Proceedings of the Fourth International Workshop on Source Code Analysis and Manipulation
SCAM, 2004.
@proceedings{SCAM-2004,
address = "Chicago, Illinois, USA",
isbn = "0-7695-2144-4",
publisher = "{IEEE Computer Society}",
title = "{Proceedings of the Fourth International Workshop on Source Code Analysis and Manipulation}",
year = 2004,
}
Contents (17 items)
- SCAM-2004-Rothermel #analysis #source code #using
- Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
- SCAM-2004-SuWHM #pipes and filters
- Software De-Pipelining Technique (BS, JW, EWH, JM), pp. 7–16.
- SCAM-2004-LakhotiaK #detection #obfuscation #stack
- Abstracting Stack to Detect Obfuscated Calls in Binaries (AL, EUK), pp. 17–26.
- SCAM-2004-Krinke #context-sensitive grammar #matter
- Context-Sensitivity Matters, But Context Does Not (JK), pp. 29–35.
- SCAM-2004-Gallagher #interprocedural #slicing
- Some Notes on Interprocedural Program Slicing (KBG), pp. 36–42.
- SCAM-2004-BinkleyDGHKO #execution #formal method #slicing
- Formalizing Executable Dynamic and Forward Slicing (DB, SD, TG, MH, ÁK, LO), pp. 43–52.
- SCAM-2004-NaumannULF #code generation #control flow
- Control Flow Reversal for Adjoint Code Generation (UN, JU, AL, MWF), pp. 55–64.
- SCAM-2004-FatiregunHH #algorithm #evolution #search-based #sequence #using
- Evolving Transformation Sequences using Genetic Algorithms (DF, MH, RMH), pp. 66–75.
- SCAM-2004-XuLZS #clustering
- Program Restructuring Through Clustering Techniques (XX, CHL, MZ, AS), pp. 75–84.
- SCAM-2004-HarmanBSH
- Amorphous Procedure Extraction (MH, DB, RS, RMH), pp. 85–94.
- SCAM-2004-TourweM #concept analysis #mining #using
- Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
- SCAM-2004-CeccatoT #aspect-oriented #programming
- Adding Distribution to Existing Applications by Means of Aspect Oriented Programming (MC, PT), pp. 107–116.
- SCAM-2004-HouHR #c++ #guidelines #programming #specification
- Specifying the Law of Demeter and C++ Programming Guidelines with FCL (DH, HJH, PR), pp. 119–127.
- SCAM-2004-WahlerSGF #clone detection #detection #source code
- Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
- SCAM-2004-BruntinkD #metric #object-oriented #predict #testing #using
- Predicting Class Testability using Object-Oriented Metrics (MB, AvD), pp. 136–145.
- SCAM-2004-RoblesG #analysis #execution #source code
- Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
- SCAM-2004-MaruyamaY #automation #framework #java #platform #representation #source code #using #xml
- A CASE Tool Platform Using an XML Representation of Java Source Code (KM, SY), pp. 158–167.