Conferences in DBLP
Michael Weber , Viren Shah , Chris Ren A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:3-13 [Conf ] Juergen Rilling , Bhaskar Karanth A Hybrid Program Slicing Framework. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:14-25 [Conf ] Sandro Bartolini , Cosimo Antonio Prete An Object Level Transformation Technique to Improve the Performance of Embedded Applications. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:26-34 [Conf ] Maurizio Rebaudengo , Matteo Sonza Reorda , Massimo Violante , Marco Torchiano A Source-to-Source Compiler for Generating Dependable Software. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:35-44 [Conf ] Laurent Deruelle , Nordine Melab , Mourad Bouneffa , Henri Basson Analysis and Manipulation of Distributed Multi-Language Software Code. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:45-56 [Conf ] Amit Sharma , Miriam A. M. Capretz Application Maintenance Using Software Agents. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:57-66 [Conf ] Zhenqiang Chen , Baowen Xu , Hongji Yang Detecting Dead Statements for Concurrent Programs. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:67-74 [Conf ] James M. Bieman , Vanessa Murdock Finding Code on the World Wibe Web: A Preliminary Investigation. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:75-80 [Conf ] Paul Anderson , David Binkley , Genevieve Rosay , Tim Teitelbaum Flow Insensitive Points-To Sets. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:81-91 [Conf ] Giuliano Antoniol , Umberto Villano , Massimiliano Di Penta , Gerardo Casazza , Ettore Merlo Identifying Clones in the Linux Kernel. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:92-99 [Conf ] Günter Kniesel , Pascal Costanza , Michael Austermann Jmangler-A Framework for Load-Time Transformation of Java Class Files. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:100-110 [Conf ] Sibylle Schupp , Douglas Gregor , David R. Musser Library Transformations. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:111-123 [Conf ] Jane Horgan , James F. Power , John Waldron Measurement and Analysis of Runtime Profiling Data for Java Programs. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:124-132 [Conf ] Michael L. Van de Vanter Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:133-143 [Conf ] Andrea De Lucia Program Slicing: Methods and Applications. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:144-151 [Conf ] Filippo Ricca , Paolo Tonella , Ira D. Baxter Restructuring Web Applications via Transformation Rules. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:152-162 [Conf ] Claire Knight Smell the Coffee! Uncovering Java Analysis Issues. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:163-169 [Conf ] James R. Cordy , Thomas R. Dean , Andrew J. Malton , Kevin A. Schneider Software Engineering by Source Transformation-Experience with TXL. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:170-180 [Conf ] David Byers , Mariam Kamkar Static Slicing and Parametric Polymorphism. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:181-186 [Conf ] Martin P. Ward The Formal Transformation Approach to Source Code Analysis and Manipulation. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:187-195 [Conf ] Amie L. Souter , Lori L. Pollock Type Infeasible Call Chains. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:196-205 [Conf ] Liz Burd , Stephen Rank Using Automated Source Code Analysis for Software Evolution. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:206-212 [Conf ] Paolo Maggi , Riccardo Sisto Using Data Flow Analysis to Infer Type Information in Java Bytecode. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:213-0 [Conf ]