Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richard E. Jones, Andy C. King |
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman |
Forward slices are smaller than backward slices. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Singer |
Concept Assignment as a Debugging Technique for Code Generators. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Message from the Chairs. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Title Page. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Program Committee. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nerina Bermudo, Andreas Krall, R. Nigel Horspool |
Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Beat Fluri, Harald C. Gall, Martin Pinzger 0001 |
Fine-Grained Analysis of Change Couplings. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hyoung Seok Hong, Insup Lee 0001, Oleg Sokolsky |
Abstract Slicing: A New Approach to Program Slicing Based on Abstract Interpretation and Model Checking. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss 0001, Bogdan Korel |
Minimal Slicing and the Relationships Between Forms of Slicing. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Attila Szegedi, Tibor Gyimóthy |
Dynamic Slicing of Java Bytecode Programs. |
SCAM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA |
SCAM |
2004 |
DBLP BibTeX RDF |
|
1 | Mark Harman, David W. Binkley, Ranjit Singh, Robert M. Hierons |
Amorphous Procedure Extraction. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mariano Ceccato, Paolo Tonella |
Adding Distribution to Existing Applications by Means of Aspect Oriented Programming. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Vera Wahler, Dietmar Seipel, Jürgen Wolff von Gudenberg, Gregor Fischer |
Clone Detection in Source Code by Frequent Itemset Techniques. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss 0001, Lahcen Ouarbya |
Formalizing Executable Dynamic and Forward Slicing. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tom Tourwé, Kim Mens |
Mining Aspectual Views using Formal Concept Analysis. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bogong Su, Jian Wang 0046, Erh-Wen Hu, Joseph B. Manzano |
Software De-Pipelining Technique. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Context-Sensitivity Matters, But Context Does Not. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Daqing Hou, H. James Hoover, Piotr Rudnicki |
Specifying the Law of Demeter and C++ Programming Guidelines with FCL. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Arun Lakhotia, Eric Uday Kumar |
Abstracting Stack to Detect Obfuscated Calls in Binaries. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Deji Fatiregun, Mark Harman, Robert M. Hierons |
Evolving Transformation Sequences using Genetic Algorithms. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xia Xu, Chung-Horng Lung, Marzia Zaman, Anand Srinivasan |
Program Restructuring Through Clustering Techniques. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Magiel Bruntink, Arie van Deursen |
Predicting Class Testability using Object-Oriented Metrics. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Katsuhisa Maruyama, Shinichiro Yamamoto |
A CASE Tool Platform Using an XML Representation of Java Source Code. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Uwe Naumann, Jean Utke, Andrew Lyons, Michael W. Fagan |
Control Flow Reversal for Adjoint Code Generation. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gregg Rothermel |
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gregorio Robles, Jesús M. González-Barahona |
Executable Source Code and Non-Executable Source Code: Analysis and Relationships. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Gallagher |
Some Notes on Interprocedural Program Slicing. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Rajeev Kulkarni, S. Ramesh 0001 |
Static Slicing of Reactive Programs. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Karina Olmos, Eelco Visser |
Turning Dynamic Typing into Static Typing by Program Specialization in a Compiler Front-end for Octave. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Moseley, Saumya K. Debray, Gregory R. Andrews |
Checking Program Profiles. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David W. Binkley, Mark Harman |
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael English, Jim Buckley, Tony Cahill |
Applying Meyer's Taxonomy to Object-Oriented Software Systems. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David J. Pearce 0001, Paul H. J. Kelly, Chris Hankin |
Online Cycle Detection and Difference Propagation for Pointer Analysis. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | António Menezes Leitão |
Detection of Redundant Code using R2D2. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Giuliano Antoniol, Massimiliano Di Penta, Gianluca Masone, Umberto Villano |
XOgastan: XML-Oriented gcc AST Analysis and Transformations. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
source code analysis tools, XML, gcc, GXL |
1 | Chris Verhoef |
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Neil Walkinshaw, Marc Roper, Murray Wood |
The Java System Dependence Graph. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | |
3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 26-27 September 2003, Amsterdam, The Netherlands |
SCAM |
2003 |
DBLP BibTeX RDF |
|
1 | Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Katsuro Inoue |
Design and Implementation of Bytecode-based Java Slicing System. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Richard Wheeldon, Steve Counsell |
Power Law Distributions in Class Relationships. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jan Kort, Ralf Lämmel |
Parse-Tree Annotations Meet Re-Engineering Concerns. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Marie Favre |
CPP Denotational Semantics. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Otto Skrove Bagge, Karl Trygve Kalleberg, Magne Haveraaen, Eelco Visser |
Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu Martel |
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Xinping Guo, James R. Cordy, Thomas R. Dean |
Unique Renaming of Java Using Source Transformation. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jens Krinke |
Barrier Slicing and Chopping. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ákos Kiss 0001, Judit Jász, Gábor Lehotai, Tibor Gyimóthy |
Interprocedural Static Slicing of Binary Executables. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
Slicing the SCAM Mug: A Case Study in Semantic Slicing. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Maxim Mossienko, Oleg Khaschansky, Dmitriy Antonov, Oleg Smirnov, Anton Gubanov |
Towards managing environment dependence during legacy systems renovation and maintenance. |
SCAM |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Christian H. Bischof, H. Martin Bücker, Bruno Lang, Arno Rasch, Andre Vehreschild |
Combining Source Transformation and Operator Overloading Techniques to Compute Derivatives for MATLAB Programs. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
operator overloading, MATLAB, high-level language, automatic differentiation, derivatives, source transformation |
1 | Frederick V. Ramsey, James J. Alpigini |
A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Juergen Rilling, Hon Fung Li, Dhrubajyoti Goswami |
Predicate-Based Dynamic Slicing of Message Passing Programs. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
predicate slice, predicate trace, message passing, program comprehension, Program slicing |
1 | Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu 0005 |
Mechanized Operational Semantics of WSL. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
Computer Assisted Formal Reasoning, Program Transformation |
1 | Ira D. Baxter |
Parallel Support for Source Code Analysis and Modification. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Lerina Aversano, Massimiliano Di Penta, Ira D. Baxter |
Handling Preprocessor-Conditioned Declarations. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
Preprocessor code analysis, multi-platform software, type-checking, symbol table |
1 | Elizabeth Burd, John Oliver Bailey |
Evaluating Clone Detection Tools for Use during Preventative Maintenance. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Baowen Xu, Zhenqiang Chen, Hongji Yang |
Dynamic Slicing Object-Oriented Programs for Debugging. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sudipto Ghosh |
Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
Java, software testing, Concurrent programs, testability, faults, mutation analysis, test adequacy |
1 | Terence J. Harmer, F. George Wilkie |
An Extensible Metrics Extraction Environment for Object-Oriented Programming Languages. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
Programming language Metrics, Java, Complexity, C++, Object-oriented metrics |
1 | Mark Harman, Lin Hu 0005, Malcolm Munro, Xingyuan Zhang, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya |
An Interprocedural Amorphous Slicer for WSL. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Byeong-Mo Chang, Jang-Wu Jo, Soon Hee Her |
Visualization of Exception Propagation for Java Using Static Analysis. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
exception analysis, Java, set-based analysis, exception propagation |
1 | Filippo Ricca, Paolo Tonella |
Construction of the System Dependence Graph for Web Application Slicing. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ana L. Milanova, Atanas Rountev, Barbara G. Ryder |
Precise Call Graph Construction in the Presence of Function Pointers. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Peter Bunus, Peter Fritzson |
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | |
2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 1 October 2002, Montreal, Canada |
SCAM |
2002 |
DBLP BibTeX RDF |
|
1 | Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider |
Grammar Programming in TXL. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Francoise Balmas |
Using Dependence Graphs as a Support to Document Programs. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mark Harman, Chris Fox, Robert M. Hierons, Lin Hu 0005, Sebastian Danicic, Joachim Wegener |
VADA: A Transformation-Based System for Variable Dependence Analysis. |
SCAM |
2002 |
DBLP DOI BibTeX RDF |
Variable Dependence Analysis, Program Transformation, Program Slicing |
1 | Andrea De Lucia |
Program Slicing: Methods and Applications. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jane Horgan, James F. Power, John Waldron |
Measurement and Analysis of Runtime Profiling Data for Java Programs. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Bytecode Analysis, Contingency Measure, Java Virtual Machine |
1 | Juergen Rilling, Bhaskar Karanth |
A Hybrid Program Slicing Framework. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Martin P. Ward |
The Formal Transformation Approach to Source Code Analysis and Manipulation. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
amorphous slicing, conditioned slicing, semantic slicing, Formal Methods, Transformation, Slicing, WSL |
1 | Amit Sharma, Miriam A. M. Capretz |
Application Maintenance Using Software Agents. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
open-source Internet software application, software maintenance, software agents |
1 | Sandro Bartolini, Cosimo Antonio Prete |
An Object Level Transformation Technique to Improve the Performance of Embedded Applications. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
procedure reordering, optimization, cache, program transformation, conflict misses |
1 | Paolo Maggi, Riccardo Sisto |
Using Data Flow Analysis to Infer Type Information in Java Bytecode. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
1 | |
1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy |
SCAM |
2001 |
DBLP BibTeX RDF |
|
1 | Günter Kniesel, Pascal Costanza, Michael Austermann |
Jmangler-A Framework for Load-Time Transformation of Java Class Files. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
JMangler, load-time transformation, class file transformation, class loader, transformer components, independent extensibility |
1 | James M. Bieman, Vanessa Murdock 0001 |
Finding Code on the World Wibe Web: A Preliminary Investigation. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
World Wide Web estimation, code on the World Wide Web, Design, source code analysis |
1 | Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo |
Identifying Clones in the Linux Kernel. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
metric extraction, clone detection, source code analysis |
1 | Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum |
Flow Insensitive Points-To Sets. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson |
Analysis and Manipulation of Distributed Multi-Language Software Code. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Byte-code, Profiling, Source code analysis, Change Propagation, Decompiling |
1 | Filippo Ricca, Paolo Tonella, Ira D. Baxter |
Restructuring Web Applications via Transformation Rules. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Web applications, restructuring, transformation rules |
1 | Zhenqiang Chen, Baowen Xu, Hongji Yang |
Detecting Dead Statements for Concurrent Programs. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
concurrent program flow graph, MHP algorithm, dead statements, rendezvous |
1 | Amie L. Souter, Lori L. Pollock |
Type Infeasible Call Chains. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Call chains, Type Infeasibility |
1 | Liz Burd, Stephen Rank |
Using Automated Source Code Analysis for Software Evolution. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
1 | David Byers, Mariam Kamkar |
Static Slicing and Parametric Polymorphism. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Claire Knight |
Smell the Coffee! Uncovering Java Analysis Issues. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
Java, Program Comprehension, Source Code Analysis |
1 | Sibylle Schupp, Douglas P. Gregor, David R. Musser |
Library Transformations. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Michael L. Van de Vanter |
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
prettyprinting, unparsing, programming languages, program understanding, comments, source code transformations |
1 | Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano |
A Source-to-Source Compiler for Generating Dependable Software. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider |
Software Engineering by Source Transformation-Experience with TXL. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |