Publication

A.  Articles published in refereed conferences/journal

The publications are listed in the order of their appearance.

[14]  M. Asaduzzaman, C. K. Roy, K. A. Schneider, and D. Hou, “Recommending Framework Extension Examples”. Accepted to be published in Proc. of the 33rd International Conference on Software Maintenance and Evolution, 11 pages, 2017.

[13] M. Asaduzzaman, M. Ahasanuzzaman, C. K. Roy, K. A. Schneider, “How Developers Use Exception Handling in Java?”  in Proceedings of the  13th International Conference on Mining Software Repositories (MSR 2016).

[12] M. Asaduzzaman, C. K. Roy, K. A. Schneider, and D. Hou, “A Simple, Efficient, Context-sensitive Approach for Code Completion”, Journal of Software: Evolution and Process, 2016.

[11] M. Asaduzzaman, C. K. Roy, K. A. Schneider, “PARC: Recommending API Methods Parameters”, in Proceedings of the  31st International Conference on Software maintenance and Evolution (ICSME 2015) (Tool Demo Track).

[10]  M. Asaduzzaman, C. K. Roy, S. Monir, K. A. Schneider, “Exploring API Method Parameter Recommendations”, in Proceedings of the  31st International Conference on Software maintenance and Evolution (ICSME 2015).

[9]  M. Asaduzzaman, C. K. Roy, K. A. Schneider, Daqing Hou, “CSCC: Simple, Efficient, Context Sensitive Code Completion“, in Proceedings of the  30th International Conference on Software maintenance and Evolution (ICSME 2014).

[8]  M. Asaduzzaman, C. K. Roy, K. A. Schneider, Daqing Hou, “Context-sensitive Code Completion Tool for Better API Usability, in Proceedings of the  Tool Demonstration track of the 30th International Conference on Software maintenance and Evolution (ICSME 2014).

[7]  M. Asaduzzaman, C. K. Roy, K. A. Schneider, M. D. Penta, “Tracking Source Code Lines to Support Software Mainenance Activities,  in Proceedings of the  29th International Conference on Software maintenance (ICSM 2013, Tool Demo Track).

[6]  M. Asaduzzaman, C. K. Roy, K. A. Schneider, M. D. Penta, “LHDiff: A Language-Independent Hybrid Approach for Tracking Source Code Lines”, accepted to be published in Proceedings of the  29th International Conference on Software maintenance (ICSM 2013).

[5]  M. Asaduzzaman, A. S. Mashiyat, C. K. Roy, and K. A. Schneider, “Answering Questions about Unanswered Questions of Stack Overflow”, in Proceedings of the  10th Working Conference on Mining Software Repositories (MSR 2013), San Francisco, USA, May 2013, 4 pp (Mining Challenge Paper).

[4]  Asaduzzaman, M., Bullock, M., Roy, C.K., and Schneider, K.A. “Bug Introducing Changes: A Study with Android”, in Proceedings of the  9th Working Conference on Mining Software Repositories (MSR 2012), Zurich, Switzerland, June 2012, 4 pp (Mining Challenge Paper).

[3]  Asaduzzaman, M., Roy, C.K., and Schneider, K.A. “VisCad: Flexible Code Clone Analysis Support For NiCad“, in Proceedings of the Tool Demo Track of the ICSE 5th International Workshop on Software Clones (IWSC 2011), Waikiki, Hawaii, USA, May 2011, pp. 77-78.

[2] Zibran, M.F., Saha, R.K., Asaduzzaman, M., and Roy, C. K., “Analyzing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study“, in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2011), Las Vegas, USA, April 2011, pp. 295-304.

[1] Saha, R.K., Asaduzzaman, M., Zibran, M.F., Roy, C.K., and Schneider, K.A., “Evaluating Code Clone Genealogies at Release Level: An Empirical Study”, in Proceedings of the 10th IEEE International Conference on Source Code Analysis and Manipulation, Timisoara, Romania, pp. 87-96, September 2010.

B. Others

[2009] Haque, M. R., Naznin, M., Asaduzzaman, M., and Ahmed, R.U., “STP: In-network aggregation through proximity queries in a Sensor Network, in Proceedings of the 12th International Conference on Computers and Information Technology, pp.541 546, 21-23 December 2009.

[2008] Islam, M. R., Hasan, M. S., Sharif, I., and Asaduzzaman, M., “A New Point Multiplication Method for Elliptic Curve Cryptography Using Modified Base Representation”. International Journal of the Computer, Internet and Management (IJCIM), Volume 16 No. 2 (May-August), pp. 9-16. 2008.

[2005] Islam, M. R., Asaduzzaman, M., Hasan, M. S., and Bhuyan, I. M. S.“An Efficient Technique For implementation Of Elliptic Curve Cryptosystem over GF ((2^n) ^m)”, in Proceedings of the International Conference on Computer and Information Technology (ICCIT-2005), pp. 716-721, 28-30 Dec. 2005.

C. Thesis/Posters

[5] M. Asaduzzaman, C. K. Roy, K. A. Schneider, and D. Hou, “Mining Framework Extension Patterns”, in the Consortium for Software Engineering Research (CSER) Fall Meeting, University of Alberta, Canada, 2016.

[4] M. Asaduzzaman, M Ahasanuzzaman, C. K. Roy, and K. A. Schneider, “Detection and Analysis of Merging and Splitting, in the Consortium for Software Engineering Research (CSER) Spring Meeting, University of Alberta, Canada, 2014.

[3] M. Asaduzzaman, C. K. Roy, and K. A. Schneider, “Tracking Source Code Lines’’, in the MSR Vision 2020, Queen’s University, Canada, 2012.

[2] Asaduzzaman, M.. Visualization and Analysis of Software Clones. M.Sc. Thesis, University of Saskatchewan, 179 pp.

[1] Asaduzzaman, M., C.K. Roy and K.A. Schneider, 2011. “VisCad: Tool Support for Large Scale Code Clone Analysis”, in the College of Arts and Science Graduate Poster Symposium, University of Saskatchewan, Canada, April 2011.

D. Software

[4]PARC: Recommending API Methods Parameters. The tool is available as an Eclipse plugin. More details of the tool can be obtained from here

[3]CSCC: Simple, Efficient, Context Sensitive Method Call Completion Support for Better API Usability. The tool is available as an Eclipse plugin and can be obtained from here

[2]LHDiff: A Language-Independent Tool for Tracking Source Code Lines. The tool has been published as open source software and can be obtained from here

[1]VisCad: a support environment for code clone analysis. The tool has been published as open source software and can be obtained from the following location: http://homepage.usask.ca/~mua237/viscad/viscad.html