:facetid:toc:\"db/conf/scam/scam2013.bht\"OK:facetid:toc:db/conf/scam/scam2013.bhtK. M. AnnervazVikrant S. KaulgudJanardan MisraShubhashis SenguptaGary TitusAzmat MunshiCode clustering workbench.SCAM31-362013Conference and Workshop Papersclosedconf/scam/AnnervazKMSTM1310.1109/SCAM.2013.6648181https://doi.org/10.1109/SCAM.2013.6648181https://dblp.org/rec/conf/scam/AnnervazKMSTM13URL#4220636David BacaTracing with a minimal number of probes.SCAM74-832013Conference and Workshop Papersclosedconf/scam/Baca1310.1109/SCAM.2013.6648187https://doi.org/10.1109/SCAM.2013.6648187https://dblp.org/rec/conf/scam/Baca13URL#4220637Vipin BalachandranFix-it: An extensible code auto-fix component in Review Bot.SCAM167-1722013Conference and Workshop Papersclosedconf/scam/Balachandran1310.1109/SCAM.2013.6648198https://doi.org/10.1109/SCAM.2013.6648198https://dblp.org/rec/conf/scam/Balachandran13URL#4220638Gergõ BaloghÁrpád BeszédesCodeMetropolis - code visualisation in MineCraft.SCAM136-1412013Conference and Workshop Papersclosedconf/scam/BaloghB1310.1109/SCAM.2013.6648194https://doi.org/10.1109/SCAM.2013.6648194https://dblp.org/rec/conf/scam/BaloghB13URL#4220639Árpád BeszédesLajos SchrettnerBéla CsabaTamás GergelyJudit JászTibor GyimóthyEmpirical investigation of SEA-based dependence cluster properties.SCAM1-102013Conference and Workshop Papersclosedconf/scam/BeszedesSCGJG1310.1109/SCAM.2013.6648178https://doi.org/10.1109/SCAM.2013.6648178https://dblp.org/rec/conf/scam/BeszedesSCGJG13URL#4220640Sebastian BiallasMads Chr. OlesenFranck CassezRalf HuuckPtrTracker: Pragmatic pointer analysis.SCAM69-732013Conference and Workshop Papersclosedconf/scam/BiallasOCH1310.1109/SCAM.2013.6648186https://doi.org/10.1109/SCAM.2013.6648186https://dblp.org/rec/conf/scam/BiallasOCH13URL#4220641Luigi CeruloMichele CeccarelliMassimiliano Di PentaGerardo CanforaA Hidden Markov Model to detect coded information islands in free text.SCAM157-1662013Conference and Workshop Papersclosedconf/scam/CeruloCPC1310.1109/SCAM.2013.6648197https://doi.org/10.1109/SCAM.2013.6648197https://dblp.org/rec/conf/scam/CeruloCPC13URL#4220642Johan FabryCoen De RooverViviane JonckersAspectual source code analysis with GASR.SCAM53-622013Conference and Workshop Papersclosedconf/scam/FabryRJ1310.1109/SCAM.2013.6648184https://doi.org/10.1109/SCAM.2013.6648184https://dblp.org/rec/conf/scam/FabryRJ13URL#4220643Amin Milani FardAli Mesbah 0001JSNOSE: Detecting JavaScript Code Smells.SCAM116-1252013Conference and Workshop Papersclosedconf/scam/FardM1310.1109/SCAM.2013.6648192https://doi.org/10.1109/SCAM.2013.6648192https://dblp.org/rec/conf/scam/FardM13URL#4220644Antoine FlochTomofumi YukiAli El MoussawiAntoine MorvanKevin J. M. MartinMaxime NaulletMythri AlleLudovic L'HoursNicolas SimonSteven DerrienFrançois CharotChristophe WolinskiOlivier SentieysGeCoS: A framework for prototyping custom hardware design flows.SCAM100-1052013Conference and Workshop Papersclosedconf/scam/FlochYMMMNALSDCWS1310.1109/SCAM.2013.6648190https://doi.org/10.1109/SCAM.2013.6648190https://dblp.org/rec/conf/scam/FlochYMMMNALSDCWS13URL#4220645Ahmad JbaraDror G. FeitelsonCharacterization and assessment of the linux configuration complexity.SCAM11-202013Conference and Workshop Papersclosedconf/scam/JbaraF1310.1109/SCAM.2013.6648179https://doi.org/10.1109/SCAM.2013.6648179https://dblp.org/rec/conf/scam/JbaraF13URL#4220646Arvind W. KiwelekarRushikesh K. JoshiOntological interpretation of object-oriented programming abstractions.SCAM189-1982013Conference and Workshop Papersclosedconf/scam/KiwelekarJ1310.1109/SCAM.2013.6648201https://doi.org/10.1109/SCAM.2013.6648201https://dblp.org/rec/conf/scam/KiwelekarJ13URL#4220647Michaël MarcozziWim VanhoofJean-Luc HainautA relational symbolic execution algorithm for constraint-based testing of database programs.SCAM179-1882013Conference and Workshop Papersclosedconf/scam/MarcozziVH1310.1109/SCAM.2013.6648200https://doi.org/10.1109/SCAM.2013.6648200https://dblp.org/rec/conf/scam/MarcozziVH13URL#4220648Sven MattsenPascal CuoqSibylle SchuppDriving a sound static software analyzer with branch-and-bound.SCAM63-682013Conference and Workshop Papersclosedconf/scam/MattsenCS1310.1109/SCAM.2013.6648185https://doi.org/10.1109/SCAM.2013.6648185https://dblp.org/rec/conf/scam/MattsenCS13URL#4220649Diego Mendez 0002Benoit BaudryMartin MonperrusEmpirical evidence of large-scale diversity in API usage of object-oriented software.SCAM43-522013Conference and Workshop Papersclosedconf/scam/MendezBM1310.1109/SCAM.2013.6648183https://doi.org/10.1109/SCAM.2013.6648183https://dblp.org/rec/conf/scam/MendezBM13URL#4220650Tukaram B. MuskeAnkit BaidTushar SanasReview efforts reduction by partitioning of static analysis warnings.SCAM106-1152013Conference and Workshop Papersclosedconf/scam/MuskeBS1310.1109/SCAM.2013.6648191https://doi.org/10.1109/SCAM.2013.6648191https://dblp.org/rec/conf/scam/MuskeBS13URL#4220651Jens NicolayCarlos NogueraCoen De RooverWolfgang De MeuterDetermining dynamic coupling in JavaScript using object type inference.SCAM126-1352013Conference and Workshop Papersclosedconf/scam/NicolayNRM1310.1109/SCAM.2013.6648193https://doi.org/10.1109/SCAM.2013.6648193https://dblp.org/rec/conf/scam/NicolayNRM13URL#4220652Tosin Daniel OyetoyanReidar ConradiDaniela S. CruzesCriticality of defects in cyclic dependent components.SCAM21-302013Conference and Workshop Papersclosedconf/scam/OyetoyanCC1310.1109/SCAM.2013.6648180https://doi.org/10.1109/SCAM.2013.6648180https://dblp.org/rec/conf/scam/OyetoyanCC13URL#4220653Mike PapadakisMárcio Eduardo DelamaroYves Le TraonProteum/FL: A tool for localizing faults using mutation analysis.SCAM94-992013Conference and Workshop Papersclosedconf/scam/PapadakisDT1310.1109/SCAM.2013.6648189https://doi.org/10.1109/SCAM.2013.6648189https://dblp.org/rec/conf/scam/PapadakisDT13URL#4220654Hagen Schinksql-schema-comparer: Support of multi-language refactoring with relational databases.SCAM173-1782013Conference and Workshop Papersclosedconf/scam/Schink1310.1109/SCAM.2013.6648199https://doi.org/10.1109/SCAM.2013.6648199https://dblp.org/rec/conf/scam/Schink13URL#4220655Francisco Zigmund SokolMauricio Finavaro AnicheMarco Aurélio GerosaMetricMiner: Supporting researchers in mining software repositories.SCAM142-1462013Conference and Workshop Papersclosedconf/scam/SokolAG1310.1109/SCAM.2013.6648195https://doi.org/10.1109/SCAM.2013.6648195https://dblp.org/rec/conf/scam/SokolAG13URL#4220656Jeffrey SvajlenkoChanchal K. RoySlawomir DuszynskiForkSim: Generating software forks for evaluating cross-project similarity analysis tools.SCAM37-422013Conference and Workshop Papersclosedconf/scam/SvajlenkoRD1310.1109/SCAM.2013.6648182https://doi.org/10.1109/SCAM.2013.6648182https://dblp.org/rec/conf/scam/SvajlenkoRD13URL#4220657Yan WangMin Feng 0001Rajiv Gupta 0001Iulian NeamtiuA state alteration and inspection-based interactive debugger.SCAM84-932013Conference and Workshop Papersclosedconf/scam/WangFGN1310.1109/SCAM.2013.6648188https://doi.org/10.1109/SCAM.2013.6648188https://dblp.org/rec/conf/scam/WangFGN13URL#4220658Martin P. WardAssembler restructuring in FermaT.SCAM147-1562013Conference and Workshop Papersclosedconf/scam/Ward1310.1109/SCAM.2013.6648196https://doi.org/10.1109/SCAM.2013.6648196https://dblp.org/rec/conf/scam/Ward13URL#422065913th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2013, Eindhoven, Netherlands, September 22-23, 2013SCAMIEEE Computer Society2013Editorshipconf/scam/2013https://ieeexplore.ieee.org/xpl/conhome/6636284/proceedinghttps://dblp.org/rec/conf/scam/2013URL#4248282