The Community for Technology Leaders
2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM) (2001)
Florence, Italy
Nov. 10, 2001 to Dec. 10, 2001
ISBN: 0-7695-1387-5

Application maintenance using software agents (Abstract)

A. Sharma , Dept. of Electr. & Comput. Eng., Univ. of Western Ontario, London, Ont., Canada
pp. 55,56,57,58,59,60,61,62,63,64

Conference Organizers (Abstract)

pp. viii

Program Committee (Abstract)

pp. ix

A Hybrid Program Slicing Framework (Abstract)

Juergen Rilling , Concordia University
Bhaskar Karanth , Concordia University
pp. 0014

A Source-to-Source Compiler for Generating Dependable Software (Abstract)

Matteo Sonza Reorda , Politecnico di Torino
Maurizio Rebaudengo , Politecnico di Torino
Massimo Violante , Politecnico di Torino
pp. 0035

Analysis and Manipulation of Distributed Multi-Language Software Code (Abstract)

N. Melab , Universite du Littoral
M. Bouneffa , Universite du Littoral
H. Basson , Universite du Littoral
L. Deruelle , Universite du Littoral
pp. 0045

Application Maintenance Using Software Agents (Abstract)

Miriam A. M. Capretz , University of Western Ontario
Amit Sharma , University of Western Ontario
pp. 0057

Detecting Dead Statements for Concurrent Programs (Abstract)

Hongji Yang , De Montfort University
Baowen Xu , Southeast University
Zhenqiang Chen , Southeast University
pp. 0067

Finding Code on the World Wibe Web: A Preliminary Investigation (Abstract)

Vanessa Murdock , Colorado State University
James M. Bieman , Colorado State University
pp. 0075

Flow Insensitive Points-To Sets (Abstract)

P. Anderson , GrammaTech, Inc.
D. Binkley , GrammaTech, Inc.
T. Teitelbaum , GrammaTech, Inc.
G. Rosay , GrammaTech, Inc.
pp. 0081

Identifying Clones in the Linux Kernel (Abstract)

G. Casazza , University of Naples "Federico II"
U. Villano , University of Sannio
E. Merlo , ?cole Polytechnique de Montr?al
G. Antoniol , University of Sannio
M. DiPenta , University of Sannio
pp. 0092

Library Transformations (Abstract)

Sibylle Schupp , Rensselaer Polytechnic Institute
Douglas Gregor , Rensselaer Polytechnic Institute
David Musser , Rensselaer Polytechnic Institute
pp. 0111

Measurement and Analysis of Runtime Profiling Data for Java Programs (Abstract)

Jane Horgan , Dublin City University
James Power , National University of Ireland
John Waldron , Trinity College
pp. 0124

Program Slicing: Methods and Applications (Abstract)

Andrea de Lucia , University of Sannio
pp. 0144

Smell the Coffee! Uncovering Java Analysis Issues (Abstract)

Claire Knight , University of Durham,
pp. 0163

Software Engineering by Source Transformation-Experience with TXL (Abstract)

Thomas R. Dean , Queen's University
James R. Cordy , Queen's University
Kevin A. Schneider , Queen's University
Andrew J. Malton , Queen's University
pp. 0170

Static Slicing and Parametric Polymorphism (Abstract)

David Byers , Link?pings universitet
Mariam Kamkar , Link?pings universitet
pp. 0181

Type Infeasible Call Chains (Abstract)

Lori L. Pollock , University of Delaware
Amie L. Souter , University of Delaware
pp. 0196

Using Automated Source Code Analysis for Software Evolution (Abstract)

Liz Burd , University of Durham
Stephen Rank , University of Durham
pp. 0206

Using Data Flow Analysis to Infer Type Information in Java Bytecode (Abstract)

Paolo Maggi , Politecnico di Torino
Riccardo Sisto , Politecnico di Torino
pp. 0213

Author Index (Abstract)

pp. 0225
93 ms
(Ver 3.1 (10032016))