Proceedings of the Third International Workshop on Source Code Analysis and Manipulation
SCAM, 2003.
@proceedings{SCAM-2003, address = "Amsterdam, The Netherlands", isbn = "0-7695-2005-7", publisher = "{IEEE Computer Society}", title = "{Proceedings of the Third International Workshop on Source Code Analysis and Manipulation}", year = 2003, }
Contents (21 items)
- SCAM-2003-PearceKH #analysis #detection #difference #online #pointer
- Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
- SCAM-2003-Martel #clustering #static analysis
- Improving the Static Analysis of Loops by Dynamic Partitioning Techniques (MM), pp. 13–21.
- SCAM-2003-Favre #semantics
- CPP Denotational Semantics (JMF), p. 22–?.
- SCAM-2003-EnglishBC #object-oriented #taxonomy
- Applying Meyer’s Taxonomy to Object-Oriented Software Systems (ME, JB, TC), pp. 35–44.
- SCAM-2003-WheeldonC
- Power Law Distributions in Class Relationships (RW, SC), pp. 45–54.
- SCAM-2003-WalkinshawRW #dependence #graph #java
- The Java System Dependence Graph (NW, MR, MW), pp. 55–64.
- SCAM-2003-BaggeKHV #c++ #design #optimisation #source code
- Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs (OSB, KTK, MH, EV), p. 65–?.
- SCAM-2003-Verhoef #analysis #multi #source code #using
- Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
- SCAM-2003-Krinke #slicing
- Barrier Slicing and Chopping (JK), pp. 81–87.
- SCAM-2003-Ward #case study #semantics #slicing
- Slicing the SCAM Mug: A Case Study in Semantic Slicing (MPW), pp. 88–97.
- SCAM-2003-KulkarniR #slicing #source code
- Static Slicing of Reactive Programs (ARK, SR), pp. 98–107.
- SCAM-2003-UmemoriKYI #design #implementation #java #slicing
- Design and Implementation of Bytecode-based Java Slicing System (FU, KK, RY, KI), pp. 108–117.
- SCAM-2003-KissJLG #bytecode #interprocedural #slicing
- Interprocedural Static Slicing of Binary Executables (ÁK, JJ, GL, TG), p. 118–?.
- SCAM-2003-MossienkoKASG #dependence #legacy #maintenance #towards
- Towards managing environment dependence during legacy systems renovation and maintenance (MM, OK, DA, OS, AG), pp. 131–140.
- SCAM-2003-OlmosV #compilation #dynamic typing #static typing #type system
- Turning Dynamic Typing into Static Typing by Program Specialization in a Compiler Front-end for Octave (KO, EV), pp. 141–150.
- SCAM-2003-GuoCD #java #using
- Unique Renaming of Java Using Source Transformation (XG, JRC, TRD), pp. 151–160.
- SCAM-2003-KortL #re-engineering
- Parse-Tree Annotations Meet Re-Engineering Concerns (JK, RL), p. 161–?.
- SCAM-2003-AntoniolPMV #abstract syntax tree #analysis #named #xml
- XOgastan: XML-Oriented gcc AST Analysis and Transformations (GA, MDP, GM, UV), pp. 173–182.
- SCAM-2003-Leitao #2d #detection #using
- Detection of Redundant Code using R2D2 (AML), pp. 183–192.
- SCAM-2003-MoseleyDA
- Checking Program Profiles (PM, SKD, GRA), pp. 193–202.
- SCAM-2003-BinkleyH #algorithm #analysis #graph #optimisation #performance #reachability #scalability #source code
- Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
5 ×#slicing
4 ×#analysis
4 ×#source code
3 ×#java
3 ×#using
2 ×#dependence
2 ×#design
2 ×#detection
2 ×#graph
2 ×#optimisation
4 ×#analysis
4 ×#source code
3 ×#java
3 ×#using
2 ×#dependence
2 ×#design
2 ×#detection
2 ×#graph
2 ×#optimisation