Proceedings of the 11th Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the 11th Working Conference on Source Code Analysis and Manipulation
SCAM, 2011.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{SCAM-2011,
	address       = "Williamsburg, Virginia, USA",
	isbn          = "978-1-4577-0932-6",
	publisher     = "{IEEE}",
	title         = "{Proceedings of the 11th Working Conference on Source Code Analysis and Manipulation}",
	year          = 2011,
}

Contents (21 items)

SCAM-2011-Black #debugging
Counting Bugs is Harder Than You Think (PEB), pp. 1–9.
SCAM-2011-Gold #analysis #music #programming #source code
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
SCAM-2011-Larson #program analysis #set
Program Analysis Too Loopy? Set the Loops Aside (EL), pp. 15–24.
SCAM-2011-PavluSK #alias #analysis #comparison #graph #precise #set
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
SCAM-2011-SawinR #algorithm #graph
Assumption Hierarchy for a CHA Call Graph Construction Algorithm (JS, AR), pp. 35–44.
SCAM-2011-Keul #analysis
Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
SCAM-2011-SyerAZH #android #case study #development #platform
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms (MDS, BA, YZ, AEH), pp. 55–64.
SCAM-2011-MarinescuM #fault #question
Are the Clients of Flawed Classes (Also) Defect Prone? (RM, CM), pp. 65–74.
SCAM-2011-CooganD #assembly #equation #reasoning
Equational Reasoning on x86 Assembly Code (KC, SKD), pp. 75–84.
SCAM-2011-AvanciniC #approach #search-based #security #testing #web
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
SCAM-2011-WangG #case study #linux
A Study of Cloning in the Linux SCSI Drivers (WW, MWG), pp. 95–104.
SCAM-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
SCAM-2011-SchulzeJF #preprocessor
Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
SCAM-2011-AbebeHTM #concept #smell #source code
The Effect of Lexicon Bad Smells on Concept Location in Source Code (SLA, SH, PT, AM), pp. 125–134.
SCAM-2011-KellyAAH #overview #topic
Recovering a Balanced Overview of Topics in a Software Domain (MBK, JSA, BA, AEH), pp. 135–144.
SCAM-2011-AlvesHR #case study #comparative #query
A Comparative Study of Code Query Technologies (TLA, JH, PR), pp. 145–154.
SCAM-2011-RoubtsovSMB #diagrams #enterprise #java #named #reverse engineering #sequence chart
I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors (SAR, AS, AM, MvdB), pp. 155–164.
SCAM-2011-Mehlich #c #memory management #named #validation
CheckPointer — A C Memory Access Validator (MM), pp. 165–172.
SCAM-2011-CollardDM #fact extraction #lightweight #semiparsing #tool support
Lightweight Transformation and Fact Extraction with the srcML Toolkit (MLC, MJD, JIM), pp. 173–184.
SCAM-2011-NicolayRMJ #automation #higher-order #parallel #source code
Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs (JN, CDR, WDM, VJ), pp. 185–194.
SCAM-2011-SfayhiS #analysis #interactive #visualisation #what
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.