default search action
1st SCAM 2001: Florence, Italy
- 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy. IEEE Computer Society 2001, ISBN 0-7695-1387-5
- Michael Weber, Viren Shah, Chris Ren:
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. 3-13 - Juergen Rilling, Bhaskar Karanth:
A Hybrid Program Slicing Framework. 14-25 - Sandro Bartolini, Cosimo Antonio Prete:
An Object Level Transformation Technique to Improve the Performance of Embedded Applications. 26-34 - Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano:
A Source-to-Source Compiler for Generating Dependable Software. 35-44 - Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson:
Analysis and Manipulation of Distributed Multi-Language Software Code. 45-56 - Amit Sharma, Miriam A. M. Capretz:
Application Maintenance Using Software Agents. 57-66 - Zhenqiang Chen, Baowen Xu, Hongji Yang:
Detecting Dead Statements for Concurrent Programs. 67-74 - James M. Bieman, Vanessa Murdock:
Finding Code on the World Wibe Web: A Preliminary Investigation. 75-80 - Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:
Flow Insensitive Points-To Sets. 81-91 - Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:
Identifying Clones in the Linux Kernel. 92-99 - Günter Kniesel, Pascal Costanza, Michael Austermann:
Jmangler-A Framework for Load-Time Transformation of Java Class Files. 100-110 - Sibylle Schupp, Douglas P. Gregor, David R. Musser:
Library Transformations. 111-123 - Jane Horgan, James F. Power, John Waldron:
Measurement and Analysis of Runtime Profiling Data for Java Programs. 124-132 - Michael L. Van de Vanter:
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. 133-143 - Andrea De Lucia:
Program Slicing: Methods and Applications. 144-151 - Filippo Ricca, Paolo Tonella, Ira D. Baxter:
Restructuring Web Applications via Transformation Rules. 152-162 - Claire Knight:
Smell the Coffee! Uncovering Java Analysis Issues. 163-169 - James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation-Experience with TXL. 170-180 - David Byers, Mariam Kamkar:
Static Slicing and Parametric Polymorphism. 181-186 - Martin P. Ward:
The Formal Transformation Approach to Source Code Analysis and Manipulation. 187-195 - Amie L. Souter, Lori L. Pollock:
Type Infeasible Call Chains. 196-205 - Liz Burd, Stephen Rank:
Using Automated Source Code Analysis for Software Evolution. 206-212 - Paolo Maggi, Riccardo Sisto:
Using Data Flow Analysis to Infer Type Information in Java Bytecode. 213-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.