Search dblp for Publications

export results for "toc:db/conf/scam/scam2003.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scam/AntoniolPMV03,
  author       = {Giuliano Antoniol and
                  Massimiliano Di Penta and
                  Gianluca Masone and
                  Umberto Villano},
  title        = {XOgastan: XML-Oriented gcc {AST} Analysis and Transformations},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {173--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238043},
  doi          = {10.1109/SCAM.2003.1238043},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/AntoniolPMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BaggeKHV03,
  author       = {Otto Skrove Bagge and
                  Karl Trygve Kalleberg and
                  Magne Haveraaen and
                  Eelco Visser},
  title        = {Design of the CodeBoost Transformation System for Domain-Specific
                  Optimisation of {C++} Programs},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {65},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238032},
  doi          = {10.1109/SCAM.2003.1238032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/BaggeKHV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BinkleyH03,
  author       = {David W. Binkley and
                  Mark Harman},
  title        = {Results from a Large-Scale Study of Performance Optimization Techniques
                  for Source Code Analyses Based on Graph Reachability Algorithms},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {203},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238046},
  doi          = {10.1109/SCAM.2003.1238046},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BinkleyH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/EnglishBC03,
  author       = {Michael English and
                  Jim Buckley and
                  Tony Cahill},
  title        = {Applying Meyer's Taxonomy to Object-Oriented Software Systems},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238029},
  doi          = {10.1109/SCAM.2003.1238029},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/EnglishBC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Favre03,
  author       = {Jean{-}Marie Favre},
  title        = {{CPP} Denotational Semantics},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {22},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238028},
  doi          = {10.1109/SCAM.2003.1238028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Favre03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/GuoCD03,
  author       = {Xinping Guo and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Unique Renaming of Java Using Source Transformation},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {151--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238041},
  doi          = {10.1109/SCAM.2003.1238041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/GuoCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/KissJLG03,
  author       = {{\'{A}}kos Kiss and
                  Judit J{\'{a}}sz and
                  G{\'{a}}bor Lehotai and
                  Tibor Gyim{\'{o}}thy},
  title        = {Interprocedural Static Slicing of Binary Executables},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {118},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238038},
  doi          = {10.1109/SCAM.2003.1238038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/KissJLG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/KortL03,
  author       = {Jan Kort and
                  Ralf L{\"{a}}mmel},
  title        = {Parse-Tree Annotations Meet Re-Engineering Concerns},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {161},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238042},
  doi          = {10.1109/SCAM.2003.1238042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/KortL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Krinke03,
  author       = {Jens Krinke},
  title        = {Barrier Slicing and Chopping},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {81--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238034},
  doi          = {10.1109/SCAM.2003.1238034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Krinke03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/KulkarniR03,
  author       = {Aditya Rajeev Kulkarni and
                  S. Ramesh},
  title        = {Static Slicing of Reactive Programs},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {98--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238036},
  doi          = {10.1109/SCAM.2003.1238036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/KulkarniR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Leitao03,
  author       = {Ant{\'{o}}nio Menezes Leit{\~{a}}o},
  title        = {Detection of Redundant Code using {R2D2}},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {183--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238044},
  doi          = {10.1109/SCAM.2003.1238044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Leitao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Martel03,
  author       = {Matthieu Martel},
  title        = {Improving the Static Analysis of Loops by Dynamic Partitioning Techniques},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {13--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238027},
  doi          = {10.1109/SCAM.2003.1238027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Martel03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/MoseleyDA03,
  author       = {Patrick Moseley and
                  Saumya K. Debray and
                  Gregory R. Andrews},
  title        = {Checking Program Profiles},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {193--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238045},
  doi          = {10.1109/SCAM.2003.1238045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/MoseleyDA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/MossienkoKASG03,
  author       = {Maxim Mossienko and
                  Oleg Khaschansky and
                  Dmitriy Antonov and
                  Oleg Smirnov and
                  Anton Gubanov},
  title        = {Towards managing environment dependence during legacy systems renovation
                  and maintenance},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238039},
  doi          = {10.1109/SCAM.2003.1238039},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/MossienkoKASG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/OlmosV03,
  author       = {Karina Olmos and
                  Eelco Visser},
  title        = {Turning Dynamic Typing into Static Typing by Program Specialization
                  in a Compiler Front-end for Octave},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238040},
  doi          = {10.1109/SCAM.2003.1238040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/OlmosV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/PearceKH03,
  author       = {David J. Pearce and
                  Paul H. J. Kelly and
                  Chris Hankin},
  title        = {Online Cycle Detection and Difference Propagation for Pointer Analysis},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {3--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238026},
  doi          = {10.1109/SCAM.2003.1238026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/PearceKH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/UmemoriKYI03,
  author       = {Fumiaki Umemori and
                  Kenji Konda and
                  Reishi Yokomori and
                  Katsuro Inoue},
  title        = {Design and Implementation of Bytecode-based Java Slicing System},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {108--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238037},
  doi          = {10.1109/SCAM.2003.1238037},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/UmemoriKYI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Verhoef03,
  author       = {Chris Verhoef},
  title        = {Managing Multi-Billion Dollar {IT} Budgets using Source Code Analysis},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {77},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238033},
  doi          = {10.1109/SCAM.2003.1238033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Verhoef03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/WalkinshawRW03,
  author       = {Neil Walkinshaw and
                  Marc Roper and
                  Murray Wood},
  title        = {The Java System Dependence Graph},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238031},
  doi          = {10.1109/SCAM.2003.1238031},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/WalkinshawRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Ward03,
  author       = {Martin P. Ward},
  title        = {Slicing the {SCAM} Mug: {A} Case Study in Semantic Slicing},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {88--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238035},
  doi          = {10.1109/SCAM.2003.1238035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Ward03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/WheeldonC03,
  author       = {Richard Wheeldon and
                  Steve Counsell},
  title        = {Power Law Distributions in Class Relationships},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {45--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238030},
  doi          = {10.1109/SCAM.2003.1238030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/WheeldonC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scam/2003,
  title        = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8773/proceeding},
  isbn         = {0-7695-2005-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics