Proceedings of the 10th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2010.
@proceedings{SCAM-2010, address = "Timisoara, Romania", isbn = "978-0-7695-4178-5", publisher = "{IEEE Computer Society}", title = "{Proceedings of the 10th International Working Conference on Source Code Analysis and Manipulation}", year = 2010, }
Contents (21 items)
- SCAM-2010-Zeller #in the large #learning #mining #modelling
- Learning from 6,000 Projects: Mining Models in the Large (AZ), pp. 3–6.
- SCAM-2010-Harman #analysis #source code #why
- Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
- SCAM-2010-WheelerB #subclass
- Subclass Instantiation Distribution (AW, DB), pp. 23–32.
- SCAM-2010-UjhaziFPG #concept #metric #object-oriented
- New Conceptual Coupling and Cohesion Metrics for Object-Oriented Systems (BU, RF, DP, TG), pp. 33–42.
- SCAM-2010-AllierVDS #graph #metric
- Deriving Coupling Metrics from Call Graphs (SA, SV, BD, HAS), pp. 43–52.
- SCAM-2010-ThomasAHB #evolution #modelling #topic #using #validation
- Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
- SCAM-2010-GrantC #analysis #concept #source code
- Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
- SCAM-2010-BrixtelFLBR #clone detection #detection #independence
- Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
- SCAM-2010-SahaAZRS #empirical
- Evaluating Code Clone Genealogies at Release Level: An Empirical Study (RKS, MA, MFZ, CKR, KAS), pp. 87–96.
- SCAM-2010-Pise #generative #parsing
- The Fika Parser Generator (MP), pp. 99–100.
- SCAM-2010-BastenS #ambiguity #detection #named
- AMBIDEXTER: Practical Ambiguity Detection (BB, TvdS), pp. 101–102.
- SCAM-2010-Graf #dependence #generative
- Speeding Up Context-, Object- and Field-Sensitive SDG Generation (JG), pp. 105–114.
- SCAM-2010-KesterMB #concurrent #debugging #how #question #static analysis
- How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
- SCAM-2010-EdvinssonLL #analysis #parallel #reachability
- Parallel Reachability and Escape Analyses (ME, JL, WL), pp. 125–134.
- SCAM-2010-LuoHDQ #concurrent #debugging #effectiveness #java #static analysis
- Effective Static Analysis to Find Concurrency Bugs in Java (ZDL, LH, RD, YQ), pp. 135–144.
- SCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming #using
- Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
- SCAM-2010-LiT #composition #erlang #maintenance #refactoring
- Refactoring Support for Modularity Maintenance in Erlang (HL, SJT), pp. 157–166.
- SCAM-2010-Borok-NagyMMPP #c++ #metaprogramming #visualisation
- Visualization of C++ Template Metaprograms (ZBN, VM, JM, NP, ZP), pp. 167–176.
- SCAM-2010-TroshinaDC #decompiler #re-engineering
- Reconstruction of Composite Types for Decompilation (KT, YD, AC), pp. 179–188.
- SCAM-2010-KetterlinC #behaviour #execution #memory management #source code
- Recovering the Memory Behavior of Executable Programs (AK, PC), pp. 189–198.
- SCAM-2010-SimpsonB #c #memory management #named #runtime #safety
- MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.
3 ×#analysis
3 ×#source code
2 ×#concept
2 ×#concurrent
2 ×#debugging
2 ×#detection
2 ×#generative
2 ×#memory management
2 ×#metric
2 ×#modelling
3 ×#source code
2 ×#concept
2 ×#concurrent
2 ×#debugging
2 ×#detection
2 ×#generative
2 ×#memory management
2 ×#metric
2 ×#modelling