


default search action
12th SCAM 2012: Riva del Garda, Italy
- 12th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2398-7
- Tao Xie:
Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done. 1-3 - Tobias Gutzmann, Jonas Lundberg, Welf Löwe:
Collections Frameworks for Points-To Analysis. 4-13 - Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan:
Building Useful Program Analysis Tools Using an Extensible Java Compiler. 14-23 - Lajos Schrettner, Judit Jász
, Tamás Gergely
, Árpád Beszédes
, Tibor Gyimóthy
:
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit. 24-33 - Germán Vidal
:
Closed Symbolic Execution for Verifying Program Termination. 34-43 - François Gauthier, Ettore Merlo:
Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. 44-53 - Jun Yuan, Rob Johnson:
CAWDOR: Compiler Assisted Worm Defense. 54-63 - Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Folding Repeated Instructions for Improving Token-Based Code Clone Detection. 64-73 - Saman Bazrafshan:
Evolution of Near-Miss Clones. 74-83 - Chris Wilcox, Michelle Mills Strout, James M. Bieman:
Optimizing Expression Selection for Lookup Table Program Transformation. 84-93 - Philip Mayer, Andreas Schroeder:
Cross-Language Code Analysis and Refactoring. 94-103 - Gabriele Bavota
, Bernardino De Carluccio, Andrea De Lucia
, Massimiliano Di Penta
, Rocco Oliveto, Orazio Strollo:
When Does a Refactoring Induce Bugs? An Empirical Study. 104-113 - Andrea Zambon:
Aucsmith-Like Obfuscation of Java Bytecode. 114-119 - Christian Zoller, Axel Schmolitzky
:
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems. 120-125 - Mihai T. Lazarescu
, Luciano Lavagno:
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs. 126-131 - Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby:
Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK. 132-137 - Ulf Kargén
, Nahid Shahmehri:
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. 138-143 - Malcom Gethers, Amir Aryani
, Denys Poshyvanyk
:
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies. 144-153 - Jurgen J. Vinju
, Michael W. Godfrey:
What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric. 154-163 - John Businge, Alexander Serebrenik
, Mark van den Brand
:
Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases. 164-173 - Nasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Improving Bug Location Using Binary Class Relationships. 174-183 - Emily Hill, Shivani Rao, Avinash C. Kak:
On the Use of Stemming for Concern Location and Bug Localization in Java. 184-193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.