Y. M. Mileva, A. Wasylkowski, and A. Zeller, Mining Evolution of Object Usage, European Conference on Object-Oriented Programming, 2011.
DOI : 10.1109/TSE.2005.63

M. Kim and D. Notkin, Discovering and representing systematic code changes, 2009 IEEE 31st International Conference on Software Engineering, 2009.
DOI : 10.1109/ICSE.2009.5070531

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Kim, K. Pan, E. E. Whitehead, and J. , Memories of bug fixes, Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering , SIGSOFT '06/FSE-14, 2006.
DOI : 10.1145/1181775.1181781

H. A. Nguyen, T. T. Nguyen, G. Wilson, J. , A. T. Nguyen et al., A graph-based approach to API usage adaptation, ACM International Conference on Object Oriented Programming Systems Languages and Applications, 2010.

A. Hora, N. Anquetil, S. Ducasse, and S. Allier, Domain specific warnings: Are they any better?, 2012 28th IEEE International Conference on Software Maintenance (ICSM), 2012.
DOI : 10.1109/ICSM.2012.6405305

URL : https://hal.archives-ouvertes.fr/hal-00848830

M. Zaki and W. M. Jr, Fundamentals of data mining algorithms, 2012.

S. Ducasse, T. Girba, and A. Kuhn, Distribution Map, 2006 22nd IEEE International Conference on Software Maintenance, 2006.
DOI : 10.1109/ICSM.2006.22

A. Hora, C. Couto, N. Anquetil, S. Ducasse, M. Bhatti et al., BugMaps: A Tool for the Visual Exploration and Analysis of Bugs, European Conference on Software Maintenance and Reengineering, Tool Track, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00668397

S. Ducasse, A. Lienhard, and L. Renggli, Seaside: A Flexible Environment for Building Dynamic Web Applications, IEEE Software, vol.24, issue.5, 2007.
DOI : 10.1109/MS.2007.144

N. Meng, M. Kim, and K. S. Mckinley, Lase: Locating and applying systematic edits by learning from examples, 2013 35th International Conference on Software Engineering (ICSE), 2013.
DOI : 10.1109/ICSE.2013.6606596

A. Hora, N. Anquetil, S. Ducasse, and M. T. Valente, Mining system specific rules from change patterns, 2013 20th Working Conference on Reverse Engineering (WCRE), 2013.
DOI : 10.1109/WCRE.2013.6671308

URL : https://hal.archives-ouvertes.fr/hal-00854861