Proceedings of the Eighth International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the Eighth International Working Conference on Source Code Analysis and Manipulation
SCAM, 2008.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{SCAM-2008,
	address       = "Beijing, China",
	publisher     = "{IEEE}",
	title         = "{Proceedings of the Eighth International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2008,
}

Contents (29 items)

SCAM-2008-Anderson #industrial #static analysis
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
SCAM-2008-FehnkerHRS #assembly #embedded #program analysis
Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
SCAM-2008-ScholzZC #analysis #dependence #graph #reachability
User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
SCAM-2008-GondowKI #analysis #approach #automation #behaviour #c #named #preprocessor
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
SCAM-2008-WangH #c++ #empirical
An Empirical Study of Function Overloading in C++ (CW, DH), pp. 47–56.
SCAM-2008-Krinke #question
Is Cloned Code More Stable than Non-cloned Code? (JK), pp. 57–66.
SCAM-2008-SingerK
Exploiting the Correspondence between Micro Patterns and Class Names (JS, CCK), pp. 67–76.
SCAM-2008-BoogerdM #analysis #data flow #on the #profiling #using
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAM-2008-Zanardini #semantics #slicing
The Semantics of Abstract Program Slicing (DZ), pp. 89–98.
SCAM-2008-PentaCA #detection #evolution #source code
The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
SCAM-2008-HindleGH
From Indentation Shapes to Code Structures (AH, MWG, RCH), pp. 111–120.
SCAM-2008-BinkleyGHLM #analysis
Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
SCAM-2008-LundbergGL #analysis #performance #points-to #precise
Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
SCAM-2008-SunZ #analysis #points-to
Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
SCAM-2008-StoneSB #analysis #automation #data flow #set
Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
SCAM-2008-WangZZ #automation #detection #model checking #program analysis
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
SCAM-2008-GorbovitskiTRSL #analysis #debugging #performance
Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
SCAM-2008-GermanRH #graph #impact analysis
Change Impact Graphs: Determining the Impact of Prior Code Changes (DMG, GR, AEH), pp. 184–193.
SCAM-2008-CeccatoDT #legacy #program transformation #using
Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
SCAM-2008-Mihancea #approach #re-engineering #visual notation
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering (PFM), pp. 207–216.
SCAM-2008-ChuD #ajax #automation #migration #web
Automated Migration of List Based JSP Web Pages to AJAX (JC, TRD), pp. 217–226.
SCAM-2008-ClarkSW #java
Beyond Annotations: A Proposal for Extensible Java (XJ) (TC, PS, JSW), pp. 229–238.
SCAM-2008-Gomez-ZamalloaAP #composition #decompiler #low level #partial evaluation
Modular Decompilation of Low-Level Code by Partial Evaluation (MGZ, EA, GP), pp. 239–248.
SCAM-2008-JiaH #fault #higher-order #mutation testing #testing #using
Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
SCAM-2008-KhatchadourianR #aspect-oriented #evolution
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software (RK, AR), pp. 261–262.
SCAM-2008-Cifuentes #c #debugging #named #scalability
Parfait — A Scalable Bug Checker for C Code (CC), pp. 263–264.
SCAM-2008-RodriguesB #coordination #legacy #named
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code (NFR, LSB), pp. 265–266.
SCAM-2008-GiffhornH #analysis #java #precise #source code #using
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAM-2008-YangGQW #fault #named #testing
DTS — A Software Defects Testing System (ZHY, YZG, XQ, WYW), pp. 269–270.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.