The SCEAS System
Navigation Menu

Conferences in DBLP

Source Code Analysis and Manipulation (scam)
2001 (conf/scam/2001)

  1. Michael Weber, Viren Shah, Chris Ren
    A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:3-13 [Conf]
  2. Juergen Rilling, Bhaskar Karanth
    A Hybrid Program Slicing Framework. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:14-25 [Conf]
  3. Sandro Bartolini, Cosimo Antonio Prete
    An Object Level Transformation Technique to Improve the Performance of Embedded Applications. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:26-34 [Conf]
  4. Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano
    A Source-to-Source Compiler for Generating Dependable Software. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:35-44 [Conf]
  5. Laurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson
    Analysis and Manipulation of Distributed Multi-Language Software Code. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:45-56 [Conf]
  6. Amit Sharma, Miriam A. M. Capretz
    Application Maintenance Using Software Agents. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:57-66 [Conf]
  7. Zhenqiang Chen, Baowen Xu, Hongji Yang
    Detecting Dead Statements for Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:67-74 [Conf]
  8. James M. Bieman, Vanessa Murdock
    Finding Code on the World Wibe Web: A Preliminary Investigation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:75-80 [Conf]
  9. Paul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum
    Flow Insensitive Points-To Sets. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:81-91 [Conf]
  10. Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo
    Identifying Clones in the Linux Kernel. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:92-99 [Conf]
  11. Günter Kniesel, Pascal Costanza, Michael Austermann
    Jmangler-A Framework for Load-Time Transformation of Java Class Files. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:100-110 [Conf]
  12. Sibylle Schupp, Douglas Gregor, David R. Musser
    Library Transformations. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:111-123 [Conf]
  13. Jane Horgan, James F. Power, John Waldron
    Measurement and Analysis of Runtime Profiling Data for Java Programs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:124-132 [Conf]
  14. Michael L. Van de Vanter
    Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:133-143 [Conf]
  15. Andrea De Lucia
    Program Slicing: Methods and Applications. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:144-151 [Conf]
  16. Filippo Ricca, Paolo Tonella, Ira D. Baxter
    Restructuring Web Applications via Transformation Rules. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:152-162 [Conf]
  17. Claire Knight
    Smell the Coffee! Uncovering Java Analysis Issues. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:163-169 [Conf]
  18. James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
    Software Engineering by Source Transformation-Experience with TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:170-180 [Conf]
  19. David Byers, Mariam Kamkar
    Static Slicing and Parametric Polymorphism. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:181-186 [Conf]
  20. Martin P. Ward
    The Formal Transformation Approach to Source Code Analysis and Manipulation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:187-195 [Conf]
  21. Amie L. Souter, Lori L. Pollock
    Type Infeasible Call Chains. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:196-205 [Conf]
  22. Liz Burd, Stephen Rank
    Using Automated Source Code Analysis for Software Evolution. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:206-212 [Conf]
  23. Paolo Maggi, Riccardo Sisto
    Using Data Flow Analysis to Infer Type Information in Java Bytecode. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:213-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002