


default search action
8th SCAM 2008: Beijing, China
- Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3353-7

- Paul Anderson:

90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications. 3-12 - Ansgar Fehnker

, Ralf Huuck, Felix Rauch, Sean Seefried:
Some Assembly Required - Program Analysis of Embedded System Code. 15-24 - Bernhard Scholz, Chenyi Zhang

, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. 25-34 - Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi:

TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor's Behaviors. 35-44 - Cheng Wang, Daqing Hou:

An Empirical Study of Function Overloading in C++. 47-56 - Jens Krinke

:
Is Cloned Code More Stable than Non-cloned Code? 57-66 - Jeremy Singer

, Chris C. Kirkham:
Exploiting the Correspondence between Micro Patterns and Class Names. 67-76 - Cathal Boogerd, Leon Moonen

:
On the Use of Data Flow Analysis in Static Profiling. 79-88 - Damiano Zanardini

:
The Semantics of Abstract Program Slicing. 89-98 - Massimiliano Di Penta

, Luigi Cerulo
, Lerina Aversano
:
The Evolution and Decay of Statically Detected Source Code Vulnerabilities. 101-110 - Abram Hindle, Michael W. Godfrey, Richard C. Holt:

From Indentation Shapes to Code Structures. 111-120 - David W. Binkley, Nicolas Gold, Mark Harman

, Zheng Li
, Kiarash Mahdavi:
Evaluating Key Statements Analysis. 121-130 - Jonas Lundberg, Tobias Gutzmann, Welf Löwe:

Fast and Precise Points-to Analysis. 133-142 - Qiang Sun, Jianjun Zhao:

Aspect-Aware Points-to Analysis. 143-152 - Andrew Stone, Michelle Strout, Shweta Behere:

Automatic Determination of May/Must Set Usage in Data-Flow Analysis. 153-162 - Lei Wang, Qiang Zhang, PengChao Zhao:

Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. 165-173 - Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu:

Analysis and Transformations for Efficient Query-Based Debugging. 174-183 - Daniel M. Germán, Gregorio Robles

, Ahmed E. Hassan:
Change Impact Graphs: Determining the Impact of Prior Code Changes. 184-193 - Mariano Ceccato

, Thomas Roy Dean, Paolo Tonella
:
Using Program Transformations to Add Structure to a Legacy Data Model. 197-206 - Petru Florin Mihancea:

Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering. 207-216 - Jason Chu, Thomas R. Dean:

Automated Migration of List Based JSP Web Pages to AJAX. 217-226 - Tony Clark

, Paul Sammut, James S. Willans:
Beyond Annotations: A Proposal for Extensible Java (XJ). 229-238 - Miguel Gómez-Zamalloa

, Elvira Albert, Germán Puebla:
Modular Decompilation of Low-Level Code by Partial Evaluation. 239-248 - Yue Jia, Mark Harman

:
Constructing Subtle Faults Using Higher Order Mutation Testing. 249-258 - Raffi Khatchadourian

, Awais Rashid
:
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. 261-262 - Cristina Cifuentes:

Parfait - A Scalable Bug Checker for C Code. 263-264 - Nuno F. Rodrigues

, Luís Soares Barbosa
:
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code. 265-266 - Dennis Giffhorn, Christian Hammer

:
Precise Analysis of Java Programs Using JOANA. 267-268 - Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang:

DTS - A Software Defects Testing System. 269-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














