The SCEAS System
Navigation Menu

Conferences in DBLP

Source Code Analysis and Manipulation (scam)
2005 (conf/scam/2005)


  1. Reviewers. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:- [Conf]

  2. Title Page. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:- [Conf]

  3. Copyright. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:- [Conf]

  4. Message from the Chairs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:- [Conf]

  5. Program Committee. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:- [Conf]
  6. David Binkley, Mark Harman
    Forward slices are smaller than backward slices. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:15-24 [Conf]
  7. Hyoung Seok Hong, Insup Lee, Oleg Sokolsky
    Abstract Slicing: A New Approach to Program Slicing Based on Abstract Interpretation and Model Checking. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:25-34 [Conf]
  8. Attila Szegedi, Tibor Gyimóthy
    Dynamic Slicing of Java Bytecode Programs. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:35-44 [Conf]
  9. David Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Bogdan Korel
    Minimal Slicing and the Relationships Between Forms of Slicing. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:45-56 [Conf]
  10. Silvia Breu
    Extending Dynamic Aspect Mining with Static Information. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:57-65 [Conf]
  11. Beat Fluri, Harald Gall, Martin Pinzger
    Fine-Grained Analysis of Change Couplings. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:66-74 [Conf]
  12. Jeremy Singer
    Concept Assignment as a Debugging Technique for Code Generators. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:75-86 [Conf]
  13. Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel
    Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:87-96 [Conf]
  14. Markus Schordan, Daniel J. Quinlan
    Specifying Transformation Sequences as Computation on Program Fragments with an Abstract Attribute Grammar. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:97-106 [Conf]
  15. Nerina Bermudo, Andreas Krall, R. Nigel Horspool
    Control Flow Graph Reconstruction for Assembly Language Programs with Delayed Instructions. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:107-118 [Conf]
  16. Aiwu Shi, Gleb Naumovich
    Static Analysis for Computing Escapability and Mutability for Java Components. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:119-128 [Conf]
  17. Richard Jones, Andy C. King
    A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:129-138 [Conf]
  18. Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. Waddington
    Pointer Analysis for Source-to-Source Transformations. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:139-150 [Conf]
  19. Michael English, Jim Buckley, Tony Cahill, Kristian Lynch
    Measuring the Impact of Friends on the Internal Attributes of Software Systems. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:151-160 [Conf]
  20. Steve Counsell, Stephen Swift, Allan Tucker
    Object-oriented cohesion as a surrogate of software comprehension: an empirical study. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:161-172 [Conf]
  21. Shannon Xu, Thomas R. Dean
    Transforming Embedded Java Code into Custom Tags. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:173-182 [Conf]
  22. Bernadette Power, Geoff W. Hamilton
    Declassification: Transforming Java Programs to Remove Intermediate Classes. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:183-192 [Conf]
  23. Paul Anderson
    The Performance Penalty of XML for Program Intermediate Representations. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:193-202 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002