default search action
8th SCAM 2008: Beijing, China
- Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3353-7
- Paul Anderson:
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications. 3-12 - Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried:
Some Assembly Required - Program Analysis of Embedded System Code. 15-24 - Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. 25-34 - Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi:
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor's Behaviors. 35-44 - Cheng Wang, Daqing Hou:
An Empirical Study of Function Overloading in C++. 47-56 - Jens Krinke:
Is Cloned Code More Stable than Non-cloned Code? 57-66 - Jeremy Singer, Chris C. Kirkham:
Exploiting the Correspondence between Micro Patterns and Class Names. 67-76 - Cathal Boogerd, Leon Moonen:
On the Use of Data Flow Analysis in Static Profiling. 79-88 - Damiano Zanardini:
The Semantics of Abstract Program Slicing. 89-98 - Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano:
The Evolution and Decay of Statically Detected Source Code Vulnerabilities. 101-110 - Abram Hindle, Michael W. Godfrey, Richard C. Holt:
From Indentation Shapes to Code Structures. 111-120 - David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
Evaluating Key Statements Analysis. 121-130 - Jonas Lundberg, Tobias Gutzmann, Welf Löwe:
Fast and Precise Points-to Analysis. 133-142 - Qiang Sun, Jianjun Zhao:
Aspect-Aware Points-to Analysis. 143-152 - Andrew Stone, Michelle Strout, Shweta Behere:
Automatic Determination of May/Must Set Usage in Data-Flow Analysis. 153-162 - Lei Wang, Qiang Zhang, PengChao Zhao:
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. 165-173 - Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu:
Analysis and Transformations for Efficient Query-Based Debugging. 174-183 - Daniel M. Germán, Gregorio Robles, Ahmed E. Hassan:
Change Impact Graphs: Determining the Impact of Prior Code Changes. 184-193 - Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Using Program Transformations to Add Structure to a Legacy Data Model. 197-206 - Petru Florin Mihancea:
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering. 207-216 - Jason Chu, Thomas R. Dean:
Automated Migration of List Based JSP Web Pages to AJAX. 217-226 - Tony Clark, Paul Sammut, James S. Willans:
Beyond Annotations: A Proposal for Extensible Java (XJ). 229-238 - Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla:
Modular Decompilation of Low-Level Code by Partial Evaluation. 239-248 - Yue Jia, Mark Harman:
Constructing Subtle Faults Using Higher Order Mutation Testing. 249-258 - Raffi Khatchadourian, Awais Rashid:
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. 261-262 - Cristina Cifuentes:
Parfait - A Scalable Bug Checker for C Code. 263-264 - Nuno F. Rodrigues, Luís Soares Barbosa:
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code. 265-266 - Dennis Giffhorn, Christian Hammer:
Precise Analysis of Java Programs Using JOANA. 267-268 - Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang:
DTS - A Software Defects Testing System. 269-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.