1. SCAM 2001:
Florence,
Italy
1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy.
IEEE Computer Society 2001, ISBN 0-7695-1387-5 BibTeX
@proceedings{DBLP:conf/scam/2001,
title = {1st IEEE International Workshop on Source Code Analysis and Manipulation
(SCAM 2001), 10 November 2001, Florence, Italy},
booktitle = {SCAM},
publisher = {IEEE Computer Society},
year = {2001},
isbn = {0-7695-1387-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Michael Weber, Viren Shah, Chris Ren:
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization.
3-13
Electronic Edition (link) BibTeX
- Juergen Rilling, Bhaskar Karanth:
A Hybrid Program Slicing Framework.
14-25
Electronic Edition (link) BibTeX
- Sandro Bartolini, Cosimo Antonio Prete:
An Object Level Transformation Technique to Improve the Performance of Embedded Applications.
26-34
Electronic Edition (link) BibTeX
- Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano:
A Source-to-Source Compiler for Generating Dependable Software.
35-44
Electronic Edition (link) BibTeX
- Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson:
Analysis and Manipulation of Distributed Multi-Language Software Code.
45-56
Electronic Edition (link) BibTeX
- Amit Sharma, Miriam A. M. Capretz:
Application Maintenance Using Software Agents.
57-66
Electronic Edition (link) BibTeX
- Zhenqiang Chen, Baowen Xu, Hongji Yang:
Detecting Dead Statements for Concurrent Programs.
67-74
Electronic Edition (link) BibTeX
- James M. Bieman, Vanessa Murdock:
Finding Code on the World Wibe Web: A Preliminary Investigation.
75-80
Electronic Edition (link) BibTeX
- Paul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum:
Flow Insensitive Points-To Sets.
81-91
Electronic Edition (link) BibTeX
- Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:
Identifying Clones in the Linux Kernel.
92-99
Electronic Edition (link) BibTeX
- Günter Kniesel, Pascal Costanza, Michael Austermann:
Jmangler-A Framework for Load-Time Transformation of Java Class Files.
100-110
Electronic Edition (link) BibTeX
- Sibylle Schupp, Douglas Gregor, David R. Musser:
Library Transformations.
111-123
Electronic Edition (link) BibTeX
- Jane Horgan, James F. Power, John Waldron:
Measurement and Analysis of Runtime Profiling Data for Java Programs.
124-132
Electronic Edition (link) BibTeX
- Michael L. Van de Vanter:
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools.
133-143
Electronic Edition (link) BibTeX
- Andrea De Lucia:
Program Slicing: Methods and Applications.
144-151
Electronic Edition (link) BibTeX
- Filippo Ricca, Paolo Tonella, Ira D. Baxter:
Restructuring Web Applications via Transformation Rules.
152-162
Electronic Edition (link) BibTeX
- Claire Knight:
Smell the Coffee! Uncovering Java Analysis Issues.
163-169
Electronic Edition (link) BibTeX
- James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation-Experience with TXL.
170-180
Electronic Edition (link) BibTeX
- David Byers, Mariam Kamkar:
Static Slicing and Parametric Polymorphism.
181-186
Electronic Edition (link) BibTeX
- Martin P. Ward:
The Formal Transformation Approach to Source Code Analysis and Manipulation.
187-195
Electronic Edition (link) BibTeX
- Amie L. Souter, Lori L. Pollock:
Type Infeasible Call Chains.
196-205
Electronic Edition (link) BibTeX
- Liz Burd, Stephen Rank:
Using Automated Source Code Analysis for Software Evolution.
206-212
Electronic Edition (link) BibTeX
- Paolo Maggi, Riccardo Sisto:
Using Data Flow Analysis to Infer Type Information in Java Bytecode.
213-
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:36:59 2009
by Michael Ley (ley@uni-trier.de)