SCAM C

23 papers

YearTitle / Authors
201212th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012
2012AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems.
Christian Zoller, Axel Schmolitzky
2012Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications.
François Gauthier, Ettore Merlo
2012Aucsmith-Like Obfuscation of Java Bytecode.
Andrea Zambon
2012Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK.
Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby
2012Building Useful Program Analysis Tools Using an Extensible Java Compiler.
Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan
2012CAWDOR: Compiler Assisted Worm Defense.
Jun Yuan, Rob Johnson
2012Closed Symbolic Execution for Verifying Program Termination.
Germán Vidal
2012Collections Frameworks for Points-To Analysis.
Tobias Gutzmann, Jonas Lundberg, Welf Löwe
2012Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies.
Malcom Gethers, Amir Aryani, Denys Poshyvanyk
2012Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases.
John Businge, Alexander Serebrenik, Mark van den Brand
2012Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done.
Tao Xie
2012Cross-Language Code Analysis and Refactoring.
Philip Mayer, Andreas Schroeder
2012Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs.
Mihai T. Lazarescu, Luciano Lavagno
2012Evolution of Near-Miss Clones.
Saman Bazrafshan
2012Folding Repeated Instructions for Improving Token-Based Code Clone Detection.
Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto
2012Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit.
Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy
2012Improving Bug Location Using Binary Class Relationships.
Nasir Ali, Aminata Sabané, Yann-Gaël Guéhéneuc, Giuliano Antoniol
2012InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries.
Ulf Kargén, Nahid Shahmehri
2012On the Use of Stemming for Concern Location and Bug Localization in Java.
Emily Hill, Shivani Rao, Avinash C. Kak
2012Optimizing Expression Selection for Lookup Table Program Transformation.
Chris Wilcox, Michelle Mills Strout, James M. Bieman
2012What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric.
Jurgen J. Vinju, Michael W. Godfrey
2012When Does a Refactoring Induce Bugs? An Empirical Study.
Gabriele Bavota, Bernardino De Carluccio, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Orazio Strollo