1. SCAM 2001: Florence, Italy
- 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy. IEEE Computer Society 2001, ISBN 0-7695-1387-5
- Michael Weber, Viren Shah, Chris Ren:
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. 3-13 - Sandro Bartolini, Cosimo Antonio Prete:
An Object Level Transformation Technique to Improve the Performance of Embedded Applications. 26-34 - Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano:
A Source-to-Source Compiler for Generating Dependable Software. 35-44 - Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson:
Analysis and Manipulation of Distributed Multi-Language Software Code. 45-56 - James M. Bieman, Vanessa Murdock:
Finding Code on the World Wibe Web: A Preliminary Investigation. 75-80 - Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:
Flow Insensitive Points-To Sets. 81-91 - Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:
Identifying Clones in the Linux Kernel. 92-99 - Günter Kniesel, Pascal Costanza, Michael Austermann:
Jmangler-A Framework for Load-Time Transformation of Java Class Files. 100-110 - Jane Horgan, James F. Power, John Waldron:
Measurement and Analysis of Runtime Profiling Data for Java Programs. 124-132 - Michael L. Van de Vanter:
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. 133-143 - Filippo Ricca, Paolo Tonella, Ira D. Baxter:
Restructuring Web Applications via Transformation Rules. 152-162 - James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation-Experience with TXL. 170-180 - Martin P. Ward:
The Formal Transformation Approach to Source Code Analysis and Manipulation. 187-195 - Paolo Maggi, Riccardo Sisto:
Using Data Flow Analysis to Infer Type Information in Java Bytecode. 213-