Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David Baca |
Tracing with a minimal number of probes. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Floch, Tomofumi Yuki, Ali El Moussawi, Antoine Morvan, Kevin J. M. Martin, Maxime Naullet, Mythri Alle, Ludovic L'Hours, Nicolas Simon, Steven Derrien, François Charot, Christophe Wolinski, Olivier Sentieys |
GeCoS: A framework for prototyping custom hardware design flows. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tosin Daniel Oyetoyan, Reidar Conradi, Daniela S. Cruzes |
Criticality of defects in cyclic dependent components. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
13th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013 |
SCAM |
2013 |
DBLP BibTeX RDF |
|
1 | Jeffrey Svajlenko, Chanchal K. Roy, Slawomir Duszynski |
ForkSim: Generating software forks for evaluating cross-project similarity analysis tools. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Diego Mendez 0002, Benoit Baudry, Martin Monperrus |
Empirical evidence of large-scale diversity in API usage of object-oriented software. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Cerulo, Michele Ceccarelli, Massimiliano Di Penta, Gerardo Canfora |
A Hidden Markov Model to detect coded information islands in free text. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gergö Balogh, Árpád Beszédes |
CodeMetropolis - code visualisation in MineCraft. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mike Papadakis, Márcio Eduardo Delamaro, Yves Le Traon |
Proteum/FL: A tool for localizing faults using mutation analysis. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arvind W. Kiwelekar, Rushikesh K. Joshi |
Ontological interpretation of object-oriented programming abstractions. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hagen Schink |
sql-schema-comparer: Support of multi-language refactoring with relational databases. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
Assembler restructuring in FermaT. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Johan Fabry, Coen De Roover, Viviane Jonckers |
Aspectual source code analysis with GASR. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michaël Marcozzi, Wim Vanhoof, Jean-Luc Hainaut |
A relational symbolic execution algorithm for constraint-based testing of database programs. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Biallas, Mads Chr. Olesen, Franck Cassez, Ralf Huuck |
PtrTracker: Pragmatic pointer analysis. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sven Mattsen, Pascal Cuoq, Sibylle Schupp |
Driving a sound static software analyzer with branch-and-bound. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Francisco Zigmund Sokol, Mauricio Finavaro Aniche, Marco Aurélio Gerosa |
MetricMiner: Supporting researchers in mining software repositories. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | K. M. Annervaz, Vikrant S. Kaulgud, Janardan Misra, Shubhashis Sengupta, Gary Titus, Azmat Munshi |
Code clustering workbench. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vipin Balachandran |
Fix-it: An extensible code auto-fix component in Review Bot. |
SCAM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | John Businge, Alexander Serebrenik, Mark van den Brand |
Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto |
Folding Repeated Instructions for Improving Token-Based Code Clone Detection. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Zambon |
Aucsmith-Like Obfuscation of Java Bytecode. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Malcom Gethers, Amir Aryani, Denys Poshyvanyk |
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby |
Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gabriele Bavota, Bernardino De Carluccio, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Orazio Strollo |
When Does a Refactoring Induce Bugs? An Empirical Study. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Kargén, Nahid Shahmehri |
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Philip Mayer, Andreas Schroeder 0001 |
Cross-Language Code Analysis and Refactoring. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yuan 0006, Rob Johnson |
CAWDOR: Compiler Assisted Worm Defense. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Emily Hill 0001, Shivani Rao, Avinash C. Kak |
On the Use of Stemming for Concern Location and Bug Localization in Java. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chris Wilcox, Michelle Mills Strout, James M. Bieman |
Optimizing Expression Selection for Lookup Table Program Transformation. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol |
Improving Bug Location Using Binary Class Relationships. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan |
Building Useful Program Analysis Tools Using an Extensible Java Compiler. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Gutzmann, Jonas Lundberg, Welf Löwe |
Collections Frameworks for Points-To Analysis. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jurgen J. Vinju, Michael W. Godfrey |
What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Germán Vidal |
Closed Symbolic Execution for Verifying Program Termination. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tao Xie 0001 |
Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Saman Bazrafshan |
Evolution of Near-Miss Clones. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | François Gauthier 0001, Ettore Merlo |
Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy |
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
12th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012 |
SCAM |
2012 |
DBLP BibTeX RDF |
|
1 | Mihai T. Lazarescu, Luciano Lavagno |
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian Zoller, Axel Schmolitzky |
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems. |
SCAM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jens Nicolay, Coen De Roover, Wolfgang De Meuter, Viviane Jonckers |
Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Roubtsov, Alexander Serebrenik, Aurélien Mazoyer, Mark van den Brand |
I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Sfayhi, Houari A. Sahraoui |
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paul E. Black |
Counting Bugs is Harder Than You Think. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
11th IEEE Working Conference on Source Code Analysis and Manipulation, SCAM 2011, Williamsburg, VA, USA, September 25-26, 2011 |
SCAM |
2011 |
DBLP BibTeX RDF |
|
1 | Wei Wang 0001, Michael W. Godfrey |
A Study of Cloning in the Linux SCSI Drivers. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew B. Kelly, Jason S. Alexander, Bram Adams, Ahmed E. Hassan |
Recovering a Balanced Overview of Topics in a Software Domain. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Pavlu, Markus Schordan, Andreas Krall |
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Gold |
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Radu Marinescu 0001, Cristina Marinescu |
Are the Clients of Flawed Classes (Also) Defect Prone? |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Coogan, Saumya K. Debray |
Equational Reasoning on x86 Assembly Code. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sandro Schulze, Elmar Jürgens, Janet Feigenspan |
Analyzing the Effect of Preprocessor Annotations on Code Clones. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tiago L. Alves, Jurriaan Hage, Peter Rademaker |
A Comparative Study of Code Query Technologies. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Surafel Lemma Abebe, Sonia Haiduc, Paolo Tonella, Andrian Marcus |
The Effect of Lexicon Bad Smells on Concept Location in Source Code. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mehlich |
CheckPointer - A C Memory Access Validator. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael L. Collard, Michael John Decker, Jonathan I. Maletic |
Lightweight Transformation and Fact Extraction with the srcML Toolkit. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark D. Syer, Bram Adams, Ying Zou 0001, Ahmed E. Hassan |
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Avancini, Mariano Ceccato |
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eric Larson |
Program Analysis Too Loopy? Set the Loops Aside. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jason Sawin, Atanas Rountev |
Assumption Hierarchy for a CHA Call Graph Construction Algorithm. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Minhaz F. Zibran, Chanchal K. Roy |
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steffen Keul |
Tuning Static Data Race Analysis for Automotive Control Software. |
SCAM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zoltan Borok-Nagy, Viktor Majer, József Mihalicza, Norbert Pataki, Zoltán Porkoláb |
Visualization of C++ Template Metaprograms. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Zeller |
Learning from 6, 000 Projects: Mining Models in the Large. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marcus Edvinsson, Jonas Lundberg, Welf Löwe |
Parallel Reachability and Escape Analyses. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lennart C. L. Kats, Eelco Visser |
Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Katerina Troshina, Yegor Derevenets, Alexander Chernov |
Reconstruction of Composite Types for Decompilation. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Romain Brixtel, Mathieu Fontaine 0001, Boris Lesner, Cyril Bazin, Romain Robbes |
Language-Independent Clone Detection Applied to Plagiarism Detection. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mark Harman |
Why Source Code Analysis and Manipulation Will Always be Important. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bela Ujhazi, Rudolf Ferenc, Denys Poshyvanyk, Tibor Gyimóthy |
New Conceptual Coupling and Cohesion Metrics for Object-Oriented Systems. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Simon Allier, Stéphane Vaucher, Bruno Dufour, Houari A. Sahraoui |
Deriving Coupling Metrics from Call Graphs. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bas Basten, Tijs van der Storm |
AMBIDEXTER: Practical Ambiguity Detection. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alain Ketterlin, Philippe Clauss |
Recovering the Memory Behavior of Executable Programs. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ripon K. Saha, Muhammad Asaduzzaman, Minhaz F. Zibran, Chanchal K. Roy, Kevin A. Schneider |
Evaluating Code Clone Genealogies at Release Level: An Empirical Study. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthew S. Simpson, Rajeev Barua |
MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jürgen Graf 0001 |
Speeding Up Context-, Object- and Field-Sensitive SDG Generation. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huiqing Li, Simon J. Thompson |
Refactoring Support for Modularity Maintenance in Erlang. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Scott Grant, James R. Cordy |
Estimating the Optimal Number of Latent Concepts in Source Code Analysis. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amy Wheeler, Dave W. Binkley |
Subclass Instantiation Distribution. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Devin Kester, Martin Mwebesa, Jeremy S. Bradbury |
How Good is Static Analysis at Finding Concurrency Bugs? |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Píse |
The Fika Parser Generator. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Da Luo, Linda Hillis, Raja Das, Yao Qi |
Effective Static Analysis to Find Concurrency Bugs in Java. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stephen W. Thomas, Bram Adams, Ahmed E. Hassan, Dorothea Blostein |
Validating the Use of Topic Models for Software Evolution. |
SCAM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
Tenth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2010, Timisoara, Romania, 12-13 September 2010 |
SCAM |
2010 |
DBLP BibTeX RDF |
|
1 | Christian Prause |
Maintaining Fine-Grained Code Metadata Regardless of Moving, Copying and Merging. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
code metadata, code evolution, clone detection, document similarity, code ownership |
1 | Tiago L. Alves, Joost Visser 0001 |
Static Estimation of Test Coverage. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
metrics, static analysis, estimation, slicing, test coverage |
1 | Michael Achenbach, Klaus Ostermann |
Engineering Abstractions in Model Checking and Testing. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman |
Identifying 'Linchpin Vertices' That Cause Large Dependence Clusters. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
Dependence Cluster |
1 | El Hachemi Alikacem, Houari A. Sahraoui |
A Metric Extraction Framework Based on a High-Level Description Language. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
Metric extraction, source code representation, meta-model, object-oriented metrics |
1 | Paul Klint, Tijs van der Storm, Jurgen J. Vinju |
RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
source code manipulation, transformation, meta-programming, source code analysis |
1 | Valentin David, Magne Haveraaen |
Concepts as Syntactic Sugar. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
Properties of Slicing Definitions. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
properties of slicing, semi-refinement, refinement, program analysis, transformation, Program Slicing, slicing |
1 | Tobias Gutzmann, Tamara Steijger |
Backporting Java 5 Code. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Lämmel, Vadim Zaytsev |
Recovering Grammar Relationships for the Java Language Specification. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
|
1 | James Alexander George Hamilton, Sebastian Danicic |
An Evaluation of Current Java Bytecode Decompilers. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
java, bytecode, decompilation |
1 | Martin P. Ward |
The FermaT Maintenance Environment Tool Demonstration. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
formal methods, reverse engineering, Program transformation, analysis, migration, transformation system |
1 | |
Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009 |
SCAM |
2009 |
DBLP BibTeX RDF |
|
1 | Ju Qian, Yuming Zhou, Baowen Xu |
Improving Side-Effect Analysis with Lazy Access Path Resolving. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
must alias, points-to analysis, side-effect |