Proceedings of the First International Workshop on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the First International Workshop on Source Code Analysis and Manipulation
SCAM, 2001.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{SCAM-2001,
	address       = "Florence, Italy",
	isbn          = "0-7695-1387-5",
	publisher     = "{IEEE Computer Society}",
	title         = "{Proceedings of the First International Workshop on Source Code Analysis and Manipulation}",
	year          = 2001,
}

Contents (23 items)

SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
SCAM-2001-RillingK #framework #hybrid #slicing
A Hybrid Program Slicing Framework (JR, BK), pp. 14–25.
SCAM-2001-BartoliniP #embedded #performance
An Object Level Transformation Technique to Improve the Performance of Embedded Applications (SB, CAP), pp. 26–34.
SCAM-2001-RebaudengoRVT #compilation #generative #text-to-text
A Source-to-Source Compiler for Generating Dependable Software (MR, MSR, MV, MT), pp. 35–44.
SCAM-2001-DeruelleMBB #analysis #distributed #multi
Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
SCAM-2001-SharmaC #maintenance #using
Application Maintenance Using Software Agents (AS, MAMC), pp. 57–66.
SCAM-2001-ChenXY #concurrent #detection #source code
Detecting Dead Statements for Concurrent Programs (ZC, BX, HY), pp. 67–74.
SCAM-2001-BiemanM #web
Finding Code on the World Wibe Web: A Preliminary Investigation (JMB, VM), pp. 75–80.
SCAM-2001-AndersonBRT #points-to #set
Flow Insensitive Points-To Sets (PA, DB, GR, TT), pp. 81–91.
SCAM-2001-AntoniolVDCM #clone detection #identification #kernel #linux
Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
SCAM-2001-KnieselCA #framework #java #named
Jmangler — A Framework for Load-Time Transformation of Java Class Files (GK, PC, MA), pp. 100–110.
SCAM-2001-SchuppGM #library
Library Transformations (SS, DG, DRM), pp. 111–123.
SCAM-2001-HorganPW #analysis #java #metric #profiling #runtime #source code
Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
SCAM-2001-Vanter #source code #tool support
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools (MvdV), pp. 133–143.
SCAM-2001-Lucia #slicing
Program Slicing: Methods and Applications (ADL), pp. 144–151.
SCAM-2001-RiccaTB #web
Restructuring Web Applications via Transformation Rules (FR, PT, IDB), pp. 152–162.
SCAM-2001-Knight #analysis #exclamation #java #smell
Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
SCAM-2001-CordyDMS #re-engineering #txl
Software Engineering by Source Transformation-Experience with TXL (JRC, TRD, AJM, KAS), pp. 170–180.
SCAM-2001-ByersK #morphism #parametricity #polymorphism #slicing
Static Slicing and Parametric Polymorphism (DB, MK), pp. 181–186.
SCAM-2001-Ward #analysis #approach #source code
The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
SCAM-2001-SouterP
Type Infeasible Call Chains (ALS, LLP), pp. 196–205.
SCAM-2001-BurdR #analysis #automation #evolution #source code #using
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAM-2001-MaggiS #analysis #bytecode #data flow #java #using
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.