SCAM 2024
Mon 7 - Tue 8 October 2024
co-located with ICSME 2024
Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 7 Oct

Displayed time zone: Arizona change

08:45 - 09:00
SCAM Opening SessionResearch Track at Fremont
Chair(s): Coen De Roover Vrije Universiteit Brussel, Valentina Lenarduzzi University of Oulu
09:00 - 10:00
SCAM + VISSOFT Joint KeynoteResearch Track at Fremont
09:00
60m
Keynote
SCAM + VISSOFT Keynote: Code that Generates Visual Art
Research Track
Benoit Baudry Université de Montréal
10:30 - 12:00
Empirical StudiesResearch Track at Fremont
Chair(s): Alexander Serebrenik Eindhoven University of Technology
10:30
16m
Research paper
An Empirical Investigation Into the Use of Dockerfile Preprocessors for Docker Image Management
Research Track
Wataru Mabuchi Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Kenji Fujiwara Nara Women’s University, Hajimu Iida Nara Institute of Science and Technology
10:47
16m
Research paper
How do Software Engineering Researchers Use GitHub? An Empirical Study of Artifacts & Impact
Research Track
Kamel Alrashedy Georgia Institute of Technology, Ahmed Binjahlan Georgia Institute of Technology
Pre-print
11:04
16m
Research paper
On the Investigation of Exception Pull Request Characteristics: Exploring the Apache Ecosystem
Research Track
João Correia PUC-Rio, Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello UFRJ, Brazil, Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira PUC-Rio, Igor Steinmacher Northern Arizona University, Marco Gerosa Northern Arizona University, Jairo Souza Federal University of Pernambuco (UFPE), Johny Arriel PUC-Rio
Pre-print
11:21
16m
Research paper
Software Quality Assurance Analytics: Enabling Software Engineers to Reflect on QA PracticesVideo Presentation
Research Track
Ali Khatami Delft University of Technology, Carolin Brandt Delft University of Technology, Andy Zaidman Delft University of Technology
Pre-print
11:40
20m
Live Q&A
Discussion (Empirical Studies)
Research Track

13:30 - 15:00
Code SmellsResearch Track at Fremont
Chair(s): Tushar Sharma Dalhousie University
13:30
16m
Research paper
Catching Smells in the Act: A GitHub Actions Workflow InvestigationVideo Presentation
Research Track
Ali Khatami Delft University of Technology, Cédric Willekens Delft University of Technology, Andy Zaidman Delft University of Technology
Pre-print
13:47
16m
Research paper
Toward Interactive Optimization of Source Code Differences: An Empirical Study of Its Performance
Research Track
Tsukasa Yagi Tokyo Institute of Technology, Shinpei Hayashi Tokyo Institute of Technology
DOI Pre-print
14:04
16m
Research paper
On the Prevalence, Evolution, and Impact of Code Smells in Simulation Modelling Software
Research Track
Riasat Mahbub Dalhousie University, Masud Rahman Dalhousie University, Muhammad Ahsanul Habib Dalhousie University
14:21
16m
Research paper
An Empirical Analysis of Git Commit Logs for Potential Inconsistency in Code Clones
Research Track
Reishi Yokomori Nanzan University, Katsuro Inoue Nanzan University
Pre-print File Attached
14:40
20m
Live Q&A
Discussion (Code Smells)
Research Track

15:30 - 17:00
MaintenanceResearch Track at Fremont
Chair(s): Mohamed Wiem Mkaouer University of Michigan - Flint
15:30
16m
Research paper
Enhancing Recommendations of Composite Refactorings based on the Practice
Research Track
Ana Carla Bibiano Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Uchôa Federal University of Ceará, Daniel Tenório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Audrey Vasconcelos Federal University of Alagoas (UFAL), Rafael de Mello UFRJ, Brazil
15:47
16m
Research paper
The Hidden Costs of Automation: An Empirical Study on GitHub Actions Workflow Maintenance
Research Track
Pablo Valenzuela-Toledo University of Bern, Universidad de La Frontera, Alexandre Bergel University of Chile, Oscar Nierstrasz feenk.com, Timo Kehrer University of Bern
Pre-print
16:04
16m
Research paper
Enhancing Identifier Naming Through Multi-Mask Fine-tuning of Language Models of CodeResearch Object ReviewedOpen Research Object
Research Track
Sanidhya Vijayvargiya BITS Pilani Hyderabad Campus, Mootez Saad Dalhousie University, Tushar Sharma Dalhousie University
Pre-print
16:21
16m
Research paper
Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision
Research Track
Mohammad Mahdi Abdollahpour University of Waterloo, Jens Dietrich Victoria University of Wellington, Patrick Lam University of Waterloo
Pre-print
16:40
20m
Live Q&A
Discussion (Maintainance)
Research Track

Tue 8 Oct

Displayed time zone: Arizona change

08:45 - 10:00
SCAM KeynoteResearch Track at Fremont
Chair(s): Coen De Roover Vrije Universiteit Brussel
09:00
60m
Keynote
SCAM Keynote: The Quest for Practical Static Analysis
Research Track
K: Karim Ali NYU Abu Dhabi
10:30 - 12:00
Program Analysis and GenerationResearch Track at Fremont
Chair(s): Patrick Lam University of Waterloo
10:30
16m
Research paper
AUTOGENICS: Automated Generation of Context-Aware Inline Comments for Code Snippets on Programming Q&A Sites Using LLM
Research Track
Suborno Deb Bappon Department of Computer Science, University of Saskatchewan, Canada, Saikat Mondal University of Saskatchewan, Banani Roy University of Saskatchewan
Pre-print
10:47
16m
Research paper
Code Search Oriented Node-Enhanced Control Flow Graph EmbeddingVideo Presentation
Research Track
Yang Xu , WenLiang Peng South China University of Technology
11:04
16m
Research paper
FRANC: A Lightweight Framework for High-Quality Code Generation
Research Track
Mohammed Latif Siddiq University of Notre Dame, Beatrice Casey University of Notre Dame, Joanna C. S. Santos University of Notre Dame
Pre-print
11:21
16m
Research paper
REINFOREST: Reinforcing Semantic Code Similarity for Cross-Lingual Code Search Models
Research Track
Anthony Saieva IBM Research, Saikat Chakraborty Microsoft Research, Gail Kaiser Columbia University
Pre-print
11:40
20m
Live Q&A
Discussion (Program Analysis and Generation)
Research Track

13:30 - 15:00
Testing & DebuggingResearch Track at Fremont
Chair(s): Wesley Assunção North Carolina State University
13:30
16m
Research paper
Migrating Unit Tests Across Java Applications
Research Track
Ajay Jha North Dakota State University, Sarah Nadi New York University Abu Dhabi, University of Alberta
Pre-print
13:47
16m
Research paper
PROZE: Generating Parameterized Unit Tests Informed by Runtime Data
Research Track
Deepika Tiwari KTH Royal Institute of Technology, Yogya Gamage Universtité de Montréal, Martin Monperrus KTH Royal Institute of Technology, Benoit Baudry Université de Montréal
Pre-print
14:04
16m
Research paper
The Fault in our Stars: Quality Assessment of Code Generation Benchmarks
Research Track
Mohammed Latif Siddiq University of Notre Dame, Simantika Bhattacharjee Dristi BRAC University, Joy Saha BRAC University, Joanna C. S. Santos University of Notre Dame
Pre-print
14:21
16m
Research paper
Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis
Research Track
Frank Reyes Garcia KTH Royal Institute of Technology, Benoit Baudry Université de Montréal, Martin Monperrus KTH Royal Institute of Technology
Pre-print
14:40
20m
Live Q&A
Discussion (Testing & Debugging)
Research Track

15:30 - 16:20
Engineering / NIERNew Ideas and Emerging Results / Engineering Track at Fremont
Chair(s): Eduardo Figueiredo Federal University of Minas Gerais
15:30
10m
Research paper
GitRev: An LLM-based Gamification Framework for Modern Code Review Activities
Engineering Track
Jasem Khelifi ETS Montreal, University of Quebec, Moataz Chouchen ETS, Ali Ouni ETS Montreal, University of Quebec, Raula Gaikovina Kula Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Salma Hamza Mediterranean Institute of Technology, South Mediterranean University, Tunisia, Mohamed Wiem Mkaouer University of Michigan - Flint
15:40
10m
Research paper
An Empirical Study on Understanding Performance Issues and Causes in Android Apps
New Ideas and Emerging Results
Nisha Kumari Oulu University of Applied Sciences, Teerath Das University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla
15:50
10m
Research paper
An Experiment Using Partial Evaluation for Transformational DebuggingOnline presentation
New Ideas and Emerging Results
Kanae Tsushima Research Organization of Information and Systems (ROIS), Robert Glück University of Copenhagen
16:00
10m
Research paper
Deciphering Discrepancies: A Comparative Analysis of Docker Image Security
New Ideas and Emerging Results
Brittany Boles Montana State University, Eric O'Donoghue Montana State University, Garrett Perkins Montana State University, Clemente Izurieta Montana State University, Ann Marie Reinhold Montana State University
16:10
10m
Live Q&A
Discussion (Engineering / NIER)
New Ideas and Emerging Results

16:20 - 17:00
SCAM Most Influential PaperResearch Track at Fremont
Chair(s): Leon Moonen Simula Research Laboratory and BI Norwegian Business School
16:20
40m
Talk
MIP Presentation: "On Automatically Generating Commit Messages via Summarization of Source Code Changes"
Research Track
Luis Fernando Cortés-Coy , Mario Linares-Vasquez Universidad de los Andes, Jairo Aponte Universidad Nacional de Colombia, Denys Poshyvanyk William & Mary
17:00 - 17:30
Open Steering Committee MeetingResearch Track at Fremont
17:30 - 17:45
Closing and Introduction of SCAM 2025Research Track at Fremont

Call for papers

The Engineering Track in the 24th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024) looks for papers that discuss innovations and solutions to practical problems that researchers and practitioners face in source code analysis and manipulation of software systems. With the research advancements in source code analysis during the past decades, the industry has adopted many of the research ideas and built tools and techniques to solve real-world problems in daily jobs of software engineers. The Engineering Track provides an opportunity to discuss these important and often overlooked ideas and achievements so that software engineers and researchers can use them to improve their engineering development and produce high-quality software. This track aims to bring researchers and software engineers to communicate and share their insights and collaborate on tools, libraries, and infrastructure for source code analysis.

This track welcomes six-page papers (included references) that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and real-world studies. The papers are expected to discuss engineering work artifacts that have NOT been published before as the main contribution. We encourage submissions that accompany papers in the Research Track.

What artifacts qualify as Engineering Track material?

  • Tools: Software or hardware that facilitate source code analysis.
  • Libraries: Reusable APIs and frameworks.
  • Infrastructure: Projects that provide/facilitate access to data for reproducibility.
  • Data: Reusable datasets for other researchers to reproduce the results.
  • Real-world Studies: Studies that focus on how tools, libraries, infrastructure and data enable research.
  • Engineering challenges: Identifying engineering challenges that remain unresolved and have impact on research in source-code analysis.

Topics of interest include, but are not limited to:

  • Program transformation, refactoring, analysis, optimization and measurement.
  • Mining repositories, revisions and changes.
  • Bad smell detection, clone management, and program comprehension.
  • Concern, concept and feature localization and mining.
  • Source-level testing, verification, bug detection and prediction, security vulnerability analysis.
  • Natural language analysis of source code artifacts.

Submission guidelines

All submissions must be in English and should be submitted electronically in PDF format using EasyChair.

The submission length has a limit of six pages, with the expectation that authors use the space to discuss artifact motivation, design, and use cases in detail. Papers must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website. All submissions must be in English and should be submitted electronically in PDF format. Each submission will be reviewed by members of the Engineering Track program committee. Authors of accepted papers will be required to present their contributions at the conference.

The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artifacts for source code analysis and manipulation. The artifacts can range from an early research prototype to a polished deployed product. Papers about commercial products are welcome, as long as the guidelines described above are followed.

Videos and other demo material may be taken into account by reviewers as they review the paper, but the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source, or made available in such a way that the track chairs can download them once and redistribute them to reviewers.

All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

Double-blind Review

This year, we are following a double-blind reviewing process. Submitted papers must adhere to the following rules: - Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.) - References to authors’ own related work must be in the third person. (For example, instead of writing “We build on our previous work…” you should write “We build on the work of…”)

If the program chairs find that authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

Artifact evaluation

ICSME, VISSOFT, and SCAM have joined once more forces and present a single Artifact Evaluation Track for the three venues. We invite authors of any paper accepted to SCAM 2024 to submit artifacts associated with their papers for evaluation. Papers with artifacts that meet the review criteria will be awarded badges, noting their contributions to open science in software engineering.

More information on the Call for Papers of the Joint Artifact Evaluation Track will be available at the ICSME 2024 web page (https://conf.researchr.org/home/icsme-2024).

Proceedings

All accepted papers will appear in the proceedings, which will be available through the IEEE Digital Library.