Mon 7 OctDisplayed time zone: Arizona change
08:45 - 09:00 | SCAM Opening SessionResearch Track at Fremont Chair(s): Coen De Roover Vrije Universiteit Brussel, Valentina Lenarduzzi University of Oulu | ||
09:00 - 10:00 | |||
09:00 60mKeynote | SCAM + VISSOFT Keynote: Code that Generates Visual Art Research Track Benoit Baudry Université de Montréal |
10:30 - 12:00 | Empirical StudiesResearch Track at Fremont Chair(s): Alexander Serebrenik Eindhoven University of Technology | ||
10:30 16mResearch paper | An Empirical Investigation Into the Use of Dockerfile Preprocessors for Docker Image Management Research Track Wataru Mabuchi Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Kenji Fujiwara Nara Women’s University, Hajimu Iida Nara Institute of Science and Technology | ||
10:47 16mResearch paper | How do Software Engineering Researchers Use GitHub? An Empirical Study of Artifacts & Impact Research Track Pre-print | ||
11:04 16mResearch paper | On the Investigation of Exception Pull Request Characteristics: Exploring the Apache Ecosystem Research Track João Correia PUC-Rio, Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello UFRJ, Brazil, Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira PUC-Rio, Igor Steinmacher Northern Arizona University, Marco Gerosa Northern Arizona University, Jairo Souza Federal University of Pernambuco (UFPE), Johny Arriel PUC-Rio Pre-print | ||
11:21 16mResearch paper | Software Quality Assurance Analytics: Enabling Software Engineers to Reflect on QA PracticesVideo Presentation Research Track Ali Khatami Delft University of Technology, Carolin Brandt Delft University of Technology, Andy Zaidman Delft University of Technology Pre-print | ||
11:40 20mLive Q&A | Discussion (Empirical Studies) Research Track |
13:30 - 15:00 | |||
13:30 16mResearch paper | Catching Smells in the Act: A GitHub Actions Workflow InvestigationVideo Presentation Research Track Ali Khatami Delft University of Technology, Cédric Willekens Delft University of Technology, Andy Zaidman Delft University of Technology Pre-print | ||
13:47 16mResearch paper | Toward Interactive Optimization of Source Code Differences: An Empirical Study of Its Performance Research Track DOI Pre-print | ||
14:04 16mResearch paper | On the Prevalence, Evolution, and Impact of Code Smells in Simulation Modelling Software Research Track Riasat Mahbub Dalhousie University, Masud Rahman Dalhousie University, Muhammad Ahsanul Habib Dalhousie University | ||
14:21 16mResearch paper | An Empirical Analysis of Git Commit Logs for Potential Inconsistency in Code Clones Research Track Pre-print File Attached | ||
14:40 20mLive Q&A | Discussion (Code Smells) Research Track |
15:30 - 17:00 | |||
15:30 16mResearch paper | Enhancing Recommendations of Composite Refactorings based on the Practice Research Track Ana Carla Bibiano Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Anderson Uchôa Federal University of Ceará, Daniel Tenório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Audrey Vasconcelos Federal University of Alagoas (UFAL), Rafael de Mello UFRJ, Brazil | ||
15:47 16mResearch paper | The Hidden Costs of Automation: An Empirical Study on GitHub Actions Workflow Maintenance Research Track Pablo Valenzuela-Toledo University of Bern, Universidad de La Frontera, Alexandre Bergel University of Chile, Oscar Nierstrasz feenk.com, Timo Kehrer University of Bern Pre-print | ||
16:04 16mResearch paper | Enhancing Identifier Naming Through Multi-Mask Fine-tuning of Language Models of CodeResearch Object ReviewedOpen Research Object Research Track Sanidhya Vijayvargiya BITS Pilani Hyderabad Campus, Mootez Saad Dalhousie University, Tushar Sharma Dalhousie University Pre-print | ||
16:21 16mResearch paper | Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision Research Track Mohammad Mahdi Abdollahpour University of Waterloo, Jens Dietrich Victoria University of Wellington, Patrick Lam University of Waterloo Pre-print | ||
16:40 20mLive Q&A | Discussion (Maintainance) Research Track |
Tue 8 OctDisplayed time zone: Arizona change
08:45 - 10:00 | |||
09:00 60mKeynote | SCAM Keynote: The Quest for Practical Static Analysis Research Track |
13:30 - 15:00 | Testing & DebuggingResearch Track at Fremont Chair(s): Wesley Assunção North Carolina State University | ||
13:30 16mResearch paper | Migrating Unit Tests Across Java Applications Research Track Ajay Jha North Dakota State University, Sarah Nadi New York University Abu Dhabi, University of Alberta Pre-print | ||
13:47 16mResearch paper | PROZE: Generating Parameterized Unit Tests Informed by Runtime Data Research Track Deepika Tiwari KTH Royal Institute of Technology, Yogya Gamage Universtité de Montréal, Martin Monperrus KTH Royal Institute of Technology, Benoit Baudry Université de Montréal Pre-print | ||
14:04 16mResearch paper | The Fault in our Stars: Quality Assessment of Code Generation Benchmarks Research Track Mohammed Latif Siddiq University of Notre Dame, Simantika Bhattacharjee Dristi BRAC University, Joy Saha BRAC University, Joanna C. S. Santos University of Notre Dame Pre-print | ||
14:21 16mResearch paper | Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis Research Track Frank Reyes Garcia KTH Royal Institute of Technology, Benoit Baudry Université de Montréal, Martin Monperrus KTH Royal Institute of Technology Pre-print | ||
14:40 20mLive Q&A | Discussion (Testing & Debugging) Research Track |
15:30 - 16:20 | Engineering / NIERNew Ideas and Emerging Results / Engineering Track at Fremont Chair(s): Eduardo Figueiredo Federal University of Minas Gerais | ||
15:30 10mResearch paper | GitRev: An LLM-based Gamification Framework for Modern Code Review Activities Engineering Track Jasem Khelifi ETS Montreal, University of Quebec, Moataz Chouchen ETS, Ali Ouni ETS Montreal, University of Quebec, Raula Gaikovina Kula Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Salma Hamza Mediterranean Institute of Technology, South Mediterranean University, Tunisia, Mohamed Wiem Mkaouer University of Michigan - Flint | ||
15:40 10mResearch paper | An Empirical Study on Understanding Performance Issues and Causes in Android Apps New Ideas and Emerging Results Nisha Kumari Oulu University of Applied Sciences, Teerath Das University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
15:50 10mResearch paper | An Experiment Using Partial Evaluation for Transformational DebuggingOnline presentation New Ideas and Emerging Results Kanae Tsushima Research Organization of Information and Systems (ROIS), Robert Glück University of Copenhagen | ||
16:00 10mResearch paper | Deciphering Discrepancies: A Comparative Analysis of Docker Image Security New Ideas and Emerging Results Brittany Boles Montana State University, Eric O'Donoghue Montana State University, Garrett Perkins Montana State University, Clemente Izurieta Montana State University, Ann Marie Reinhold Montana State University | ||
16:10 10mLive Q&A | Discussion (Engineering / NIER) New Ideas and Emerging Results |
16:20 - 17:00 | SCAM Most Influential PaperResearch Track at Fremont Chair(s): Leon Moonen Simula Research Laboratory and BI Norwegian Business School | ||
16:20 40mTalk | MIP Presentation: "On Automatically Generating Commit Messages via Summarization of Source Code Changes" Research Track Luis Fernando Cortés-Coy , Mario Linares-Vasquez Universidad de los Andes, Jairo Aponte Universidad Nacional de Colombia, Denys Poshyvanyk William & Mary |
17:00 - 17:30 | |||
17:30 - 17:45 | |||
Accepted Papers
Title | |
---|---|
An Empirical Study on Understanding Performance Issues and Causes in Android Apps New Ideas and Emerging Results | |
An Experiment Using Partial Evaluation for Transformational DebuggingOnline presentation New Ideas and Emerging Results | |
Deciphering Discrepancies: A Comparative Analysis of Docker Image Security New Ideas and Emerging Results |
Call for papers
Following the success of the previous editions of the New Ideas and Emerging Results (NIER) track at SCAM 2021-2023, the 24th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024) will again host a NIER track. This track aims to provide a place for researchers and practitioners to present, discuss, and polish early-stage research. This early-stage research should be innovative with the potential to make a strong future impact on the research or practice of software engineering. However, as it concerns early-stage research, the NIER track does not require submissions to have a strong evaluation. Instead, submissions should contain preliminary results that indicate the future potential of the research as well as a discussion of the challenges which must be overcome in the pursuit of the given research goals. These challenges should act as both future research directions as well as topics which the authors feel require discussion within the community. The topics of interest for this track are the same as for the main research track and are listed below.
Topics of Interest
We welcome the submission of papers that describe original, early-stage work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:
- abstract interpretation
- bad smell detection
- bug location and prediction
- clone detection
- concern, concept, and feature localization and mining
- decompilation
- energy efficient source code
- natural language analysis of source code artifacts
- program comprehension
- program slicing
- program transformation and refactoring
- repository, revision, and change analysis
- security vulnerability analysis
- source level metrics
- source level optimization
- source-level testing and verification
- static and dynamic analysis
We explicitly solicit results from any theoretical or technological domain that can be applied to these and similar topics.
Submission guidelines
All submissions must be in English and should be submitted electronically in PDF format using EasyChair.
Submitted papers should describe original, unpublished, and significant work. These papers must not have been previously accepted for publication, nor be concurrently submitted for review in another journal, book, conference, or workshop.
The submissions must follow the rules of the double-blind reviewing process. Additionally:
- papers must not exceed 6 pages, including figures, tables, appendices, and references (the 6th page can be used for references only)
- papers must be marked as NIER track papers
- papers must conform to the IEEE proceedings paper format guidelines; templates in LaTeX and Word are available on IEEE’s website
- all submissions must be in English and should be submitted electronically in PDF format
- if the paper is accepted, at least one author must register for the conference and present the paper
- all authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct; failure to do so may lead to a (desk) rejection of the paper
Double-blind review
We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:
- author names and affiliations must be omitted (the track co-chairs will check compliance before reviewing begins)
- references to authors’ own related work must be in the third person (for example, instead of writing “We build on our previous work…” you should write “We build on the work of…”)
If the program chairs find that the authors did not respect the rules of double-blind review, they can decide to (desk) reject the paper.
Paper evaluation
Submissions will be evaluated based on their originality, the importance of their contribution, the challenges highlighted, and their potential future significance. In addition, reviewers are asked to consider the soundness, overall quality, clarity and consistency of presentation, and whether the submission appropriately contextualizes itself with respect to related work. Again, the NIER track does not require a complete evaluation. Preliminary data and a discussion of the challenges and future research directions supported by this preliminary data are encouraged.
Artifact Evaluation
ICSME, VISSOFT, and SCAM have joined forces and present a single Artifact Evaluation Track for all three venues. We invite authors of papers of all lengths accepted to SCAM 2024 to submit artifacts associated with those papers for evaluation. Papers with artifacts that meet the review criteria will be awarded badges, noting their contributions to open science in SE.
More information on the Call for Papers of the Joint Artifact Evaluation Track will be available at the ICSME 2024 Joint Artifact Evaluation Track.
Proceedings
All accepted papers will appear in the SCAM 2024 proceedings, which will be available through the IEEE Digital Library.