|
Conferences in DBLP
Reviewers. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:- [Conf]
Title Page. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:- [Conf]
Copyright. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:- [Conf]
Message from the Chairs. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:- [Conf]
Program Committee. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:- [Conf]
- David Binkley, Mark Harman
Forward slices are smaller than backward slices. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:15-24 [Conf]
- Hyoung Seok Hong, Insup Lee, Oleg Sokolsky
Abstract Slicing: A New Approach to Program Slicing Based on Abstract Interpretation and Model Checking. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:25-34 [Conf]
- Attila Szegedi, Tibor Gyimóthy
Dynamic Slicing of Java Bytecode Programs. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:35-44 [Conf]
- David Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel
Minimal Slicing and the Relationships Between Forms of Slicing. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:45-56 [Conf]
- Silvia Breu
Extending Dynamic Aspect Mining with Static Information. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:57-65 [Conf]
- Beat Fluri, Harald Gall, Martin Pinzger
Fine-Grained Analysis of Change Couplings. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:66-74 [Conf]
- Jeremy Singer
Concept Assignment as a Debugging Technique for Code Generators. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:75-86 [Conf]
- Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:87-96 [Conf]
- Markus Schordan, Daniel J. Quinlan
Specifying Transformation Sequences as Computation on Program Fragments with an Abstract Attribute Grammar. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:97-106 [Conf]
- Nerina Bermudo, Andreas Krall, R. Nigel Horspool
Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:107-118 [Conf]
- Aiwu Shi, Gleb Naumovich
Static Analysis for Computing Escapability and Mutability for Java Components. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:119-128 [Conf]
- Richard Jones, Andy C. King
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:129-138 [Conf]
- Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. Waddington
Pointer Analysis for Source-to-Source Transformations. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:139-150 [Conf]
- Michael English, Jim Buckley, Tony Cahill, Kristian Lynch
Measuring the Impact of Friends on the Internal Attributes of Software Systems. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:151-160 [Conf]
- Steve Counsell, Stephen Swift, Allan Tucker
Object-oriented cohesion as a surrogate of software comprehension: an empirical study. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:161-172 [Conf]
- Shannon Xu, Thomas R. Dean
Transforming Embedded Java Code into Custom Tags. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:173-182 [Conf]
- Bernadette Power, Geoff W. Hamilton
Declassification: Transforming Java Programs to Remove Intermediate Classes. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:183-192 [Conf]
- Paul Anderson
The Performance Penalty of XML for Program Intermediate Representations. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:193-202 [Conf]
|