Proceedings of the 18th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2018.
Contents (27 items)
- SCAM-2018-HarmanO #problem #program analysis
- From Start-ups to Scale-ups: Opportunities and Open Problems for Static and Dynamic Program Analysis (MH, PWO), pp. 1–23.
- SCAM-2018-GueltonGBCDS #obfuscation #optimisation #research
- [Research Paper] Combining Obfuscation and Optimizations in the Real World (SG, AG, PB, JMMC, FD, NS), pp. 24–33.
- SCAM-2018-KhatchadourianT #automation #java #optimisation #refactoring
- [Engineering Paper] A Tool for Optimizing Java 8 Stream Software via Automated Refactoring (RK, YT, MB, SA), pp. 34–39.
- SCAM-2018-PizzolottoC #bytecode #java #library #obfuscation #research #source code
- [Research Paper] Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries (DP, MC), pp. 40–49.
- SCAM-2018-SchulzeF #evolution #variability
- [Engineering Paper] Analyzing the Evolution of Preprocessor-Based Variability: A Tale of a Thousand and One Scripts (SS, WF), pp. 50–55.
- SCAM-2018-JimenezTP #analysis #security
- [Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7 (MJ, YLT, MP), pp. 56–61.
- SCAM-2018-PaceTG #architecture #predict #research #smell #towards #using
- [Research Paper] Towards Anticipation of Architectural Smells Using Link Prediction Techniques (JADP, AT, DG), pp. 62–71.
- SCAM-2018-KiniT #developer #fault #metric #predict #research
- [Research Paper] Periodic Developer Metrics in Software Defect Prediction (SOK, AT), pp. 72–81.
- SCAM-2018-DeckerNDCMK #question #research #smell
- [Research Paper] Which Method-Stereotype Changes are Indicators of Code Smells? (MJD, CDN, ND, MLC, JIM, NAK), pp. 82–91.
- SCAM-2018-JiangCZPP0 #code search #research #semantics #using
- [Research Paper] Semantics-Based Code Search Using Input/Output Examples (RJ, ZC, ZZ, YP0, MP, TZ0), pp. 92–102.
- SCAM-2018-SasBF #automation #detection #java #library #research
- [Research Paper] Automatic Detection of Sources and Sinks in Arbitrary Java Libraries (DS, MB, FAF), pp. 103–112.
- SCAM-2018-IslamIMRRS #detection #research #transitive #using
- [Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
- SCAM-2018-CosentinoDZRG #source code
- [Engineering Paper] Graal: The Quest for Source Code Knowledge (VC, SD, AZ, GR, JMGB), pp. 123–128.
- SCAM-2018-PughBM #adaptation #recommendation #research
- [Research Paper] The Case for Adaptive Change Recommendation (SP, DWB, LM), pp. 129–138.
- SCAM-2018-NafiRRS #api #detection #documentation #research #similarity #using
- [Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
- SCAM-2018-ChochlovEBIS #identification
- [Engineering Paper] Identifying Feature Clones in a Suite of Systems (MC, ME, JB, DI, MS), pp. 149–154.
- SCAM-2018-MostaeenSRRS #automation #design #machine learning #research #tool support #towards #using #validation
- [Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools (GM, JS, BR, CKR, KAS), pp. 155–164.
- SCAM-2018-KoschkeSB #clone detection #detection
- [Engineering Paper] Built-in Clone Detection in Meta Languages (RK, UBS, BJB), pp. 165–170.
- SCAM-2018-HorvathSGKP #analysis #challenge #implementation
- [Engineering Paper] Challenges of Implementing Cross Translation Unit Analysis in Clang Static Analyzer (GH, PS, ZG, DK, NP), pp. 171–176.
- SCAM-2018-AntalHTFG #case study #comparative #graph #javascript #research
- [Research Paper] Static JavaScript Call Graphs: A Comparative Study (GA, PH, ZT, RF, TG), pp. 177–186.
- SCAM-2018-DiarraMV #optimisation #plugin #source code
- [Engineering Paper] RECKA and RPromF: Two Frama-C Plug-ins for Optimizing Registers Usage in CUDA, OpenACC and OpenMP Programs (RD, AM, BV), pp. 187–192.
- SCAM-2018-MuylaertR #commit #research #slicing #using
- [Research Paper] Untangling Composite Commits Using Program Slicing (WM, CDR), pp. 193–202.
- SCAM-2018-AlreshedyDGSG #automation #classification
- [Engineering Paper] SCC: Automatic Classification of Code Snippets (KA, DD, DMG, VS0, TAG), pp. 203–208.
- SCAM-2018-ShepherdFWFLA #ide #programming
- [Engineering Paper] An IDE for Easy Programming of Simple Robotics Tasks (DCS, PF, DW, DF, BL, AA), pp. 209–214.
- SCAM-2018-SakuraiAG #concurrent #detection #parallel #research
- [Research Paper] POI: Skew-Aware Parallel Race Detection (YS, YA, KG), pp. 215–224.
- SCAM-2018-Larson #automation #regular expression #research
- [Research Paper] Automatic Checking of Regular Expressions (EL), pp. 225–234.
- SCAM-2018-EilersHPB #fine-grained #research #slicing
- [Research Paper] Fine-Grained Model Slicing for Rebel (RE, JH, WP, JB0), pp. 235–244.