Mon 7 OctDisplayed time zone: Arizona change
08:45 - 09:00 | SCAM Opening SessionResearch Track at Fremont Chair(s): Coen De Roover Vrije Universiteit Brussel, Valentina Lenarduzzi University of Oulu | ||
09:00 - 10:00 | |||
09:00 60mKeynote | SCAM + VISSOFT Keynote: Code that Generates Visual Art Research Track Benoit Baudry Université de Montréal |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break ICSME Catering |
10:30 - 12:00 | Empirical StudiesResearch Track at Fremont Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
10:30 16mResearch paper | An Empirical Investigation Into the Use of Dockerfile Preprocessors for Docker Image Management Research Track Wataru Mabuchi Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Kenji Fujiwara Nara Women’s University, Hajimu Iida Nara Institute of Science and Technology | ||
10:47 16mResearch paper | How do Software Engineering Researchers Use GitHub? An Empirical Study of Artifacts & Impact Research Track Pre-print | ||
11:04 16mResearch paper | On the Investigation of Exception Pull Request Characteristics: Exploring the Apache Ecosystem Research Track João Correia PUC-Rio, Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello UFRJ, Brazil, Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira PUC-Rio, Igor Steinmacher Northern Arizona University, Marco Gerosa Northern Arizona University, Jairo Souza Federal University of Pernambuco (UFPE), Johny Arriel PUC-Rio Pre-print | ||
11:21 16mResearch paper | Software Quality Assurance Analytics: Enabling Software Engineers to Reflect on QA PracticesVideo Presentation Research Track Ali Khatami Delft University of Technology, Carolin Brandt Delft University of Technology, Andy Zaidman Delft University of Technology Pre-print | ||
11:40 20mLive Q&A | Discussion (Empirical Studies) Research Track |
12:00 - 13:30 | |||
13:30 - 15:00 | |||
13:30 16mResearch paper | Catching Smells in the Act: A GitHub Actions Workflow InvestigationVideo Presentation Research Track Ali Khatami Delft University of Technology, Cédric Willekens Delft University of Technology, Andy Zaidman Delft University of Technology Pre-print | ||
13:47 16mResearch paper | Toward Interactive Optimization of Source Code Differences: An Empirical Study of Its Performance Research Track DOI Pre-print | ||
14:04 16mResearch paper | On the Prevalence, Evolution, and Impact of Code Smells in Simulation Modelling Software Research Track Riasat Mahbub Dalhousie University, Masud Rahman Dalhousie University, Muhammad Ahsanul Habib Dalhousie University | ||
14:21 16mResearch paper | An Empirical Analysis of Git Commit Logs for Potential Inconsistency in Code Clones Research Track Pre-print File Attached | ||
14:40 20mLive Q&A | Discussion (Code Smells) Research Track |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break ICSME Catering |
15:30 - 17:00 | |||
15:30 16mResearch paper | Enhancing Recommendations of Composite Refactorings based on the Practice Research Track Ana Carla Bibiano Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Uchôa Federal University of Ceará, Daniel Tenório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Audrey Vasconcelos Federal University of Alagoas (UFAL), Rafael de Mello UFRJ, Brazil | ||
15:47 16mResearch paper | The Hidden Costs of Automation: An Empirical Study on GitHub Actions Workflow Maintenance Research Track Pablo Valenzuela-Toledo University of Bern, Universidad de La Frontera, Alexandre Bergel University of Chile, Oscar Nierstrasz feenk.com, Timo Kehrer University of Bern Pre-print | ||
16:04 16mResearch paper | Enhancing Identifier Naming Through Multi-Mask Fine-tuning of Language Models of CodeResearch Object ReviewedOpen Research Object Research Track Sanidhya Vijayvargiya BITS Pilani Hyderabad Campus, Mootez Saad Dalhousie University, Tushar Sharma Dalhousie University Pre-print | ||
16:21 16mResearch paper | Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision Research Track Mohammad Mahdi Abdollahpour University of Waterloo, Jens Dietrich Victoria University of Wellington, Patrick Lam University of Waterloo Pre-print | ||
16:40 20mLive Q&A | Discussion (Maintainance) Research Track |
18:00 - 21:00 | Social Event with VISSOFTCatering | ||
18:00 3hDinner | Dinner @ Grand Canyon Brewery Catering |
Tue 8 OctDisplayed time zone: Arizona change
08:45 - 10:00 | |||
09:00 60mKeynote | SCAM Keynote: The Quest for Practical Static Analysis Research Track |
12:00 - 13:30 | |||
13:30 - 15:00 | Testing & DebuggingResearch Track at Fremont Chair(s): Wesley Assunção North Carolina State University | ||
13:30 16mResearch paper | Migrating Unit Tests Across Java Applications Research Track Ajay Jha North Dakota State University, Sarah Nadi New York University Abu Dhabi, University of Alberta Pre-print | ||
13:47 16mResearch paper | PROZE: Generating Parameterized Unit Tests Informed by Runtime Data Research Track Deepika Tiwari KTH Royal Institute of Technology, Yogya Gamage Universtité de Montréal, Martin Monperrus KTH Royal Institute of Technology, Benoit Baudry Université de Montréal Pre-print | ||
14:04 16mResearch paper | The Fault in our Stars: Quality Assessment of Code Generation Benchmarks Research Track Mohammed Latif Siddiq University of Notre Dame, Simantika Bhattacharjee Dristi BRAC University, Joy Saha BRAC University, Joanna C. S. Santos University of Notre Dame Pre-print | ||
14:21 16mResearch paper | Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis Research Track Frank Reyes Garcia KTH Royal Institute of Technology, Benoit Baudry Université de Montréal, Martin Monperrus KTH Royal Institute of Technology Pre-print | ||
14:40 20mLive Q&A | Discussion (Testing & Debugging) Research Track |
15:00 - 15:30 | |||
15:30 - 16:20 | Engineering / NIERNew Ideas and Emerging Results / Engineering Track at Fremont Chair(s): Eduardo Figueiredo Federal University of Minas Gerais | ||
15:30 10mResearch paper | GitRev: An LLM-based Gamification Framework for Modern Code Review Activities Engineering Track Jasem Khelifi ETS Montreal, University of Quebec, Moataz Chouchen ETS, Ali Ouni ETS Montreal, University of Quebec, Raula Gaikovina Kula Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Salma Hamza Mediterranean Institute of Technology, South Mediterranean University, Tunisia, Mohamed Wiem Mkaouer University of Michigan - Flint | ||
15:40 10mResearch paper | An Empirical Study on Understanding Performance Issues and Causes in Android Apps New Ideas and Emerging Results Nisha Kumari Oulu University of Applied Sciences, Teerath Das University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
15:50 10mResearch paper | An Experiment Using Partial Evaluation for Transformational DebuggingOnline presentation New Ideas and Emerging Results Kanae Tsushima Research Organization of Information and Systems (ROIS), Robert Glück University of Copenhagen | ||
16:00 10mResearch paper | Deciphering Discrepancies: A Comparative Analysis of Docker Image Security New Ideas and Emerging Results Brittany Boles Montana State University, Eric O'Donoghue Montana State University, Garrett Perkins Montana State University, Clemente Izurieta Montana State University, Ann Marie Reinhold Montana State University | ||
16:10 10mLive Q&A | Discussion (Engineering / NIER) New Ideas and Emerging Results |
16:20 - 17:00 | SCAM Most Influential PaperResearch Track at Fremont Chair(s): Leon Moonen Simula Research Laboratory and BI Norwegian Business School | ||
16:20 40mTalk | MIP Presentation: "On Automatically Generating Commit Messages via Summarization of Source Code Changes" Research Track Luis Fernando Cortés-Coy , Mario Linares-Vasquez Universidad de los Andes, Jairo Aponte Universidad Nacional de Colombia, Denys Poshyvanyk William & Mary |
17:00 - 17:30 | |||
17:30 - 17:45 | |||
Accepted Papers
Call for papers
The 24th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term “source code” refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term “analysis” refers to any (semi-)automated procedure that yields insight into source code, while “manipulation” refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Thus, the analysis and manipulation of source code remains a critical area of research from which SCAM 2024 solicits high-quality submissions.
Covered Topics and Paper Formats
We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:
- abstract interpretation
- bad smell detection
- bug location and prediction
- clone detection
- concern, concept, and feature localization and mining
- decompilation
- energy efficient source code
- natural language analysis of source code artifacts
- program comprehension
- program slicing
- program transformation and refactoring
- repository, revision, and change analysis
- security vulnerability analysis
- source level metrics
- source level optimization
- source-level testing and verification
- static and dynamic analysis
SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.
Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website. All submissions must be in English and should be submitted electronically in PDF format. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper. All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.
Submission guidelines
All submissions must be in English and should be submitted electronically in PDF format using EasyChair.
- Papers must not exceed 12 pages, and the last 2 pages can be used for references only.
- Papers must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website.
- All submissions must be in English and should be submitted electronically in PDF format.
- Submissions will be reviewed by at least three members of the program committee, judging the paper on its novelty, presentation quality, importance, soundness, and the quality of its evaluation.
- If the paper is accepted, at least one author must register for the conference and present the paper.
- All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.
Double-blind Review
We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:
- Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.)
- References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)
If the program chairs find that the authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.
Artifact Evaluation
ICSME, VISSOFT, and SCAM have joined once more forces and present a single Artifact Evaluation Track for the three venues. We invite authors of any paper accepted to SCAM 2024 to submit artifacts associated with their papers for evaluation. Papers with artifacts that meet the review criteria will be awarded badges, noting their contributions to open science in software engineering.
More information on the Call for Papers of the Joint Artifact Evaluation Track will be available at the ICSME 2024 web page (https://conf.researchr.org/home/icsme-2024).
Proceedings
All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.