Proceedings of the Eighth International Working Conference on Source Code Analysis and Manipulation
SCAM, 2008.
@proceedings{SCAM-2008,
address = "Beijing, China",
publisher = "{IEEE}",
title = "{Proceedings of the Eighth International Working Conference on Source Code Analysis and Manipulation}",
year = 2008,
}
Contents (29 items)
- SCAM-2008-Anderson #industrial #static analysis
- 90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
- SCAM-2008-FehnkerHRS #assembly #embedded #program analysis
- Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
- SCAM-2008-ScholzZC #analysis #dependence #graph #reachability
- User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
- SCAM-2008-GondowKI #analysis #approach #automation #behaviour #c #named #preprocessor
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
- SCAM-2008-WangH #c++ #empirical
- An Empirical Study of Function Overloading in C++ (CW, DH), pp. 47–56.
- SCAM-2008-Krinke #question
- Is Cloned Code More Stable than Non-cloned Code? (JK), pp. 57–66.
- SCAM-2008-SingerK
- Exploiting the Correspondence between Micro Patterns and Class Names (JS, CCK), pp. 67–76.
- SCAM-2008-BoogerdM #analysis #data flow #on the #profiling #using
- On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
- SCAM-2008-Zanardini #semantics #slicing
- The Semantics of Abstract Program Slicing (DZ), pp. 89–98.
- SCAM-2008-PentaCA #detection #evolution #source code
- The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
- SCAM-2008-HindleGH
- From Indentation Shapes to Code Structures (AH, MWG, RCH), pp. 111–120.
- SCAM-2008-BinkleyGHLM #analysis
- Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
- SCAM-2008-LundbergGL #analysis #performance #points-to #precise
- Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
- SCAM-2008-SunZ #analysis #points-to
- Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
- SCAM-2008-StoneSB #analysis #automation #data flow #set
- Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
- SCAM-2008-WangZZ #automation #detection #model checking #program analysis
- Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
- SCAM-2008-GorbovitskiTRSL #analysis #debugging #performance
- Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
- SCAM-2008-GermanRH #graph #impact analysis
- Change Impact Graphs: Determining the Impact of Prior Code Changes (DMG, GR, AEH), pp. 184–193.
- SCAM-2008-CeccatoDT #legacy #program transformation #using
- Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
- SCAM-2008-Mihancea #approach #re-engineering #visual notation
- Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering (PFM), pp. 207–216.
- SCAM-2008-ChuD #ajax #automation #migration #web
- Automated Migration of List Based JSP Web Pages to AJAX (JC, TRD), pp. 217–226.
- SCAM-2008-ClarkSW #java
- Beyond Annotations: A Proposal for Extensible Java (XJ) (TC, PS, JSW), pp. 229–238.
- SCAM-2008-Gomez-ZamalloaAP #composition #decompiler #low level #partial evaluation
- Modular Decompilation of Low-Level Code by Partial Evaluation (MGZ, EA, GP), pp. 239–248.
- SCAM-2008-JiaH #fault #higher-order #mutation testing #testing #using
- Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
- SCAM-2008-KhatchadourianR #aspect-oriented #evolution
- Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software (RK, AR), pp. 261–262.
- SCAM-2008-Cifuentes #c #debugging #named #scalability
- Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
- SCAM-2008-RodriguesB #coordination #legacy #named
- CoordInspector: A Tool for Extracting Coordination Data from Legacy Code (NFR, LSB), pp. 265–266.
- SCAM-2008-GiffhornH #analysis #java #precise #source code #using
- Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
- SCAM-2008-YangGQW #fault #named #testing
- DTS — A Software Defects Testing System (ZHY, YZG, XQ, WYW), pp. 269–270.
9 ×#analysis
4 ×#automation
4 ×#named
3 ×#using
2 ×#approach
2 ×#c
2 ×#data flow
2 ×#debugging
2 ×#detection
2 ×#evolution
4 ×#automation
4 ×#named
3 ×#using
2 ×#approach
2 ×#c
2 ×#data flow
2 ×#debugging
2 ×#detection
2 ×#evolution