Conferences in DBLP
David J. Pearce , Paul H. J. Kelly , Chris Hankin Online Cycle Detection and Difference Propagation for Pointer Analysis. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:3-12 [Conf ] Matthieu Martel Improving the Static Analysis of Loops by Dynamic Partitioning Techniques. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:13-21 [Conf ] Jean-Marie Favre CPP Denotational Semantics. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:22-0 [Conf ] Michael English , Jim Buckley , Tony Cahill Applying Meyer's Taxonomy to Object-Oriented Software Systems. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:35-44 [Conf ] Richard Wheeldon , Steve Counsell Power Law Distributions in Class Relationships. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:45-54 [Conf ] Neil Walkinshaw , Marc Roper , Murray Wood The Java System Dependence Graph. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:55-64 [Conf ] Otto Skrove Bagge , Karl Trygve Kalleberg , Magne Haveraaen , Eelco Visser Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:65-0 [Conf ] Chris Verhoef Managing Multi-Billion Dollar IT Budgets using Source Code Analysis. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:77-0 [Conf ] Jens Krinke Barrier Slicing and Chopping. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:81-87 [Conf ] Martin P. Ward Slicing the SCAM Mug: A Case Study in Semantic Slicing. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:88-97 [Conf ] Aditya Rajeev Kulkarni , S. Ramesh Static Slicing of Reactive Programs. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:98-107 [Conf ] Fumiaki Umemori , Kenji Konda , Reishi Yokomori , Katsuro Inoue Design and Implementation of Bytecode-based Java Slicing System. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:108-117 [Conf ] Ákos Kiss , Judit Jász , Gábor Lehotai , Tibor Gyimóthy Interprocedural Static Slicing of Binary Executables. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:118-0 [Conf ] Maxim Mossienko , Oleg Khaschansky , Dmitriy Antonov , Oleg Smirnov , Anton Gubanov Towards managing environment dependence during legacy systems renovation and maintenance. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:131-140 [Conf ] Karina Olmos , Eelco Visser Turning Dynamic Typing into Static Typing by Program Specialization in a Compiler Front-end for Octave. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:141-150 [Conf ] Xinping Guo , James R. Cordy , Thomas R. Dean Unique Renaming of Java Using Source Transformation. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:151-160 [Conf ] Jan Kort , Ralf Lämmel Parse-Tree Annotations Meet Re-Engineering Concerns. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:161-0 [Conf ] Giuliano Antoniol , Massimiliano Di Penta , Gianluca Masone , Umberto Villano XOgastan: XML-Oriented gcc AST Analysis and Transformations. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:173-182 [Conf ] António Menezes Leitão Detection of Redundant Code using R2D2. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:183-192 [Conf ] Patrick Moseley , Saumya K. Debray , Gregory R. Andrews Checking Program Profiles. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:193-202 [Conf ] David Binkley , Mark Harman Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms. [Citation Graph (0, 0)][DBLP ] SCAM, 2003, pp:203-0 [Conf ]