Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richard E. Jones, Andy C. King |
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 129-138, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman |
Forward slices are smaller than backward slices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 15-24, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Singer |
Concept Assignment as a Debugging Technique for Code Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 75-86, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Message from the Chairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Title Page. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Program Committee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nerina Bermudo, Andreas Krall, R. Nigel Horspool |
Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 107-118, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Beat Fluri, Harald C. Gall, Martin Pinzger 0001 |
Fine-Grained Analysis of Change Couplings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 66-74, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hyoung Seok Hong, Insup Lee 0001, Oleg Sokolsky |
Abstract Slicing: A New Approach to Program Slicing Based on Abstract Interpretation and Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 25-34, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss 0001, Bogdan Korel |
Minimal Slicing and the Relationships Between Forms of Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 45-56, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Attila Szegedi, Tibor Gyimóthy |
Dynamic Slicing of Java Bytecode Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 35-44, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-2144-4 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Mark Harman, David W. Binkley, Ranjit Singh, Robert M. Hierons |
Amorphous Procedure Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 85-94, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Ceccato, Paolo Tonella |
Adding Distribution to Existing Applications by Means of Aspect Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 107-116, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Vera Wahler, Dietmar Seipel, Jürgen Wolff von Gudenberg, Gregor Fischer |
Clone Detection in Source Code by Frequent Itemset Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 128-135, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss 0001, Lahcen Ouarbya |
Formalizing Executable Dynamic and Forward Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 43-52, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tom Tourwé, Kim Mens |
Mining Aspectual Views using Formal Concept Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 97-106, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bogong Su, Jian Wang 0046, Erh-Wen Hu, Joseph B. Manzano |
Software De-Pipelining Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 7-16, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Context-Sensitivity Matters, But Context Does Not. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 29-35, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Daqing Hou, H. James Hoover, Piotr Rudnicki |
Specifying the Law of Demeter and C++ Programming Guidelines with FCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 119-127, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Arun Lakhotia, Eric Uday Kumar |
Abstracting Stack to Detect Obfuscated Calls in Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 17-26, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Deji Fatiregun, Mark Harman, Robert M. Hierons |
Evolving Transformation Sequences using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 66-75, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xia Xu, Chung-Horng Lung, Marzia Zaman, Anand Srinivasan |
Program Restructuring Through Clustering Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 75-84, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Magiel Bruntink, Arie van Deursen |
Predicting Class Testability using Object-Oriented Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 136-145, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Katsuhisa Maruyama, Shinichiro Yamamoto |
A CASE Tool Platform Using an XML Representation of Java Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 158-167, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Uwe Naumann, Jean Utke, Andrew Lyons, Michael W. Fagan |
Control Flow Reversal for Adjoint Code Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 55-64, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gregg Rothermel |
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 3, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gregorio Robles, Jesús M. González-Barahona |
Executable Source Code and Non-Executable Source Code: Analysis and Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 149-157, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Gallagher |
Some Notes on Interprocedural Program Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 36-42, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Rajeev Kulkarni, S. Ramesh 0001 |
Static Slicing of Reactive Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 98-107, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Karina Olmos, Eelco Visser |
Turning Dynamic Typing into Static Typing by Program Specialization in a Compiler Front-end for Octave. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 141-150, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Moseley, Saumya K. Debray, Gregory R. Andrews |
Checking Program Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 193-202, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman |
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 203-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael English, Jim Buckley, Tony Cahill |
Applying Meyer's Taxonomy to Object-Oriented Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 35-44, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David J. Pearce 0001, Paul H. J. Kelly, Chris Hankin |
Online Cycle Detection and Difference Propagation for Pointer Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 3-12, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | António Menezes Leitão |
Detection of Redundant Code using R2D2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 183-192, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Giuliano Antoniol, Massimiliano Di Penta, Gianluca Masone, Umberto Villano |
XOgastan: XML-Oriented gcc AST Analysis and Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 173-182, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
source code analysis tools, XML, gcc, GXL |
1 | Chris Verhoef |
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 77-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Neil Walkinshaw, Marc Roper, Murray Wood |
The Java System Dependence Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 55-64, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | |
3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-2005-7 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Katsuro Inoue |
Design and Implementation of Bytecode-based Java Slicing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 108-117, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Richard Wheeldon, Steve Counsell |
Power Law Distributions in Class Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 45-54, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jan Kort, Ralf Lämmel |
Parse-Tree Annotations Meet Re-Engineering Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 161-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Marie Favre |
CPP Denotational Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 22-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Otto Skrove Bagge, Karl Trygve Kalleberg, Magne Haveraaen, Eelco Visser |
Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 65-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu Martel |
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 13-21, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Xinping Guo, James R. Cordy, Thomas R. Dean |
Unique Renaming of Java Using Source Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 151-160, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Barrier Slicing and Chopping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 81-87, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ákos Kiss 0001, Judit Jász, Gábor Lehotai, Tibor Gyimóthy |
Interprocedural Static Slicing of Binary Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 118-, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
Slicing the SCAM Mug: A Case Study in Semantic Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 88-97, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Maxim Mossienko, Oleg Khaschansky, Dmitriy Antonov, Oleg Smirnov, Anton Gubanov |
Towards managing environment dependence during legacy systems renovation and maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands, pp. 131-140, 2003, IEEE Computer Society, 0-7695-2005-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Christian H. Bischof, H. Martin Bücker, Bruno Lang, Arno Rasch, Andre Vehreschild |
Combining Source Transformation and Operator Overloading Techniques to Compute Derivatives for MATLAB Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 65-72, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
operator overloading, MATLAB, high-level language, automatic differentiation, derivatives, source transformation |
1 | Frederick V. Ramsey, James J. Alpigini |
A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 44-, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Juergen Rilling, Hon Fung Li, Dhrubajyoti Goswami |
Predicate-Based Dynamic Slicing of Message Passing Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 133-, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
predicate slice, predicate trace, message passing, program comprehension, Program slicing |
1 | Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu 0005 |
Mechanized Operational Semantics of WSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 73-82, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Computer Assisted Formal Reasoning, Program Transformation |
1 | Ira D. Baxter |
Parallel Support for Source Code Analysis and Modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 3-, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Lerina Aversano, Massimiliano Di Penta, Ira D. Baxter |
Handling Preprocessor-Conditioned Declarations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 83-92, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Preprocessor code analysis, multi-platform software, type-checking, symbol table |
1 | Elizabeth Burd, John Oliver Bailey |
Evaluating Clone Detection Tools for Use during Preventative Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 36-43, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Baowen Xu, Zhenqiang Chen, Hongji Yang |
Dynamic Slicing Object-Oriented Programs for Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 115-122, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sudipto Ghosh |
Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 17-25, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Java, software testing, Concurrent programs, testability, faults, mutation analysis, test adequacy |
1 | Terence J. Harmer, F. George Wilkie |
An Extensible Metrics Extraction Environment for Object-Oriented Programming Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 26-35, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Programming language Metrics, Java, Complexity, C++, Object-oriented metrics |
1 | Mark Harman, Lin Hu 0005, Malcolm Munro, Xingyuan Zhang, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya |
An Interprocedural Amorphous Slicer for WSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 105-114, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Byeong-Mo Chang, Jang-Wu Jo, Soon Hee Her |
Visualization of Exception Propagation for Java Using Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 173-, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
exception analysis, Java, set-based analysis, exception propagation |
1 | Filippo Ricca, Paolo Tonella |
Construction of the System Dependence Graph for Web Application Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 123-132, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ana L. Milanova, Atanas Rountev, Barbara G. Ryder |
Precise Call Graph Construction in the Presence of Function Pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 155-162, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Peter Bunus, Peter Fritzson |
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 163-172, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | |
2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-1793-5 The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
1 | Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider |
Grammar Programming in TXL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 93-, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Francoise Balmas |
Using Dependence Graphs as a Support to Document Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 145-154, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mark Harman, Chris Fox, Robert M. Hierons, Lin Hu 0005, Sebastian Danicic, Joachim Wegener |
VADA: A Transformation-Based System for Variable Dependence Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada, pp. 55-64, 2002, IEEE Computer Society, 0-7695-1793-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Variable Dependence Analysis, Program Transformation, Program Slicing |
1 | Andrea De Lucia |
Program Slicing: Methods and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 144-151, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jane Horgan, James F. Power, John Waldron |
Measurement and Analysis of Runtime Profiling Data for Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 124-132, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Bytecode Analysis, Contingency Measure, Java Virtual Machine |
1 | Juergen Rilling, Bhaskar Karanth |
A Hybrid Program Slicing Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 14-25, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
The Formal Transformation Approach to Source Code Analysis and Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 187-195, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
amorphous slicing, conditioned slicing, semantic slicing, Formal Methods, Transformation, Slicing, WSL |
1 | Amit Sharma, Miriam A. M. Capretz |
Application Maintenance Using Software Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 57-66, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
open-source Internet software application, software maintenance, software agents |
1 | Sandro Bartolini, Cosimo Antonio Prete |
An Object Level Transformation Technique to Improve the Performance of Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 26-34, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
procedure reordering, optimization, cache, program transformation, conflict misses |
1 | Paolo Maggi, Riccardo Sisto |
Using Data Flow Analysis to Infer Type Information in Java Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 213-, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
1 | |
1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![IEEE Computer Society, 0-7695-1387-5 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
1 | Günter Kniesel, Pascal Costanza, Michael Austermann |
Jmangler-A Framework for Load-Time Transformation of Java Class Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 100-110, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
JMangler, load-time transformation, class file transformation, class loader, transformer components, independent extensibility |
1 | James M. Bieman, Vanessa Murdock 0001 |
Finding Code on the World Wibe Web: A Preliminary Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 75-80, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
World Wide Web estimation, code on the World Wide Web, Design, source code analysis |
1 | Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo |
Identifying Clones in the Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 92-99, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
metric extraction, clone detection, source code analysis |
1 | Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum |
Flow Insensitive Points-To Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 81-91, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson |
Analysis and Manipulation of Distributed Multi-Language Software Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 45-56, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Byte-code, Profiling, Source code analysis, Change Propagation, Decompiling |
1 | Filippo Ricca, Paolo Tonella, Ira D. Baxter |
Restructuring Web Applications via Transformation Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 152-162, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Web applications, restructuring, transformation rules |
1 | Zhenqiang Chen, Baowen Xu, Hongji Yang |
Detecting Dead Statements for Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 67-74, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
concurrent program flow graph, MHP algorithm, dead statements, rendezvous |
1 | Amie L. Souter, Lori L. Pollock |
Type Infeasible Call Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 196-205, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Call chains, Type Infeasibility |
1 | Liz Burd, Stephen Rank |
Using Automated Source Code Analysis for Software Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 206-212, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
1 | David Byers, Mariam Kamkar |
Static Slicing and Parametric Polymorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 181-186, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Claire Knight |
Smell the Coffee! Uncovering Java Analysis Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 163-169, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Java, Program Comprehension, Source Code Analysis |
1 | Sibylle Schupp, Douglas P. Gregor, David R. Musser |
Library Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 111-123, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Michael L. Van de Vanter |
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 133-143, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
prettyprinting, unparsing, programming languages, program understanding, comments, source code transformations |
1 | Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano |
A Source-to-Source Compiler for Generating Dependable Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 35-44, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider |
Software Engineering by Source Transformation-Experience with TXL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 170-180, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 3-13, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |