default search action
22nd SCAM 2022: Limassol, Cyprus
- 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2021, Limassol, Cyprus, October 3, 2022. IEEE 2022, ISBN 978-1-6654-9609-4
- Mariano Ceccato, Banani Roy, Mohammad Ghafari:
Message from the General Chair and Program Co-Chairs SCAM 2022. ix-x - Thomas Hirsch, Birgit Hofer:
Pruning Boolean Expressions to Shorten Dynamic Slices. 1-11 - Stefan Schott, Felix Pauck:
Benchmark Fuzzing for Android Taint Analyses. 12-23 - Hiroki Inayoshi, Shohei Kakei, Shoichi Saito:
Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps. 24-34 - Mehrdad Abdi, Serge Demeyer:
Test Transplantation through Dynamic Test Slicing. 35-39 - Dave W. Binkley, Leon Moonen:
Assessing the Impact of Execution Environment on Observation-Based Slicing. 40-44 - Richárd Szalay, Zoltán Porkoláb:
Semi-Automatic Refactoring to C++20 Modules: A Semi-Success Story. 45-55 - Aurel Ikama, Vincent Du, Philippe Belias, Biruk Asmare Muse, Foutse Khomh, Mohammad Hamdaqa:
Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication. 56-65 - Manuel De Stefano, Fabiano Pecorelli, Dario Di Nucci, Andrea De Lucia:
A preliminary evaluation on the relationship among architectural and test smells. 66-70 - Mohammed Latif Siddiq, Shafayat H. Majumder, Maisha R. Mim, Sourov Jajodia, Joanna C. S. Santos:
An Empirical Study of Code Smells in Transformer-based Code Generation Techniques. 71-82 - Riley VanDonge, Naser Ezzati-Jivan:
N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing. 83-93 - Liang Tan, Christoph Bockisch:
Checking Refactoring Detection Results Using Code Changes Encoding for Improved Accuracy. 94-104 - Ching-Chi Chuang, Luís Cruz, Robbert van Dalen, Vladimir Mikovski, Arie van Deursen:
Removing dependencies from large software projects: are you really sure? 105-115 - Anushka Bhave, Roopak Sinha:
Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT. 116-120 - Yunior Pacheco, Ahmed Zerouali, Coen De Roover:
Mining for Framework Instantiation Pattern Interplays. 121-131 - Lile Lin, Zhiqiu Huang, Yaoshen Yu, Yapeng Liu:
Multi-Modal Code Summarization with Retrieved Summary. 132-142 - Daniel Atzberger, Nico Scordialo, Tim Cech, Willy Scheibel, Matthias Trapp, Jürgen Döllner:
CodeCV: Mining Expertise of GitHub Users from Coding Activities. 143-147 - Alin-Petru Rosu, Petru Florin Mihancea:
Towards the Detection of Hidden Familial Type Correlations in Java Code. 148-152 - Boladji Vinny Adjibi, Fatou Ndiaye Mbodji, Tegawendé F. Bissyandé, Kevin Allix, Jacques Klein:
The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 153-163 - Balázs Rózsa, Gábor Antal, Rudolf Ferenc:
Don't DIY: Automatically transform legacy Python code to support structural pattern matching. 164-169 - Jim Buffenbarger:
Building LLVM and GCC, with Amake. 170-175 - Daniel Domínguez-Álvarez, Alessandra Gorla, Juan Caballero:
On the Usage of Programming Languages in the iOS Ecosystem. 176-180 - Wouter Van den Brink, Marcus Gerhold, Vadim Zaytsev:
Deriving Modernity Signatures for PHP Systems with Static Analysis. 181-185 - Bram Vandenbogaerde, Quentin Stiévenart, Coen De Roover:
Summary-Based Compositional Analysis for Soft Contract Verification. 186-196 - Tukaram Muske, Alexander Serebrenik:
Classification and Ranking of Delta Static Analysis Alarms. 197-207 - Naelson Oliveira, Márcio Ribeiro, Rodrigo Bonifácio, Rohit Gheyi, Igor Wiese, Baldoino Fonseca:
Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring. 208-218 - Niloofar Mansoor, Tukaram Muske, Alexander Serebrenik, Bonita Sharif:
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms. 219-229 - Ranjith Krishnamurthy, Goran Piskachev, Eric Bodden:
To what extent can we analyze Kotlin programs using existing Java taint analysis tools? 230-235 - Idriss Riouak, Görel Hedin, Christoph Reichenbach, Niklas Fors:
JFeature: Know Your Corpus. 236-241 - Judit Jász, Péter Hegedüs, Ákos Milánkovich, Rudolf Ferenc:
An End-to-End Framework for Repairing Potentially Vulnerable Source Code. 242-247 - Gergö Balogh, István Baráth:
First Steps towards a Methodology for Unified Graph's Discrepancy Analysis. 248-252 - Haruka Yoshioka, Yoshiki Higo, Shinji Kusumoto:
Improving Weighted-SBFL by Blocking Spectrum. 253-263 - Jens Dietrich, Shawn Rasheed, Amjed Tahir:
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies. 264-275 - Qusay Idrees Sarhan, Árpád Beszédes:
Experimental Evaluation of A New Ranking Formula for Spectrum based Fault Localization. 276-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.