Proceedings of the First International Workshop on Source Code Analysis and Manipulation
SCAM, 2001.
@proceedings{SCAM-2001,
address = "Florence, Italy",
isbn = "0-7695-1387-5",
publisher = "{IEEE Computer Society}",
title = "{Proceedings of the First International Workshop on Source Code Analysis and Manipulation}",
year = 2001,
}
Contents (23 items)
- SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
- A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
- SCAM-2001-RillingK #framework #hybrid #slicing
- A Hybrid Program Slicing Framework (JR, BK), pp. 14–25.
- SCAM-2001-BartoliniP #embedded #performance
- An Object Level Transformation Technique to Improve the Performance of Embedded Applications (SB, CAP), pp. 26–34.
- SCAM-2001-RebaudengoRVT #compilation #generative #text-to-text
- A Source-to-Source Compiler for Generating Dependable Software (MR, MSR, MV, MT), pp. 35–44.
- SCAM-2001-DeruelleMBB #analysis #distributed #multi
- Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
- SCAM-2001-SharmaC #maintenance #using
- Application Maintenance Using Software Agents (AS, MAMC), pp. 57–66.
- SCAM-2001-ChenXY #concurrent #detection #source code
- Detecting Dead Statements for Concurrent Programs (ZC, BX, HY), pp. 67–74.
- SCAM-2001-BiemanM #web
- Finding Code on the World Wibe Web: A Preliminary Investigation (JMB, VM), pp. 75–80.
- SCAM-2001-AndersonBRT #points-to #set
- Flow Insensitive Points-To Sets (PA, DB, GR, TT), pp. 81–91.
- SCAM-2001-AntoniolVDCM #clone detection #identification #kernel #linux
- Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
- SCAM-2001-KnieselCA #framework #java #named
- Jmangler — A Framework for Load-Time Transformation of Java Class Files (GK, PC, MA), pp. 100–110.
- SCAM-2001-SchuppGM #library
- Library Transformations (SS, DG, DRM), pp. 111–123.
- SCAM-2001-HorganPW #analysis #java #metric #profiling #runtime #source code
- Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
- SCAM-2001-Vanter #source code #tool support
- Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools (MvdV), pp. 133–143.
- SCAM-2001-Lucia #slicing
- Program Slicing: Methods and Applications (ADL), pp. 144–151.
- SCAM-2001-RiccaTB #web
- Restructuring Web Applications via Transformation Rules (FR, PT, IDB), pp. 152–162.
- SCAM-2001-Knight #analysis #exclamation #java #smell
- Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
- SCAM-2001-CordyDMS #re-engineering #txl
- Software Engineering by Source Transformation-Experience with TXL (JRC, TRD, AJM, KAS), pp. 170–180.
- SCAM-2001-ByersK #morphism #parametricity #polymorphism #slicing
- Static Slicing and Parametric Polymorphism (DB, MK), pp. 181–186.
- SCAM-2001-Ward #analysis #approach #source code
- The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
- SCAM-2001-SouterP
- Type Infeasible Call Chains (ALS, LLP), pp. 196–205.
- SCAM-2001-BurdR #analysis #automation #evolution #source code #using
- Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
- SCAM-2001-MaggiS #analysis #bytecode #data flow #java #using
- Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.