


default search action
11th SCAM 2011: Williamsburg, VA, USA
- 11th IEEE Working Conference on Source Code Analysis and Manipulation, SCAM 2011, Williamsburg, VA, USA, September 25-26, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0932-6

Invited Talks
- Paul E. Black:

Counting Bugs is Harder Than You Think. 1-9 - Nicolas Gold:

Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis. 10-14
Static Analysis
- Eric Larson:

Program Analysis Too Loopy? Set the Loops Aside. 15-24 - Viktor Pavlu, Markus Schordan

, Andreas Krall:
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision. 25-34 - Jason Sawin, Atanas Rountev:

Assumption Hierarchy for a CHA Call Graph Construction Algorithm. 35-44
Embedded Systems and Mobile Platforms
- Steffen Keul:

Tuning Static Data Race Analysis for Automotive Control Software. 45-54 - Mark D. Syer, Bram Adams

, Ying Zou, Ahmed E. Hassan:
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms. 55-64
Defects and Security
- Radu Marinescu

, Cristina Marinescu
:
Are the Clients of Flawed Classes (Also) Defect Prone? 65-74 - Kevin Coogan, Saumya K. Debray:

Equational Reasoning on x86 Assembly Code. 75-84 - Andrea Avancini, Mariano Ceccato

:
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities. 85-94
Clones
- Wei Wang, Michael W. Godfrey:

A Study of Cloning in the Linux SCSI Drivers. 95-104 - Minhaz F. Zibran, Chanchal K. Roy:

A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring. 105-114 - Sandro Schulze

, Elmar Jürgens, Janet Feigenspan:
Analyzing the Effect of Preprocessor Annotations on Code Clones. 115-124
Search
- Surafel Lemma Abebe

, Sonia Haiduc, Paolo Tonella
, Andrian Marcus
:
The Effect of Lexicon Bad Smells on Concept Location in Source Code. 125-134 - Matthew B. Kelly, Jason S. Alexander, Bram Adams

, Ahmed E. Hassan:
Recovering a Balanced Overview of Topics in a Software Domain. 135-144 - Tiago L. Alves, Jurriaan Hage

, Peter Rademaker:
A Comparative Study of Code Query Technologies. 145-154
Tools
- Serguei A. Roubtsov, Alexander Serebrenik

, Aurélien Mazoyer, Mark van den Brand
:
I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors. 155-164 - Michael Mehlich:

CheckPointer - A C Memory Access Validator. 165-172 - Michael L. Collard, Michael John Decker, Jonathan I. Maletic:

Lightweight Transformation and Fact Extraction with the srcML Toolkit. 173-184
Transformation
- Jens Nicolay, Coen De Roover

, Wolfgang De Meuter, Viviane Jonckers:
Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs. 185-194 - Ahmed Sfayhi, Houari A. Sahraoui:

What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios. 195-203

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














