Proceedings of the 12th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2012.
@proceedings{SCAM-2012, address = "Riva del Garda, Italy", isbn = "978-1-4673-2398-7", publisher = "{IEEE Computer Society}", title = "{Proceedings of the 12th International Working Conference on Source Code Analysis and Manipulation}", year = 2012, }
Contents (22 items)
- SCAM-2012-Xie #analysis #testing
- Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
- SCAM-2012-GutzmannLL #analysis #framework #points-to
- Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
- SCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using
- Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
- SCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using
- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
- SCAM-2012-Vidal #execution #symbolic computation #termination #verification
- Closed Symbolic Execution for Verifying Program Termination (GV), pp. 34–43.
- SCAM-2012-GauthierM #alias #php
- Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications (FG, EM), pp. 44–53.
- SCAM-2012-YuanJ #compilation #named
- CAWDOR: Compiler Assisted Worm Defense (JY, RJ), pp. 54–63.
- SCAM-2012-MurakamiHHIK #clone detection #detection
- Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
- SCAM-2012-Bazrafshan #evolution
- Evolution of Near-Miss Clones (SB), pp. 74–83.
- SCAM-2012-WilcoxSB #optimisation #program transformation
- Optimizing Expression Selection for Lookup Table Program Transformation (CW, MMS, JMB), pp. 84–93.
- SCAM-2012-MayerS #analysis #refactoring
- Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
- SCAM-2012-BavotaCLPOS #debugging #empirical #refactoring
- When Does a Refactoring Induce Bugs? An Empirical Study (GB, BDC, ADL, MDP, RO, OS), pp. 104–113.
- SCAM-2012-Zambon #bytecode #java #obfuscation
- Aucsmith-Like Obfuscation of Java Bytecode (AZ), pp. 114–119.
- SCAM-2012-ZollerS #java #named
- AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
- SCAM-2012-LazarescuL #analysis #c #dependence #parallel #source code
- Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
- SCAM-2012-ThiagarajanHBR #contract #data flow #developer
- Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK (HT, JH, JB, R), pp. 132–137.
- SCAM-2012-KargenS #analysis #comprehension #data flow #named
- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
- SCAM-2012-GethersAP #concept #database #dependence #detection
- Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
- SCAM-2012-VinjuG #complexity #control flow #metric #what
- What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric (JJV, MWG), pp. 154–163.
- SCAM-2012-BusingeSB #eclipse #plugin #predict
- Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases (JB, AS, MvdB), pp. 164–173.
- SCAM-2012-AliSGA #debugging #using
- Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
- SCAM-2012-HillRK #debugging #java #locality #on the #using
- On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
5 ×#analysis
4 ×#java
3 ×#debugging
3 ×#dependence
3 ×#named
3 ×#using
2 ×#compilation
2 ×#data flow
2 ×#detection
2 ×#refactoring
4 ×#java
3 ×#debugging
3 ×#dependence
3 ×#named
3 ×#using
2 ×#compilation
2 ×#data flow
2 ×#detection
2 ×#refactoring