Software Engineering - International Summer Schools, ISSSE 2009-2011, Salerno, Italy. Revised Tutorial Lectures
暂无分享,去创建一个
[1] Ehud Reiter,et al. Book Reviews: Building Natural Language Generation Systems , 2000, CL.
[2] Yann-Gaël Guéhéneuc,et al. Mining the Lexicon Used by Programmers during Sofware Evolution , 2007, 2007 IEEE International Conference on Software Maintenance.
[3] Ted J. Biggerstaff,et al. The concept assignment problem in program understanding , 1993, [1993] Proceedings Working Conference on Reverse Engineering.
[4] Grady Booch. Object-oriented design , 1982, ALET.
[5] Per Runeson,et al. Detection of Duplicate Defect Reports Using Natural Language Processing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[6] Yann-Gaël Guéhéneuc,et al. Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques , 2010, 2010 14th European Conference on Software Maintenance and Reengineering.
[7] Rachel K. E. Bellamy,et al. Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks , 2008, CHI.
[8] Westley Weimer,et al. Automatic documentation inference for exceptions , 2008, ISSTA '08.
[9] Nicolas Anquetil,et al. A study of the documentation essential to software maintenance , 2005, SIGDOC '05.
[10] Emily Hill,et al. Mining source code to automatically split identifiers for software analysis , 2009, 2009 6th IEEE International Working Conference on Mining Software Repositories.
[11] Yuanyuan Zhou,et al. aComment: mining annotations from comments and code to detect interrupt related concurrency bugs , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[12] Paolo Tonella,et al. Nomen est omen: analyzing the language of function identifiers , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).
[13] Emily Hill,et al. Using natural language program analysis to locate and understand action-oriented concerns , 2007, AOSD.
[14] Stéphane Ducasse,et al. Semantic clustering: Identifying topics in source code , 2007, Inf. Softw. Technol..
[15] David W. Binkley,et al. Normalizing Source Code Vocabulary , 2010, 2010 17th Working Conference on Reverse Engineering.
[16] Paolo Tonella,et al. Restructuring program identifier names , 2000, Proceedings 2000 International Conference on Software Maintenance.
[17] Mira Kajko-Mattsson,et al. A Survey of Documentation Practice within Corrective Maintenance , 2004, Empirical Software Engineering.
[18] Ted J. Biggerstaff,et al. Design recovery for maintenance and reuse , 1989, Computer.
[19] Ted Briscoe,et al. High Precision Extraction of Grammatical Relations , 2001, COLING.
[20] Mordechai Nisenson,et al. A Traceability Technique for Specifications , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[21] W. Bruce Croft,et al. Probabilistic techniques for phrase extraction , 2001, Inf. Process. Manag..
[22] Premkumar T. Devanbu,et al. Recommending random walks , 2007, ESEC-FSE '07.
[23] Einar W. Høst,et al. Canonical Method Names for Java - Using Implementation Semantics to Identify Synonymous Verbs , 2010, SLE.
[24] Andrew Begel,et al. Cognitive Perspectives on the Role of Naming in Computer Programs , 2006, PPIG.
[25] Katsuro Inoue,et al. A Program Slicing Approach for Locating Functional Concerns , 2007 .
[26] Stanley M. Sutton,et al. N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[27] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[28] Emily Hill,et al. Analysing source code: looking for useful verbdirect object pairs in all the right places , 2008, IET Softw..
[29] Avinash C. Kak,et al. Retrieval from software libraries for bug localization: a comparative study of generic and composite text models , 2011, MSR '11.
[30] Ted Tenny,et al. Program Readability: Procedures Versus Comments , 1988, IEEE Trans. Software Eng..
[31] Pierre N. Robillard,et al. Schematic pseudocode for program constructs and its computer automation by SCHEMACODE , 1986, CACM.
[32] Timothy E. Erickson. An automated FORTRAN documenter , 1982, SIGDOC '82.
[33] Yuanyuan Zhou,et al. /*icomment: bugs or bad comments?*/ , 2007, SOSP.
[34] Andrian Marcus,et al. An information retrieval approach to concept location in source code , 2004, 11th Working Conference on Reverse Engineering.
[35] Bogdan Dit,et al. Using Data Fusion and Web Mining to Support Feature Location in Software , 2010, 2010 IEEE 18th International Conference on Program Comprehension.
[36] Alfred V. Aho,et al. CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[37] Genny Tortora,et al. Assessing IR-based traceability recovery tools through controlled experiments , 2009, Empirical Software Engineering.
[38] Chao Liu,et al. Recovering Relationships between Documentation and Source Code based on the Characteristics of Software Engineering , 2009, Electron. Notes Theor. Comput. Sci..
[39] Denys Poshyvanyk,et al. Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code , 2007, 15th IEEE International Conference on Program Comprehension (ICPC '07).
[40] Gerhard Fischer,et al. Helgon: extending the retrieval by reformulation paradigm , 1989, CHI '89.
[41] Collin McMillan,et al. Combining textual and structural analysis of software artifacts for traceability link recovery , 2009, 2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering.
[42] Giuliano Antoniol,et al. Analyzing the Evolution of the Source Code Vocabulary , 2009, 2009 13th European Conference on Software Maintenance and Reengineering.
[43] Einar W. Høst,et al. The Java Programmer's Phrase Book , 2009, SLE.
[44] Sushil Krishna Bajracharya,et al. Mining concepts from code with probabilistic topic models , 2007, ASE.
[45] Gail E. Kaiser,et al. An Information Retrieval Approach For Automatically Constructing Software Libraries , 1991, IEEE Trans. Software Eng..
[46] Scott N. Woodfield,et al. The effect of modularization and comments on program comprehension , 1981, ICSE '81.
[47] Frank Tip,et al. A survey of program slicing techniques , 1994, J. Program. Lang..
[48] Hal Berghel,et al. An interactive source commenter for Prolog programs , 1990, SIGDOC '90.
[49] Susan Elliott Sim,et al. Cross-artifact traceability using lightweight links , 2009, 2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering.
[50] Scott Henninger,et al. Using iterative refinement to find reusable software , 1994, IEEE Software.
[51] Denys Poshyvanyk,et al. JIRiSS - an Eclipse plug-in for Source Code Exploration , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[52] Yann-Gaël Guéhéneuc,et al. Feature Identification: An Epidemiological Metaphor , 2006, IEEE Transactions on Software Engineering.
[53] David W. Binkley,et al. Leveraged Quality Assessment using Information Retrieval Techniques , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[54] Santonu Sarkar,et al. Mining business topics in source code using latent dirichlet allocation , 2008, ISEC '08.
[55] Martin P. Robillard,et al. Suade: Topology-Based Searches for Software Investigation , 2007, 29th International Conference on Software Engineering (ICSE'07).
[56] Emily Hill,et al. Automatically capturing source code context of NL-queries for software maintenance and reuse , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[57] Lori L. Pollock,et al. Towards supporting on-demand virtual remodularization using program graphs , 2006, AOSD.
[58] Jean Scholtz,et al. The Roles Beacons Play in Comprehension for Novice and Expert Programmers , 2002, PPIG.
[59] Emily Hill,et al. Towards automatically generating summary comments for Java methods , 2010, ASE.
[60] Lori Pollock,et al. An Empirical Study of the Concept Assignment Problem , 2007 .
[61] Emily Hill,et al. Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[62] Giuliano Antoniol,et al. Recovering Traceability Links between Code and Documentation , 2002, IEEE Trans. Software Eng..
[63] Robert D. Macredie,et al. The effects of comments and identifier names on program comprehensibility: an experimental investigation , 1996, J. Program. Lang..
[64] Emily Hill,et al. AMAP: automatically mining abbreviation expansions in programs to enhance software maintenance tools , 2008, MSR '08.
[65] David W. Binkley,et al. Impact of Limited Memory Resources , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[66] L. Erlikh,et al. Leveraging legacy system dollars for e-business , 2000 .
[67] Andrian Marcus,et al. On the Use of Domain Terms in Source Code , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[68] Martin P. Robillard,et al. Automatic generation of suggestions for program investigation , 2005, ESEC/FSE-13.
[69] Andrian Marcus,et al. Recovering documentation-to-source-code traceability links using latent semantic indexing , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[70] Lori L. Pollock,et al. Generating Parameter Comments and Integrating with Method Summaries , 2011, 2011 IEEE 19th International Conference on Program Comprehension.
[71] Clémentine Nebut,et al. Automatic Extraction of a WordNet-Like Identifier Network from Software , 2010, 2010 IEEE 18th International Conference on Program Comprehension.
[72] Emily Hill,et al. Exploring the neighborhood with dora to expedite software maintenance , 2007, ASE '07.
[73] Yang Cai,et al. Api hyperlinking via structural overlap , 2009, ESEC/SIGSOFT FSE.
[74] Einar W. Høst,et al. The Programmer's Lexicon, Volume I: The Verbs , 2007 .
[75] Václav Rajlich,et al. Case study of feature location using dependence graph , 2000, Proceedings IWPC 2000. 8th International Workshop on Program Comprehension.
[76] Donald E. Knuth,et al. Literate Programming , 1984, Comput. J..
[77] Katsuro Inoue,et al. Building Domain Specific Dictionaries of Verb-Object Relation from Source Code , 2011, 2011 15th European Conference on Software Maintenance and Reengineering.
[78] Martin P. Robillard,et al. Concern graphs: finding and describing concerns using structural program dependencies , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[79] Denys Poshyvanyk,et al. Source Code Exploration with Google , 2006, 2006 22nd IEEE International Conference on Software Maintenance.
[80] Sana Malik. PARSING JAVA METHOD NAMES FOR IMPROVED SOFTWARE ANALYSIS , 2011 .
[81] Einar W. Høst,et al. Debugging Method Names , 2009, ECOOP.
[82] Manu Sridharan,et al. Thin slicing , 2007, PLDI '07.
[83] David W. Binkley,et al. Whats in a Name? A Study of Identifiers , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[84] Martin P. Robillard,et al. How effective developers investigate source code: an exploratory study , 2004, IEEE Transactions on Software Engineering.
[85] David W. Binkley,et al. Extracting Meaning from Abbreviated Identifiers , 2007, Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007).
[86] Markus Pizka,et al. Concise and consistent naming , 2005, 13th International Workshop on Program Comprehension (IWPC'05).
[87] David R. Karger,et al. Relo: Helping Users Manage Context during Interactive Exploratory Visualization of Large Codebases , 2006, VL/HCC.
[88] Dawn J Lawrie,et al. AN EMPIRICAL COMPARISON OF TECHNIQUES FOR EXTRACTING CONCEPT ABBREVIATIONS FROM IDENTIFIERS , 2006 .
[89] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[90] Sushil Krishna Bajracharya,et al. Sourcerer: mining and searching internet-scale software repositories , 2008, Data Mining and Knowledge Discovery.
[91] Letha H. Etzkorn,et al. Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation , 2008, 2008 15th Working Conference on Reverse Engineering.
[92] Amir Michail,et al. Assessing software libraries by browsing similar classes, functions and relationships , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[93] Lori L. Pollock,et al. Automatically detecting and describing high level actions within methods , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[94] James R. Larus,et al. Branch prediction for free , 1993, PLDI '93.
[95] Katsuhiko Gondow,et al. Toward mining "concept keywords" from identifiers in large software projects , 2005, MSR.
[96] Lori Pollock,et al. Integrating natural language and program structure information to improve software search and exploration , 2010 .
[97] David W. Binkley,et al. An empirical study of rules for well-formed identifiers , 2007, J. Softw. Maintenance Res. Pract..
[98] Susan T. Dumais,et al. The vocabulary problem in human-system communication , 1987, CACM.
[99] Denys Poshyvanyk,et al. The conceptual cohesion of classes , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).
[100] Mark T. Maybury,et al. Automatic Summarization , 2002, Computational Linguistics.