


default search action
12th SCAM 2012: Riva del Garda, Italy
- 12th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2398-7

- Tao Xie:

Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done. 1-3 - Tobias Gutzmann, Jonas Lundberg, Welf Löwe:

Collections Frameworks for Points-To Analysis. 4-13 - Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan:

Building Useful Program Analysis Tools Using an Extensible Java Compiler. 14-23 - Lajos Schrettner, Judit Jász

, Tamás Gergely
, Árpád Beszédes
, Tibor Gyimóthy
:
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit. 24-33 - Germán Vidal

:
Closed Symbolic Execution for Verifying Program Termination. 34-43 - François Gauthier, Ettore Merlo:

Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. 44-53 - Jun Yuan, Rob Johnson:

CAWDOR: Compiler Assisted Worm Defense. 54-63 - Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:

Folding Repeated Instructions for Improving Token-Based Code Clone Detection. 64-73 - Saman Bazrafshan:

Evolution of Near-Miss Clones. 74-83 - Chris Wilcox, Michelle Mills Strout, James M. Bieman:

Optimizing Expression Selection for Lookup Table Program Transformation. 84-93 - Philip Mayer, Andreas Schroeder:

Cross-Language Code Analysis and Refactoring. 94-103 - Gabriele Bavota

, Bernardino De Carluccio, Andrea De Lucia
, Massimiliano Di Penta
, Rocco Oliveto, Orazio Strollo:
When Does a Refactoring Induce Bugs? An Empirical Study. 104-113 - Andrea Zambon:

Aucsmith-Like Obfuscation of Java Bytecode. 114-119 - Christian Zoller, Axel Schmolitzky

:
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems. 120-125 - Mihai T. Lazarescu

, Luciano Lavagno:
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs. 126-131 - Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby:

Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK. 132-137 - Ulf Kargén

, Nahid Shahmehri:
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. 138-143 - Malcom Gethers, Amir Aryani

, Denys Poshyvanyk
:
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies. 144-153 - Jurgen J. Vinju

, Michael W. Godfrey:
What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric. 154-163 - John Businge, Alexander Serebrenik

, Mark van den Brand
:
Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases. 164-173 - Nasir Ali, Aminata Sabané, Yann-Gaël Guéhéneuc, Giuliano Antoniol:

Improving Bug Location Using Binary Class Relationships. 174-183 - Emily Hill, Shivani Rao, Avinash C. Kak:

On the Use of Stemming for Concern Location and Bug Localization in Java. 184-193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














