Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dennis Giffhorn |
Chopping Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 13-22, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
chopping, concurrency, program analysis, slicing |
1 | Tobias Gutzmann, Antonina Khairova, Jonas Lundberg, Welf Löwe |
Towards Comparing and Combining Points-to Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 45-54, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
analysis precision, interpreting analysis results, static analysis, dynamic analysis, points-to analysis |
1 | Robert Charles Lange, Spiros Mancoridis |
thr2csp: Toward Transforming Threads into Communicating Sequential Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 3-12, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
concurrency, reverse engineering, communicating sequential processes |
1 | Jaime Spacco, Chadd C. Williams |
Lightweight Techniques for Tracking Unique Program Statements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 99-108, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
levenshtein, differencing tools, mining software archives, line-tracking, diff |
1 | Géraud Canet, Pascal Cuoq, Benjamin Monate |
A Value Analysis for C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 123-124, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tool demo, static analysis, C, abstract interpretation, software verification |
1 | Nils Göde |
Evolution of Type-1 Clones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 77-86, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clone mapping, software clones, evolution model |
1 | Rebecca Tiarks, Rainer Koschke, Raimar Falke |
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2009, Edmonton, Alberta, Canada, September 20-21, 2009, pp. 67-76, 2009, IEEE Computer Society, 978-0-7695-3793-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clone categorization, type-3 clones, software clones |
1 | Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang |
DTS - A Software Defects Testing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 269-270, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li 0002, Kiarash Mahdavi |
Evaluating Key Statements Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 121-130, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Raffi Khatchadourian, Awais Rashid |
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 261-262, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu |
Analysis and Transformations for Efficient Query-Based Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 174-183, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Wang, Daqing Hou |
An Empirical Study of Function Overloading in C++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 47-56, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abram Hindle, Michael W. Godfrey, Richard C. Holt |
From Indentation Shapes to Code Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 111-120, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Daniel M. Germán, Gregorio Robles, Ahmed E. Hassan |
Change Impact Graphs: Determining the Impact of Prior Code Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 184-193, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Lundberg, Tobias Gutzmann, Welf Löwe |
Fast and Precise Points-to Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 133-142, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Petru Florin Mihancea |
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 207-216, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Stone, Michelle Strout, Shweta Behere |
Automatic Determination of May/Must Set Usage in Data-Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 153-162, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 978-0-7695-3353-7 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Mariano Ceccato, Thomas Roy Dean, Paolo Tonella |
Using Program Transformations to Add Structure to a Legacy Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 197-206, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla |
Modular Decompilation of Low-Level Code by Partial Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 239-248, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jason Chu, Thomas R. Dean |
Automated Migration of List Based JSP Web Pages to AJAX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 217-226, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Giffhorn, Christian Hammer 0001 |
Precise Analysis of Java Programs Using JOANA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 267-268, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cathal Boogerd, Leon Moonen |
On the Use of Data Flow Analysis in Static Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 79-88, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano |
The Evolution and Decay of Statically Detected Source Code Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 101-110, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Paul Anderson |
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 3-12, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wang 0183, Qiang Zhang, PengChao Zhao |
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 165-173, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yue Jia 0001, Mark Harman |
Constructing Subtle Faults Using Higher Order Mutation Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 249-258, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tony Clark 0001, Paul Sammut, James S. Willans |
Beyond Annotations: A Proposal for Extensible Java (XJ). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 229-238, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi |
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor's Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 35-44, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Cifuentes |
Parfait - A Scalable Bug Checker for C Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 263-264, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried |
Some Assembly Required - Program Analysis of Embedded System Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 15-24, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Damiano Zanardini |
The Semantics of Abstract Program Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 89-98, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nuno F. Rodrigues, Luís Soares Barbosa |
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 265-266, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Sun, Jianjun Zhao 0001 |
Aspect-Aware Points-to Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 143-152, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Is Cloned Code More Stable than Non-cloned Code? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 57-66, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes |
User-Input Dependence Analysis via Graph Reachability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 25-34, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Singer, Chris C. Kirkham |
Exploiting the Correspondence between Micro Patterns and Class Names. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China, pp. 67-76, 2008, IEEE Computer Society, 978-0-7695-3353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Naylor, Colin Runciman |
Finding Inputs that Reach a Target Expression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 133-142, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eric Larson |
SUDS: An Infrastructure for Creating Bug Detection Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 123-132, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Statement-Level Cohesion Metrics and their Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 37-48, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Huib van den Brink, Rob van der Leek, Joost Visser 0001 |
Quality Assessment for Embedded SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 163-170, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Ming Jiang, Ahmed E. Hassan |
A Framework for Studying Clones In Large Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 203-212, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Marius Marin, Leon Moonen, Arie van Deursen |
An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 101-110, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Gutzmann, Jonas Lundberg, Welf Löwe |
Towards Path-Sensitive Points-to Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 59-68, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Oege de Moor, Mathieu Verbaere, Elnar Hajiyev, Pavel Avgustinov, Torbjörn Ekman 0001, Neil Ongkingco, Damien Sereni, Julian Tibble |
Keynote Address: .QL for Source Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 3-16, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Lochbihler, Gregor Snelting |
On Temporal Path Conditions in Dependence Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 49-58, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Arnoldo José Müller Molina, Takeshi Shinohara |
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 111-122, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-2880-5 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Dawn J. Lawrie, Henry Feild, David W. Binkley |
Extracting Meaning from Abbreviated Identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 213-222, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Giffhorn, Christian Hammer 0001 |
An Evaluation of Slicing Algorithms for Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 17-26, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jendrik Johannes |
Source Code Composition with the Reuseware Composition Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 159-160, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eva Magnusson, Torbjörn Ekman 0001, Görel Hedin |
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 69-80, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Roubtsov, Alexandru C. Telea, Danny Holten |
SQuAVisiT: A Software Quality Assessment and Visualisation Toolset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 155-156, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lerina Aversano, Luigi Cerulo, Massimiliano Di Penta |
Relating the Evolution of Design Patterns and Crosscutting Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 180-192, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella |
Barrier Slicing for Remote Software Trusting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 27-36, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jason Sawin, Atanas Rountev |
Improved Static Resolution of Dynamic Class Loading in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 143-154, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Einar W. Høst, Bjarte M. Østvold |
The Programmer's Lexicon, Volume I: The Verbs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 193-202, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Marinescu |
DATES: Design Analysis Tool for Enterprise Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 157-158, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Patricia L. Roden, Shamsnaz Virani, Letha H. Etzkorn, Sherri L. Messimer |
An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 171-179, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Walter Binder, Jarle Hulaas, Philippe Moret |
Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 91-100, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Juillerat, Béat Hirsbrunner |
Toward an Implementation of the "Form Template Method" Refactoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30 - October 1, 2007, Paris, France, pp. 81-90, 2007, IEEE Computer Society, 0-7695-2880-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kim S. Henriksen, John P. Gallagher |
Abstract Interpretation of PIC Programs through Logic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 184-196, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Gallagher, David W. Binkley, Mark Harman |
Stop-List Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 11-20, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Organizing Committee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Cathal Boogerd, Leon Moonen |
Prioritizing Software Inspection Results using Static Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 149-160, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia |
Normalizing Metamorphic Malware Using Term Rewriting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 75-84, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael L. Collard, Huzefa H. Kagdi, Jonathan I. Maletic |
Factoring Differences for Iterative Change Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 217-226, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael W. Fagan, Laurent Hascoët, Jean Utke |
Data Representation Alternatives in Semantically Augmented Numerical Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 85-94, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Message from the Chairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lajos Jeno Fülöp, Tamas Gyovai, Rudolf Ferenc |
Evaluating C++ Design Pattern Miner Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 127-138, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Adrian D. Thurston, James R. Cordy |
Evolving TXL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 117-126, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weilei Zhang, Barbara G. Ryder |
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 63-74, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Strein, Hans Kratz, Welf Löwe |
Cross-Language Program Analysis and Refactoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 207-216, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Steering Committee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Árpád Beszédes, Tamás Gergely, Tibor Gyimóthy |
Graph-Less Dynamic Dependence-Based Dynamic Slicing Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 21-30, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic slicing algorithms, Program slicing, execution trace, program dependences |
1 | Dawn J. Lawrie, Henry Feild, David W. Binkley |
Syntactic Identifier Conciseness and Consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 139-148, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Identifier Quality, Part-of-speech |
1 | Huiqing Li, Simon J. Thompson |
Comparative Study of Refactoring Haskell and Erlang Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 197-206, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Eric Van Wyk, Lijesh Krishnan, Derek Bodin, Eric Johnson, August Schwerdfeger, Phil Russell |
Tool Demonstration: Silver Extensible Compiler Frameworks and Modular Language Extensions for Java and C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 161, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Additional Reviewers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jason Sawin, Atanas Rountev |
Estimating the Run-Time Progress of a Call Graph Construction Algorithm53-62. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 53-62, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Noguera, Renaud Pawlak |
AVal: an Extensible Attribute-Oriented Programming Validator for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 175-183, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman, Jens Krinke |
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 43-52, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-2353-6 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Kai Pan, Sunghun Kim 0001, E. James Whitehead Jr. |
Bug Classification Using Program Slicing Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 31-42, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Magiel Bruntink |
Linking Analysis and Transformation Tools with Source-Based Mappings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 107-116, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Jacobs, E. Christopher Lewis |
SMART C: A Semantic Macro Replacement Translator for C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, pp. 95-106, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | |
Program Committee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 27-29 September 2006, Philadelphia, Pennsylvania, USA, 2006, IEEE Computer Society, 0-7695-2353-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. Waddington |
Pointer Analysis for Source-to-Source Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 139-150, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Steve Counsell, Stephen Swift, Allan Tucker |
Object-oriented cohesion as a surrogate of software comprehension: an empirical study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 161-172, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-2290-4 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | |
Copyright. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shannon Xu, Thomas R. Dean |
Transforming Embedded Java Code into Custom Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 173-182, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Silvia Breu |
Extending Dynamic Aspect Mining with Static Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 57-65, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paul Anderson |
The Performance Penalty of XML for Program Intermediate Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 193-202, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Aiwu Shi, Gleb Naumovich |
Static Analysis for Computing Escapability and Mutability for Java Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 119-128, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel |
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 87-96, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael English, Jim Buckley, Tony Cahill, Kristian Lynch |
Measuring the Impact of Friends on the Internal Attributes of Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 151-160, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Markus Schordan, Daniel J. Quinlan |
Specifying Transformation Sequences as Computation on Program Fragments with an Abstract Attribute Grammar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 97-106, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bernadette Power, Geoff W. Hamilton |
Declassification: Transforming Java Programs to Remove Intermediate Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 183-192, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Reviewers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|