifa Boucheneb and
    Abdessamad Imine and
    Alejandro Quintero},
    title = {On Consistency of Operational Transformation Approach},
    booktitle = {Infinity},
    year = {2012},
    pages = {45-59},
    ee = {http://dx.doi.org/10.4204/EPTCS.107.5},
    crossref = {DBLP:journals/corr/abs-1302-3105}
    }
  • M. Lavallée and P. N. Robillard, “The impacts of software process improvement on developers: a systematic review,” in Icse, 2012, pp. 113-122.
    [Bibtex]
    @inproceedings{conf/icse/LavalleeR12,
    author = {Mathieu Lavall{\'e}e and
    Pierre N. Robillard},
    title = {The impacts of software process improvement on developers:
    A systematic review},
    booktitle = {ICSE},
    year = {2012},
    pages = {113-122},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227201},
    crossref = {DBLP:conf/icse/2012}
    }
  • F. Gauthier and E. Merlo, “Fast detection of access control vulnerabilities in php applications,” in Wcre, 2012, pp. 247-256.
    [Bibtex]
    @inproceedings{conf/wcre/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Fast Detection of Access Control Vulnerabilities in PHP
    Applications},
    booktitle = {WCRE},
    year = {2012},
    pages = {247-256},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.34},
    crossref = {DBLP:conf/wcre/2012}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A qualitative study on performance bugs,” in Msr, 2012, pp. 199-208.
    [Bibtex]
    @inproceedings{conf/msr/ZamanAH12,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A qualitative study on performance bugs},
    booktitle = {MSR},
    year = {2012},
    pages = {199-208},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224281},
    crossref = {DBLP:conf/msr/2012}
    }
  • Z. Soh, Z. Sharafi, B. V. den Plas, G. C. Porras, Y. Guéhéneuc, and G. Antoniol, “Professional status and expertise for uml class diagram comprehension: an empirical study,” in Icpc, 2012, pp. 163-172.
    [Bibtex]
    @inproceedings{conf/iwpc/SohSPPGA12,
    author = {Z{\'e}phyrin Soh and
    Zohreh Sharafi and
    Bertrand Van den Plas and
    Gerardo Cepeda Porras and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Professional status and expertise for UML class diagram
    comprehension: An empirical study},
    booktitle = {ICPC},
    year = {2012},
    pages = {163-172},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240484},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • N. Ali, A. Sabane, Y. Guéhéneuc, and G. Antoniol, “Improving bug location using binary class relationships,” in Scam, 2012, pp. 174-183.
    [Bibtex]
    @inproceedings{conf/scam/AliSGA12,
    author = {Nasir Ali and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Improving Bug Location Using Binary Class Relationships},
    booktitle = {SCAM},
    year = {2012},
    pages = {174-183},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.26},
    crossref = {DBLP:conf/scam/2012}
    }
  • F. Zhang, F. Khomh, Y. Zou, and A. E. Hassan, “An empirical study of the effect of file editing patterns on software quality,” in Wcre, 2012, pp. 456-465.
    [Bibtex]
    @inproceedings{conf/wcre/ZhangKZH12a,
    author = {Feng Zhang and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study of the Effect of File Editing Patterns
    on Software Quality},
    booktitle = {WCRE},
    year = {2012},
    pages = {456-465},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.55},
    crossref = {DBLP:conf/wcre/2012}
    }
  • D. Romano, P. Raila, M. Pinzger, and F. Khomh, “Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes,” in Wcre, 2012, pp. 437-446.
    [Bibtex]
    @inproceedings{conf/wcre/RomanoRPK12,
    author = {Daniele Romano and
    Paulius Raila and
    Martin Pinzger and
    Foutse Khomh},
    title = {Analyzing the Impact of Antipatterns on Change-Proneness
    Using Fine-Grained Source Code Changes},
    booktitle = {WCRE},
    year = {2012},
    pages = {437-446},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.53},
    crossref = {DBLP:conf/wcre/2012}
    }
  • M. C. Desmarais, R. Naceur, and B. Beheshti, “Linear models of student skills for static data,” in Umap workshops, 2012.
    [Bibtex]
    @inproceedings{conf/um/DesmaraisNB12,
    author = {Michel C. Desmarais and
    Rhouma Naceur and
    Behzad Beheshti},
    title = {Linear models of student skills for static data},
    booktitle = {UMAP Workshops},
    year = {2012},
    ee = {http://ceur-ws.org/Vol-872/factmod2012_paper_1.pdf},
    crossref = {DBLP:conf/um/2012w}
    }
  • H. Boucheneb and K. Barkaoui, “Parametric verification of timeworkflow nets,” in Seke, 2012, pp. 375-380.
    [Bibtex]
    @inproceedings{conf/seke/BouchenebB12,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Parametric Verification of TimeWorkflow Nets},
    booktitle = {SEKE},
    year = {2012},
    pages = {375-380},
    crossref = {DBLP:conf/seke/2012}
    }
  • Z. Sharafi, Z. Soh, Y. Guéhéneuc, and G. Antoniol, “Women and men – different but equal: on the impact of identifier style on source code reading,” in Icpc, 2012, pp. 27-36.
    [Bibtex]
    @inproceedings{conf/iwpc/SharafiSGA12,
    author = {Zohreh Sharafi and
    Z{\'e}phyrin Soh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Women and men - Different but equal: On the impact of identifier
    style on source code reading},
    booktitle = {ICPC},
    year = {2012},
    pages = {27-36},
    ee = {http://dx.doi.org/10.1109/ICPC.2012.6240505},
    crossref = {DBLP:conf/iwpc/2012}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, G. Antoniol, and E. Aïmeur, “Support vector machines for anti-pattern detection,” in Ase, 2012, pp. 278-281.
    [Bibtex]
    @inproceedings{conf/kbse/MaigaABSGAA12,
    author = {Abdou Maiga and
    Nasir Ali and
    Neelesh Bhattacharya and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Esma A\"{\i}meur},
    title = {Support vector machines for anti-pattern detection},
    booktitle = {ASE},
    year = {2012},
    pages = {278-281},
    ee = {http://doi.acm.org/10.1145/2351676.2351723},
    crossref = {DBLP:conf/kbse/2012}
    }
  • H. Ould-Slimane, M. Bande, and H. Boucheneb, “Wiseshare: a collaborative environment for knowledge sharing governed by abac policies,” in Collaboratecom, 2012, pp. 21-29.
    [Bibtex]
    @inproceedings{conf/colcom/Ould-SlimaneBB12,
    author = {Hakima Ould-Slimane and
    Moustapha Bande and
    Hanifa Boucheneb},
    title = {WiseShare: A collaborative environment for knowledge sharing
    governed by ABAC policies},
    booktitle = {CollaborateCom},
    year = {2012},
    pages = {21-29},
    ee = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=6450889},
    crossref = {DBLP:conf/colcom/2012}
    }
  • M. Ouellet, E. Merlo, N. Sozen, and M. Gagnon, “Locating features in dynamically configured avionics software,” in Icse, 2012, pp. 1453-1454.
    [Bibtex]
    @inproceedings{conf/icse/OuelletMSG12,
    author = {Maxime Ouellet and
    Ettore Merlo and
    Neset Sozen and
    Martin Gagnon},
    title = {Locating features in dynamically configured avionics software},
    booktitle = {ICSE},
    year = {2012},
    pages = {1453-1454},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227068},
    crossref = {DBLP:conf/icse/2012}
    }
  • L. Guerrouj, P. Galinier, Y. Guéhéneuc, G. Antoniol, and M. D. Penta, “Tris: a fast and accurate identifiers splitting and expansion algorithm,” in Wcre, 2012, pp. 103-112.
    [Bibtex]
    @inproceedings{conf/wcre/GuerroujGGAP12,
    author = {Latifa Guerrouj and
    Philippe Galinier and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {TRIS: A Fast and Accurate Identifiers Splitting and Expansion
    Algorithm},
    booktitle = {WCRE},
    year = {2012},
    pages = {103-112},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.20},
    crossref = {DBLP:conf/wcre/2012}
    }
  • B. Upadhyaya, F. Khomh, and Y. Zou, “Extracting restful services from web applications,” in Soca, 2012, pp. 1-4.
    [Bibtex]
    @inproceedings{conf/soca/UpadhyayaKZ12,
    author = {Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou},
    title = {Extracting RESTful services from Web applications},
    booktitle = {SOCA},
    year = {2012},
    pages = {1-4},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2012.6449448},
    crossref = {DBLP:conf/soca/2012}
    }
  • F. Gauthier and E. Merlo, “Alias-aware propagation of simple pattern-based properties in php applications,” in Scam, 2012, pp. 44-53.
    [Bibtex]
    @inproceedings{conf/scam/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Alias-Aware Propagation of Simple Pattern-Based Properties
    in PHP Applications},
    booktitle = {SCAM},
    year = {2012},
    pages = {44-53},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2012.19},
    crossref = {DBLP:conf/scam/2012}
    }
  • A. Sakti, Y. Guéhéneuc, and G. Pesant, “Boosting search based testing by using constraint based testing,” in Ssbse, 2012, pp. 213-227.
    [Bibtex]
    @inproceedings{conf/ssbse/SaktiGP12,
    author = {Abdelilah Sakti and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Boosting Search Based Testing by Using Constraint Based
    Testing},
    booktitle = {SSBSE},
    year = {2012},
    pages = {213-227},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_16},
    crossref = {DBLP:conf/ssbse/2012}
    }
  • B. Beheshti and M. Desmarais, “Improving matrix factorization techniques of student test data with partial order constraints,” in Umap, 2012, pp. 346-350.
    [Bibtex]
    @inproceedings{conf/um/BeheshtiD12,
    author = {Behzad Beheshti and
    Michel Desmarais},
    title = {Improving Matrix Factorization Techniques of Student Test
    Data with Partial Order Constraints},
    booktitle = {UMAP},
    year = {2012},
    pages = {346-350},
    ee = {http://dx.doi.org/10.1007/978-3-642-31454-4_33},
    crossref = {DBLP:conf/um/2012}
    }
  • R. Nagano, H. Nakamura, Y. Kamei, B. Adams, K. Hisazumi, N. Ubayashi, and A. Fukuda, “Using the gpgpu for scaling up mining software repositories,” in Icse, 2012, pp. 1435-1436.
    [Bibtex]
    @inproceedings{conf/icse/NaganoNKAHUF12,
    author = {Rina Nagano and
    Hiroki Nakamura and
    Yasutaka Kamei and
    Bram Adams and
    Kenji Hisazumi and
    Naoyasu Ubayashi and
    Akira Fukuda},
    title = {Using the GPGPU for scaling up Mining Software Repositories},
    booktitle = {ICSE},
    year = {2012},
    pages = {1435-1436},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227077},
    crossref = {DBLP:conf/icse/2012}
    }
  • S. Medini, G. Antoniol, Y. Guéhéneuc, M. D. Penta, and P. Tonella, “Scan: an approach to label and relate execution trace segments,” in Wcre, 2012, pp. 135-144.
    [Bibtex]
    @inproceedings{conf/wcre/MediniAGPT12,
    author = {Soumaya Medini and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Massimiliano Di Penta and
    Paolo Tonella},
    title = {SCAN: An Approach to Label and Relate Execution Trace Segments},
    booktitle = {WCRE},
    year = {2012},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.23},
    crossref = {DBLP:conf/wcre/2012}
    }
  • M. D. Penta, G. Antoniol, D. M. Germán, Y. Guéhéneuc, and B. Adams, “Five days of empirical software engineering: the pased experience,” in Icse, 2012, pp. 1255-1258.
    [Bibtex]
    @inproceedings{conf/icse/PentaAGGA12,
    author = {Massimiliano Di Penta and
    Giuliano Antoniol and
    Daniel M. Germ{\'a}n and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Bram Adams},
    title = {Five days of empirical software engineering: The PASED experience},
    booktitle = {ICSE},
    year = {2012},
    pages = {1255-1258},
    ee = {http://dx.doi.org/10.1109/ICSE.2012.6227017},
    crossref = {DBLP:conf/icse/2012}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “A large scale empirical study on user-centric performance analysis,” in Icst, 2012, pp. 410-419.
    [Bibtex]
    @inproceedings{conf/icst/ZamanAH12,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Large Scale Empirical Study on User-Centric Performance
    Analysis},
    booktitle = {ICST},
    year = {2012},
    pages = {410-419},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICST.2012.121},
    crossref = {DBLP:conf/icst/2012}
    }
  • S. L. Abebe, V. Arnaoudova, P. Tonella, G. Antoniol, and Y. Guéhéneuc, “Can lexicon bad smells improve fault prediction?,” in Wcre, 2012, pp. 235-244.
    [Bibtex]
    @inproceedings{conf/wcre/AbebeATAG12,
    author = {Surafel Lemma Abebe and
    Venera Arnaoudova and
    Paolo Tonella and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Can Lexicon Bad Smells Improve Fault Prediction?},
    booktitle = {WCRE},
    year = {2012},
    pages = {235-244},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.33},
    crossref = {DBLP:conf/wcre/2012}
    }
  • A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y. Guéhéneuc, and E. Aïmeur, “Smurf: a svm-based incremental anti-pattern detection approach,” in Wcre, 2012, pp. 466-475.
    [Bibtex]
    @inproceedings{conf/wcre/MaigaABSGA12,
    author = {Abdou Maiga and
    Nasir Ali and
    Neelesh Bhattacharya and
    Aminata Sabane and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Esma A\"{\i}meur},
    title = {SMURF: A SVM-based Incremental Anti-pattern Detection Approach},
    booktitle = {WCRE},
    year = {2012},
    pages = {466-475},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.56},
    crossref = {DBLP:conf/wcre/2012}
    }
  • N. Moha, F. Palma, M. Nayrolles, B. J. Conseil, Y. Guéhéneuc, B. Baudry, and J. Jézéquel, “Specification and detection of soa antipatterns,” in Icsoc, 2012, pp. 1-16.
    [Bibtex]
    @inproceedings{conf/icsoc/MohaPNCGBJ12,
    author = {Naouel Moha and
    Francis Palma and
    Mathieu Nayrolles and
    Benjamin Joyen Conseil and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Benoit Baudry and
    Jean-Marc J{\'e}z{\'e}quel},
    title = {Specification and Detection of SOA Antipatterns},
    booktitle = {ICSOC},
    year = {2012},
    pages = {1-16},
    ee = {http://dx.doi.org/10.1007/978-3-642-34321-6_1},
    crossref = {DBLP:conf/icsoc/2012}
    }
  • S. Hassaine, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Advise: architectural decay in software evolution,” in Csmr, 2012, pp. 267-276.
    [Bibtex]
    @inproceedings{conf/csmr/HassaineGHA12,
    author = {Salima Hassaine and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {ADvISE: Architectural Decay in Software Evolution},
    booktitle = {CSMR},
    year = {2012},
    pages = {267-276},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.34},
    crossref = {DBLP:conf/csmr/2012}
    }
  • P. N. Robillard and M. Lavallée, “Software team processes: a taxonomy,” in Icssp, 2012, pp. 101-109.
    [Bibtex]
    @inproceedings{conf/ispw/RobillardL12,
    author = {Pierre N. Robillard and
    Mathieu Lavall{\'e}e},
    title = {Software team processes: A taxonomy},
    booktitle = {ICSSP},
    year = {2012},
    pages = {101-109},
    ee = {http://dx.doi.org/10.1109/ICSSP.2012.6225952},
    crossref = {DBLP:conf/ispw/2012}
    }
  • T. Lavoie and E. Merlo, “An accurate estimation of the levenshtein distance using metric trees and manhattan distance,” in Iwsc, 2012, pp. 1-7.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM12,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {An accurate estimation of the Levenshtein distance using
    metric trees and Manhattan distance},
    booktitle = {IWSC},
    year = {2012},
    pages = {1-7},
    ee = {http://dx.doi.org/10.1109/IWSC.2012.6227861},
    crossref = {DBLP:conf/iwsc/2012}
    }
  • F. Gauthier and E. Merlo, “Investigation of access control models with formal concept analysis: a case study,” in Csmr, 2012, pp. 397-402.
    [Bibtex]
    @inproceedings{conf/csmr/GauthierM12,
    author = {Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Investigation of Access Control Models with Formal Concept
    Analysis: A Case Study},
    booktitle = {CSMR},
    year = {2012},
    pages = {397-402},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2012.50},
    crossref = {DBLP:conf/csmr/2012}
    }
  • D. Letarte, F. Gauthier, E. Merlo, N. Sutyanyong, and C. Zuzarte, “Targeted genetic test sql generation for the db2 database,” in Dbtest, 2012, p. 5.
    [Bibtex]
    @inproceedings{conf/sigmod/LetarteGMSZ12,
    author = {Dominic Letarte and
    Fran\c{c}ois Gauthier and
    Ettore Merlo and
    Nattavut Sutyanyong and
    Calisto Zuzarte},
    title = {Targeted genetic test SQL generation for the DB2 database},
    booktitle = {DBTest},
    year = {2012},
    pages = {5},
    ee = {http://doi.acm.org/10.1145/2304510.2304517},
    crossref = {DBLP:conf/sigmod/2012dbtest}
    }
  • O. Gotel, J. Cleland-Huang, J. H. Hayes, A. Zisman, A. Egyed, P. Grünbacher, and G. Antoniol, “The quest for ubiquity: a roadmap for software and systems traceability research,” in Re, 2012, pp. 71-80.
    [Bibtex]
    @inproceedings{conf/re/GotelCHZEGA12,
    author = {Orlena Gotel and
    Jane Cleland-Huang and
    Jane Huffman Hayes and
    Andrea Zisman and
    Alexander Egyed and
    Paul Gr{\"u}nbacher and
    Giuliano Antoniol},
    title = {The quest for Ubiquity: A roadmap for software and systems
    traceability research},
    booktitle = {RE},
    year = {2012},
    pages = {71-80},
    ee = {http://dx.doi.org/10.1109/RE.2012.6345841},
    crossref = {DBLP:conf/re/2012}
    }
  • F. Khomh, T. Dhaliwal, Y. Zou, and B. Adams, “Do faster releases improve software quality? an empirical case study of mozilla firefox,” in Msr, 2012, pp. 179-188.
    [Bibtex]
    @inproceedings{conf/msr/KhomhDZA12,
    author = {Foutse Khomh and
    Tejinder Dhaliwal and
    Ying Zou and
    Bram Adams},
    title = {Do faster releases improve software quality? An empirical
    case study of Mozilla Firefox},
    booktitle = {MSR},
    year = {2012},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/MSR.2012.6224279},
    crossref = {DBLP:conf/msr/2012}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated detection of performance regressions using statistical process control techniques,” in Icpe, 2012, pp. 299-310.
    [Bibtex]
    @inproceedings{conf/wosp/NguyenAJHNF12,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {Automated detection of performance regressions using statistical
    process control techniques},
    booktitle = {ICPE},
    year = {2012},
    pages = {299-310},
    ee = {http://doi.acm.org/10.1145/2188286.2188344},
    crossref = {DBLP:conf/wosp/2012}
    }
  • F. Khomh, H. Yuan, and Y. Zou, “Adapting linux for mobile platforms: an empirical study of android,” in Icsm, 2012, pp. 629-632.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhYZ12,
    author = {Foutse Khomh and
    Hao Yuan and
    Ying Zou},
    title = {Adapting Linux for mobile platforms: An empirical study
    of Android},
    booktitle = {ICSM},
    year = {2012},
    pages = {629-632},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405339},
    crossref = {DBLP:conf/icsm/2012}
    }
  • T. Dhaliwal, F. Khomh, Y. Zou, and A. E. Hassan, “Recovering commit dependencies for selective code integration in software product lines,” in Icsm, 2012, pp. 202-211.
    [Bibtex]
    @inproceedings{conf/icsm/DhaliwalKZH12,
    author = {Tejinder Dhaliwal and
    Foutse Khomh and
    Ying Zou and
    Ahmed E. Hassan},
    title = {Recovering commit dependencies for selective code integration
    in software product lines},
    booktitle = {ICSM},
    year = {2012},
    pages = {202-211},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405273},
    crossref = {DBLP:conf/icsm/2012}
    }
  • M. C. Desmarais, B. Beheshti, and R. Naceur, “Item to skills mapping: deriving a conjunctive q-matrix from data,” in Its, 2012, pp. 454-463.
    [Bibtex]
    @inproceedings{conf/its/DesmaraisBN12,
    author = {Michel C. Desmarais and
    Behzad Beheshti and
    Rhouma Naceur},
    title = {Item to Skills Mapping: Deriving a Conjunctive Q-matrix
    from Data},
    booktitle = {ITS},
    year = {2012},
    pages = {454-463},
    ee = {http://dx.doi.org/10.1007/978-3-642-30950-2_58},
    crossref = {DBLP:conf/its/2012}
    }
  • N. Bhattacharya, O. El-Mahi, E. Duclos, G. Beltrame, G. Antoniol, S. L. Digabel, and Y. Guéhéneuc, “Optimizing threads schedule alignments to expose the interference bug pattern,” in Ssbse, 2012, pp. 90-104.
    [Bibtex]
    @inproceedings{conf/ssbse/BhattacharyaEDBADG12,
    author = {Neelesh Bhattacharya and
    Olfat El-Mahi and
    Etienne Duclos and
    Giovanni Beltrame and
    Giuliano Antoniol and
    S{\'e}bastien Le Digabel and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Optimizing Threads Schedule Alignments to Expose the Interference
    Bug Pattern},
    booktitle = {SSBSE},
    year = {2012},
    pages = {90-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-33119-0_8},
    crossref = {DBLP:conf/ssbse/2012}
    }
  • B. Beheshti, M. Desmarais, and R. Naceur, “Methods to find the number of latent skills,” in Edm, 2012, pp. 81-86.
    [Bibtex]
    @inproceedings{conf/edm/BeheshtiDN12,
    author = {Behzad Beheshti and
    Michel Desmarais and
    Rhouma Naceur},
    title = {Methods to find the number of latent skills},
    booktitle = {EDM},
    year = {2012},
    pages = {81-86},
    ee = {http://educationaldatamining.org/EDM2012/uploads/procs/Full_Papers/edm2012_full_3.pdf},
    crossref = {DBLP:conf/edm/2012}
    }
  • E. Charton and M. Gagnon, “A disambiguation resource extracted from wikipedia for semantic annotation,” in Lrec, 2012, pp. 3665-3671.
    [Bibtex]
    @inproceedings{conf/lrec/ChartonG12,
    author = {Eric Charton and
    Michel Gagnon},
    title = {A disambiguation resource extracted from Wikipedia for semantic
    annotation},
    booktitle = {LREC},
    year = {2012},
    pages = {3665-3671},
    ee = {http://www.lrec-conf.org/proceedings/lrec2012/summaries/983.html},
    crossref = {DBLP:conf/lrec/2012}
    }
  • T. Lavoie, F. Khomh, E. Merlo, and Y. Zou, “Inferring repository file structure modifications using nearest-neighbor clone detection,” in Wcre, 2012, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/wcre/LavoieKMZ12,
    author = {Thierry Lavoie and
    Foutse Khomh and
    Ettore Merlo and
    Ying Zou},
    title = {Inferring Repository File Structure Modifications Using
    Nearest-Neighbor Clone Detection},
    booktitle = {WCRE},
    year = {2012},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2012.42},
    crossref = {DBLP:conf/wcre/2012}
    }
  • E. Shihab, A. E. Hassan, B. Adams, and Z. M. Jiang, “An industrial study on the risk of software changes,” in Sigsoft fse, 2012, p. 62.
    [Bibtex]
    @inproceedings{conf/sigsoft/ShihabHAJ12,
    author = {Emad Shihab and
    Ahmed E. Hassan and
    Bram Adams and
    Zhen Ming Jiang},
    title = {An industrial study on the risk of software changes},
    booktitle = {SIGSOFT FSE},
    year = {2012},
    pages = {62},
    ee = {http://doi.acm.org/10.1145/2393596.2393670},
    crossref = {DBLP:conf/sigsoft/2012}
    }
  • N. Ali, Z. Sharafi, Y. Guéhéneuc, and G. Antoniol, “An empirical study on requirements traceability using eye-tracking,” in Icsm, 2012, pp. 191-200.
    [Bibtex]
    @inproceedings{conf/icsm/AliSGA12,
    author = {Nasir Ali and
    Zohreh Sharafi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An empirical study on requirements traceability using eye-tracking},
    booktitle = {ICSM},
    year = {2012},
    pages = {191-200},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405271},
    crossref = {DBLP:conf/icsm/2012}
    }
  • R. Suvorov, M. Nagappan, A. E. Hassan, Y. Zou, and B. Adams, “An empirical study of build system migrations in practice: case studies on kde and the linux kernel,” in Icsm, 2012, pp. 160-169.
    [Bibtex]
    @inproceedings{conf/icsm/SuvorovNHZA12,
    author = {Roman Suvorov and
    Meiyappan Nagappan and
    Ahmed E. Hassan and
    Ying Zou and
    Bram Adams},
    title = {An empirical study of build system migrations in practice:
    Case studies on KDE and the Linux kernel},
    booktitle = {ICSM},
    year = {2012},
    pages = {160-169},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2012.6405267},
    crossref = {DBLP:conf/icsm/2012}
    }

2011

  • D. Romano, M. D. Penta, and G. Antoniol, “An approach for search based testing of null pointer exceptions,” in Icst, 2011, pp. 160-169.
    [Bibtex]
    @inproceedings{conf/icst/RomanoPA11,
    author = {Daniele Romano and
    Massimiliano Di Penta and
    Giuliano Antoniol},
    title = {An Approach for Search Based Testing of Null Pointer Exceptions},
    booktitle = {ICST},
    year = {2011},
    pages = {160-169},
    ee = {http://dx.doi.org/10.1109/ICST.2011.49},
    crossref = {DBLP:conf/icst/2011}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, K. Martin, and P. Flora, “Modeling the performance of ultra-large-scale systems using layered simulations,” in Mesoca, 2011, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/mesoca/FooJAHZMF11,
    author = {King Chun Foo and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou and
    Kim Martin and
    Parminder Flora},
    title = {Modeling the performance of Ultra-Large-Scale systems using
    layered simulations},
    booktitle = {MESOCA},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/MESOCA.2011.6049040},
    crossref = {DBLP:conf/mesoca/2011}
    }
  • H. Xiao, B. Upadhyaya, F. Khomh, Y. Zou, J. Ng, and A. Lau, “An automatic approach for extracting process knowledge from the web,” in Icws, 2011, pp. 315-322.
    [Bibtex]
    @inproceedings{conf/icws/XiaoUKZNL11,
    author = {Hua Xiao and
    Bipin Upadhyaya and
    Foutse Khomh and
    Ying Zou and
    Joanna Ng and
    Alex Lau},
    title = {An Automatic Approach for Extracting Process Knowledge from
    the Web},
    booktitle = {ICWS},
    year = {2011},
    pages = {315-322},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICWS.2011.85},
    crossref = {DBLP:conf/icws/2011}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Identifying performance deviations in thread pools,” in Icsm, 2011, pp. 83-92.
    [Bibtex]
    @inproceedings{conf/icsm/SyerAH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Identifying performance deviations in thread pools},
    booktitle = {ICSM},
    year = {2011},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080775},
    crossref = {DBLP:conf/icsm/2011}
    }
  • A. Belderrar, S. Kpodjedo, Y. Guéhéneuc, G. Antoniol, and P. Galinier, “Sub-graph mining: identifying micro-architectures in evolving object-oriented software,” in Csmr, 2011, pp. 171-180.
    [Bibtex]
    @inproceedings{conf/csmr/BelderrarKGAG11,
    author = {Ahmed Belderrar and
    Segla Kpodjedo and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Philippe Galinier},
    title = {Sub-graph Mining: Identifying Micro-architectures in Evolving
    Object-Oriented Software},
    booktitle = {CSMR},
    year = {2011},
    pages = {171-180},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.23},
    crossref = {DBLP:conf/csmr/2011}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, E. M. Aboulhamid, and I. O’Connor, “Multi-granularity thermal evaluation of 3d mpsoc architectures,” in Date, 2011, pp. 575-578.
    [Bibtex]
    @inproceedings{conf/date/FourmigueBNAO11,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu and
    El Mostapha Aboulhamid and
    Ian O'Connor},
    title = {Multi-granularity thermal evaluation of 3D MPSoC architectures},
    booktitle = {DATE},
    year = {2011},
    pages = {575-578},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763287},
    crossref = {DBLP:conf/date/2011}
    }
  • F. Gauthier, D. Letarte, T. Lavoie, and E. Merlo, “Extraction and comprehension of moodle’s access control model: a case study,” in Pst, 2011, pp. 44-51.
    [Bibtex]
    @inproceedings{conf/pst/GauthierLLM11,
    author = {Fran\c{c}ois Gauthier and
    Dominic Letarte and
    Thierry Lavoie and
    Ettore Merlo},
    title = {Extraction and comprehension of moodle's access control
    model: A case study},
    booktitle = {PST},
    year = {2011},
    pages = {44-51},
    ee = {http://dx.doi.org/10.1109/PST.2011.5971962},
    crossref = {DBLP:conf/pst/2011}
    }
  • M. Desmarais, “Conditions for effectively deriving a q-matrix from data with non-negative matrix factorization. best paper award,” in Edm, 2011, pp. 41-50.
    [Bibtex]
    @inproceedings{conf/edm/Desmarais11,
    author = {Michel Desmarais},
    title = {Conditions for Effectively Deriving a Q-Matrix from Data
    with Non-negative Matrix Factorization. Best Paper Award},
    booktitle = {EDM},
    year = {2011},
    pages = {41-50},
    ee = {http://educationaldatamining.org/EDM2011/wp-content/uploads/proc/edm2011_paper35_full_Desmarais.pdf},
    crossref = {DBLP:conf/edm/2011}
    }
  • G. Benattar, B. Bérard, D. Lime, J. Mullins, O. H. Roux, and M. Sassolas, “Channel synthesis for finite transducers,” in Afl, 2011, pp. 79-92.
    [Bibtex]
    @inproceedings{conf/afl/BenattarBLMRS11,
    author = {Gilles Benattar and
    B{\'e}atrice B{\'e}rard and
    Didier Lime and
    John Mullins and
    Olivier H. Roux and
    Mathieu Sassolas},
    title = {Channel Synthesis for Finite Transducers},
    booktitle = {AFL},
    year = {2011},
    pages = {79-92},
    crossref = {DBLP:conf/afl/2011}
    }
  • F. Khomh, B. Chan, Y. Zou, and A. E. Hassan, “An entropy evaluation approach for triaging field crashes: a case study of mozilla firefox,” in Wcre, 2011, pp. 261-270.
    [Bibtex]
    @inproceedings{conf/wcre/KhomhCZH11,
    author = {Foutse Khomh and
    Brian Chan and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Entropy Evaluation Approach for Triaging Field Crashes:
    A Case Study of Mozilla Firefox},
    booktitle = {WCRE},
    year = {2011},
    pages = {261-270},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.39},
    crossref = {DBLP:conf/wcre/2011}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “A seismology-inspired approach to study change propagation,” in Icsm, 2011, pp. 53-62.
    [Bibtex]
    @inproceedings{conf/icsm/HassaineBGHA11,
    author = {Salima Hassaine and
    Ferdaous Boughanmi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {A seismology-inspired approach to study change propagation},
    booktitle = {ICSM},
    year = {2011},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080772},
    crossref = {DBLP:conf/icsm/2011}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Automatic semantic web annotation of named entities,” in Canadian conference on ai, 2011, pp. 74-85.
    [Bibtex]
    @inproceedings{conf/ai/ChartonGO11,
    author = {Eric Charton and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Automatic Semantic Web Annotation of Named Entities},
    booktitle = {Canadian Conference on AI},
    year = {2011},
    pages = {74-85},
    ee = {http://dx.doi.org/10.1007/978-3-642-21043-3_10},
    crossref = {DBLP:conf/ai/2011}
    }
  • X. Zhao, F. Khomh, and Y. Zou, “Improving the modifiability of the architecture of business applications,” in Qsic, 2011, pp. 176-185.
    [Bibtex]
    @inproceedings{conf/qsic/ZhaoKZ11,
    author = {Xulin Zhao and
    Foutse Khomh and
    Ying Zou},
    title = {Improving the Modifiability of the Architecture of Business
    Applications},
    booktitle = {QSIC},
    year = {2011},
    pages = {176-185},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2011.36},
    crossref = {DBLP:conf/qsic/2011}
    }
  • M. Lavallée and P. N. Robillard, “Causes of premature aging during software development: an observational study,” in Evol/iwpse, 2011, pp. 61-70.
    [Bibtex]
    @inproceedings{conf/iwpse/LavalleeR11,
    author = {Mathieu Lavall{\'e}e and
    Pierre N. Robillard},
    title = {Causes of premature aging during software development: an
    observational study},
    booktitle = {EVOL/IWPSE},
    year = {2011},
    pages = {61-70},
    ee = {http://doi.acm.org/10.1145/2024445.2024458},
    crossref = {DBLP:conf/iwpse/2011}
    }
  • N. Bhattacharya, A. Sakti, G. Antoniol, Y. Guéhéneuc, and G. Pesant, “Divide-by-zero exception raising via branch coverage,” in Ssbse, 2011, pp. 204-218.
    [Bibtex]
    @inproceedings{conf/ssbse/BhattacharyaSAGP11,
    author = {Neelesh Bhattacharya and
    Abdelilah Sakti and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Gilles Pesant},
    title = {Divide-by-Zero Exception Raising via Branch Coverage},
    booktitle = {SSBSE},
    year = {2011},
    pages = {204-218},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_19},
    crossref = {DBLP:conf/ssbse/2011}
    }
  • N. Ali, W. Wu, G. Antoniol, M. D. Penta, Y. Guéhéneuc, and J. H. Hayes, “Moms: multi-objective miniaturization of software,” in Icsm, 2011, pp. 153-162.
    [Bibtex]
    @inproceedings{conf/icsm/AliWAPGH11,
    author = {Nasir Ali and
    Wei Wu and
    Giuliano Antoniol and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Jane Huffman Hayes},
    title = {MoMS: Multi-objective miniaturization of software},
    booktitle = {ICSM},
    year = {2011},
    pages = {153-162},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080782},
    crossref = {DBLP:conf/icsm/2011}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Requirements traceability for object oriented systems by partitioning source code,” in Wcre, 2011, pp. 45-54.
    [Bibtex]
    @inproceedings{conf/wcre/AliGA11,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Requirements Traceability for Object Oriented Systems by
    Partitioning Source Code},
    booktitle = {WCRE},
    year = {2011},
    pages = {45-54},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.16},
    crossref = {DBLP:conf/wcre/2011}
    }
  • N. Bettenburg, B. Adams, A. E. Hassan, and M. Smidt, “A lightweight approach to uncover technical artifacts in unstructured data,” in Icpc, 2011, pp. 185-188.
    [Bibtex]
    @inproceedings{conf/iwpc/BettenburgAHS11,
    author = {Nicolas Bettenburg and
    Bram Adams and
    Ahmed E. Hassan and
    Michel Smidt},
    title = {A Lightweight Approach to Uncover Technical Artifacts in
    Unstructured Data},
    booktitle = {ICPC},
    year = {2011},
    pages = {185-188},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.36},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. McIntosh, B. Adams, A. E. Hassan, and Y. Zou, “Using indexed sequence diagrams to recover the behaviour of ajax applications,” in Wse, 2011, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/wse/McIntoshAHZ11,
    author = {Shane McIntosh and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou},
    title = {Using indexed sequence diagrams to recover the behaviour
    of AJAX applications},
    booktitle = {WSE},
    year = {2011},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/WSE.2011.6081813},
    crossref = {DBLP:conf/wse/2011}
    }
  • S. Hassaine, F. Boughanmi, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “Change impact analysis: an earthquake metaphor,” in Icpc, 2011, pp. 209-210.
    [Bibtex]
    @inproceedings{conf/iwpc/HassaineBGHA11,
    author = {Salima Hassaine and
    Ferdaous Boughanmi and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {Change Impact Analysis: An Earthquake Metaphor},
    booktitle = {ICPC},
    year = {2011},
    pages = {209-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.54},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • N. Ali, Y. Guéhéneuc, and G. Antoniol, “Trust-based requirements traceability,” in Icpc, 2011, pp. 111-120.
    [Bibtex]
    @inproceedings{conf/iwpc/AliGA11,
    author = {Nasir Ali and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Trust-Based Requirements Traceability},
    booktitle = {ICPC},
    year = {2011},
    pages = {111-120},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.42},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • F. Khomh, B. Chan, Y. Zou, A. Sinha, and D. Dietz, “Predicting post-release defects using pre-release field testing results,” in Icsm, 2011, pp. 253-262.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhCZSD11,
    author = {Foutse Khomh and
    Brian Chan and
    Ying Zou and
    Anand Sinha and
    Dave Dietz},
    title = {Predicting post-release defects using pre-release field
    testing results},
    booktitle = {ICSM},
    year = {2011},
    pages = {253-262},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080792},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. Abbes, F. Khomh, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension,” in Csmr, 2011, pp. 181-190.
    [Bibtex]
    @inproceedings{conf/csmr/AbbesKGA11,
    author = {Marwen Abbes and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An Empirical Study of the Impact of Two Antipatterns, Blob
    and Spaghetti Code, on Program Comprehension},
    booktitle = {CSMR},
    year = {2011},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/CSMR.2011.24},
    crossref = {DBLP:conf/csmr/2011}
    }
  • T. Lavoie and E. Merlo, “Automated type-3 clone oracle using levenshtein metric,” in Iwsc, 2011, pp. 34-40.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieM11,
    author = {Thierry Lavoie and
    Ettore Merlo},
    title = {Automated type-3 clone oracle using levenshtein metric},
    booktitle = {IWSC},
    year = {2011},
    pages = {34-40},
    ee = {http://doi.acm.org/10.1145/1985404.1985411},
    crossref = {DBLP:conf/iwsc/2011}
    }
  • M. D. Syer, B. Adams, Y. Zou, and A. E. Hassan, “Exploring the development of micro-apps: a case study on the blackberry and android platforms,” in Scam, 2011, pp. 55-64.
    [Bibtex]
    @inproceedings{conf/scam/SyerAZH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ying Zou and
    Ahmed E. Hassan},
    title = {Exploring the Development of Micro-apps: A Case Study on
    the BlackBerry and Android Platforms},
    booktitle = {SCAM},
    year = {2011},
    pages = {55-64},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.25},
    crossref = {DBLP:conf/scam/2011}
    }
  • D. Letarte, F. Gauthier, and E. Merlo, “Security model evolution of php web applications,” in Icst, 2011, pp. 289-298.
    [Bibtex]
    @inproceedings{conf/icst/LetarteGM11,
    author = {Dominic Letarte and
    Fran\c{c}ois Gauthier and
    Ettore Merlo},
    title = {Security Model Evolution of PHP Web Applications},
    booktitle = {ICST},
    year = {2011},
    pages = {289-298},
    ee = {http://dx.doi.org/10.1109/ICST.2011.36},
    crossref = {DBLP:conf/icst/2011}
    }
  • T. H. D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. N. Nasser, and P. Flora, “Automated verification of load tests using control charts,” in Apsec, 2011, pp. 282-289.
    [Bibtex]
    @inproceedings{conf/apsec/NguyenAJHNF11,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {Automated Verification of Load Tests Using Control Charts},
    booktitle = {APSEC},
    year = {2011},
    pages = {282-289},
    ee = {http://doi.ieeecomputersociety.org/10.1109/APSEC.2011.59},
    crossref = {DBLP:conf/apsec/2011}
    }
  • A. Fourmigue, G. Beltrame, G. Nicolescu, and E. M. Aboulhamid, “A linear-time approach for the transient thermal simulation of liquid-cooled 3d ics,” in Codes+isss, 2011, pp. 197-206.
    [Bibtex]
    @inproceedings{conf/codes/FourmigueBNA11,
    author = {Alain Fourmigue and
    Giovanni Beltrame and
    Gabriela Nicolescu and
    El Mostapha Aboulhamid},
    title = {A linear-time approach for the transient thermal simulation
    of liquid-cooled 3d ics},
    booktitle = {CODES+ISSS},
    year = {2011},
    pages = {197-206},
    ee = {http://doi.acm.org/10.1145/2039370.2039402},
    crossref = {DBLP:conf/codes/2011}
    }
  • S. Zaman, B. Adams, and A. E. Hassan, “Security versus performance bugs: a case study on firefox,” in Msr, 2011, pp. 93-102.
    [Bibtex]
    @inproceedings{conf/msr/ZamanAH11,
    author = {Shahed Zaman and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Security versus performance bugs: a case study on Firefox},
    booktitle = {MSR},
    year = {2011},
    pages = {93-102},
    ee = {http://doi.acm.org/10.1145/1985441.1985457},
    crossref = {DBLP:conf/msr/2011}
    }
  • S. McIntosh, B. Adams, T. H. D. Nguyen, Y. Kamei, and A. E. Hassan, “An empirical study of build maintenance effort,” in Icse, 2011, pp. 141-150.
    [Bibtex]
    @inproceedings{conf/icse/McIntoshANKH11,
    author = {Shane McIntosh and
    Bram Adams and
    Thanh H. D. Nguyen and
    Yasutaka Kamei and
    Ahmed E. Hassan},
    title = {An empirical study of build maintenance effort},
    booktitle = {ICSE},
    year = {2011},
    pages = {141-150},
    ee = {http://doi.acm.org/10.1145/1985793.1985813},
    crossref = {DBLP:conf/icse/2011}
    }
  • E. Shihab, A. Mockus, Y. Kamei, B. Adams, and A. E. Hassan, “High-impact defects: a study of breakage and surprise defects,” in Sigsoft fse, 2011, pp. 300-310.
    [Bibtex]
    @inproceedings{conf/sigsoft/ShihabMKAH11,
    author = {Emad Shihab and
    Audris Mockus and
    Yasutaka Kamei and
    Bram Adams and
    Ahmed E. Hassan},
    title = {High-impact defects: a study of breakage and surprise defects},
    booktitle = {SIGSOFT FSE},
    year = {2011},
    pages = {300-310},
    ee = {http://doi.acm.org/10.1145/2025113.2025155},
    crossref = {DBLP:conf/sigsoft/2011}
    }
  • F. Jaafar, Y. Guéhéneuc, S. Hamel, and G. Antoniol, “An exploratory study of macro co-changes,” in Wcre, 2011, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/wcre/JaafarGHA11,
    author = {Fehmi Jaafar and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel and
    Giuliano Antoniol},
    title = {An Exploratory Study of Macro Co-changes},
    booktitle = {WCRE},
    year = {2011},
    pages = {325-334},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.47},
    crossref = {DBLP:conf/wcre/2011}
    }
  • M. Gaha, M. Gagnon, and F. Sirois, “A modern blackboard system,” in Web intelligence/iat workshops, 2011, pp. 163-166.
    [Bibtex]
    @inproceedings{conf/iat/GahaGS11,
    author = {Mohamed Gaha and
    Michel Gagnon and
    Fr{\'e}d{\'e}ric Sirois},
    title = {A Modern Blackboard System},
    booktitle = {Web Intelligence/IAT Workshops},
    year = {2011},
    pages = {163-166},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI-IAT.2011.183},
    crossref = {DBLP:conf/iat/2011w}
    }
  • W. Shang, Z. M. Jiang, B. Adams, A. E. Hassan, M. W. Godfrey, M. N. Nasser, and P. Flora, “An exploratory study of the evolution of communicated information about the execution of large software systems,” in Wcre, 2011, pp. 335-344.
    [Bibtex]
    @inproceedings{conf/wcre/ShangJAHGNF11,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Michael W. Godfrey and
    Mohamed N. Nasser and
    Parminder Flora},
    title = {An Exploratory Study of the Evolution of Communicated Information
    about the Execution of Large Software Systems},
    booktitle = {WCRE},
    year = {2011},
    pages = {335-344},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2011.48},
    crossref = {DBLP:conf/wcre/2011}
    }
  • T. Dhaliwal, F. Khomh, and Y. Zou, “Classifying field crash reports for fixing bugs: a case study of mozilla firefox,” in Icsm, 2011, pp. 333-342.
    [Bibtex]
    @inproceedings{conf/icsm/DhaliwalKZ11,
    author = {Tejinder Dhaliwal and
    Foutse Khomh and
    Ying Zou},
    title = {Classifying field crash reports for fixing bugs: A case
    study of Mozilla Firefox},
    booktitle = {ICSM},
    year = {2011},
    pages = {333-342},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080800},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. C. Desmarais, “Performance comparison of item-to-item skills models with the irt single latent trait model,” in Umap, 2011, pp. 75-86.
    [Bibtex]
    @inproceedings{conf/um/Desmarais11,
    author = {Michel C. Desmarais},
    title = {Performance Comparison of Item-to-Item Skills Models with
    the IRT Single Latent Trait Model},
    booktitle = {UMAP},
    year = {2011},
    pages = {75-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-22362-4_7},
    crossref = {DBLP:conf/um/2011}
    }
  • L. Barbour, F. Khomh, and Y. Zou, “Late propagation in software clones,” in Icsm, 2011, pp. 273-282.
    [Bibtex]
    @inproceedings{conf/icsm/BarbourKZ11,
    author = {Liliane Barbour and
    Foutse Khomh and
    Ying Zou},
    title = {Late propagation in software clones},
    booktitle = {ICSM},
    year = {2011},
    pages = {273-282},
    ee = {http://dx.doi.org/10.1109/ICSM.2011.6080794},
    crossref = {DBLP:conf/icsm/2011}
    }
  • M. B. Kelly, J. S. Alexander, B. Adams, and A. E. Hassan, “Recovering a balanced overview of topics in a software domain,” in Scam, 2011, pp. 135-144.
    [Bibtex]
    @inproceedings{conf/scam/KellyAAH11,
    author = {Matthew B. Kelly and
    Jason S. Alexander and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Recovering a Balanced Overview of Topics in a Software Domain},
    booktitle = {SCAM},
    year = {2011},
    pages = {135-144},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2011.23},
    crossref = {DBLP:conf/scam/2011}
    }
  • G. Beltrame and G. Nicolescu, “A multi-objective decision-theoretic exploration algorithm for platform-based design,” in Date, 2011, pp. 1192-1195.
    [Bibtex]
    @inproceedings{conf/date/BeltrameN11,
    author = {Giovanni Beltrame and
    Gabriela Nicolescu},
    title = {A multi-objective decision-theoretic exploration algorithm
    for platform-based design},
    booktitle = {DATE},
    year = {2011},
    pages = {1192-1195},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763311},
    crossref = {DBLP:conf/date/2011}
    }
  • M. D. Syer, B. Adams, and A. E. Hassan, “Industrial case study on supporting the comprehension of system behaviour under load,” in Icpc, 2011, pp. 215-216.
    [Bibtex]
    @inproceedings{conf/iwpc/SyerAH11,
    author = {Mark D. Syer and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Industrial Case Study on Supporting the Comprehension of
    System Behaviour under Load},
    booktitle = {ICPC},
    year = {2011},
    pages = {215-216},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.38},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Modeling the evolution of topics in source code histories,” in Msr, 2011, pp. 173-182.
    [Bibtex]
    @inproceedings{conf/msr/ThomasAHB11,
    author = {Stephen W. Thomas and
    Bram Adams and
    Ahmed E. Hassan and
    Dorothea Blostein},
    title = {Modeling the evolution of topics in source code histories},
    booktitle = {MSR},
    year = {2011},
    pages = {173-182},
    ee = {http://doi.acm.org/10.1145/1985441.1985467},
    crossref = {DBLP:conf/msr/2011}
    }
  • L. M. Eshkevari, V. Arnaoudova, M. D. Penta, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of identifier renamings,” in Msr, 2011, pp. 33-42.
    [Bibtex]
    @inproceedings{conf/msr/EshkevariAPOGA11,
    author = {Laleh Mousavi Eshkevari and
    Venera Arnaoudova and
    Massimiliano Di Penta and
    Rocco Oliveto and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An exploratory study of identifier renamings},
    booktitle = {MSR},
    year = {2011},
    pages = {33-42},
    ee = {http://doi.acm.org/10.1145/1985441.1985449},
    crossref = {DBLP:conf/msr/2011}
    }
  • B. Dit, L. Guerrouj, D. Poshyvanyk, and G. Antoniol, “Can better identifier splitting techniques help feature location?,” in Icpc, 2011, pp. 11-20.
    [Bibtex]
    @inproceedings{conf/iwpc/DitGPA11,
    author = {Bogdan Dit and
    Latifa Guerrouj and
    Denys Poshyvanyk and
    Giuliano Antoniol},
    title = {Can Better Identifier Splitting Techniques Help Feature
    Location?},
    booktitle = {ICPC},
    year = {2011},
    pages = {11-20},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2011.47},
    crossref = {DBLP:conf/iwpc/2011}
    }
  • S. Medini, P. Galinier, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “A fast algorithm to locate concepts in execution traces,” in Ssbse, 2011, pp. 252-266.
    [Bibtex]
    @inproceedings{conf/ssbse/MediniGPGA11,
    author = {Soumaya Medini and
    Philippe Galinier and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {A Fast Algorithm to Locate Concepts in Execution Traces},
    booktitle = {SSBSE},
    year = {2011},
    pages = {252-266},
    ee = {http://dx.doi.org/10.1007/978-3-642-23716-4_22},
    crossref = {DBLP:conf/ssbse/2011}
    }

2010

  • M. D. Penta, D. M. Germán, Y. Guéhéneuc, and G. Antoniol, “An exploratory study of the evolution of software licensing,” in Icse (1), 2010, pp. 145-154.
    [Bibtex]
    @inproceedings{conf/icse/PentaGGA10,
    author = {Massimiliano Di Penta and
    Daniel M. Germ{\'a}n and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An exploratory study of the evolution of software licensing},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {145-154},
    ee = {http://doi.acm.org/10.1145/1806799.1806824},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • E. Shihab, Z. M. Jiang, W. M. Ibrahim, B. Adams, and A. E. Hassan, “Understanding the impact of code and process metrics on post-release defects: a case study on the eclipse project,” in Esem, 2010.
    [Bibtex]
    @inproceedings{conf/esem/ShihabJIAH10,
    author = {Emad Shihab and
    Zhen Ming Jiang and
    Walid M. Ibrahim and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Understanding the impact of code and process metrics on
    post-release defects: a case study on the Eclipse project},
    booktitle = {ESEM},
    year = {2010},
    ee = {http://doi.acm.org/10.1145/1852786.1852792},
    crossref = {DBLP:conf/esem/2010}
    }
  • S. Hassaine, F. Khomh, Y. Guéhéneuc, and S. Hamel, “Ids: an immune-inspired approach for the detection of software design smells,” in Quatic, 2010, pp. 343-348.
    [Bibtex]
    @inproceedings{conf/quatic/HassaineKGH10,
    author = {Salima Hassaine and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel},
    title = {IDS: An Immune-Inspired Approach for the Detection of Software
    Design Smells},
    booktitle = {QUATIC},
    year = {2010},
    pages = {343-348},
    ee = {http://dx.doi.org/10.1109/QUATIC.2010.61},
    crossref = {DBLP:conf/quatic/2010}
    }
  • N. Madani, L. Guerrouj, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Recognizing words from source code identifiers using speech recognition techniques,” in Csmr, 2010, pp. 68-77.
    [Bibtex]
    @inproceedings{conf/csmr/MadaniGPGA10,
    author = {Nioosha Madani and
    Latifa Guerrouj and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Recognizing Words from Source Code Identifiers Using Speech
    Recognition Techniques},
    booktitle = {CSMR},
    year = {2010},
    pages = {68-77},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.31},
    crossref = {DBLP:conf/csmr/2010}
    }
  • M. D. Penta, D. M. Germán, and G. Antoniol, “Identifying licensing of jar archives using a code-search approach,” in Msr, 2010, pp. 151-160.
    [Bibtex]
    @inproceedings{conf/msr/PentaGA10,
    author = {Massimiliano Di Penta and
    Daniel M. Germ{\'a}n and
    Giuliano Antoniol},
    title = {Identifying licensing of jar archives using a code-search
    approach},
    booktitle = {MSR},
    year = {2010},
    pages = {151-160},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463282},
    crossref = {DBLP:conf/msr/2010}
    }
  • N. Bettenburg and B. Adams, “Workshop on mining unstructured data (mud) because "mining unstructured data is like fishing in muddy waters"!,” in Wcre, 2010, pp. 277-278.
    [Bibtex]
    @inproceedings{conf/wcre/BettenburgA10,
    author = {Nicolas Bettenburg and
    Bram Adams},
    title = {Workshop on Mining Unstructured Data (MUD) because "Mining
    Unstructured Data is Like Fishing in Muddy Waters"!},
    booktitle = {WCRE},
    year = {2010},
    pages = {277-278},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.39},
    crossref = {DBLP:conf/wcre/2010}
    }
  • F. Asadi, M. D. Penta, G. Antoniol, and Y. Guéhéneuc, “A heuristic-based approach to identify concepts in execution traces,” in Csmr, 2010, pp. 31-40.
    [Bibtex]
    @inproceedings{conf/csmr/AsadiPAG10,
    author = {Fatemeh Asadi and
    Massimiliano Di Penta and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {A Heuristic-Based Approach to Identify Concepts in Execution
    Traces},
    booktitle = {CSMR},
    year = {2010},
    pages = {31-40},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.17},
    crossref = {DBLP:conf/csmr/2010}
    }
  • Y. Kamei, S. Matsumoto, A. Monden, K. Matsumoto, B. Adams, and A. E. Hassan, “Revisiting common bug prediction findings using effort-aware models,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/icsm/KameiMMMAH10,
    author = {Yasutaka Kamei and
    Shinsuke Matsumoto and
    Akito Monden and
    Ken-ichi Matsumoto and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Revisiting common bug prediction findings using effort-aware
    models},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609530},
    crossref = {DBLP:conf/icsm/2010}
    }
  • W. Wu, Y. Guéhéneuc, G. Antoniol, and M. Kim, “Aura: a hybrid approach to identify framework evolution,” in Icse (1), 2010, pp. 325-334.
    [Bibtex]
    @inproceedings{conf/icse/WuGAK10,
    author = {Wei Wu and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Miryung Kim},
    title = {AURA: a hybrid approach to identify framework evolution},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {325-334},
    ee = {http://doi.acm.org/10.1145/1806799.1806848},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • E. Shihab, Z. M. Jiang, B. Adams, A. E. Hassan, and R. Bowerman, “Prioritizing unit test creation for test-driven maintenance of legacy systems,” in Qsic, 2010, pp. 132-141.
    [Bibtex]
    @inproceedings{conf/qsic/ShihabJAHB10,
    author = {Emad Shihab and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Robert Bowerman},
    title = {Prioritizing Unit Test Creation for Test-Driven Maintenance
    of Legacy Systems},
    booktitle = {QSIC},
    year = {2010},
    pages = {132-141},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.74},
    crossref = {DBLP:conf/qsic/2010}
    }
  • G. M. K. Selim, L. Barbour, W. Shang, B. Adams, A. E. Hassan, and Y. Zou, “Studying the impact of clones on software defects,” in Wcre, 2010, pp. 13-21.
    [Bibtex]
    @inproceedings{conf/wcre/SelimBSAHZ10,
    author = {Gehan M. K. Selim and
    Liliane Barbour and
    Weiyi Shang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou},
    title = {Studying the Impact of Clones on Software Defects},
    booktitle = {WCRE},
    year = {2010},
    pages = {13-21},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.11},
    crossref = {DBLP:conf/wcre/2010}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “Studying the impact of dependency network measures on software quality,” in Icsm, 2010, pp. 1-10.
    [Bibtex]
    @inproceedings{conf/icsm/NguyenAH10,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Studying the impact of dependency network measures on software
    quality},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-10},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609560},
    crossref = {DBLP:conf/icsm/2010}
    }
  • B. Adams, Z. M. Jiang, and A. E. Hassan, “Identifying crosscutting concerns using historical code changes,” in Icse (1), 2010, pp. 305-314.
    [Bibtex]
    @inproceedings{conf/icse/AdamsJH10,
    author = {Bram Adams and
    Zhen Ming Jiang and
    Ahmed E. Hassan},
    title = {Identifying crosscutting concerns using historical code
    changes},
    booktitle = {ICSE (1)},
    year = {2010},
    pages = {305-314},
    ee = {http://doi.acm.org/10.1145/1806799.1806846},
    crossref = {DBLP:conf/icse/2010-1}
    }
  • V. Arnaoudova, L. M. Eshkevari, R. Oliveto, Y. Guéhéneuc, and G. Antoniol, “Physical and conceptual identifier dispersion: measures and relation to fault proneness,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @inproceedings{conf/icsm/ArnaoudovaEOGA10,
    author = {Venera Arnaoudova and
    Laleh Mousavi Eshkevari and
    Rocco Oliveto and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Physical and conceptual identifier dispersion: Measures
    and relation to fault proneness},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609748},
    crossref = {DBLP:conf/icsm/2010}
    }
  • N. Haderer, F. Khomh, and G. Antoniol, “Squaner: a framework for monitoring the quality of software systems,” in Icsm, 2010, pp. 1-4.
    [Bibtex]
    @inproceedings{conf/icsm/HadererKA10,
    author = {Nicolas Haderer and
    Foutse Khomh and
    Giuliano Antoniol},
    title = {SQUANER: A framework for monitoring the quality of software
    systems},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-4},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609684},
    crossref = {DBLP:conf/icsm/2010}
    }
  • S. Kpodjedo, P. Galinier, and G. Antoniol, “Enhancing a tabu algorithm for approximate graph matching by using similarity measures,” in Evocop, 2010, pp. 119-130.
    [Bibtex]
    @inproceedings{conf/evoW/KpodjedoGA10,
    author = {Segla Kpodjedo and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Enhancing a Tabu Algorithm for Approximate Graph Matching
    by Using Similarity Measures},
    booktitle = {EvoCOP},
    year = {2010},
    pages = {119-130},
    ee = {http://dx.doi.org/10.1007/978-3-642-12139-5_11},
    crossref = {DBLP:conf/evoW/2010cop}
    }
  • W. Shang, B. Adams, and A. E. Hassan, “An experience report on scaling tools for mining software repositories using mapreduce,” in Ase, 2010, pp. 275-284.
    [Bibtex]
    @inproceedings{conf/kbse/ShangAH10,
    author = {Weiyi Shang and
    Bram Adams and
    Ahmed E. Hassan},
    title = {An experience report on scaling tools for mining software
    repositories using MapReduce},
    booktitle = {ASE},
    year = {2010},
    pages = {275-284},
    ee = {http://doi.acm.org/10.1145/1858996.1859050},
    crossref = {DBLP:conf/kbse/2010}
    }
  • B. Bérard, J. Mullins, and M. Sassolas, “Quantifying opacity,” in Qest, 2010, pp. 263-272.
    [Bibtex]
    @inproceedings{conf/qest/BerardMS10,
    author = {B{\'e}atrice B{\'e}rard and
    John Mullins and
    Mathieu Sassolas},
    title = {Quantifying Opacity},
    booktitle = {QEST},
    year = {2010},
    pages = {263-272},
    ee = {http://dx.doi.org/10.1109/QEST.2010.40},
    crossref = {DBLP:conf/qest/2010}
    }
  • T. Lavoie, M. Eilers-Smith, and E. Merlo, “Challenging cloning related problems with gpu-based algorithms,” in Iwsc, 2010, pp. 25-32.
    [Bibtex]
    @inproceedings{conf/iwsc/LavoieEM10,
    author = {Thierry Lavoie and
    Michael Eilers-Smith and
    Ettore Merlo},
    title = {Challenging cloning related problems with GPU-based algorithms},
    booktitle = {IWSC},
    year = {2010},
    pages = {25-32},
    ee = {http://doi.acm.org/10.1145/1808901.1808905},
    crossref = {DBLP:conf/iwsc/2010}
    }
  • E. Shihab, A. Ihara, Y. Kamei, W. M. Ibrahim, M. Ohira, B. Adams, A. E. Hassan, and K. Matsumoto, “Predicting re-opened bugs: a case study on the eclipse project,” in Wcre, 2010, pp. 249-258.
    [Bibtex]
    @inproceedings{conf/wcre/ShihabIKIOAHM10,
    author = {Emad Shihab and
    Akinori Ihara and
    Yasutaka Kamei and
    Walid M. Ibrahim and
    Masao Ohira and
    Bram Adams and
    Ahmed E. Hassan and
    Ken-ichi Matsumoto},
    title = {Predicting Re-opened Bugs: A Case Study on the Eclipse Project},
    booktitle = {WCRE},
    year = {2010},
    pages = {249-258},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.36},
    crossref = {DBLP:conf/wcre/2010}
    }
  • J. M. T. Moreno and M. Gagnon, “The cortex automatic summarization system at the qa@inex track 2010,” in Inex, 2010, pp. 290-294.
    [Bibtex]
    @inproceedings{conf/inex/MorenoG10,
    author = {Juan Manuel Torres Moreno and
    Michel Gagnon},
    title = {The Cortex Automatic Summarization System at the QA@INEX
    Track 2010},
    booktitle = {INEX},
    year = {2010},
    pages = {290-294},
    ee = {http://dx.doi.org/10.1007/978-3-642-23577-1_26},
    crossref = {DBLP:conf/inex/2010}
    }
  • G. Bavota, R. Oliveto, A. D. Lucia, G. Antoniol, and Y. Guéhéneuc, “Playing with refactoring: identifying extract class opportunities through game theory,” in Icsm, 2010, pp. 1-5.
    [Bibtex]
    @inproceedings{conf/icsm/BavotaOLAG10,
    author = {Gabriele Bavota and
    Rocco Oliveto and
    Andrea De Lucia and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Playing with refactoring: Identifying extract class opportunities
    through game theory},
    booktitle = {ICSM},
    year = {2010},
    pages = {1-5},
    ee = {http://dx.doi.org/10.1109/ICSM.2010.5609739},
    crossref = {DBLP:conf/icsm/2010}
    }
  • T. H. D. Nguyen, B. Adams, and A. E. Hassan, “A case study of bias in bug-fix datasets,” in Wcre, 2010, pp. 259-268.
    [Bibtex]
    @inproceedings{conf/wcre/NguyenAH10,
    author = {Thanh H. D. Nguyen and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Case Study of Bias in Bug-Fix Datasets},
    booktitle = {WCRE},
    year = {2010},
    pages = {259-268},
    ee = {http://dx.doi.org/10.1109/WCRE.2010.37},
    crossref = {DBLP:conf/wcre/2010}
    }
  • G. Kniesel, A. Binun, P. Hegedus, L. J. Fülöp, A. Chatzigeorgiou, Y. Guéhéneuc, and N. Tsantalis, “Dpdx–towards a common result exchange format for design pattern detection tools,” in Csmr, 2010, pp. 232-235.
    [Bibtex]
    @inproceedings{conf/csmr/KnieselBHFCGT10,
    author = {G{\"u}nter Kniesel and
    Alexander Binun and
    P{\'e}ter Hegedus and
    Lajos Jeno F{\"u}l{\"o}p and
    Alexander Chatzigeorgiou and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Nikolaos Tsantalis},
    title = {DPDX--Towards a Common Result Exchange Format for Design
    Pattern Detection Tools},
    booktitle = {CSMR},
    year = {2010},
    pages = {232-235},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.40},
    crossref = {DBLP:conf/csmr/2010}
    }
  • H. Malik, Z. M. Jiang, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Automatic comparison of load tests to support the performance analysis of large enterprise systems,” in Csmr, 2010, pp. 222-231.
    [Bibtex]
    @inproceedings{conf/csmr/MalikJAHFH10,
    author = {Haroon Malik and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Parminder Flora and
    Gilbert Hamann},
    title = {Automatic Comparison of Load Tests to Support the Performance
    Analysis of Large Enterprise Systems},
    booktitle = {CSMR},
    year = {2010},
    pages = {222-231},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.39},
    crossref = {DBLP:conf/csmr/2010}
    }
  • S. McIntosh, B. Adams, and A. E. Hassan, “The evolution of ant build systems,” in Msr, 2010, pp. 42-51.
    [Bibtex]
    @inproceedings{conf/msr/McIntoshAH10,
    author = {Shane McIntosh and
    Bram Adams and
    Ahmed E. Hassan},
    title = {The evolution of ANT build systems},
    booktitle = {MSR},
    year = {2010},
    pages = {42-51},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463341},
    crossref = {DBLP:conf/msr/2010}
    }
  • N. Kerzazi and P. N. Robillard, “Multi-perspective software process modeling,” in Sera, 2010, pp. 85-92.
    [Bibtex]
    @inproceedings{conf/sera/KerzaziR10,
    author = {Noureddine Kerzazi and
    Pierre N. Robillard},
    title = {Multi-perspective Software Process Modeling},
    booktitle = {SERA},
    year = {2010},
    pages = {85-92},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SERA.2010.21},
    crossref = {DBLP:conf/sera/2010}
    }
  • M. C. Desmarais and I. Pelczer, “On the faithfulness of simulated student performance data,” in Edm, 2010, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/edm/DesmaraisP10,
    author = {Michel C. Desmarais and
    Ildik{\'o} Pelczer},
    title = {On the Faithfulness of Simulated Student Performance Data},
    booktitle = {EDM},
    year = {2010},
    pages = {21-30},
    ee = {http://educationaldatamining.org/EDM2010/uploads/proc/edm2010_submission_56.pdf},
    crossref = {DBLP:conf/edm/2010}
    }
  • H. Malik, B. Adams, A. E. Hassan, P. Flora, and G. Hamann, “Using load tests to automatically compare the subsystems of a large enterprise system,” in Compsac, 2010, pp. 117-126.
    [Bibtex]
    @inproceedings{conf/compsac/MalikAHFH10,
    author = {Haroon Malik and
    Bram Adams and
    Ahmed E. Hassan and
    Parminder Flora and
    Gilbert Hamann},
    title = {Using Load Tests to Automatically Compare the Subsystems
    of a Large Enterprise System},
    booktitle = {COMPSAC},
    year = {2010},
    pages = {117-126},
    ee = {http://dx.doi.org/10.1109/COMPSAC.2010.18},
    crossref = {DBLP:conf/compsac/2010}
    }
  • S. W. Thomas, B. Adams, A. E. Hassan, and D. Blostein, “Validating the use of topic models for software evolution,” in Scam, 2010, pp. 55-64.
    [Bibtex]
    @inproceedings{conf/scam/ThomasAHB10,
    author = {Stephen W. Thomas and
    Bram Adams and
    Ahmed E. Hassan and
    Dorothea Blostein},
    title = {Validating the Use of Topic Models for Software Evolution},
    booktitle = {SCAM},
    year = {2010},
    pages = {55-64},
    ee = {http://dx.doi.org/10.1109/SCAM.2010.13},
    crossref = {DBLP:conf/scam/2010}
    }
  • P. Heidari and H. Boucheneb, “Efficient method for checking the existence of a safety/ reachability controller for time petri nets,” in Acsd, 2010, pp. 201-210.
    [Bibtex]
    @inproceedings{conf/acsd/HeidariB10,
    author = {Parisa Heidari and
    Hanifa Boucheneb},
    title = {Efficient Method for Checking the Existence of a Safety/
    Reachability Controller for Time Petri Nets},
    booktitle = {ACSD},
    year = {2010},
    pages = {201-210},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2010.23},
    crossref = {DBLP:conf/acsd/2010}
    }
  • H. Boucheneb and K. Barkaoui, “On interleaving in \P,A\-time petri nets with strong semantics,” in Infinity, 2010, pp. 17-31.
    [Bibtex]
    @inproceedings{journals/corr/abs-1011-0218,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {On interleaving in \{P,A\}-Time Petri nets with strong semantics},
    booktitle = {INFINITY},
    year = {2010},
    pages = {17-31},
    ee = {http://dx.doi.org/10.4204/EPTCS.39.2},
    crossref = {DBLP:journals/corr/abs-1010-6112}
    }
  • K. C. Foo, Z. M. Jiang, B. Adams, A. E. Hassan, Y. Zou, and P. Flora, “Mining performance regression testing repositories for automated performance analysis,” in Qsic, 2010, pp. 32-41.
    [Bibtex]
    @inproceedings{conf/qsic/FooJAHZF10,
    author = {King Chun Foo and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan and
    Ying Zou and
    Parminder Flora},
    title = {Mining Performance Regression Testing Repositories for Automated
    Performance Analysis},
    booktitle = {QSIC},
    year = {2010},
    pages = {32-41},
    ee = {http://dx.doi.org/10.1109/QSIC.2010.35},
    crossref = {DBLP:conf/qsic/2010}
    }
  • W. M. Ibrahim, N. Bettenburg, E. Shihab, B. Adams, and A. E. Hassan, “Should i contribute to this discussion?,” in Msr, 2010, pp. 181-190.
    [Bibtex]
    @inproceedings{conf/msr/IbrahimBSAH10,
    author = {Walid M. Ibrahim and
    Nicolas Bettenburg and
    Emad Shihab and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Should I contribute to this discussion?},
    booktitle = {MSR},
    year = {2010},
    pages = {181-190},
    ee = {http://dx.doi.org/10.1109/MSR.2010.5463345},
    crossref = {DBLP:conf/msr/2010}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Can syntactic and logical graphs help word sense disambiguation?,” in Lrec, 2010.
    [Bibtex]
    @inproceedings{conf/lrec/ZouaqGO10,
    author = {Amal Zouaq and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Can Syntactic and Logical Graphs help Word Sense Disambiguation?},
    booktitle = {LREC},
    year = {2010},
    ee = {http://www.lrec-conf.org/proceedings/lrec2010/summaries/374.html},
    crossref = {DBLP:conf/lrec/2010}
    }
  • L. Ruhlmann, B. Ozell, M. Gagnon, S. Bourgoin, and E. Charton, “Improving communication using 3d animation,” in Kes (4), 2010, pp. 410-419.
    [Bibtex]
    @inproceedings{conf/kes/RuhlmannOGBC10,
    author = {Laurent Ruhlmann and
    Beno\^{\i}t Ozell and
    Michel Gagnon and
    Steve Bourgoin and
    Eric Charton},
    title = {Improving Communication Using 3D Animation},
    booktitle = {KES (4)},
    year = {2010},
    pages = {410-419},
    ee = {http://dx.doi.org/10.1007/978-3-642-15384-6_44},
    crossref = {DBLP:conf/kes/2010-4}
    }
  • H. Malik, B. Adams, and A. E. Hassan, “Pinpointing the subsystems responsible for the performance deviations in a load test,” in Issre, 2010, pp. 201-210.
    [Bibtex]
    @inproceedings{conf/issre/MalikAH10,
    author = {Haroon Malik and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Pinpointing the Subsystems Responsible for the Performance
    Deviations in a Load Test},
    booktitle = {ISSRE},
    year = {2010},
    pages = {201-210},
    ee = {http://dx.doi.org/10.1109/ISSRE.2010.43},
    crossref = {DBLP:conf/issre/2010}
    }
  • H. Boucheneb, A. Imine, and M. Najem, “Symbolic model-checking of optimistic replication algorithms,” in Ifm, 2010, pp. 89-104.
    [Bibtex]
    @inproceedings{conf/ifm/BouchenebIN10,
    author = {Hanifa Boucheneb and
    Abdessamad Imine and
    Manal Najem},
    title = {Symbolic Model-Checking of Optimistic Replication Algorithms},
    booktitle = {IFM},
    year = {2010},
    pages = {89-104},
    ee = {http://dx.doi.org/10.1007/978-3-642-16265-7_8},
    crossref = {DBLP:conf/ifm/2010}
    }
  • E. Charton, M. Gagnon, and B. Ozell, “Poly-co: an unsupervised co-reference detection system,” in Inlg, 2010.
    [Bibtex]
    @inproceedings{conf/inlg/ChartonGO10,
    author = {Eric Charton and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Poly-co: An Unsupervised Co-reference Detection System},
    booktitle = {INLG},
    year = {2010},
    ee = {http://www.aclweb.org/anthology/W10-4228},
    crossref = {DBLP:conf/inlg/2010}
    }
  • R. Oliveto, F. Khomh, G. Antoniol, and Y. Guéhéneuc, “Numerical signatures of antipatterns: an approach based on b-splines,” in Csmr, 2010, pp. 248-251.
    [Bibtex]
    @inproceedings{conf/csmr/OlivetoKAG10,
    author = {Rocco Oliveto and
    Foutse Khomh and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Numerical Signatures of Antipatterns: An Approach Based
    on B-Splines},
    booktitle = {CSMR},
    year = {2010},
    pages = {248-251},
    ee = {http://dx.doi.org/10.1109/CSMR.2010.47},
    crossref = {DBLP:conf/csmr/2010}
    }

2009

  • F. Khomh, “Squad: software quality understanding through the analysis of design,” in Wcre, 2009, pp. 303-306.
    [Bibtex]
    @inproceedings{conf/wcre/Khomh99a,
    author = {Foutse Khomh},
    title = {SQUAD: Software Quality Understanding through the Analysis
    of Design},
    booktitle = {WCRE},
    year = {2009},
    pages = {303-306},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.22},
    crossref = {DBLP:conf/wcre/2009}
    }
  • B. Adams, “Co-evolution of source code and the build system,” in Icsm, 2009, pp. 461-464.
    [Bibtex]
    @inproceedings{conf/icsm/Adams09,
    author = {Bram Adams},
    title = {Co-evolution of source code and the build system},
    booktitle = {ICSM},
    year = {2009},
    pages = {461-464},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306272},
    crossref = {DBLP:conf/icsm/2009}
    }
  • S. Marr, M. Haupt, S. Timbermont, B. Adams, T. D’Hondt, P. Costanza, and W. D. Meuter, “Virtual machine support for many-core architectures: decoupling abstract from concrete concurrency models,” in Places, 2009, pp. 63-77.
    [Bibtex]
    @inproceedings{journals/corr/abs-1002-0939,
    author = {Stefan Marr and
    Michael Haupt and
    Stijn Timbermont and
    Bram Adams and
    Theo D'Hondt and
    Pascal Costanza and
    Wolfgang De Meuter},
    title = {Virtual Machine Support for Many-Core Architectures: Decoupling
    Abstract from Concrete Concurrency Models},
    booktitle = {PLACES},
    year = {2009},
    pages = {63-77},
    ee = {http://dx.doi.org/10.4204/EPTCS.17.6},
    crossref = {DBLP:journals/corr/abs-1002-1408}
    }
  • S. L. Abebe, S. Haiduc, A. Marcus, P. Tonella, and G. Antoniol, “Analyzing the evolution of the source code vocabulary,” in Csmr, 2009, pp. 189-198.
    [Bibtex]
    @inproceedings{conf/csmr/AbebeHMTA09,
    author = {Surafel Lemma Abebe and
    Sonia Haiduc and
    Andrian Marcus and
    Paolo Tonella and
    Giuliano Antoniol},
    title = {Analyzing the Evolution of the Source Code Vocabulary},
    booktitle = {CSMR},
    year = {2009},
    pages = {189-198},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.61},
    crossref = {DBLP:conf/csmr/2009}
    }
  • O. Gendreau and P. N. Robillard, “Exploring knowledge flow in software project development,” in Eknow, 2009, pp. 99-104.
    [Bibtex]
    @inproceedings{conf/eknow/GendreauR09,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {Exploring Knowledge Flow in Software Project Development},
    booktitle = {eKNOW},
    year = {2009},
    pages = {99-104},
    ee = {http://doi.ieeecomputersociety.org/10.1109/eKNOW.2009.30},
    crossref = {DBLP:conf/eknow/2009}
    }
  • Y. Guéhéneuc, H. H. Kagdi, and J. I. Maletic, “Working session: using eye-tracking to understand program comprehension,” in Icpc, 2009, pp. 278-279.
    [Bibtex]
    @inproceedings{conf/iwpc/GueheneucKM09,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Huzefa H. Kagdi and
    Jonathan I. Maletic},
    title = {Working session: Using eye-tracking to understand program
    comprehension},
    booktitle = {ICPC},
    year = {2009},
    pages = {278-279},
    ee = {http://dx.doi.org/10.1109/ICPC.2009.5090057},
    crossref = {DBLP:conf/iwpc/2009}
    }
  • S. Fu, M. C. Desmarais, B. Pi, Y. Zhou, W. Wang, G. Zou, S. Han, and X. Rao, “Simple but effective porn query recognition by k-nn with semantic similarity measure,” in Apweb/waim, 2009, pp. 3-14.
    [Bibtex]
    @inproceedings{conf/waim/FuDPZWZHR09,
    author = {Shunkai Fu and
    Michel C. Desmarais and
    Bingfeng Pi and
    Ying Zhou and
    Weilei Wang and
    Gang Zou and
    Song Han and
    Xunrong Rao},
    title = {Simple but Effective Porn Query Recognition by k-NN with
    Semantic Similarity Measure},
    booktitle = {APWeb/WAIM},
    year = {2009},
    pages = {3-14},
    ee = {http://dx.doi.org/10.1007/978-3-642-00672-2_3},
    crossref = {DBLP:conf/waim/2009}
    }
  • S. Fu, S. Han, B. Pi, M. Desmarais, Y. Zhou, J. Zhuo, G. Zou, and W. Wang, “Large scale analysis of chinese mobile query behavior,” in Ike, 2009, pp. 258-264.
    [Bibtex]
    @inproceedings{conf/ike/FuHPDZZZW09,
    author = {Shunkai Fu and
    Song Han and
    Bingfeng Pi and
    Michel Desmarais and
    Ying Zhou and
    Jianhui Zhuo and
    Gang Zou and
    Weilei Wang},
    title = {Large Scale Analysis of Chinese Mobile Query Behavior},
    booktitle = {IKE},
    year = {2009},
    pages = {258-264},
    crossref = {DBLP:conf/ike/2009}
    }
  • F. Khomh, S. Vaucher, Y. Guéhéneuc, and H. A. Sahraoui, “A bayesian approach for the detection of code and design smells,” in Qsic, 2009, pp. 305-314.
    [Bibtex]
    @inproceedings{conf/qsic/KhomhVGS09,
    author = {Foutse Khomh and
    St{\'e}phane Vaucher and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui},
    title = {A Bayesian Approach for the Detection of Code and Design
    Smells},
    booktitle = {QSIC},
    year = {2009},
    pages = {305-314},
    ee = {http://doi.ieeecomputersociety.org/10.1109/QSIC.2009.47},
    crossref = {DBLP:conf/qsic/2009}
    }
  • S. Fu, B. Pi, Y. Zhou, M. C. Desmarais, W. Wang, S. Han, and X. Rao, “Cross-channel query recommendation on commercial mobile search engine: why, how and empirical evaluation,” in Pakdd, 2009, pp. 883-890.
    [Bibtex]
    @inproceedings{conf/pakdd/FuPZDWHR09,
    author = {Shunkai Fu and
    Bingfeng Pi and
    Ying Zhou and
    Michel C. Desmarais and
    Weilei Wang and
    Song Han and
    Xunrong Rao},
    title = {Cross-Channel Query Recommendation on Commercial Mobile
    Search Engine: Why, How and Empirical Evaluation},
    booktitle = {PAKDD},
    year = {2009},
    pages = {883-890},
    ee = {http://dx.doi.org/10.1007/978-3-642-01307-2_92},
    crossref = {DBLP:conf/pakdd/2009}
    }
  • D. M. Germán, M. D. Penta, Y. Guéhéneuc, and G. Antoniol, “Code siblings: technical and legal implications of copying code between applications,” in Msr, 2009, pp. 81-90.
    [Bibtex]
    @inproceedings{conf/msr/GermanPGA09,
    author = {Daniel M. Germ{\'a}n and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Code siblings: Technical and legal implications of copying
    code between applications},
    booktitle = {MSR},
    year = {2009},
    pages = {81-90},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069483},
    crossref = {DBLP:conf/msr/2009}
    }
  • Z. Awedikian, K. Ayari, and G. Antoniol, “Mc/dc automatic test input data generation,” in Gecco, 2009, pp. 1657-1664.
    [Bibtex]
    @inproceedings{conf/gecco/AwedikianAA09,
    author = {Zeina Awedikian and
    Kamel Ayari and
    Giuliano Antoniol},
    title = {MC/DC automatic test input data generation},
    booktitle = {GECCO},
    year = {2009},
    pages = {1657-1664},
    ee = {http://doi.acm.org/10.1145/1569901.1570123},
    crossref = {DBLP:conf/gecco/2009g}
    }
  • G. Beltrame, C. Bolchini, and A. Miele, “Multi-level fault modeling for transaction-level specifications,” in Acm great lakes symposium on vlsi, 2009, pp. 87-92.
    [Bibtex]
    @inproceedings{conf/glvlsi/BeltrameBM09,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Antonio Miele},
    title = {Multi-level fault modeling for transaction-level specifications},
    booktitle = {ACM Great Lakes Symposium on VLSI},
    year = {2009},
    pages = {87-92},
    ee = {http://doi.acm.org/10.1145/1531542.1531565},
    crossref = {DBLP:conf/glvlsi/2009}
    }
  • G. Antoniol, R. Oliveto, and D. Poshyvanyk, “5$^{\mbox{th}}$ international workshop on traceability in emerging forms of software engineering (tefse 2009),” in Icse companion, 2009, pp. 472-473.
    [Bibtex]
    @inproceedings{conf/icse/AntoniolOP09,
    author = {Giuliano Antoniol and
    Rocco Oliveto and
    Denys Poshyvanyk},
    title = {5$^{\mbox{th}}$ international workshop on Traceability in Emerging
    Forms of Software Engineering (TEFSE 2009)},
    booktitle = {ICSE Companion},
    year = {2009},
    pages = {472-473},
    ee = {http://dx.doi.org/10.1109/ICSE-COMPANION.2009.5071068},
    crossref = {DBLP:conf/icse/2009c}
    }
  • S. Jeanmart, Y. Guéhéneuc, H. A. Sahraoui, and N. Habra, “Impact of the visitor pattern on program comprehension and maintenance,” in Esem, 2009, pp. 69-78.
    [Bibtex]
    @inproceedings{conf/esem/JeanmartGSH09,
    author = {Sebastien Jeanmart and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Houari A. Sahraoui and
    Naji Habra},
    title = {Impact of the visitor pattern on program comprehension and
    maintenance},
    booktitle = {ESEM},
    year = {2009},
    pages = {69-78},
    ee = {http://doi.acm.org/10.1145/1671248.1671255},
    crossref = {DBLP:conf/esem/2009}
    }
  • S. Gueorguiev, M. Harman, and G. Antoniol, “Software project planning for robustness and completion time in the presence of uncertainty using multi objective search based software engineering,” in Gecco, 2009, pp. 1673-1680.
    [Bibtex]
    @inproceedings{conf/gecco/GueorguievHA09,
    author = {Stefan Gueorguiev and
    Mark Harman and
    Giuliano Antoniol},
    title = {Software project planning for robustness and completion
    time in the presence of uncertainty using multi objective
    search based software engineering},
    booktitle = {GECCO},
    year = {2009},
    pages = {1673-1680},
    ee = {http://doi.acm.org/10.1145/1569901.1570125},
    crossref = {DBLP:conf/gecco/2009g}
    }
  • H. Boucheneb and A. Imine, “On model-checking optimistic replication algorithms,” in Fmoods/forte, 2009, pp. 73-89.
    [Bibtex]
    @inproceedings{conf/forte/BouchenebI09,
    author = {Hanifa Boucheneb and
    Abdessamad Imine},
    title = {On Model-Checking Optimistic Replication Algorithms},
    booktitle = {FMOODS/FORTE},
    year = {2009},
    pages = {73-89},
    ee = {http://dx.doi.org/10.1007/978-3-642-02138-1_5},
    crossref = {DBLP:conf/forte/2009}
    }
  • E. Shihab, N. Bettenburg, B. Adams, and A. E. Hassan, “On the central role of mailing lists in open source projects: an exploratory study,” in Jsai-isai workshops, 2009, pp. 91-103.
    [Bibtex]
    @inproceedings{conf/jsai/ShihabBAH09,
    author = {Emad Shihab and
    Nicolas Bettenburg and
    Bram Adams and
    Ahmed E. Hassan},
    title = {On the Central Role of Mailing Lists in Open Source Projects:
    An Exploratory Study},
    booktitle = {JSAI-isAI Workshops},
    year = {2009},
    pages = {91-103},
    ee = {http://dx.doi.org/10.1007/978-3-642-14888-0_9},
    crossref = {DBLP:conf/jsai/2009}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “A real-time application design methodology for mpsocs,” in Date, 2009, pp. 767-772.
    [Bibtex]
    @inproceedings{conf/date/BeltrameFS09,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {A real-time application design methodology for MPSoCs},
    booktitle = {DATE},
    year = {2009},
    pages = {767-772},
    ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5090609{\&}arnumber=5090767{\&}count=326{\&}index=153},
    crossref = {DBLP:conf/date/2009}
    }
  • W. Shang, Z. M. Jiang, B. Adams, and A. E. Hassan, “Mapreduce as a general framework to support research in mining software repositories (msr),” in Msr, 2009, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/msr/ShangJAH09,
    author = {Weiyi Shang and
    Zhen Ming Jiang and
    Bram Adams and
    Ahmed E. Hassan},
    title = {MapReduce as a general framework to support research in
    Mining Software Repositories (MSR)},
    booktitle = {MSR},
    year = {2009},
    pages = {21-30},
    ee = {http://dx.doi.org/10.1109/MSR.2009.5069477},
    crossref = {DBLP:conf/msr/2009}
    }
  • S. Fu, B. Pi, M. Desmarais, Y. Zhou, W. Wang, and S. Han, “Query recommendation and its usefulness evaluation on mobile search engine,” in Smc, 2009, pp. 1292-1297.
    [Bibtex]
    @inproceedings{conf/smc/FuPDZWH09,
    author = {Shunkai Fu and
    Bingfeng Pi and
    Michel Desmarais and
    Ying Zhou and
    Weilei Wang and
    Song Han},
    title = {Query Recommendation and Its Usefulness Evaluation on Mobile
    Search Engine},
    booktitle = {SMC},
    year = {2009},
    pages = {1292-1297},
    ee = {http://dx.doi.org/10.1109/ICSMC.2009.5345920},
    crossref = {DBLP:conf/smc/2009}
    }
  • N. Bettenburg, W. Shang, W. M. Ibrahim, B. Adams, Y. Zou, and A. E. Hassan, “An empirical study on inconsistent changes to code clones at release level,” in Wcre, 2009, pp. 85-94.
    [Bibtex]
    @inproceedings{conf/wcre/BettenburgSIAZH99a,
    author = {Nicolas Bettenburg and
    Weiyi Shang and
    Walid M. Ibrahim and
    Bram Adams and
    Ying Zou and
    Ahmed E. Hassan},
    title = {An Empirical Study on Inconsistent Changes to Code Clones
    at Release Level},
    booktitle = {WCRE},
    year = {2009},
    pages = {85-94},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.51},
    crossref = {DBLP:conf/wcre/2009}
    }
  • D. Letarte and E. Merlo, “Extraction of inter-procedural simple role privilege models from php code,” in Wcre, 2009, pp. 187-191.
    [Bibtex]
    @inproceedings{conf/wcre/LetarteM99a,
    author = {Dominic Letarte and
    Ettore Merlo},
    title = {Extraction of Inter-procedural Simple Role Privilege Models
    from PHP Code},
    booktitle = {WCRE},
    year = {2009},
    pages = {187-191},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.32},
    crossref = {DBLP:conf/wcre/2009}
    }
  • E. Merlo and T. Lavoie, “Computing structural types of clone syntactic blocks,” in Wcre, 2009, pp. 274-278.
    [Bibtex]
    @inproceedings{conf/wcre/MerloL99a,
    author = {Ettore Merlo and
    Thierry Lavoie},
    title = {Computing Structural Types of Clone Syntactic Blocks},
    booktitle = {WCRE},
    year = {2009},
    pages = {274-278},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.33},
    crossref = {DBLP:conf/wcre/2009}
    }
  • B. Adams, W. D. Meuter, H. Tromp, and A. E. Hassan, “Can we refactor conditional compilation into aspects?,” in Aosd, 2009, pp. 243-254.
    [Bibtex]
    @inproceedings{conf/aosd/AdamsMTH09,
    author = {Bram Adams and
    Wolfgang De Meuter and
    Herman Tromp and
    Ahmed E. Hassan},
    title = {Can we refactor conditional compilation into aspects?},
    booktitle = {AOSD},
    year = {2009},
    pages = {243-254},
    ee = {http://doi.acm.org/10.1145/1509239.1509274},
    crossref = {DBLP:conf/aosd/2009}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Recovering the evolution stable part using an ecgm algorithm: is there a tunnel in mozilla?,” in Csmr, 2009, pp. 179-188.
    [Bibtex]
    @inproceedings{conf/csmr/KpodjedoRGA09,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Recovering the Evolution Stable Part Using an ECGM Algorithm:
    Is There a Tunnel in Mozilla?},
    booktitle = {CSMR},
    year = {2009},
    pages = {179-188},
    ee = {http://dx.doi.org/10.1109/CSMR.2009.24},
    crossref = {DBLP:conf/csmr/2009}
    }
  • A. Zouaq, M. Gagnon, and B. Ozell, “Unsupervised and open ontology-based semantic analysis,” in Ltc, 2009, pp. 245-256.
    [Bibtex]
    @inproceedings{conf/ltconf/ZouaqGO09,
    author = {Amal Zouaq and
    Michel Gagnon and
    Beno\^{\i}t Ozell},
    title = {Unsupervised and Open Ontology-Based Semantic Analysis},
    booktitle = {LTC},
    year = {2009},
    pages = {245-256},
    ee = {http://dx.doi.org/10.1007/978-3-642-20095-3_23},
    crossref = {DBLP:conf/ltconf/2009}
    }
  • F. Khomh, M. D. Penta, and Y. Guéhéneuc, “An exploratory study of the impact of code smells on software change-proneness,” in Wcre, 2009, pp. 75-84.
    [Bibtex]
    @inproceedings{conf/wcre/KhomhPG99a,
    author = {Foutse Khomh and
    Massimiliano Di Penta and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {An Exploratory Study of the Impact of Code Smells on Software
    Change-proneness},
    booktitle = {WCRE},
    year = {2009},
    pages = {75-84},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.28},
    crossref = {DBLP:conf/wcre/2009}
    }
  • F. Khomh, Y. Guéhéneuc, and G. Antoniol, “Playing roles in design patterns: an empirical descriptive and analytic study,” in Icsm, 2009, pp. 83-92.
    [Bibtex]
    @inproceedings{conf/icsm/KhomhGA09,
    author = {Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Playing roles in design patterns: An empirical descriptive
    and analytic study},
    booktitle = {ICSM},
    year = {2009},
    pages = {83-92},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306327},
    crossref = {DBLP:conf/icsm/2009}
    }
  • H. Rakkay, H. Boucheneb, and O. H. Roux, “Time arc petri nets and their analysis,” in Acsd, 2009, pp. 138-147.
    [Bibtex]
    @inproceedings{conf/acsd/RakkayBR09,
    author = {Hind Rakkay and
    Hanifa Boucheneb and
    Olivier H. Roux},
    title = {Time Arc Petri Nets and Their Analysis},
    booktitle = {ACSD},
    year = {2009},
    pages = {138-147},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2009.21},
    crossref = {DBLP:conf/acsd/2009}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “A study of the time dependence of code changes,” in Wcre, 2009, pp. 21-30.
    [Bibtex]
    @inproceedings{conf/wcre/AlamAH99a,
    author = {Omar Alam and
    Bram Adams and
    Ahmed E. Hassan},
    title = {A Study of the Time Dependence of Code Changes},
    booktitle = {WCRE},
    year = {2009},
    pages = {21-30},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.25},
    crossref = {DBLP:conf/wcre/2009}
    }
  • A. Jodoin and M. Desmarais, “L’environnement de développement dynamique (edd) pour le prototypage rapide d’interfaces graphiques,” in Ihm, 2009, pp. 111-117.
    [Bibtex]
    @inproceedings{conf/ihm/JodoinD09,
    author = {Andr{\'e} Jodoin and
    Michel Desmarais},
    title = {L'environnement de d{\'e}veloppement dynamique (EDD)
    pour le prototypage rapide d'interfaces graphiques},
    booktitle = {IHM},
    year = {2009},
    pages = {111-117},
    ee = {http://doi.acm.org/10.1145/1629826.1629844},
    crossref = {DBLP:conf/ihm/2009}
    }
  • O. Alam, B. Adams, and A. E. Hassan, “Measuring the progress of projects using the time dependence of code changes,” in Icsm, 2009, pp. 329-338.
    [Bibtex]
    @inproceedings{conf/icsm/AlamAH09,
    author = {Omar Alam and
    Bram Adams and
    Ahmed E. Hassan},
    title = {Measuring the progress of projects using the time dependence
    of code changes},
    booktitle = {ICSM},
    year = {2009},
    pages = {329-338},
    ee = {http://dx.doi.org/10.1109/ICSM.2009.5306313},
    crossref = {DBLP:conf/icsm/2009}
    }
  • S. Vaucher, F. Khomh, N. Moha, and Y. Guéhéneuc, “Tracking design smells: lessons from a study of god classes,” in Wcre, 2009, pp. 145-154.
    [Bibtex]
    @inproceedings{conf/wcre/VaucherKMG99a,
    author = {St{\'e}phane Vaucher and
    Foutse Khomh and
    Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Tracking Design Smells: Lessons from a Study of God Classes},
    booktitle = {WCRE},
    year = {2009},
    pages = {145-154},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2009.23},
    crossref = {DBLP:conf/wcre/2009}
    }
  • G. Antoniol, “Keynote paper: search based software testing for software security: breaking code to make it safer,” in Icst workshops, 2009, pp. 87-100.
    [Bibtex]
    @inproceedings{conf/icst/Antoniol09,
    author = {Giuliano Antoniol},
    title = {Keynote Paper: Search Based Software Testing for Software
    Security: Breaking Code to Make it Safer},
    booktitle = {ICST Workshops},
    year = {2009},
    pages = {87-100},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSTW.2009.12},
    crossref = {DBLP:conf/icst/2009w}
    }

2008

  • S. Denier and Y. Guéhéneuc, “Mendel: a model, metrics, and rules to understand class hierarchies,” in Icpc, 2008, pp. 143-152.
    [Bibtex]
    @inproceedings{conf/iwpc/DenierG08,
    author = {Simon Denier and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Mendel: A Model, Metrics, and Rules to Understand Class
    Hierarchies},
    booktitle = {ICPC},
    year = {2008},
    pages = {143-152},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.37},
    crossref = {DBLP:conf/iwpc/2008}
    }
  • S. Fu, M. Desmarais, and F. Li, “One-pass learning algorithm for fast recovery of bayesian network,” in Flairs conference, 2008, pp. 53-58.
    [Bibtex]
    @inproceedings{conf/flairs/FuDL08,
    author = {Shunkai Fu and
    Michel Desmarais and
    Fan Li},
    title = {One-Pass Learning Algorithm for Fast Recovery of Bayesian
    Network},
    booktitle = {FLAIRS Conference},
    year = {2008},
    pages = {53-58},
    ee = {http://www.aaai.org/Library/FLAIRS/2008/flairs08-020.php},
    crossref = {DBLP:conf/flairs/2008}
    }
  • G. Falcone, Y. Guéhéneuc, C. F. J. Lange, Z. Porkoláb, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2008, pp. 77-86.
    [Bibtex]
    @inproceedings{conf/ecoopw/FalconeGLPS08,
    author = {Giovanni Falcone and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Christian F. J. Lange and
    Zolt{\'a}n Porkol{\'a}b and
    Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2008},
    pages = {77-86},
    ee = {http://dx.doi.org/10.1007/978-3-642-02047-6_9},
    crossref = {DBLP:conf/ecoopw/2008}
    }
  • K. Barkaoui, H. Boucheneb, and A. Hicheur, “Modelling and analysis of time-constrained flexible workflows with time recursive ecatnets,” in Ws-fm, 2008, pp. 19-36.
    [Bibtex]
    @inproceedings{conf/wsfm/BarkaouiBH08,
    author = {Kamel Barkaoui and
    Hanifa Boucheneb and
    Awatef Hicheur},
    title = {Modelling and Analysis of Time-Constrained Flexible Workflows
    with Time Recursive ECATNets},
    booktitle = {WS-FM},
    year = {2008},
    pages = {19-36},
    ee = {http://dx.doi.org/10.1007/978-3-642-01364-5_2},
    crossref = {DBLP:conf/wsfm/2008}
    }
  • S. Fu and M. Desmarais, “Fast markov blanket discovery algorithm via local learning within single pass,” in Canadian conference on ai, 2008, pp. 96-107.
    [Bibtex]
    @inproceedings{conf/ai/FuD08,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Fast Markov Blanket Discovery Algorithm Via Local Learning
    within Single Pass},
    booktitle = {Canadian Conference on AI},
    year = {2008},
    pages = {96-107},
    ee = {http://dx.doi.org/10.1007/978-3-540-68825-9_10},
    crossref = {DBLP:conf/ai/2008}
    }
  • M. Desmarais, “Just-in-time knowledge for effective hybrid learning,” in Ichl, 2008, pp. 31-39.
    [Bibtex]
    @inproceedings{conf/ichl/Desmarais08,
    author = {Michel Desmarais},
    title = {Just-in-Time Knowledge for Effective Hybrid Learning},
    booktitle = {ICHL},
    year = {2008},
    pages = {31-39},
    ee = {http://dx.doi.org/10.1007/978-3-540-85170-7_3},
    crossref = {DBLP:conf/ichl/2008}
    }
  • G. Antoniol, J. H. Hayes, Y. Guéhéneuc, and M. D. Penta, “Reuse or rewrite: combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date,” in Icsm, 2008, pp. 147-156.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolHGP08,
    author = {Giuliano Antoniol and
    Jane Huffman Hayes and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Massimiliano Di Penta},
    title = {Reuse or rewrite: Combining textual, static, and dynamic
    analyses to assess the cost of keeping a system up-to-date},
    booktitle = {ICSM},
    year = {2008},
    pages = {147-156},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658063},
    crossref = {DBLP:conf/icsm/2008}
    }
  • M. C. Desmarais, A. Villarreal, and M. Gagnon, “Adaptive test design with a naive bayes framework,” in Edm, 2008, pp. 48-56.
    [Bibtex]
    @inproceedings{conf/edm/DesmaraisVG08,
    author = {Michel C. Desmarais and
    Alejandro Villarreal and
    Michel Gagnon},
    title = {Adaptive Test Design with a Naive Bayes Framework},
    booktitle = {EDM},
    year = {2008},
    pages = {48-56},
    ee = {http://www.educationaldatamining.org/EDM2008/uploads/proc/5_Desmarais_17.pdf},
    crossref = {DBLP:conf/edm/2008}
    }
  • S. Fu and M. Desmarais, “Tradeoff analysis of different markov blanket local learning approaches,” in Pakdd, 2008, pp. 562-571.
    [Bibtex]
    @inproceedings{conf/pakdd/FuD08,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Tradeoff Analysis of Different Markov Blanket Local Learning
    Approaches},
    booktitle = {PAKDD},
    year = {2008},
    pages = {562-571},
    ee = {http://dx.doi.org/10.1007/978-3-540-68125-0_51},
    crossref = {DBLP:conf/pakdd/2008}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “Concurrency emulation and analysis of parallel applications for multi-processor system-on-chip co-design,” in Codes+isss, 2008, pp. 7-12.
    [Bibtex]
    @inproceedings{conf/codes/BeltrameFS08,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {Concurrency emulation and analysis of parallel applications
    for multi-processor system-on-chip co-design},
    booktitle = {CODES+ISSS},
    year = {2008},
    pages = {7-12},
    ee = {http://doi.acm.org/10.1145/1450135.1450138},
    crossref = {DBLP:conf/codes/2008}
    }
  • N. Moha, Y. Guéhéneuc, A. L. Meur, and L. Duchien, “A domain analysis to specify design defects and generate detection algorithms,” in Fase, 2008, pp. 276-291.
    [Bibtex]
    @inproceedings{conf/fase/MohaGMD08,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Anne-Fran\c{c}oise Le Meur and
    Laurence Duchien},
    title = {A Domain Analysis to Specify Design Defects and Generate
    Detection Algorithms},
    booktitle = {FASE},
    year = {2008},
    pages = {276-291},
    ee = {http://dx.doi.org/10.1007/978-3-540-78743-3_20},
    crossref = {DBLP:conf/fase/2008}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Semantics for model-based validation of continuous/discrete systems,” in Date, 2008, pp. 498-503.
    [Bibtex]
    @inproceedings{conf/date/GheorgheBNB08,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {Semantics for Model-Based Validation of Continuous/Discrete
    Systems},
    booktitle = {DATE},
    year = {2008},
    pages = {498-503},
    ee = {http://dx.doi.org/10.1109/DATE.2008.4484730},
    crossref = {DBLP:conf/date/2008}
    }
  • J. H. Hayes, G. Antoniol, and Y. Guéhéneuc, “Prereqir: recovering pre-requirements via cluster analysis,” in Wcre, 2008, pp. 165-174.
    [Bibtex]
    @inproceedings{conf/wcre/HayesAG08,
    author = {Jane Huffman Hayes and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {PREREQIR: Recovering Pre-Requirements via Cluster Analysis},
    booktitle = {WCRE},
    year = {2008},
    pages = {165-174},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.36},
    crossref = {DBLP:conf/wcre/2008}
    }
  • N. Moha, A. R. Hacene, P. Valtchev, and Y. Guéhéneuc, “Refactorings of design defects using relational concept analysis,” in Icfca, 2008, pp. 289-304.
    [Bibtex]
    @inproceedings{conf/icfca/MohaHVG08,
    author = {Naouel Moha and
    Amine Rouane Hacene and
    Petko Valtchev and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Refactorings of Design Defects Using Relational Concept
    Analysis},
    booktitle = {ICFCA},
    year = {2008},
    pages = {289-304},
    ee = {http://dx.doi.org/10.1007/978-3-540-78137-0_21},
    crossref = {DBLP:conf/icfca/2008}
    }
  • M. Eaddy, A. V. Aho, G. Antoniol, and Y. Guéhéneuc, “Cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis,” in Icpc, 2008, pp. 53-62.
    [Bibtex]
    @inproceedings{conf/iwpc/EaddyAAG08,
    author = {Marc Eaddy and
    Alfred V. Aho and
    Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {CERBERUS: Tracing Requirements to Source Code Using Information
    Retrieval, Dynamic Analysis, and Program Analysis},
    booktitle = {ICPC},
    year = {2008},
    pages = {53-62},
    ee = {http://dx.doi.org/10.1109/ICPC.2008.39},
    crossref = {DBLP:conf/iwpc/2008}
    }
  • H. Boucheneb and K. Barkaoui, “Relevant timed schedules / clock valuations for constructing time petri net reachability graphs,” in Formats, 2008, pp. 265-279.
    [Bibtex]
    @inproceedings{conf/formats/BouchenebB08,
    author = {Hanifa Boucheneb and
    Kamel Barkaoui},
    title = {Relevant Timed Schedules / Clock Valuations for Constructing
    Time Petri Net Reachability Graphs},
    booktitle = {FORMATS},
    year = {2008},
    pages = {265-279},
    ee = {http://dx.doi.org/10.1007/978-3-540-85778-5_19},
    crossref = {DBLP:conf/formats/2008}
    }
  • G. Beltrame, L. Fossati, and D. Sciuto, “High-level modeling and exploration of reconfigurable mpsocs,” in Ahs, 2008, pp. 330-337.
    [Bibtex]
    @inproceedings{conf/ahs/BeltrameFS08,
    author = {Giovanni Beltrame and
    Luca Fossati and
    Donatella Sciuto},
    title = {High-Level Modeling and Exploration of Reconfigurable MPSoCs},
    booktitle = {AHS},
    year = {2008},
    pages = {330-337},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AHS.2008.15},
    crossref = {DBLP:conf/ahs/2008}
    }
  • K. Barkaoui, R. B. Ayed, H. Boucheneb, and A. Hicheur, “Verification of workflow processes under multilevel security considerations,” in Crisis, 2008, pp. 77-84.
    [Bibtex]
    @inproceedings{conf/crisis/BarkaouiABH08,
    author = {Kamel Barkaoui and
    Rahma Ben Ayed and
    Hanifa Boucheneb and
    Awatef Hicheur},
    title = {Verification of Workflow processes under multilevel security
    considerations},
    booktitle = {CRiSIS},
    year = {2008},
    pages = {77-84},
    ee = {http://dx.doi.org/10.1109/CRISIS.2008.4757466},
    crossref = {DBLP:conf/crisis/2008}
    }
  • S. Kpodjedo, F. Ricca, P. Galinier, and G. Antoniol, “Error correcting graph matching application to software evolution,” in Wcre, 2008, pp. 289-293.
    [Bibtex]
    @inproceedings{conf/wcre/KpodjedoRGA08,
    author = {Segla Kpodjedo and
    Filippo Ricca and
    Philippe Galinier and
    Giuliano Antoniol},
    title = {Error Correcting Graph Matching Application to Software
    Evolution},
    booktitle = {WCRE},
    year = {2008},
    pages = {289-293},
    ee = {http://dx.doi.org/10.1109/WCRE.2008.48},
    crossref = {DBLP:conf/wcre/2008}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “Resp: a non-intrusive transaction-level reflective mpsoc simulation platform for design space exploration,” in Asp-dac, 2008, pp. 673-678.
    [Bibtex]
    @inproceedings{conf/aspdac/BeltrameBFMS08,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Luca Fossati and
    Antonio Miele and
    Donatella Sciuto},
    title = {ReSP: A non-intrusive Transaction-Level Reflective MPSoC
    Simulation Platform for design space exploration},
    booktitle = {ASP-DAC},
    year = {2008},
    pages = {673-678},
    ee = {http://dx.doi.org/10.1109/ASPDAC.2008.4484036},
    crossref = {DBLP:conf/aspdac/2008}
    }
  • B. Kenmei, G. Antoniol, and M. D. Penta, “Trend analysis and issue prediction in large-scale open source systems,” in Csmr, 2008, pp. 73-82.
    [Bibtex]
    @inproceedings{conf/csmr/KenmeiAP08,
    author = {B{\'e}n{\'e}dicte Kenmei and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Trend Analysis and Issue Prediction in Large-Scale Open
    Source Systems},
    booktitle = {CSMR},
    year = {2008},
    pages = {73-82},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493302},
    crossref = {DBLP:conf/csmr/2008}
    }
  • F. Khomh and Y. Guéhéneuc, “Do design patterns impact software quality positively?,” in Csmr, 2008, pp. 274-278.
    [Bibtex]
    @inproceedings{conf/csmr/KhomhG08,
    author = {Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Do Design Patterns Impact Software Quality Positively?},
    booktitle = {CSMR},
    year = {2008},
    pages = {274-278},
    ee = {http://dx.doi.org/10.1109/CSMR.2008.4493325},
    crossref = {DBLP:conf/csmr/2008}
    }
  • M. D. Penta, L. Cerulo, Y. Guéhéneuc, and G. Antoniol, “An empirical study of the relationships between design pattern roles and class change proneness,” in Icsm, 2008, pp. 217-226.
    [Bibtex]
    @inproceedings{conf/icsm/PentaCGA08,
    author = {Massimiliano Di Penta and
    Luigi Cerulo and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {An empirical study of the relationships between design pattern
    roles and class change proneness},
    booktitle = {ICSM},
    year = {2008},
    pages = {217-226},
    ee = {http://dx.doi.org/10.1109/ICSM.2008.4658070},
    crossref = {DBLP:conf/icsm/2008}
    }
  • G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. Guéhéneuc, “Is it a bug or an enhancement?: a text-based approach to classify change requests,” in Cascon, 2008, p. 23.
    [Bibtex]
    @inproceedings{conf/cascon/AntoniolAPKG08,
    author = {Giuliano Antoniol and
    Kamel Ayari and
    Massimiliano Di Penta and
    Foutse Khomh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Is it a bug or an enhancement?: a text-based approach to
    classify change requests},
    booktitle = {CASCON},
    year = {2008},
    pages = {23},
    ee = {http://doi.acm.org/10.1145/1463788.1463819},
    crossref = {DBLP:conf/cascon/2008}
    }

2007

  • Y. Guéhéneuc, C. F. J. Lange, H. A. Sahraoui, G. Falcone, M. Lanza, C. Calero, and F. B. e Abreu, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2007, pp. 166-170.
    [Bibtex]
    @inproceedings{conf/ecoopw/GueheneucLSFLCA07,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Christian F. J. Lange and
    Houari A. Sahraoui and
    Giovanni Falcone and
    Michele Lanza and
    Coral Calero and
    Fernando Brito e Abreu},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {166-170},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_16},
    crossref = {DBLP:conf/ecoopw/2007}
    }
  • S. Fu and M. Desmarais, “Local learning algorithm for markov blanket discovery,” in Australian conference on artificial intelligence, 2007, pp. 68-79.
    [Bibtex]
    @inproceedings{conf/ausai/FuD07,
    author = {Shunkai Fu and
    Michel Desmarais},
    title = {Local Learning Algorithm for Markov Blanket Discovery},
    booktitle = {Australian Conference on Artificial Intelligence},
    year = {2007},
    pages = {68-79},
    ee = {http://dx.doi.org/10.1007/978-3-540-76928-6_9},
    crossref = {DBLP:conf/ausai/2007}
    }
  • D. Boteanu, J. M. Fernandez, J. McHugh, and J. Mullins, “Queue management as a dos counter-measure?,” in Isc, 2007, pp. 263-280.
    [Bibtex]
    @inproceedings{conf/isw/BoteanuFMM07,
    author = {Daniel Boteanu and
    Jos{\'e} M. Fernandez and
    John McHugh and
    John Mullins},
    title = {Queue Management as a DoS Counter-Measure?},
    booktitle = {ISC},
    year = {2007},
    pages = {263-280},
    ee = {http://dx.doi.org/10.1007/978-3-540-75496-1_18},
    crossref = {DBLP:conf/isw/2007}
    }
  • S. Demeyer, Y. Guéhéneuc, A. Keller, C. F. J. Lange, K. Mens, A. Kuhn, and M. Kuhlemann, “Object-oriented reengineering,” in Ecoop workshops, 2007, pp. 142-153.
    [Bibtex]
    @inproceedings{conf/ecoopw/DemeyerGKLMKK07,
    author = {Serge Demeyer and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Anne Keller and
    Christian F. J. Lange and
    Kim Mens and
    Adrian Kuhn and
    Martin Kuhlemann},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2007},
    pages = {142-153},
    ee = {http://dx.doi.org/10.1007/978-3-540-78195-0_14},
    crossref = {DBLP:conf/ecoopw/2007}
    }
  • O. Gendreau and P. N. Robillard, “Knowledge conversion in software development,” in Seke, 2007, pp. 392-395.
    [Bibtex]
    @inproceedings{conf/seke/GendreauR07,
    author = {Olivier Gendreau and
    Pierre N. Robillard},
    title = {Knowledge Conversion in Software Development},
    booktitle = {SEKE},
    year = {2007},
    pages = {392-395},
    crossref = {DBLP:conf/seke/2007}
    }
  • J. Migneault, J. Robert, M. C. Desmarais, and S. Caron, “Comparing voice with touch screen for controlling the instructor’s operating station of a flight simulator,” in Smc, 2007, pp. 3662-3667.
    [Bibtex]
    @inproceedings{conf/smc/MigneaultRDC07,
    author = {Jo{\"e}l Migneault and
    Jean-Marc Robert and
    Michel C. Desmarais and
    Sylvain Caron},
    title = {Comparing voice with touch screen for controlling the instructor's
    operating station of a flight simulator},
    booktitle = {SMC},
    year = {2007},
    pages = {3662-3667},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414002},
    crossref = {DBLP:conf/smc/2007}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “A formalization of global simulation models for continuous/discrete systems,” in Scsc, 2007, pp. 559-566.
    [Bibtex]
    @inproceedings{conf/scsc/GheorgheBNB07,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {A formalization of global simulation models for continuous/discrete
    systems},
    booktitle = {SCSC},
    year = {2007},
    pages = {559-566},
    ee = {http://doi.acm.org/10.1145/1357910.1357998},
    crossref = {DBLP:conf/scsc/2007}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Gesture-based interactions with virtually embodied wearable computer software processes competing for user attention,” in Smc, 2007, pp. 2533-2538.
    [Bibtex]
    @inproceedings{conf/smc/PlouznikoffPDR07,
    author = {Nicolas Plouznikoff and
    Alexandre Plouznikoff and
    Michel Desmarais and
    Jean-Marc Robert},
    title = {Gesture-based interactions with virtually embodied wearable
    computer software processes competing for user attention},
    booktitle = {SMC},
    year = {2007},
    pages = {2533-2538},
    ee = {http://dx.doi.org/10.1109/ICSMC.2007.4414047},
    crossref = {DBLP:conf/smc/2007}
    }
  • Y. Guéhéneuc, “Ptidej: a flexible reverse engineering tool suite,” in Icsm, 2007, pp. 529-530.
    [Bibtex]
    @inproceedings{conf/icsm/Gueheneuc07,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Ptidej: A Flexible Reverse Engineering Tool Suite},
    booktitle = {ICSM},
    year = {2007},
    pages = {529-530},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362684},
    crossref = {DBLP:conf/icsm/2007}
    }
  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Makao,” in Icsm, 2007, pp. 517-518.
    [Bibtex]
    @inproceedings{conf/icsm/AdamsTSM07a,
    author = {Bram Adams and
    Herman Tromp and
    Kris De Schutter and
    Wolfgang De Meuter},
    title = {MAKAO},
    booktitle = {ICSM},
    year = {2007},
    pages = {517-518},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362678},
    crossref = {DBLP:conf/icsm/2007}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Sql-injection security evolution analysis in php,” in Wse, 2007, pp. 45-49.
    [Bibtex]
    @inproceedings{conf/wse/MerloLA07,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {SQL-Injection Security Evolution Analysis in PHP},
    booktitle = {WSE},
    year = {2007},
    pages = {45-49},
    ee = {http://dx.doi.org/10.1109/WSE.2007.4380243},
    crossref = {DBLP:conf/wse/2007}
    }
  • B. Adams and K. D. Schutter, “An aspect for idiom-based exception handling: (using local continuation join points, join point properties, annotations and type parameters),” in Splat, 2007, p. 1.
    [Bibtex]
    @inproceedings{conf/aosd/AdamsS07,
    author = {Bram Adams and
    Kris De Schutter},
    title = {An aspect for idiom-based exception handling: (using local
    continuation join points, join point properties, annotations
    and type parameters)},
    booktitle = {SPLAT},
    year = {2007},
    pages = {1},
    ee = {http://doi.acm.org/10.1145/1233843.1233844},
    crossref = {DBLP:conf/aosd/2007splat}
    }
  • H. Boucheneb and H. Rakkay, “A more efficient time petri net state space abstraction preserving linear properties,” in Acsd, 2007, pp. 61-70.
    [Bibtex]
    @inproceedings{conf/acsd/BouchenebR07,
    author = {Hanifa Boucheneb and
    Hind Rakkay},
    title = {A more efficient time Petri net state space abstraction
    preserving linear properties},
    booktitle = {ACSD},
    year = {2007},
    pages = {61-70},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2007.41},
    crossref = {DBLP:conf/acsd/2007}
    }
  • J. Mullins and R. Oarga, “Model checking of extended ocl constraints on uml models in socle,” in Fmoods, 2007, pp. 59-75.
    [Bibtex]
    @inproceedings{conf/fmoods/MullinsO07,
    author = {John Mullins and
    Raveca Oarga},
    title = {Model Checking of Extended OCL Constraints on UML Models
    in SOCLe},
    booktitle = {FMOODS},
    year = {2007},
    pages = {59-75},
    ee = {http://dx.doi.org/10.1007/978-3-540-72952-5_4},
    crossref = {DBLP:conf/fmoods/2007}
    }
  • M. D. Penta, M. Harman, G. Antoniol, and F. Qureshi, “The effect of communication overhead on software maintenance project staffing: a search-based approach,” in Icsm, 2007, pp. 315-324.
    [Bibtex]
    @inproceedings{conf/icsm/PentaHAQ07,
    author = {Massimiliano Di Penta and
    Mark Harman and
    Giuliano Antoniol and
    Fahim Qureshi},
    title = {The Effect of Communication Overhead on Software Maintenance
    Project Staffing: a Search-Based Approach},
    booktitle = {ICSM},
    year = {2007},
    pages = {315-324},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362644},
    crossref = {DBLP:conf/icsm/2007}
    }
  • G. Beltrame, C. Bolchini, L. Fossati, A. Miele, and D. Sciuto, “A framework for reliability assessment and enhancement in multi-processor systems-on-chip,” in Dft, 2007, pp. 132-141.
    [Bibtex]
    @inproceedings{conf/dft/BeltrameBFMS07,
    author = {Giovanni Beltrame and
    Cristiana Bolchini and
    Luca Fossati and
    Antonio Miele and
    Donatella Sciuto},
    title = {A Framework for Reliability Assessment and Enhancement in
    Multi-Processor Systems-On-Chip},
    booktitle = {DFT},
    year = {2007},
    pages = {132-141},
    ee = {http://doi.ieeecomputersociety.org/10.1109/DFT.2007.35},
    crossref = {DBLP:conf/dft/2007}
    }
  • R. Oliveto, G. Antoniol, A. Marcus, and J. H. Hayes, “Software artefact traceability: the never-ending challenge,” in Icsm, 2007, pp. 485-488.
    [Bibtex]
    @inproceedings{conf/icsm/OlivetoAMH07,
    author = {Rocco Oliveto and
    Giuliano Antoniol and
    Andrian Marcus and
    Jane Huffman Hayes},
    title = {Software Artefact Traceability: the Never-Ending Challenge},
    booktitle = {ICSM},
    year = {2007},
    pages = {485-488},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362664},
    crossref = {DBLP:conf/icsm/2007}
    }
  • S. Hardy and P. N. Robillard, “Visualization of the simulation data of biochemical network models: a painted petri net approach,” in Scsc, 2007, pp. 802-808.
    [Bibtex]
    @inproceedings{conf/scsc/HardyR07,
    author = {Simon Hardy and
    Pierre N. Robillard},
    title = {Visualization of the simulation data of biochemical network
    models: a painted Petri net approach},
    booktitle = {SCSC},
    year = {2007},
    pages = {802-808},
    ee = {http://doi.acm.org/10.1145/1357910.1358033},
    crossref = {DBLP:conf/scsc/2007}
    }
  • N. Moha and Y. Guéhéneuc, “P<scp>tidej</scp> and d<scp>ecor</scp>: identification of design patterns and design defects,” in Oopsla companion, 2007, pp. 868-869.
    [Bibtex]
    @inproceedings{conf/oopsla/MohaG07,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {P{\&}lt;scp{\&}gt;TIDEJ{\&}lt;/scp{\&}gt; and D{\&}lt;scp{\&}gt;ECOR{\&}lt;/scp{\&}gt;:
    identification of design patterns and design defects},
    booktitle = {OOPSLA Companion},
    year = {2007},
    pages = {868-869},
    ee = {http://doi.acm.org/10.1145/1297846.1297930},
    crossref = {DBLP:conf/oopsla/2007c}
    }
  • G. Antoniol, “Requiem for software evolution research: a few steps toward the creative age,” in Iwpse, 2007, pp. 1-3.
    [Bibtex]
    @inproceedings{conf/iwpse/Antoniol07,
    author = {Giuliano Antoniol},
    title = {Requiem for software evolution research: a few steps toward
    the creative age},
    booktitle = {IWPSE},
    year = {2007},
    pages = {1-3},
    ee = {http://doi.acm.org/10.1145/1294948.1294950},
    crossref = {DBLP:conf/iwpse/2007}
    }
  • M. Gagnon, “Ontology-based integration of data sources,” in Fusion, 2007, pp. 1-8.
    [Bibtex]
    @inproceedings{conf/fusion/Gagnon07,
    author = {Michel Gagnon},
    title = {Ontology-based integration of data sources},
    booktitle = {FUSION},
    year = {2007},
    pages = {1-8},
    ee = {http://dx.doi.org/10.1109/ICIF.2007.4408086},
    crossref = {DBLP:conf/fusion/2007}
    }
  • N. Moha and Y. Guéhéneuc, “Decor: a tool for the detection of design defects,” in Ase, 2007, pp. 527-528.
    [Bibtex]
    @inproceedings{conf/kbse/MohaG07,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Decor: a tool for the detection of design defects},
    booktitle = {ASE},
    year = {2007},
    pages = {527-528},
    ee = {http://doi.acm.org/10.1145/1321631.1321727},
    crossref = {DBLP:conf/kbse/2007}
    }
  • K. Ayari, S. Bouktif, and G. Antoniol, “Automatic mutation test input data generation via ant colony,” in Gecco, 2007, pp. 1074-1081.
    [Bibtex]
    @inproceedings{conf/gecco/AyariBA07,
    author = {Kamel Ayari and
    Salah Bouktif and
    Giuliano Antoniol},
    title = {Automatic mutation test input data generation via ant colony},
    booktitle = {GECCO},
    year = {2007},
    pages = {1074-1081},
    ee = {http://doi.acm.org/10.1145/1276958.1277172},
    crossref = {DBLP:conf/gecco/2007}
    }
  • K. Ayari, P. Meshkinfam, G. Antoniol, and M. D. Penta, “Threats on building models from cvs and bugzilla repositories: the mozilla case study,” in Cascon, 2007, pp. 215-228.
    [Bibtex]
    @inproceedings{conf/cascon/AyariMAP07,
    author = {Kamel Ayari and
    Peyman Meshkinfam and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Threats on building models from CVS and Bugzilla repositories:
    the Mozilla case study},
    booktitle = {CASCON},
    year = {2007},
    pages = {215-228},
    ee = {http://doi.acm.org/10.1145/1321211.1321234},
    crossref = {DBLP:conf/cascon/2007}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Automated protection of php applications against sql-injection attacks,” in Csmr, 2007, pp. 191-202.
    [Bibtex]
    @inproceedings{conf/csmr/MerloLA07,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {Automated Protection of PHP Applications Against SQL-injection
    Attacks},
    booktitle = {CSMR},
    year = {2007},
    pages = {191-202},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2007.16},
    crossref = {DBLP:conf/csmr/2007}
    }
  • B. Adams, H. Tromp, K. D. Schutter, and W. D. Meuter, “Design recovery and maintenance of build systems,” in Icsm, 2007, pp. 114-123.
    [Bibtex]
    @inproceedings{conf/icsm/AdamsTSM07,
    author = {Bram Adams and
    Herman Tromp and
    Kris De Schutter and
    Wolfgang De Meuter},
    title = {Design recovery and maintenance of build systems},
    booktitle = {ICSM},
    year = {2007},
    pages = {114-123},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362624},
    crossref = {DBLP:conf/icsm/2007}
    }
  • G. Antoniol, Y. Guéhéneuc, E. Merlo, and P. Tonella, “Mining the lexicon used by programmers during sofware evolution,” in Icsm, 2007, pp. 14-23.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolGMT07,
    author = {Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Ettore Merlo and
    Paolo Tonella},
    title = {Mining the Lexicon Used by Programmers during Sofware Evolution},
    booktitle = {ICSM},
    year = {2007},
    pages = {14-23},
    ee = {http://dx.doi.org/10.1109/ICSM.2007.4362614},
    crossref = {DBLP:conf/icsm/2007}
    }

2006

  • Y. Guéhéneuc, K. Mens, and R. Wuyts, “A comparative framework for design recovery tools,” in Csmr, 2006, pp. 123-134.
    [Bibtex]
    @inproceedings{conf/csmr/GueheneucMW06,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Kim Mens and
    Roel Wuyts},
    title = {A Comparative Framework for Design Recovery Tools},
    booktitle = {CSMR},
    year = {2006},
    pages = {123-134},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.1},
    crossref = {DBLP:conf/csmr/2006}
    }
  • A. Walenstein, R. Koschke, and E. Merlo, “06301 summary — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/WalensteinKM06,
    author = {Andrew Walenstein and
    Rainer Koschke and
    Ettore Merlo},
    title = {06301 Summary -- Duplication, Redundancy, and Similarity
    in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/971},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, D. Lyonnard, and C. Pilkington, “Exploiting tlm and object introspection for system-level simulation,” in Date, 2006, pp. 100-105.
    [Bibtex]
    @inproceedings{conf/date/BeltrameSSLP06,
    author = {Giovanni Beltrame and
    Donatella Sciuto and
    Cristina Silvano and
    Damien Lyonnard and
    Chuck Pilkington},
    title = {Exploiting TLM and object introspection for system-level
    simulation},
    booktitle = {DATE},
    year = {2006},
    pages = {100-105},
    ee = {http://doi.acm.org/10.1145/1131515},
    crossref = {DBLP:conf/date/2006p}
    }
  • M. Dulipovici and P. N. Robillard, “Vector-based method for measuring and comparing software requirements implementation,” in Acst, 2006, pp. 292-297.
    [Bibtex]
    @inproceedings{conf/acst/DulipoviciR06,
    author = {Mihaela Dulipovici and
    Pierre N. Robillard},
    title = {Vector-based method for measuring and comparing software
    requirements implementation},
    booktitle = {ACST},
    year = {2006},
    pages = {292-297},
    crossref = {DBLP:conf/acst/2006}
    }
  • G. Beltrame, D. Sciuto, C. Silvano, P. G. Paulin, and E. Bensoudane, “An application mapping methodology and case study for multi-processor on-chip architectures,” in Vlsi-soc, 2006, pp. 146-151.
    [Bibtex]
    @inproceedings{conf/vlsi/BeltrameSSPB06,
    author = {Giovanni Beltrame and
    Donatella Sciuto and
    Cristina Silvano and
    Pierre G. Paulin and
    Essaid Bensoudane},
    title = {An Application Mapping Methodology and Case Study for Multi-Processor
    On-Chip Architectures},
    booktitle = {VLSI-SoC},
    year = {2006},
    pages = {146-151},
    ee = {http://dx.doi.org/10.1109/VLSISOC.2006.313219},
    crossref = {DBLP:conf/vlsi/2006soc}
    }
  • S. Bouktif, G. Antoniol, and E. Merlo, “A feedback based quality assessment to support open source software evolution: the grass case study,” in Icsm, 2006, pp. 155-165.
    [Bibtex]
    @inproceedings{conf/icsm/BouktifAM06,
    author = {Salah Bouktif and
    Giuliano Antoniol and
    Ettore Merlo},
    title = {A Feedback Based Quality Assessment to Support Open Source
    Software Evolution: the GRASS Case Study},
    booktitle = {ICSM},
    year = {2006},
    pages = {155-165},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2006.5},
    crossref = {DBLP:conf/icsm/2006}
    }
  • K. D. Schutter and B. Adams, “Face-off: aop+lmp vs. legacy software,” in Aspects for legacy applications, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/SchutterA06,
    author = {Kris De Schutter and
    Bram Adams},
    title = {Face-off: AOP+LMP vs. legacy software},
    booktitle = {Aspects For Legacy Applications},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/888},
    crossref = {DBLP:conf/dagstuhl/2006P6302}
    }
  • M. Gagnon and L. D. Sylva, “Text compression by syntactic pruning,” in Canadian conference on ai, 2006, pp. 312-323.
    [Bibtex]
    @inproceedings{conf/ai/GagnonS06,
    author = {Michel Gagnon and
    Lyne Da Sylva},
    title = {Text Compression by Syntactic Pruning},
    booktitle = {Canadian Conference on AI},
    year = {2006},
    pages = {312-323},
    ee = {http://dx.doi.org/10.1007/11766247_27},
    crossref = {DBLP:conf/ai/2006}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Scenario-driven dynamic analysis for comprehending large software systems,” in Csmr, 2006, pp. 71-80.
    [Bibtex]
    @inproceedings{conf/csmr/SalahMAP06,
    author = {Maher Salah and
    Spiros Mancoridis and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Scenario-Driven Dynamic Analysis for Comprehending Large
    Software Systems},
    booktitle = {CSMR},
    year = {2006},
    pages = {71-80},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.47},
    crossref = {DBLP:conf/csmr/2006}
    }
  • E. Merlo, “Detection of plagiarism in university projects using metrics-based spectral similarity,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/Merlo06,
    author = {Ettore Merlo},
    title = {Detection of Plagiarism in University Projects Using Metrics-based
    Spectral Similarity},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/986},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • R. Hadjidj and H. Boucheneb, “On-the-fly tctl model checking for time petri nets using state class graphs,” in Acsd, 2006, pp. 111-122.
    [Bibtex]
    @inproceedings{conf/acsd/HadjidjB06,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {On-the-fly TCTL model checking for Time Petri Nets using
    state class graphs},
    booktitle = {ACSD},
    year = {2006},
    pages = {111-122},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2006.18},
    crossref = {DBLP:conf/acsd/2006}
    }
  • N. Plouznikoff, A. Plouznikoff, M. Desmarais, and J. Robert, “Support mobile à la tâche: médiation utilisateur – monde réel par l’intermédiaire d’un ordinateur porté,” in Ihm, 2006, pp. 107-114.
    [Bibtex]
    @inproceedings{conf/ihm/PlouznikoffPDR06,
    author = {Nicolas Plouznikoff and
    Alexandre Plouznikoff and
    Michel Desmarais and
    Jean-Marc Robert},
    title = {Support mobile {\`a} la t{\^a}che: m{\'e}diation
    utilisateur - monde r{\'e}el par l'interm{\'e}diaire
    d'un ordinateur port{\'e}},
    booktitle = {IHM},
    year = {2006},
    pages = {107-114},
    ee = {http://doi.acm.org/10.1145/1132736.1132750},
    crossref = {DBLP:conf/ihm/2006}
    }
  • S. Galice, M. Minier, J. Mullins, and S. Ubéda, “Cryptographic protocol to establish trusted history of interactions,” in Esas, 2006, pp. 136-149.
    [Bibtex]
    @inproceedings{conf/esas/GaliceMMU06,
    author = {Samuel Galice and
    Marine Minier and
    John Mullins and
    St{\'e}phane Ub{\'e}da},
    title = {Cryptographic Protocol to Establish Trusted History of Interactions},
    booktitle = {ESAS},
    year = {2006},
    pages = {136-149},
    ee = {http://dx.doi.org/10.1007/11964254_13},
    crossref = {DBLP:conf/esas/2006}
    }
  • N. Moha, J. Rezgui, Y. Guéhéneuc, P. Valtchev, and G. El-Boussaidi, “Using fca to suggest refactorings to correct design defects,” in Cla, 2006, pp. 269-275.
    [Bibtex]
    @inproceedings{conf/cla/MohaRGVE06,
    author = {Naouel Moha and
    Jihene Rezgui and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Petko Valtchev and
    Ghizlane El-Boussaidi},
    title = {Using FCA to Suggest Refactorings to Correct Design Defects},
    booktitle = {CLA},
    year = {2006},
    pages = {269-275},
    ee = {http://dx.doi.org/10.1007/978-3-540-78921-5_20},
    crossref = {DBLP:conf/cla/2006}
    }
  • S. Bouktif, Y. Guéhéneuc, and G. Antoniol, “Extracting change-patterns from cvs repositories,” in Wcre, 2006, pp. 221-230.
    [Bibtex]
    @inproceedings{conf/wcre/BouktifGA06,
    author = {Salah Bouktif and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Extracting Change-patterns from CVS Repositories},
    booktitle = {WCRE},
    year = {2006},
    pages = {221-230},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.27},
    crossref = {DBLP:conf/wcre/2006}
    }
  • A. Plouznikoff, N. Plouznikoff, J. Robert, and M. Desmarais, “Enhancing human-machine interactions: virtual interface alteration through wearable computers,” in Chi, 2006, pp. 373-376.
    [Bibtex]
    @inproceedings{conf/chi/PlouznikoffPRD06,
    author = {Alexandre Plouznikoff and
    Nicolas Plouznikoff and
    Jean-Marc Robert and
    Michel Desmarais},
    title = {Enhancing human-machine interactions: virtual interface
    alteration through wearable computers},
    booktitle = {CHI},
    year = {2006},
    pages = {373-376},
    ee = {http://doi.acm.org/10.1145/1124772.1124828},
    crossref = {DBLP:conf/chi/2006}
    }
  • A. Jodoin, R. L’Archevêque, P. Allard, M. Desmarais, and L. Granger, “Un environnement de développement dynamique qui intègre des composants graphiques actifs,” in Ihm, 2006, pp. 293-294.
    [Bibtex]
    @inproceedings{conf/ihm/JodoinLADG06,
    author = {Andr{\'e} Jodoin and
    R{\'e}gent L'Archev{\^e}que and
    Pierre Allard and
    Michel Desmarais and
    Louis Granger},
    title = {Un environnement de d{\'e}veloppement dynamique qui int{\`e}gre
    des composants graphiques actifs},
    booktitle = {IHM},
    year = {2006},
    pages = {293-294},
    ee = {http://doi.acm.org/10.1145/1132736.1132789},
    crossref = {DBLP:conf/ihm/2006}
    }
  • A. Walenstein, J. R. Cordy, W. S. Evans, A. E. Hassan, T. Kamiya, C. Kapser, and E. Merlo, “06301 working session summary: presentation and visualization of redundant code,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/WalensteinCEHKKM06,
    author = {Andrew Walenstein and
    James R. Cordy and
    William S. Evans and
    Ahmed E. Hassan and
    Toshihiro Kamiya and
    Cory Kapser and
    Ettore Merlo},
    title = {06301 Working Session Summary: Presentation and Visualization
    of Redundant Code},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/966},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • S. Bouktif, G. Antoniol, E. Merlo, and M. Neteler, “A novel approach to optimize clone refactoring activity,” in Gecco, 2006, pp. 1885-1892.
    [Bibtex]
    @inproceedings{conf/gecco/BouktifAMN06,
    author = {Salah Bouktif and
    Giuliano Antoniol and
    Ettore Merlo and
    Markus Neteler},
    title = {A novel approach to optimize clone refactoring activity},
    booktitle = {GECCO},
    year = {2006},
    pages = {1885-1892},
    ee = {http://doi.acm.org/10.1145/1143997.1144312},
    crossref = {DBLP:conf/gecco/2006}
    }
  • R. Wuyts, S. Demeyer, Y. Guéhéneuc, K. Mens, and S. Ducasse, “Object-oriented reengineering,” in Ecoop workshops, 2006, pp. 69-71.
    [Bibtex]
    @inproceedings{conf/ecoopw/WuytsDGMD06,
    author = {Roel Wuyts and
    Serge Demeyer and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Kim Mens and
    St{\'e}phane Ducasse},
    title = {Object-Oriented Reengineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {69-71},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_8},
    crossref = {DBLP:conf/ecoopw/2006}
    }
  • N. Moha, D. -L. Huynh, and Y. Guéhéneuc, “Une taxonomie et un métamodèle pour la détection des défauts de conception,” in Lmo, 2006, pp. 201-216.
    [Bibtex]
    @inproceedings{conf/lmo/MohaHG06,
    author = {Naouel Moha and
    D.-L. Huynh and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Une taxonomie et un m{\'e}tamod{\`e}le pour la d{\'e}tection
    des d{\'e}fauts de conception},
    booktitle = {LMO},
    year = {2006},
    pages = {201-216},
    crossref = {DBLP:conf/lmo/2006}
    }
  • G. Beltrame, D. Bruschi, D. Sciuto, and C. Silvano, “Decision-theoretic exploration of multiprocessor platforms,” in Codes+isss, 2006, pp. 205-210.
    [Bibtex]
    @inproceedings{conf/codes/BeltrameBSS06,
    author = {Giovanni Beltrame and
    Dario Bruschi and
    Donatella Sciuto and
    Cristina Silvano},
    title = {Decision-theoretic exploration of multiProcessor platforms},
    booktitle = {CODES+ISSS},
    year = {2006},
    pages = {205-210},
    ee = {http://doi.acm.org/10.1145/1176254.1176305},
    crossref = {DBLP:conf/codes/2006}
    }
  • M. Desmarais and M. Gagnon, “Bayesian student models based on item to item knowledge structures,” in Ec-tel, 2006, pp. 111-124.
    [Bibtex]
    @inproceedings{conf/ectel/DesmaraisG06,
    author = {Michel Desmarais and
    Michel Gagnon},
    title = {Bayesian Student Models Based on Item to Item Knowledge
    Structures},
    booktitle = {EC-TEL},
    year = {2006},
    pages = {111-124},
    ee = {http://dx.doi.org/10.1007/11876663_11},
    crossref = {DBLP:conf/ectel/2006}
    }
  • M. Gagnon, E. M. P. de Coelho, and R. A. Finger, “Towards a formalization of tense and aspect for the generation of portuguese sentences,” in Propor, 2006, pp. 229-232.
    [Bibtex]
    @inproceedings{conf/propor/GagnonCF06,
    author = {Michel Gagnon and
    Eliana de Mattos Pinto Coelho and
    Roger Antonio Finger},
    title = {Towards a Formalization of Tense and Aspect for the Generation
    of Portuguese Sentences},
    booktitle = {PROPOR},
    year = {2006},
    pages = {229-232},
    ee = {http://dx.doi.org/10.1007/11751984_28},
    crossref = {DBLP:conf/propor/2006}
    }
  • N. Moha, Y. Guéhéneuc, and P. Leduc, “Automatic generation of detection algorithms for design defects,” in Ase, 2006, pp. 297-300.
    [Bibtex]
    @inproceedings{conf/kbse/MohaGL06,
    author = {Naouel Moha and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Pierre Leduc},
    title = {Automatic Generation of Detection Algorithms for Design
    Defects},
    booktitle = {ASE},
    year = {2006},
    pages = {297-300},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ASE.2006.22},
    crossref = {DBLP:conf/kbse/2006}
    }
  • S. Brlek, S. Hamadou, and J. Mullins, “Some remarks on the certificates registration of the electronic commerce protocol set,” in Aict/iciw, 2006, p. 119.
    [Bibtex]
    @inproceedings{conf/aict/BrlekHM06,
    author = {Srecko Brlek and
    Sardaouna Hamadou and
    John Mullins},
    title = {Some Remarks on the Certificates Registration of the Electronic
    Commerce Protocol SET},
    booktitle = {AICT/ICIW},
    year = {2006},
    pages = {119},
    ee = {http://doi.ieeecomputersociety.org/10.1109/AICT-ICIW.2006.176},
    crossref = {DBLP:conf/aict/2006}
    }
  • L. Gheorghe, F. Bouchhima, G. Nicolescu, and H. Boucheneb, “Formal definitions of simulation interfaces in a continuous/discrete co-simulation tool,” in Ieee international workshop on rapid system prototyping, 2006, pp. 186-192.
    [Bibtex]
    @inproceedings{conf/rsp/GheorgheBNB06,
    author = {Luiza Gheorghe and
    Faouzi Bouchhima and
    Gabriela Nicolescu and
    Hanifa Boucheneb},
    title = {Formal Definitions of Simulation Interfaces in a Continuous/Discrete
    Co-Simulation Tool},
    booktitle = {IEEE International Workshop on Rapid System Prototyping},
    year = {2006},
    pages = {186-192},
    ee = {http://doi.ieeecomputersociety.org/10.1109/RSP.2006.18},
    crossref = {DBLP:conf/rsp/2006}
    }
  • D. Poshyvanyk, A. Marcus, V. Rajlich, Y. Guéhéneuc, and G. Antoniol, “Combining probabilistic ranking and latent semantic indexing for feature identification,” in Icpc, 2006, pp. 137-148.
    [Bibtex]
    @inproceedings{conf/iwpc/PoshyvanykMRGA06,
    author = {Denys Poshyvanyk and
    Andrian Marcus and
    V{\'a}clav Rajlich and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Combining Probabilistic Ranking and Latent Semantic Indexing
    for Feature Identification},
    booktitle = {ICPC},
    year = {2006},
    pages = {137-148},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICPC.2006.17},
    crossref = {DBLP:conf/iwpc/2006}
    }
  • F. A. Fontana, C. Raibulet, Y. Guéhéneuc, G. Antoniol, and J. M. Smith, “Design pattern detection for reverse engineering,” in Wcre, 2006, p. 316.
    [Bibtex]
    @inproceedings{conf/wcre/FontanaRGAS06,
    author = {Francesca Arcelli Fontana and
    Claudia Raibulet and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol and
    Jason McC. Smith},
    title = {Design Pattern Detection for Reverse Engineering},
    booktitle = {WCRE},
    year = {2006},
    pages = {316},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.23},
    crossref = {DBLP:conf/wcre/2006}
    }
  • A. Zaidman, S. Demeyer, B. Adams, K. D. Schutter, G. Hoffman, and B. D. Ruyck, “Regaining lost knowledge through dynamic analysis and aspect orientation,” in Csmr, 2006, pp. 91-102.
    [Bibtex]
    @inproceedings{conf/csmr/ZaidmanDASHR06,
    author = {Andy Zaidman and
    Serge Demeyer and
    Bram Adams and
    Kris De Schutter and
    Ghislain Hoffman and
    Bernard De Ruyck},
    title = {Regaining Lost Knowledge through Dynamic Analysis and Aspect
    Orientation},
    booktitle = {CSMR},
    year = {2006},
    pages = {91-102},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.45},
    crossref = {DBLP:conf/csmr/2006}
    }
  • R. Koschke, A. Walenstein, and E. Merlo, “06301 abstracts collection — duplication, redundancy, and similarity in software,” in Duplication, redundancy, and similarity in software, 2006.
    [Bibtex]
    @inproceedings{conf/dagstuhl/KoschkeWM06,
    author = {Rainer Koschke and
    Andrew Walenstein and
    Ettore Merlo},
    title = {06301 Abstracts Collection -- Duplication, Redundancy, and
    Similarity in Software},
    booktitle = {Duplication, Redundancy, and Similarity in Software},
    year = {2006},
    ee = {http://drops.dagstuhl.de/opus/volltexte/2007/972},
    crossref = {DBLP:conf/dagstuhl/2006P6301}
    }
  • F. B. e Abreu, C. Calero, Y. Guéhéneuc, M. Lanza, and H. A. Sahraoui, “Quantitative approaches in object-oriented software engineering,” in Ecoop workshops, 2006, pp. 87-96.
    [Bibtex]
    @inproceedings{conf/ecoopw/AbreuCGLS06,
    author = {Fernando Brito e Abreu and
    Coral Calero and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Michele Lanza and
    Houari A. Sahraoui},
    title = {Quantitative Approaches in Object-Oriented Software Engineering},
    booktitle = {ECOOP Workshops},
    year = {2006},
    pages = {87-96},
    ee = {http://dx.doi.org/10.1007/978-3-540-71774-4_10},
    crossref = {DBLP:conf/ecoopw/2006}
    }
  • O. Kaczor, Y. Guéhéneuc, and S. Hamel, “Efficient identification of design patterns with bit-vector algorithm,” in Csmr, 2006, pp. 175-184.
    [Bibtex]
    @inproceedings{conf/csmr/KaczorGH06,
    author = {Olivier Kaczor and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Sylvie Hamel},
    title = {Efficient Identification of Design Patterns with Bit-vector
    Algorithm},
    booktitle = {CSMR},
    year = {2006},
    pages = {175-184},
    ee = {http://doi.ieeecomputersociety.org/10.1109/CSMR.2006.25},
    crossref = {DBLP:conf/csmr/2006}
    }
  • S. Galice, V. Legrand, M. Minier, J. Mullins, and S. Ubéda, “A history-based framework to build trust management systems,” in Securecomm, 2006, pp. 1-7.
    [Bibtex]
    @inproceedings{conf/securecomm/GaliceLMMU06,
    author = {Samuel Galice and
    V{\'e}ronique Legrand and
    Marine Minier and
    John Mullins and
    St{\'e}phane Ub{\'e}da},
    title = {A History-Based Framework to Build Trust Management Systems},
    booktitle = {SecureComm},
    year = {2006},
    pages = {1-7},
    ee = {http://doi.ieeecomputersociety.org/10.1109/SECCOMW.2006.359580},
    crossref = {DBLP:conf/securecomm/2006}
    }
  • E. Merlo, D. Letarte, and G. Antoniol, “Insider and ousider threat-sensitive sql injection vulnerability analysis in php,” in Wcre, 2006, pp. 147-156.
    [Bibtex]
    @inproceedings{conf/wcre/MerloLA06,
    author = {Ettore Merlo and
    Dominic Letarte and
    Giuliano Antoniol},
    title = {Insider and Ousider Threat-Sensitive SQL Injection Vulnerability
    Analysis in PHP},
    booktitle = {WCRE},
    year = {2006},
    pages = {147-156},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WCRE.2006.33},
    crossref = {DBLP:conf/wcre/2006}
    }
  • S. Bouktif, H. A. Sahraoui, and G. Antoniol, “Simulated annealing for improving software quality prediction,” in Gecco, 2006, pp. 1893-1900.
    [Bibtex]
    @inproceedings{conf/gecco/BouktifSA06,
    author = {Salah Bouktif and
    Houari A. Sahraoui and
    Giuliano Antoniol},
    title = {Simulated annealing for improving software quality prediction},
    booktitle = {GECCO},
    year = {2006},
    pages = {1893-1900},
    ee = {http://doi.acm.org/10.1145/1143997.1144313},
    crossref = {DBLP:conf/gecco/2006}
    }
  • Y. Guéhéneuc, “Taupe: towards understanding program comprehension,” in Cascon, 2006, pp. 1-13.
    [Bibtex]
    @inproceedings{conf/cascon/Gueheneuc06,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {TAUPE: towards understanding program comprehension},
    booktitle = {CASCON},
    year = {2006},
    pages = {1-13},
    ee = {http://doi.acm.org/10.1145/1188966.1188968},
    crossref = {DBLP:conf/cascon/2006}
    }

2005

  • G. Antoniol and Y. Guéhéneuc, “Feature identification: a novel approach and a case study,” in Icsm, 2005, pp. 357-366.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolG05,
    author = {Giuliano Antoniol and
    Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc},
    title = {Feature Identification: A Novel Approach and a Case Study},
    booktitle = {ICSM},
    year = {2005},
    pages = {357-366},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.48},
    crossref = {DBLP:conf/icsm/2005}
    }
  • J. I. Maletic, G. Antoniol, J. Cleland-Huang, and J. H. Hayes, “3rd international workshop on traceability in emerging forms of software engineering (tefse 2005),” in Ase, 2005, p. 462.
    [Bibtex]
    @inproceedings{conf/kbse/MaleticACH05,
    author = {Jonathan I. Maletic and
    Giuliano Antoniol and
    Jane Cleland-Huang and
    Jane Huffman Hayes},
    title = {3rd international workshop on traceability in emerging forms
    of software engineering (TEFSE 2005)},
    booktitle = {ASE},
    year = {2005},
    pages = {462},
    ee = {http://doi.acm.org/10.1145/1101908.1102002},
    crossref = {DBLP:conf/kbse/2005}
    }
  • M. Desmarais and X. Pu, “Computer adaptive testing: comparison of a probabilistic network approach with item response theory,” in User modeling, 2005, pp. 392-396.
    [Bibtex]
    @inproceedings{conf/um/DesmaraisP05,
    author = {Michel Desmarais and
    Xiaoming Pu},
    title = {Computer Adaptive Testing: Comparison of a Probabilistic
    Network Approach with Item Response Theory},
    booktitle = {User Modeling},
    year = {2005},
    pages = {392-396},
    ee = {http://dx.doi.org/10.1007/11527886_51},
    crossref = {DBLP:conf/um/2005}
    }
  • G. Antoniol, M. Ceccarelli, and A. Petrosino, “Microarray image addressing based on the radon transform,” in Icip (1), 2005, pp. 13-16.
    [Bibtex]
    @inproceedings{conf/icip/AntoniolCP05,
    author = {Giuliano Antoniol and
    Michele Ceccarelli and
    Alfredo Petrosino},
    title = {Microarray image addressing based on the Radon transform},
    booktitle = {ICIP (1)},
    year = {2005},
    pages = {13-16},
    ee = {http://dx.doi.org/10.1109/ICIP.2005.1529675},
    crossref = {DBLP:conf/icip/2005}
    }
  • M. Salah, S. Mancoridis, G. Antoniol, and M. D. Penta, “Towards employing use-cases and dynamic analysis to comprehend mozilla,” in Icsm, 2005, pp. 639-642.
    [Bibtex]
    @inproceedings{conf/icsm/SalahMAP05,
    author = {Maher Salah and
    Spiros Mancoridis and
    Giuliano Antoniol and
    Massimiliano Di Penta},
    title = {Towards Employing Use-Cases and Dynamic Analysis to Comprehend
    Mozilla},
    booktitle = {ICSM},
    year = {2005},
    pages = {639-642},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.94},
    crossref = {DBLP:conf/icsm/2005}
    }
  • M. Desmarais, S. Fu, and X. Pu, “Tradeoff analysis between knowledge assessment approaches,” in Aied, 2005, pp. 209-216.
    [Bibtex]
    @inproceedings{conf/aied/DesmaraisFP05,
    author = {Michel Desmarais and
    Shunkai Fu and
    Xiaoming Pu},
    title = {Tradeoff analysis between knowledge assessment approaches},
    booktitle = {AIED},
    year = {2005},
    pages = {209-216},
    ee = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1311},
    crossref = {DBLP:conf/aied/2005}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories,” in Msr, 2005.
    [Bibtex]
    @inproceedings{conf/msr/AntoniolRV05,
    author = {Giuliano Antoniol and
    Vincenzo Fabio Rollo and
    Gabriele Venturi},
    title = {Linear predictive coding and cepstrum coefficients for mining
    time variant information from software repositories},
    booktitle = {MSR},
    year = {2005},
    ee = {http://doi.acm.org/10.1145/1083142.1083156},
    crossref = {DBLP:conf/msr/2005}
    }
  • C. D. Grosso, G. Antoniol, M. D. Penta, P. Galinier, and E. Merlo, “Improving network applications security: a new heuristic to generate stress testing data,” in Gecco, 2005, pp. 1037-1043.
    [Bibtex]
    @inproceedings{conf/gecco/GrossoAPGM05,
    author = {Concettina Del Grosso and
    Giuliano Antoniol and
    Massimiliano Di Penta and
    Philippe Galinier and
    Ettore Merlo},
    title = {Improving network applications security: a new heuristic
    to generate stress testing data},
    booktitle = {GECCO},
    year = {2005},
    pages = {1037-1043},
    ee = {http://doi.acm.org/10.1145/1068009.1068185},
    crossref = {DBLP:conf/gecco/2005}
    }
  • G. Antoniol, M. D. Penta, and M. Harman, “Search-based techniques applied to optimization of project planning for a massive maintenance project,” in Icsm, 2005, pp. 240-249.
    [Bibtex]
    @inproceedings{conf/icsm/AntoniolPH05,
    author = {Giuliano Antoniol and
    Massimiliano Di Penta and
    Mark Harman},
    title = {Search-Based Techniques Applied to Optimization of Project
    Planning for a Massive Maintenance Project},
    booktitle = {ICSM},
    year = {2005},
    pages = {240-249},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.2005.79},
    crossref = {DBLP:conf/icsm/2005}
    }
  • A. Fellah and J. Mullins, “Admissible interference by typing for cryptographic protocols,” in Icics, 2005, pp. 123-135.
    [Bibtex]
    @inproceedings{conf/icics/FellahM05,
    author = {Alaaeddine Fellah and
    John Mullins},
    title = {Admissible Interference by Typing for Cryptographic Protocols},
    booktitle = {ICICS},
    year = {2005},
    pages = {123-135},
    ee = {http://dx.doi.org/10.1007/11602897_11},
    crossref = {DBLP:conf/icics/2005}
    }
  • G. Antoniol, V. F. Rollo, and G. Venturi, “Detecting groups of co-changing files in cvs repositories,” in Iwpse, 2005, pp. 23-32.
    [Bibtex]
    @inproceedings{conf/iwpse/AntoniolRV05,
    author = {Giuliano Antoniol and
    Vincenzo Fabio Rollo and
    Gabriele Venturi},
    title = {Detecting groups of co-changing files in CVS repositories},
    booktitle = {IWPSE},
    year = {2005},
    pages = {23-32},
    ee = {http://doi.ieeecomputersociety.org/10.1109/IWPSE.2005.11},
    crossref = {DBLP:conf/iwpse/2005}
    }
  • A. Ouardani, S. Pierre, and H. Boucheneb, “A secure protocol for mobile agents in hostile environment,” in Mata, 2005, pp. 192-202.
    [Bibtex]
    @inproceedings{conf/mata/OuardaniPB05,
    author = {Abdelhamid Ouardani and
    Samuel Pierre and
    Hanifa Boucheneb},
    title = {A Secure Protocol for Mobile Agents in Hostile Environment},
    booktitle = {MATA},
    year = {2005},
    pages = {192-202},
    ee = {http://dx.doi.org/10.1007/11569510_19},
    crossref = {DBLP:conf/mata/2005}
    }
  • Y. Guéhéneuc and G. Antoniol, “Report on the 1st international workshop on design pattern theory and practice,” in Step, 2005, pp. 193-195.
    [Bibtex]
    @inproceedings{conf/step/GueheneucA05,
    author = {Yann-Ga{\"e}l Gu{\'e}h{\'e}neuc and
    Giuliano Antoniol},
    title = {Report on the 1st International Workshop on Design Pattern
    Theory and Practice},
    booktitle = {STEP},
    year = {2005},
    pages = {193-195},
    ee = {http://doi.ieeecomputersociety.org/10.1109/STEP.2005.20},
    crossref = {DBLP:conf/step/2005}
    }
  • R. Hadjidj and H. Boucheneb, “Much compact time petri net state class spaces useful to restore ctl* properties,” in Acsd, 2005, pp. 224-233.
    [Bibtex]
    @inproceedings{conf/acsd/HadjidjB05,
    author = {Rachid Hadjidj and
    Hanifa Boucheneb},
    title = {Much Compact Time Petri Net State Class Spaces Useful to
    Restore CTL* Properties},
    booktitle = {ACSD},
    year = {2005},
    pages = {224-233},
    ee = {http://doi.ieeecomputersociety.org/10.1109/ACSD.2005.28},
    crossref = {DBLP:conf/acsd/2005}
    }
  • M. Desmarais, “Web log session analyzer: integrating parsing and logic programming into a data mart architecture,” in Web intelligence, 2005, pp. 794-797.
    [Bibtex]
    @inproceedings{conf/webi/Desmarais05,
    author = {Michel Desmarais},
    title = {Web Log Session Analyzer: Integrating Parsing and Logic
    Programming into a Data Mart Architecture},
    booktitle = {Web Intelligence},
    year = {2005},
    pages = {794-797},
    ee = {http://doi.ieeecomputersociety.org/10.1109/WI.2005.159},
    crossref = {DBLP:conf/webi/2005}
    }

Recent Tweets