Proceedings of the 11th Working Conference on Source Code Analysis and Manipulation
SCAM, 2011.
@proceedings{SCAM-2011,
address = "Williamsburg, Virginia, USA",
isbn = "978-1-4577-0932-6",
publisher = "{IEEE}",
title = "{Proceedings of the 11th Working Conference on Source Code Analysis and Manipulation}",
year = 2011,
}
Contents (21 items)
- SCAM-2011-Black #debugging
- Counting Bugs is Harder Than You Think (PEB), pp. 1–9.
- SCAM-2011-Gold #analysis #music #programming #source code
- Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
- SCAM-2011-Larson #program analysis #set
- Program Analysis Too Loopy? Set the Loops Aside (EL), pp. 15–24.
- SCAM-2011-PavluSK #alias #analysis #comparison #graph #precise #set
- Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
- SCAM-2011-SawinR #algorithm #graph
- Assumption Hierarchy for a CHA Call Graph Construction Algorithm (JS, AR), pp. 35–44.
- SCAM-2011-Keul #analysis
- Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
- SCAM-2011-SyerAZH #android #case study #development #platform
- Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms (MDS, BA, YZ, AEH), pp. 55–64.
- SCAM-2011-MarinescuM #fault #question
- Are the Clients of Flawed Classes (Also) Defect Prone? (RM, CM), pp. 65–74.
- SCAM-2011-CooganD #assembly #equation #reasoning
- Equational Reasoning on x86 Assembly Code (KC, SKD), pp. 75–84.
- SCAM-2011-AvanciniC #approach #search-based #security #testing #web
- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
- SCAM-2011-WangG #case study #linux
- A Study of Cloning in the Linux SCSI Drivers (WW, MWG), pp. 95–104.
- SCAM-2011-ZibranR #approach #constraints #programming #refactoring #scheduling
- A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring (MFZ, CKR), pp. 105–114.
- SCAM-2011-SchulzeJF #preprocessor
- Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
- SCAM-2011-AbebeHTM #concept #smell #source code
- The Effect of Lexicon Bad Smells on Concept Location in Source Code (SLA, SH, PT, AM), pp. 125–134.
- SCAM-2011-KellyAAH #overview #topic
- Recovering a Balanced Overview of Topics in a Software Domain (MBK, JSA, BA, AEH), pp. 135–144.
- SCAM-2011-AlvesHR #case study #comparative #query
- A Comparative Study of Code Query Technologies (TLA, JH, PR), pp. 145–154.
- SCAM-2011-RoubtsovSMB #diagrams #enterprise #java #named #reverse engineering #sequence chart
- I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors (SAR, AS, AM, MvdB), pp. 155–164.
- SCAM-2011-Mehlich #c #memory management #named #validation
- CheckPointer — A C Memory Access Validator (MM), pp. 165–172.
- SCAM-2011-CollardDM #fact extraction #lightweight #semiparsing #tool support
- Lightweight Transformation and Fact Extraction with the srcML Toolkit (MLC, MJD, JIM), pp. 173–184.
- SCAM-2011-NicolayRMJ #automation #higher-order #parallel #source code
- Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs (JN, CDR, WDM, VJ), pp. 185–194.
- SCAM-2011-SfayhiS #analysis #interactive #visualisation #what
- What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.