Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dennis Giffhorn |
Chopping Concurrent Programs. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
chopping, concurrency, program analysis, slicing |
1 | Tobias Gutzmann, Antonina Khairova, Jonas Lundberg, Welf Löwe |
Towards Comparing and Combining Points-to Analyses. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
analysis precision, interpreting analysis results, static analysis, dynamic analysis, points-to analysis |
1 | Robert Charles Lange, Spiros Mancoridis |
thr2csp: Toward Transforming Threads into Communicating Sequential Processes. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
concurrency, reverse engineering, communicating sequential processes |
1 | Jaime Spacco, Chadd C. Williams |
Lightweight Techniques for Tracking Unique Program Statements. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
levenshtein, differencing tools, mining software archives, line-tracking, diff |
1 | Géraud Canet, Pascal Cuoq, Benjamin Monate |
A Value Analysis for C Programs. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
tool demo, static analysis, C, abstract interpretation, software verification |
1 | Nils Göde |
Evolution of Type-1 Clones. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
clone mapping, software clones, evolution model |
1 | Rebecca Tiarks, Rainer Koschke, Raimar Falke |
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. |
SCAM |
2009 |
DBLP DOI BibTeX RDF |
clone categorization, type-3 clones, software clones |
1 | Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang |
DTS - A Software Defects Testing System. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li 0002, Kiarash Mahdavi |
Evaluating Key Statements Analysis. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Raffi Khatchadourian, Awais Rashid |
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu |
Analysis and Transformations for Efficient Query-Based Debugging. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Wang, Daqing Hou |
An Empirical Study of Function Overloading in C++. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abram Hindle, Michael W. Godfrey, Richard C. Holt |
From Indentation Shapes to Code Structures. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Daniel M. Germán, Gregorio Robles, Ahmed E. Hassan |
Change Impact Graphs: Determining the Impact of Prior Code Changes. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Lundberg, Tobias Gutzmann, Welf Löwe |
Fast and Precise Points-to Analysis. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Petru Florin Mihancea |
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Stone, Michelle Strout, Shweta Behere |
Automatic Determination of May/Must Set Usage in Data-Flow Analysis. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China |
SCAM |
2008 |
DBLP BibTeX RDF |
|
1 | Mariano Ceccato, Thomas Roy Dean, Paolo Tonella |
Using Program Transformations to Add Structure to a Legacy Data Model. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla |
Modular Decompilation of Low-Level Code by Partial Evaluation. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jason Chu, Thomas R. Dean |
Automated Migration of List Based JSP Web Pages to AJAX. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Giffhorn, Christian Hammer 0001 |
Precise Analysis of Java Programs Using JOANA. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cathal Boogerd, Leon Moonen |
On the Use of Data Flow Analysis in Static Profiling. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano |
The Evolution and Decay of Statically Detected Source Code Vulnerabilities. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Paul Anderson |
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wang 0183, Qiang Zhang, PengChao Zhao |
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yue Jia 0001, Mark Harman |
Constructing Subtle Faults Using Higher Order Mutation Testing. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tony Clark 0001, Paul Sammut, James S. Willans |
Beyond Annotations: A Proposal for Extensible Java (XJ). |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi |
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor's Behaviors. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Cifuentes |
Parfait - A Scalable Bug Checker for C Code. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried |
Some Assembly Required - Program Analysis of Embedded System Code. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Damiano Zanardini |
The Semantics of Abstract Program Slicing. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nuno F. Rodrigues, Luís Soares Barbosa |
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Sun, Jianjun Zhao 0001 |
Aspect-Aware Points-to Analysis. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Is Cloned Code More Stable than Non-cloned Code? |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes |
User-Input Dependence Analysis via Graph Reachability. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Singer, Chris C. Kirkham |
Exploiting the Correspondence between Micro Patterns and Class Names. |
SCAM |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Naylor, Colin Runciman |
Finding Inputs that Reach a Target Expression. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eric Larson |
SUDS: An Infrastructure for Creating Bug Detection Tools. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Statement-Level Cohesion Metrics and their Visualization. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Huib van den Brink, Rob van der Leek, Joost Visser 0001 |
Quality Assessment for Embedded SQL. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Ming Jiang, Ahmed E. Hassan |
A Framework for Studying Clones In Large Software Systems. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Marius Marin, Leon Moonen, Arie van Deursen |
An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Gutzmann, Jonas Lundberg, Welf Löwe |
Towards Path-Sensitive Points-to Analysis. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Oege de Moor, Mathieu Verbaere, Elnar Hajiyev, Pavel Avgustinov, Torbjörn Ekman 0001, Neil Ongkingco, Damien Sereni, Julian Tibble |
Keynote Address: .QL for Source Code Analysis. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Lochbihler, Gregor Snelting |
On Temporal Path Conditions in Dependence Graphs. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Arnoldo José Müller Molina, Takeshi Shinohara |
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France |
SCAM |
2007 |
DBLP BibTeX RDF |
|
1 | Dawn J. Lawrie, Henry Feild, David W. Binkley |
Extracting Meaning from Abbreviated Identifiers. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Giffhorn, Christian Hammer 0001 |
An Evaluation of Slicing Algorithms for Concurrent Programs. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jendrik Johannes |
Source Code Composition with the Reuseware Composition Framework. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eva Magnusson, Torbjörn Ekman 0001, Görel Hedin |
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Roubtsov, Alexandru C. Telea, Danny Holten |
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lerina Aversano, Luigi Cerulo, Massimiliano Di Penta |
Relating the Evolution of Design Patterns and Crosscutting Concerns. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella |
Barrier Slicing for Remote Software Trusting. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jason Sawin, Atanas Rountev |
Improved Static Resolution of Dynamic Class Loading in Java. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Einar W. Høst, Bjarte M. Østvold |
The Programmer's Lexicon, Volume I: The Verbs. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Marinescu |
DATES: Design Analysis Tool for Enterprise Systems. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Patricia L. Roden, Shamsnaz Virani, Letha H. Etzkorn, Sherri L. Messimer |
An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Walter Binder, Jarle Hulaas, Philippe Moret |
Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Juillerat, Béat Hirsbrunner |
Toward an Implementation of the "Form Template Method" Refactoring. |
SCAM |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kim S. Henriksen, John P. Gallagher |
Abstract Interpretation of PIC Programs through Logic Programming. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Gallagher, David W. Binkley, Mark Harman |
Stop-List Slicing. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Organizing Committee. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Cathal Boogerd, Leon Moonen |
Prioritizing Software Inspection Results using Static Profiling. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia |
Normalizing Metamorphic Malware Using Term Rewriting. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael L. Collard, Huzefa H. Kagdi, Jonathan I. Maletic |
Factoring Differences for Iterative Change Management. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael W. Fagan, Laurent Hascoët, Jean Utke |
Data Representation Alternatives in Semantically Augmented Numerical Models. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Message from the Chairs. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lajos Jeno Fülöp, Tamas Gyovai, Rudolf Ferenc |
Evaluating C++ Design Pattern Miner Tools. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Adrian D. Thurston, James R. Cordy |
Evolving TXL. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weilei Zhang, Barbara G. Ryder |
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Strein, Hans Kratz, Welf Löwe |
Cross-Language Program Analysis and Refactoring. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Steering Committee. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Árpád Beszédes, Tamás Gergely, Tibor Gyimóthy |
Graph-Less Dynamic Dependence-Based Dynamic Slicing Algorithms. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
dynamic slicing algorithms, Program slicing, execution trace, program dependences |
1 | Dawn J. Lawrie, Henry Feild, David W. Binkley |
Syntactic Identifier Conciseness and Consistency. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
Identifier Quality, Part-of-speech |
1 | Huiqing Li, Simon J. Thompson |
Comparative Study of Refactoring Haskell and Erlang Programs. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Eric Van Wyk, Lijesh Krishnan, Derek Bodin, Eric Johnson, August Schwerdfeger, Phil Russell |
Tool Demonstration: Silver Extensible Compiler Frameworks and Modular Language Extensions for Java and C. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Additional Reviewers. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jason Sawin, Atanas Rountev |
Estimating the Run-Time Progress of a Call Graph Construction Algorithm53-62. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Noguera, Renaud Pawlak |
AVal: an Extensible Attribute-Oriented Programming Validator for Java. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman, Jens Krinke |
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA |
SCAM |
2006 |
DBLP BibTeX RDF |
|
1 | Kai Pan, Sunghun Kim 0001, E. James Whitehead Jr. |
Bug Classification Using Program Slicing Metrics. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Magiel Bruntink |
Linking Analysis and Transformation Tools with Source-Based Mappings. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Jacobs, E. Christopher Lewis |
SMART C: A Semantic Macro Replacement Translator for C. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Program Committee. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. Waddington |
Pointer Analysis for Source-to-Source Transformations. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Steve Counsell, Stephen Swift, Allan Tucker |
Object-oriented cohesion as a surrogate of software comprehension: an empirical study. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary |
SCAM |
2005 |
DBLP BibTeX RDF |
|
1 | |
Copyright. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shannon Xu, Thomas R. Dean |
Transforming Embedded Java Code into Custom Tags. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Silvia Breu |
Extending Dynamic Aspect Mining with Static Information. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paul Anderson |
The Performance Penalty of XML for Program Intermediate Representations. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Aiwu Shi, Gleb Naumovich |
Static Analysis for Computing Escapability and Mutability for Java Components. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel |
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael English, Jim Buckley, Tony Cahill, Kristian Lynch |
Measuring the Impact of Friends on the Internal Attributes of Software Systems. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Markus Schordan, Daniel J. Quinlan |
Specifying Transformation Sequences as Computation on Program Fragments with an Abstract Attribute Grammar. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bernadette Power, Geoff W. Hamilton |
Declassification: Transforming Java Programs to Remove Intermediate Classes. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Reviewers. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|