


default search action
1st SCAM 2001: Florence, Italy
- 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy. IEEE Computer Society 2001, ISBN 0-7695-1387-5

- Michael Weber, Viren Shah, Chris Ren:

A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. 3-13 - Juergen Rilling, Bhaskar Karanth:

A Hybrid Program Slicing Framework. 14-25 - Sandro Bartolini, Cosimo Antonio Prete:

An Object Level Transformation Technique to Improve the Performance of Embedded Applications. 26-34 - Maurizio Rebaudengo, Matteo Sonza Reorda

, Massimo Violante, Marco Torchiano
:
A Source-to-Source Compiler for Generating Dependable Software. 35-44 - Laurent Deruelle, Nordine Melab, Mourad Bouneffa

, Henri Basson:
Analysis and Manipulation of Distributed Multi-Language Software Code. 45-56 - Amit Sharma, Miriam A. M. Capretz:

Application Maintenance Using Software Agents. 57-66 - Zhenqiang Chen, Baowen Xu

, Hongji Yang:
Detecting Dead Statements for Concurrent Programs. 67-74 - James M. Bieman, Vanessa Murdock:

Finding Code on the World Wibe Web: A Preliminary Investigation. 75-80 - Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:

Flow Insensitive Points-To Sets. 81-91 - Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:

Identifying Clones in the Linux Kernel. 92-99 - Günter Kniesel, Pascal Costanza, Michael Austermann:

Jmangler-A Framework for Load-Time Transformation of Java Class Files. 100-110 - Sibylle Schupp, Douglas P. Gregor, David R. Musser:

Library Transformations. 111-123 - Jane Horgan, James F. Power, John Waldron:

Measurement and Analysis of Runtime Profiling Data for Java Programs. 124-132 - Michael L. Van de Vanter:

Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. 133-143 - Andrea De Lucia

:
Program Slicing: Methods and Applications. 144-151 - Filippo Ricca, Paolo Tonella

, Ira D. Baxter:
Restructuring Web Applications via Transformation Rules. 152-162 - Claire Knight:

Smell the Coffee! Uncovering Java Analysis Issues. 163-169 - James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:

Software Engineering by Source Transformation-Experience with TXL. 170-180 - David Byers, Mariam Kamkar:

Static Slicing and Parametric Polymorphism. 181-186 - Martin P. Ward

:
The Formal Transformation Approach to Source Code Analysis and Manipulation. 187-195 - Amie L. Souter, Lori L. Pollock:

Type Infeasible Call Chains. 196-205 - Liz Burd, Stephen Rank:

Using Automated Source Code Analysis for Software Evolution. 206-212 - Paolo Maggi, Riccardo Sisto:

Using Data Flow Analysis to Infer Type Information in Java Bytecode. 213-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














