default search action
11th SCAM 2011: Williamsburg, VA, USA
- 11th IEEE Working Conference on Source Code Analysis and Manipulation, SCAM 2011, Williamsburg, VA, USA, September 25-26, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0932-6
Invited Talks
- Paul E. Black:
Counting Bugs is Harder Than You Think. 1-9 - Nicolas Gold:
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis. 10-14
Static Analysis
- Eric Larson:
Program Analysis Too Loopy? Set the Loops Aside. 15-24 - Viktor Pavlu, Markus Schordan, Andreas Krall:
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision. 25-34 - Jason Sawin, Atanas Rountev:
Assumption Hierarchy for a CHA Call Graph Construction Algorithm. 35-44
Embedded Systems and Mobile Platforms
- Steffen Keul:
Tuning Static Data Race Analysis for Automotive Control Software. 45-54 - Mark D. Syer, Bram Adams, Ying Zou, Ahmed E. Hassan:
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms. 55-64
Defects and Security
- Radu Marinescu, Cristina Marinescu:
Are the Clients of Flawed Classes (Also) Defect Prone? 65-74 - Kevin Coogan, Saumya K. Debray:
Equational Reasoning on x86 Assembly Code. 75-84 - Andrea Avancini, Mariano Ceccato:
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities. 85-94
Clones
- Wei Wang, Michael W. Godfrey:
A Study of Cloning in the Linux SCSI Drivers. 95-104 - Minhaz F. Zibran, Chanchal K. Roy:
A Constraint Programming Approach to Conflict-Aware Optimal Scheduling of Prioritized Code Clone Refactoring. 105-114 - Sandro Schulze, Elmar Jürgens, Janet Feigenspan:
Analyzing the Effect of Preprocessor Annotations on Code Clones. 115-124
Search
- Surafel Lemma Abebe, Sonia Haiduc, Paolo Tonella, Andrian Marcus:
The Effect of Lexicon Bad Smells on Concept Location in Source Code. 125-134 - Matthew B. Kelly, Jason S. Alexander, Bram Adams, Ahmed E. Hassan:
Recovering a Balanced Overview of Topics in a Software Domain. 135-144 - Tiago L. Alves, Jurriaan Hage, Peter Rademaker:
A Comparative Study of Code Query Technologies. 145-154
Tools
- Serguei A. Roubtsov, Alexander Serebrenik, Aurélien Mazoyer, Mark van den Brand:
I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors. 155-164 - Michael Mehlich:
CheckPointer - A C Memory Access Validator. 165-172 - Michael L. Collard, Michael John Decker, Jonathan I. Maletic:
Lightweight Transformation and Fact Extraction with the srcML Toolkit. 173-184
Transformation
- Jens Nicolay, Coen De Roover, Wolfgang De Meuter, Viviane Jonckers:
Automatic Parallelization of Side-Effecting Higher-Order Scheme Programs. 185-194 - Ahmed Sfayhi, Houari A. Sahraoui:
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios. 195-203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.