Proceedings of the 10th International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the 10th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2010.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{SCAM-2010,
	address       = "Timisoara, Romania",
	isbn          = "978-0-7695-4178-5",
	publisher     = "{IEEE Computer Society}",
	title         = "{Proceedings of the 10th International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2010,
}

Contents (21 items)

SCAM-2010-Zeller #in the large #learning #mining #modelling
Learning from 6,000 Projects: Mining Models in the Large (AZ), pp. 3–6.
SCAM-2010-Harman #analysis #source code #why
Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
SCAM-2010-WheelerB #subclass
Subclass Instantiation Distribution (AW, DB), pp. 23–32.
SCAM-2010-UjhaziFPG #concept #metric #object-oriented
New Conceptual Coupling and Cohesion Metrics for Object-Oriented Systems (BU, RF, DP, TG), pp. 33–42.
SCAM-2010-AllierVDS #graph #metric
Deriving Coupling Metrics from Call Graphs (SA, SV, BD, HAS), pp. 43–52.
SCAM-2010-ThomasAHB #evolution #modelling #topic #using #validation
Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
SCAM-2010-GrantC #analysis #concept #source code
Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
SCAM-2010-BrixtelFLBR #clone detection #detection #independence
Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
SCAM-2010-SahaAZRS #empirical
Evaluating Code Clone Genealogies at Release Level: An Empirical Study (RKS, MA, MFZ, CKR, KAS), pp. 87–96.
SCAM-2010-Pise #generative #parsing
The Fika Parser Generator (MP), pp. 99–100.
SCAM-2010-BastenS #ambiguity #detection #named
AMBIDEXTER: Practical Ambiguity Detection (BB, TvdS), pp. 101–102.
SCAM-2010-Graf #dependence #generative
Speeding Up Context-, Object- and Field-Sensitive SDG Generation (JG), pp. 105–114.
SCAM-2010-KesterMB #concurrent #debugging #how #question #static analysis
How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
SCAM-2010-EdvinssonLL #analysis #parallel #reachability
Parallel Reachability and Escape Analyses (ME, JL, WL), pp. 125–134.
SCAM-2010-LuoHDQ #concurrent #debugging #effectiveness #java #static analysis
Effective Static Analysis to Find Concurrency Bugs in Java (ZDL, LH, RD, YQ), pp. 135–144.
SCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming #using
Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
SCAM-2010-LiT #composition #erlang #maintenance #refactoring
Refactoring Support for Modularity Maintenance in Erlang (HL, SJT), pp. 157–166.
SCAM-2010-Borok-NagyMMPP #c++ #metaprogramming #visualisation
Visualization of C++ Template Metaprograms (ZBN, VM, JM, NP, ZP), pp. 167–176.
SCAM-2010-TroshinaDC #decompiler #re-engineering
Reconstruction of Composite Types for Decompilation (KT, YD, AC), pp. 179–188.
SCAM-2010-KetterlinC #behaviour #execution #memory management #source code
Recovering the Memory Behavior of Executable Programs (AK, PC), pp. 189–198.
SCAM-2010-SimpsonB #c #memory management #named #runtime #safety
MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.