The Community for Technology Leaders
2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM) (2003)
Amsterdam, The Netherlands
Sept. 26, 2003 to Sept. 27, 2003
ISBN: 0-7695-2005-7
TABLE OF CONTENTS

Reviewers (PDF)

pp. x
Session I: Static Analysis

Online Cycle Detection and Difference Propagation for Pointer Analysis (Abstract)

Chris Hankin , Imperial College, London
Paul H.J. Kelly , Imperial College, London
David J. Pearce , Imperial College, London
pp. 3

CPP Denotational Semantics (Abstract)

Jean-Marie Favre , University of Grenoble, France
pp. 22
Session II: Object Oriented Code

Applying Meyer?s Taxonomy to Object-Oriented Software Systems (Abstract)

Michael English , University of Limerick, Ireland
Jim Buckley , University of Limerick, Ireland
Tony Cahill , University of Limerick, Ireland
pp. 35

Power Law Distributions in Class Relationships (Abstract)

Richard Wheeldon , Birkbeck College, University of London
Steve Counsell , Birkbeck College, University of London
pp. 45

The Java System Dependence Graph (Abstract)

Marc Roper , Livingstone Tower
Murray Wood , Livingstone Tower
Neil Walkinshaw , Livingstone Tower
pp. 55

Design of the CodeBoost Transformation System for Domain-Specific Optimisation of C++ Programs (Abstract)

Karl Trygve Kalleberg , University of Bergen
Eelco Visser , Utrecht University
Otto Skrove Bagge , Chr. Michelsen Research AS
Magne Haveraaen , University of Bergen
pp. 65
Session III: Keynote
Session IV: Slicing

Barrier Slicing and Chopping (Abstract)

Jens Krinke , Universit?t Passau
pp. 81

Static Slicing of Reactive Programs (Abstract)

S. Ramesh , Indian Institute of Technology Bombay
A. R. Kulkarni , Indian Institute of Technology Bombay
pp. 98

Design and Implementation of Bytecode-based Java Slicing System (Abstract)

Reishi Yokomori , Osaka University
Kenji Konda , Osaka University
Katsuro Inoue , Osaka University
Fumiaki Umemori , Osaka University
pp. 108

Interprocedural Static Slicing of Binary Executables (Abstract)

G?bor Lehotai , University of Szeged and Hungarian Academy of Sciences
?kos Kiss , University of Szeged and Hungarian Academy of Sciences
Tibor Gyim?thy , University of Szeged and Hungarian Academy of Sciences
Judit J?sz , University of Szeged and Hungarian Academy of Sciences
pp. 118
Session V: Program Transformations

Towards managing environment dependence during legacy systems renovation and maintenance (Abstract)

Anton Gubanov , St. Petersburg State University
Maxim Mossienko , St. Petersburg State University
Dmitriy Antonov , St. Petersburg State University
Oleg Smirnov , St. Petersburg State University
Oleg Khaschansky , St. Petersburg State University
pp. 131

Unique Renaming of Java Using Source Transformation (Abstract)

James R. Cordy , Queen?s University
Xinping Guo , Queen?s University
Thomas R. Dean , Queen?s University
pp. 151

Parse-Tree Annotations Meet Re-Engineering Concerns (Abstract)

Jan Kort , Universiteit van Amsterdam
Ralf L?mmel , Vrije Universiteit
pp. 161
Session VI: Tools and Techniques

XOgastan: XML-Oriented gcc AST Analysis and Transformations (Abstract)

G. Antoniol , University of Sannio
G. Masone , University of Sannio
U. Villano , University of Sannio
M. Di Penta , University of Sannio
pp. 173

Detection of Redundant Code using R<sup>2</sup>D<sup>2</sup> (Abstract)

Ant?nio Menezes Leit? , INESC-ID/Technical University of Lisbon
pp. 183

Checking Program Profiles (Abstract)

Patrick Moseley , The University of Arizona
Gregory Andrews , The University of Arizona
Saumya Debray , The University of Arizona
pp. 193

null (PDF)

pp. 213
105 ms
(Ver )