Proceedings of the 16th International Working Conference on Source Code Analysis and Manipulation
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter


Proceedings of the 16th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2016.

EVOL
DBLP
Scholar
?EE?
CSDL
Full names Links ISxN
@proceedings{SCAM-2016,
	ee            = "https://ieeexplore.ieee.org/xpl/conhome/7781136/proceeding",
	ee            = "https://www.computer.org/csdl/proceedings/scam/2016/3848/00/index.html",
	isbn          = "978-1-5090-3848-0",
	publisher     = "{IEEE Computer Society}",
	title         = "{Proceedings of the 16th International Working Conference on Source Code Analysis and Manipulation}",
	year          = 2016,
}

Contents (24 items)

SCAM-2016-JimenezPT #case study #kernel #linux #modelling #predict
Vulnerability Prediction Models: A Case Study on the Linux Kernel (MJ, MP, YLT), pp. 1–10.
SCAM-2016-ViticchieRTBCTT #assessment #obfuscation #source code
Assessment of Source Code Obfuscation Techniques (AV, LR, MT, CB, MC, PT, RT), pp. 11–20.
SCAM-2016-BiaseBB #code review #overview #security
A Security Perspective on Code Review: The Case of Chromium (MdB, MB, AB), pp. 21–30.
SCAM-2016-0002G #energy #framework #mobile #optimisation
A Source-Level Energy Optimization Framework for Mobile Applications (XL0, JPG), pp. 31–40.
SCAM-2016-AnicheTZDG #architecture #metric #named
SATT: Tailoring Code Metric Thresholds for Different Software Architectures (MFA, CT, AZ, AvD, MAG), pp. 41–50.
SCAM-2016-DSouzaYL #api #python #recommendation
Collective Intelligence for Smarter API Recommendations in Python (ARD, DY, CVL), pp. 51–60.
SCAM-2016-MingW #concurrent #control flow #multi #named #performance #profiling #thread
BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling (JM0, DW), pp. 61–66.
SCAM-2016-BlanchardKLL #c #composition #named #parallel #plugin #source code #verification
Conc2Seq: A Frama-C Plugin for Verification of Parallel Compositions of C Programs (AB, NK, ML, FL), pp. 67–72.
SCAM-2016-SharmaS #dependence #impact analysis #named
Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis (TS, GS), pp. 73–78.
SCAM-2016-HollandSAK #algorithm #complexity #detection #dynamic analysis #tool support
Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities (BH, GRS, PA, SK), pp. 79–84.
SCAM-2016-StievenartVMR #composition #framework #named #static analysis
Scala-AM: A Modular Static Analysis Framework (QS, MV, WDM, CDR), pp. 85–90.
SCAM-2016-Quante #abstraction #framework #interpreter
A Program Interpreter Framework for Arbitrary Abstractions (JQ), pp. 91–96.
SCAM-2016-MuscoMP #fault #graph #locality
Mutation-Based Graph Inference for Fault Localization (VM, MM, PP), pp. 97–106.
SCAM-2016-PaulaGLSL #case study #interface #repository
An Exploratory Study of Interface Redundancy in Code Repositories (ACdP, EG, CVL, HS, OALL), pp. 107–116.
SCAM-2016-Ragkhitwetsagul #pervasive #similarity #source code
Similarity of Source Code in the Presence of Pervasive Modifications (CR, JK, DC), pp. 117–126.
SCAM-2016-GaoHMW #bound #model checking #named #testing
LLSPLAT: Improving Concolic Testing by Bounded Model Checking (MG0, LH, RM, ZW), pp. 127–136.
SCAM-2016-BaloghGBG #question #testing
Are My Unit Tests in the Right Package? (GB, TG, ÁB, TG), pp. 137–146.
SCAM-2016-KintisPPVM #effectiveness #mutation testing #testing #tool support
Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study (MK, MP, AP, EV, NM), pp. 147–156.
SCAM-2016-MuskeS #overview #static analysis
Survey of Approaches for Handling Static Analysis Alarms (TM, AS), pp. 157–166.
SCAM-2016-LossingGI #c #compilation #concept #dependence #graph #text-to-text
Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers (NL, PG, FI), pp. 167–176.
SCAM-2016-AntalHSBFM #compilation #legacy
Transforming C++11 Code to C++03 to Support Legacy Compilation Environments (GA, DH, IS, ÁB, RF, JM), pp. 177–186.
SCAM-2016-BinkleyL #natural language
A Case for Software Specific Natural Language Techniques (DWB, DJL), pp. 187–196.
SCAM-2016-0006LLE #empirical #interactive
A Source Level Empirical Study of Features and Their Interactions in Variable Software (SF0, LL, RELH, AE), pp. 197–206.
SCAM-2016-MoonenARB #impact analysis #mining
Exploring the Effects of History Length and Age on Mining Software Change Impact (LM, SDA, TR, DWB), pp. 207–216.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.