5th SCAM 2005: Budapest, Hungary

Cover

Introduction

Session 1: Slicing

Session 2: Concept Location

Session 3: Program Transformations I

Session 4: Pointer Analysis

Session 5: Empirical Studies

Session 6: Program Transformations II

a service of Schloss Dagstuhl - Leibniz Center for Informatics