callback( { "result":{ "query":":facetid:toc:\"db/conf/icse/icse2010-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.62" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"66", "@dc":"66", "@oc":"66", "@id":"43408393", "text":":facetid:toc:db/conf/icse/icse2010-1.bht" } }, "hits":{ "@total":"66", "@computed":"66", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4935775", "info":{"authors":{"author":[{"@pid":"98/6356","text":"Bram Adams"},{"@pid":"50/23","text":"Zhen Ming Jiang"},{"@pid":"h/AhmedEHassan","text":"Ahmed E. Hassan"}]},"title":"Identifying crosscutting concerns using historical code changes.","venue":"ICSE","pages":"305-314","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/AdamsJH10","doi":"10.1145/1806799.1806846","ee":"https://doi.org/10.1145/1806799.1806846","url":"https://dblp.org/rec/conf/icse/AdamsJH10"}, "url":"URL#4935775" }, { "@score":"1", "@id":"4935782", "info":{"authors":{"author":[{"@pid":"48/3637","text":"Shay Artzi"},{"@pid":"08/7028","text":"Julian Dolby"},{"@pid":"32/524","text":"Frank Tip"},{"@pid":"p/MarcoPistoia","text":"Marco Pistoia"}]},"title":"Practical fault localization for dynamic web applications.","venue":"ICSE","pages":"265-274","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ArtziDTP10","doi":"10.1145/1806799.1806840","ee":"https://doi.org/10.1145/1806799.1806840","url":"https://dblp.org/rec/conf/icse/ArtziDTP10"}, "url":"URL#4935782" }, { "@score":"1", "@id":"4935784", "info":{"authors":{"author":[{"@pid":"78/3305","text":"Hazeline U. Asuncion"},{"@pid":"78/2352","text":"Arthur U. Asuncion"},{"@pid":"t/RichardNTaylor","text":"Richard N. Taylor"}]},"title":"Software traceability with topic modeling.","venue":"ICSE","pages":"95-104","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/AsuncionAT10","doi":"10.1145/1806799.1806817","ee":"https://doi.org/10.1145/1806799.1806817","url":"https://dblp.org/rec/conf/icse/AsuncionAT10"}, "url":"URL#4935784" }, { "@score":"1", "@id":"4935787", "info":{"authors":{"author":[{"@pid":"83/5261","text":"Alberto Bacchelli"},{"@pid":"53/6708","text":"Michele Lanza"},{"@pid":"43/5822","text":"Romain Robbes"}]},"title":"Linking e-mails and source code artifacts.","venue":"ICSE","pages":"375-384","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BacchelliLR10","doi":"10.1145/1806799.1806855","ee":"https://doi.org/10.1145/1806799.1806855","url":"https://dblp.org/rec/conf/icse/BacchelliLR10"}, "url":"URL#4935787" }, { "@score":"1", "@id":"4935795", "info":{"authors":{"author":[{"@pid":"68/0","text":"Andrew Begel"},{"@pid":"13/365","text":"Yit Phang Khoo"},{"@pid":"19/3622-1","text":"Thomas Zimmermann 0001"}]},"title":"Codebook: discovering and exploiting relationships in software repositories.","venue":"ICSE","pages":"125-134","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BegelKZ10","doi":"10.1145/1806799.1806821","ee":"https://doi.org/10.1145/1806799.1806821","url":"https://dblp.org/rec/conf/icse/BegelKZ10"}, "url":"URL#4935795" }, { "@score":"1", "@id":"4935801", "info":{"authors":{"author":{"@pid":"94/5744","text":"Eric Bodden"}},"title":"Efficient hybrid typestate analysis by determining continuation-equivalent states.","venue":"ICSE","pages":"5-14","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Bodden10","doi":"10.1145/1806799.1806805","ee":"https://doi.org/10.1145/1806799.1806805","url":"https://dblp.org/rec/conf/icse/Bodden10"}, "url":"URL#4935801" }, { "@score":"1", "@id":"4935807", "info":{"authors":{"author":[{"@pid":"51/1642","text":"Andrew Bragdon"},{"@pid":"r/StevenPReiss","text":"Steven P. Reiss"},{"@pid":"98/5185","text":"Robert C. Zeleznik"},{"@pid":"62/7547","text":"Suman Karumuri"},{"@pid":"07/722-3","text":"William Cheung 0003"},{"@pid":"62/7982","text":"Joshua Kaplan"},{"@pid":"32/7983","text":"Christopher Coleman"},{"@pid":"09/7982","text":"Ferdi Adeputra"},{"@pid":"48/4693","text":"Joseph J. LaViola Jr."}]},"title":"Code bubbles: rethinking the user interface paradigm of integrated development environments.","venue":"ICSE","pages":"455-464","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BragdonRZKCKCAL10","doi":"10.1145/1806799.1806866","ee":"https://doi.org/10.1145/1806799.1806866","url":"https://dblp.org/rec/conf/icse/BragdonRZKCKCAL10"}, "url":"URL#4935807" }, { "@score":"1", "@id":"4935814", "info":{"authors":{"author":[{"@pid":"23/5690","text":"Jacob Burnim"},{"@pid":"04/418","text":"Koushik Sen"}]},"title":"DETERMIN: inferring likely deterministic specifications of multithreaded programs.","venue":"ICSE","pages":"415-424","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/BurnimS10","doi":"10.1145/1806799.1806860","ee":"https://doi.org/10.1145/1806799.1806860","url":"https://dblp.org/rec/conf/icse/BurnimS10"}, "url":"URL#4935814" }, { "@score":"1", "@id":"4935837", "info":{"authors":{"author":[{"@pid":"71/3313","text":"Andreas Classen"},{"@pid":"83/3086","text":"Patrick Heymans"},{"@pid":"27/3416","text":"Pierre-Yves Schobbens"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Model checking lots of systems: efficient verification of temporal properties in software product lines.","venue":"ICSE","pages":"335-344","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ClassenHSLR10","doi":"10.1145/1806799.1806850","ee":"https://doi.org/10.1145/1806799.1806850","url":"https://dblp.org/rec/conf/icse/ClassenHSLR10"}, "url":"URL#4935837" }, { "@score":"1", "@id":"4935838", "info":{"authors":{"author":[{"@pid":"118/7794","text":"James A. Clause"},{"@pid":"35/805","text":"Alessandro Orso"}]},"title":"LEAKPOINT: pinpointing the causes of memory leaks.","venue":"ICSE","pages":"515-524","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/ClauseO10","doi":"10.1145/1806799.1806874","ee":"https://doi.org/10.1145/1806799.1806874","url":"https://dblp.org/rec/conf/icse/ClauseO10"}, "url":"URL#4935838" }, { "@score":"1", "@id":"4935840", "info":{"authors":{"author":[{"@pid":"c/JaneClelandHuang","text":"Jane Cleland-Huang"},{"@pid":"61/8164","text":"Adam Czauderna"},{"@pid":"70/8164","text":"Marek Gibiec"},{"@pid":"45/8164","text":"John Emenecker"}]},"title":"A machine learning approach for tracing regulatory codes to product specific requirements.","venue":"ICSE","pages":"155-164","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Cleland-HuangCGE10","doi":"10.1145/1806799.1806825","ee":"https://doi.org/10.1145/1806799.1806825","url":"https://dblp.org/rec/conf/icse/Cleland-HuangCGE10"}, "url":"URL#4935840" }, { "@score":"1", "@id":"4935850", "info":{"authors":{"author":[{"@pid":"82/3722","text":"Barthélémy Dagenais"},{"@pid":"76/3064","text":"Harold Ossher"},{"@pid":"33/3184","text":"Rachel K. E. Bellamy"},{"@pid":"r/MartinPRobillard","text":"Martin P. Robillard"},{"@pid":"81/7057","text":"Jacqueline de Vries"}]},"title":"Moving into a new software project landscape.","venue":"ICSE","pages":"275-284","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/DagenaisOBRV10","doi":"10.1145/1806799.1806842","ee":"https://doi.org/10.1145/1806799.1806842","url":"https://dblp.org/rec/conf/icse/DagenaisOBRV10"}, "url":"URL#4935850" }, { "@score":"1", "@id":"4935854", "info":{"authors":{"author":[{"@pid":"47/3381","text":"Brian Demsky"},{"@pid":"l/PatrickLam","text":"Patrick Lam 0001"}]},"title":"Views: object-inspired concurrency control.","venue":"ICSE","pages":"395-404","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/DemskyL10","doi":"10.1145/1806799.1806858","ee":"https://doi.org/10.1145/1806799.1806858","url":"https://dblp.org/rec/conf/icse/DemskyL10"}, "url":"URL#4935854" }, { "@score":"1", "@id":"4935876", "info":{"authors":{"author":[{"@pid":"52/2589","text":"Jens Fendler"},{"@pid":"w/HeikeWinschiers","text":"Heike Winschiers-Theophilus"}]},"title":"Towards contextualised software engineering education: an African perspective.","venue":"ICSE","pages":"599-607","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FendlerW10","doi":"10.1145/1806799.1806888","ee":"https://doi.org/10.1145/1806799.1806888","url":"https://dblp.org/rec/conf/icse/FendlerW10"}, "url":"URL#4935876" }, { "@score":"1", "@id":"4935877", "info":{"authors":{"author":[{"@pid":"48/5007","text":"Fabiano Cutigi Ferrari"},{"@pid":"71/8164","text":"Rachel Burrows"},{"@pid":"80/3784","text":"Otávio Augusto Lazzarini Lemos"},{"@pid":"g/AlessandroFGarcia","text":"Alessandro Garcia 0001"},{"@pid":"03/335","text":"Eduardo Figueiredo 0001"},{"@pid":"39/2172","text":"Nélio Cacho"},{"@pid":"39/1923","text":"Frederico Lopes"},{"@pid":"35/8164","text":"Nathalia Temudo"},{"@pid":"57/5268","text":"Liana Silva"},{"@pid":"58/232","text":"Sérgio Soares"},{"@pid":"26/3330","text":"Awais Rashid"},{"@pid":"79/216","text":"Paulo César Masiero"},{"@pid":"b/TVBatista","text":"Thaís Vasconcelos Batista"},{"@pid":"28/2292","text":"José Carlos Maldonado"}]},"title":"An exploratory study of fault-proneness in evolving aspect-oriented programs.","venue":"ICSE","pages":"65-74","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FerrariBLGFCLTSSRMBM10","doi":"10.1145/1806799.1806813","ee":"https://doi.org/10.1145/1806799.1806813","url":"https://dblp.org/rec/conf/icse/FerrariBLGFCLTSSRMBM10"}, "url":"URL#4935877" }, { "@score":"1", "@id":"4935883", "info":{"authors":{"author":[{"@pid":"67/6766-1","text":"Thomas Fritz 0001"},{"@pid":"95/712","text":"Gail C. Murphy"}]},"title":"Using information fragments to answer the questions developers ask.","venue":"ICSE","pages":"175-184","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FritzM10","doi":"10.1145/1806799.1806828","ee":"https://doi.org/10.1145/1806799.1806828","url":"https://dblp.org/rec/conf/icse/FritzM10"}, "url":"URL#4935883" }, { "@score":"1", "@id":"4935884", "info":{"authors":{"author":[{"@pid":"67/6766-1","text":"Thomas Fritz 0001"},{"@pid":"44/8164","text":"Jingwen Ou"},{"@pid":"95/712","text":"Gail C. Murphy"},{"@pid":"02/3722","text":"Emerson R. Murphy-Hill"}]},"title":"A degree-of-knowledge model to capture source code familiarity.","venue":"ICSE","pages":"385-394","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/FritzOMM10","doi":"10.1145/1806799.1806856","ee":"https://doi.org/10.1145/1806799.1806856","url":"https://dblp.org/rec/conf/icse/FritzOMM10"}, "url":"URL#4935884" }, { "@score":"1", "@id":"4935886", "info":{"authors":{"author":[{"@pid":"64/6605","text":"Mark Gabel"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"}]},"title":"Online inference and enforcement of temporal properties.","venue":"ICSE","pages":"15-24","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GabelS10","doi":"10.1145/1806799.1806806","ee":"https://doi.org/10.1145/1806799.1806806","url":"https://dblp.org/rec/conf/icse/GabelS10"}, "url":"URL#4935886" }, { "@score":"1", "@id":"4935898", "info":{"authors":{"author":[{"@pid":"43/6015","text":"Milos Gligoric 0001"},{"@pid":"15/2242","text":"Tihomir Gvero"},{"@pid":"82/4670","text":"Vilas Jagannath"},{"@pid":"k/SarfrazKhurshid","text":"Sarfraz Khurshid"},{"@pid":"k/ViktorKuncak","text":"Viktor Kuncak"},{"@pid":"48/3911","text":"Darko Marinov"}]},"title":"Test generation through programming in UDITA.","venue":"ICSE","pages":"225-234","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GligoricGJKKM10","doi":"10.1145/1806799.1806835","ee":"https://doi.org/10.1145/1806799.1806835","url":"https://dblp.org/rec/conf/icse/GligoricGJKKM10"}, "url":"URL#4935898" }, { "@score":"1", "@id":"4935903", "info":{"authors":{"author":[{"@pid":"82/3504","text":"Tony Gorschek"},{"@pid":"t/EwanDTempero","text":"Ewan D. Tempero"},{"@pid":"16/4783","text":"Lefteris Angelis"}]},"title":"A large-scale empirical study of practitioners' use of object-oriented concepts.","venue":"ICSE","pages":"115-124","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GorschekTA10","doi":"10.1145/1806799.1806820","ee":"https://doi.org/10.1145/1806799.1806820","url":"https://dblp.org/rec/conf/icse/GorschekTA10"}, "url":"URL#4935903" }, { "@score":"1", "@id":"4935904", "info":{"authors":{"author":[{"@pid":"p/MGrechanik","text":"Mark Grechanik"},{"@pid":"35/2467","text":"Chen Fu"},{"@pid":"98/2931-3","text":"Qing Xie 0003"},{"@pid":"78/7505","text":"Collin McMillan"},{"@pid":"02/320","text":"Denys Poshyvanyk"},{"@pid":"91/6764","text":"Chad M. Cumby"}]},"title":"A search engine for finding highly relevant applications.","venue":"ICSE","pages":"475-484","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GrechanikFXMPC10","doi":"10.1145/1806799.1806868","ee":"https://doi.org/10.1145/1806799.1806868","url":"https://dblp.org/rec/conf/icse/GrechanikFXMPC10"}, "url":"URL#4935904" }, { "@score":"1", "@id":"4935908", "info":{"authors":{"author":[{"@pid":"32/3857","text":"Zhongxian Gu"},{"@pid":"47/1088","text":"Earl T. Barr"},{"@pid":"35/5762","text":"David J. Hamilton"},{"@pid":"s/ZhendongSu","text":"Zhendong Su 0001"}]},"title":"Has the bug really been fixed?","venue":"ICSE","pages":"55-64","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GuBHS10","doi":"10.1145/1806799.1806812","ee":"https://doi.org/10.1145/1806799.1806812","url":"https://dblp.org/rec/conf/icse/GuBHS10"}, "url":"URL#4935908" }, { "@score":"1", "@id":"4935912", "info":{"authors":{"author":[{"@pid":"32/193","text":"Philip J. Guo"},{"@pid":"19/3622-1","text":"Thomas Zimmermann 0001"},{"@pid":"91/1758","text":"Nachiappan Nagappan"},{"@pid":"24/4066","text":"Brendan Murphy"}]},"title":"Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows.","venue":"ICSE","pages":"495-504","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/GuoZNM10","doi":"10.1145/1806799.1806871","ee":"https://doi.org/10.1145/1806799.1806871","url":"https://dblp.org/rec/conf/icse/GuoZNM10"}, "url":"URL#4935912" }, { "@score":"1", "@id":"4935922", "info":{"authors":{"author":[{"@pid":"h/OritHazzan","text":"Orit Hazzan"},{"@pid":"57/6550","text":"Yael Dubinsky"}]},"title":"A HOT --- Human, Organizational and Technological --- framework for a software engineering course.","venue":"ICSE","pages":"559-566","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HazzanD10","doi":"10.1145/1806799.1806880","ee":"https://doi.org/10.1145/1806799.1806880","url":"https://dblp.org/rec/conf/icse/HazzanD10"}, "url":"URL#4935922" }, { "@score":"1", "@id":"4935931", "info":{"authors":{"author":[{"@pid":"33/4346","text":"Rashina Hoda"},{"@pid":"n/JamesNoble","text":"James Noble 0001"},{"@pid":"51/1176","text":"Stuart Marshall"}]},"title":"Organizing self-organizing teams.","venue":"ICSE","pages":"285-294","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HodaNM10","doi":"10.1145/1806799.1806843","ee":"https://doi.org/10.1145/1806799.1806843","url":"https://dblp.org/rec/conf/icse/HodaNM10"}, "url":"URL#4935931" }, { "@score":"1", "@id":"4935935", "info":{"authors":{"author":[{"@pid":"18/1889","text":"Reid Holmes"},{"@pid":"43/511","text":"Robert J. Walker"}]},"title":"Customized awareness: recommending relevant external change events.","venue":"ICSE","pages":"465-474","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HolmesW10","doi":"10.1145/1806799.1806867","ee":"https://doi.org/10.1145/1806799.1806867","url":"https://dblp.org/rec/conf/icse/HolmesW10"}, "url":"URL#4935935" }, { "@score":"1", "@id":"4935940", "info":{"authors":{"author":[{"@pid":"20/8164","text":"Amna Humayun"},{"@pid":"33/8164","text":"Wafa Basit"},{"@pid":"96/220","text":"Ghulam A. Farrukh"},{"@pid":"94/3881","text":"Fakhar Lodhi"},{"@pid":"68/8164","text":"Rabea Aden"}]},"title":"An empirical analysis of team review approaches for teaching quality software development.","venue":"ICSE","pages":"567-575","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/HumayunBFLA10","doi":"10.1145/1806799.1806882","ee":"https://doi.org/10.1145/1806799.1806882","url":"https://dblp.org/rec/conf/icse/HumayunBFLA10"}, "url":"URL#4935940" }, { "@score":"1", "@id":"4935947", "info":{"authors":{"author":{"@pid":"j/MehdiJazayeri","text":"Mehdi Jazayeri"}},"title":"Panel on master's degree programs in software engineering.","venue":"ICSE","pages":"587","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/Jazayeri10","doi":"10.1145/1806799.1806885","ee":"https://doi.org/10.1145/1806799.1806885","url":"https://dblp.org/rec/conf/icse/Jazayeri10"}, "url":"URL#4935947" }, { "@score":"1", "@id":"4935948", "info":{"authors":{"author":[{"@pid":"61/4923","text":"Susmit Jha"},{"@pid":"g/SumitGulwani","text":"Sumit Gulwani"},{"@pid":"s/SanjitASeshia","text":"Sanjit A. Seshia"},{"@pid":"t/AshishTiwari","text":"Ashish Tiwari 0001"}]},"title":"Oracle-guided component-based program synthesis.","venue":"ICSE","pages":"215-224","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/JhaGST10","doi":"10.1145/1806799.1806833","ee":"https://doi.org/10.1145/1806799.1806833","url":"https://dblp.org/rec/conf/icse/JhaGST10"}, "url":"URL#4935948" }, { "@score":"1", "@id":"4935958", "info":{"authors":{"author":{"@pid":"79/1849","text":"David King"}},"title":"Planning for climate change in the 21st century.","venue":"ICSE","pages":"3","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/icse/King10","doi":"10.1145/1806799.1806803","ee":"https://doi.org/10.1145/1806799.1806803","url":"https://dblp.org/rec/conf/icse/King10"}, "url":"URL#4935958" } ] } } } )