The SCEAS System
Navigation Menu

Conferences in DBLP

Source Code Analysis and Manipulation (scam)
2003 (conf/scam/2003)

  1. David J. Pearce, Paul H. J. Kelly, Chris Hankin
    Online Cycle Detection and Difference Propagation for Pointer Analysis. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:3-12 [Conf]
  2. Matthieu Martel
    Improving the Static Analysis of Loops by Dynamic Partitioning Techniques. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:13-21 [Conf]
  3. Jean-Marie Favre
    CPP Denotational Semantics. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:22-0 [Conf]
  4. Michael English, Jim Buckley, Tony Cahill
    Applying Meyer's Taxonomy to Object-Oriented Software Systems. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:35-44 [Conf]
  5. Richard Wheeldon, Steve Counsell
    Power Law Distributions in Class Relationships. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:45-54 [Conf]
  6. Neil Walkinshaw, Marc Roper, Murray Wood
    The Java System Dependence Graph. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:55-64 [Conf]
  7. Otto Skrove Bagge, Karl Trygve Kalleberg, Magne Haveraaen, Eelco Visser
    Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:65-0 [Conf]
  8. Chris Verhoef
    Managing Multi-Billion Dollar IT Budgets using Source Code Analysis. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:77-0 [Conf]
  9. Jens Krinke
    Barrier Slicing and Chopping. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:81-87 [Conf]
  10. Martin P. Ward
    Slicing the SCAM Mug: A Case Study in Semantic Slicing. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:88-97 [Conf]
  11. Aditya Rajeev Kulkarni, S. Ramesh
    Static Slicing of Reactive Programs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:98-107 [Conf]
  12. Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Katsuro Inoue
    Design and Implementation of Bytecode-based Java Slicing System. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:108-117 [Conf]
  13. Ákos Kiss, Judit Jász, Gábor Lehotai, Tibor Gyimóthy
    Interprocedural Static Slicing of Binary Executables. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:118-0 [Conf]
  14. Maxim Mossienko, Oleg Khaschansky, Dmitriy Antonov, Oleg Smirnov, Anton Gubanov
    Towards managing environment dependence during legacy systems renovation and maintenance. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:131-140 [Conf]
  15. Karina Olmos, Eelco Visser
    Turning Dynamic Typing into Static Typing by Program Specialization in a Compiler Front-end for Octave. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:141-150 [Conf]
  16. Xinping Guo, James R. Cordy, Thomas R. Dean
    Unique Renaming of Java Using Source Transformation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:151-160 [Conf]
  17. Jan Kort, Ralf Lämmel
    Parse-Tree Annotations Meet Re-Engineering Concerns. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:161-0 [Conf]
  18. Giuliano Antoniol, Massimiliano Di Penta, Gianluca Masone, Umberto Villano
    XOgastan: XML-Oriented gcc AST Analysis and Transformations. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:173-182 [Conf]
  19. António Menezes Leitão
    Detection of Redundant Code using R2D2. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:183-192 [Conf]
  20. Patrick Moseley, Saumya K. Debray, Gregory R. Andrews
    Checking Program Profiles. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:193-202 [Conf]
  21. David Binkley, Mark Harman
    Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:203-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002