Search dblp for Publications

export results for "toc:db/conf/scam/scam2004.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scam/BinkleyDGHKO04,
  author       = {David W. Binkley and
                  Sebastian Danicic and
                  Tibor Gyim{\'{o}}thy and
                  Mark Harman and
                  {\'{A}}kos Kiss and
                  Lahcen Ouarbya},
  title        = {Formalizing Executable Dynamic and Forward Slicing},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.13},
  doi          = {10.1109/SCAM.2004.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BinkleyDGHKO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BruntinkD04,
  author       = {Magiel Bruntink and
                  Arie van Deursen},
  title        = {Predicting Class Testability using Object-Oriented Metrics},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {136--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.16},
  doi          = {10.1109/SCAM.2004.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BruntinkD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoT04,
  author       = {Mariano Ceccato and
                  Paolo Tonella},
  title        = {Adding Distribution to Existing Applications by Means of Aspect Oriented
                  Programming},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {107--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.3},
  doi          = {10.1109/SCAM.2004.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/FatiregunHH04,
  author       = {Deji Fatiregun and
                  Mark Harman and
                  Robert M. Hierons},
  title        = {Evolving Transformation Sequences using Genetic Algorithms},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {66--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.11},
  doi          = {10.1109/SCAM.2004.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/FatiregunHH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Gallagher04,
  author       = {Keith B. Gallagher},
  title        = {Some Notes on Interprocedural Program Slicing},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {36--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.21},
  doi          = {10.1109/SCAM.2004.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Gallagher04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/HarmanBSH04,
  author       = {Mark Harman and
                  David W. Binkley and
                  Ranjit Singh and
                  Robert M. Hierons},
  title        = {Amorphous Procedure Extraction},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.4},
  doi          = {10.1109/SCAM.2004.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/HarmanBSH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/HouHR04,
  author       = {Daqing Hou and
                  H. James Hoover and
                  Piotr Rudnicki},
  title        = {Specifying the Law of Demeter and {C++} Programming Guidelines with
                  {FCL}},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {119--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.22},
  doi          = {10.1109/SCAM.2004.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/HouHR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Krinke04,
  author       = {Jens Krinke},
  title        = {Context-Sensitivity Matters, But Context Does Not},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {29--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.8},
  doi          = {10.1109/SCAM.2004.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Krinke04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/LakhotiaK04,
  author       = {Arun Lakhotia and
                  Eric Uday Kumar},
  title        = {Abstracting Stack to Detect Obfuscated Calls in Binaries},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.2},
  doi          = {10.1109/SCAM.2004.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/LakhotiaK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/MaruyamaY04,
  author       = {Katsuhisa Maruyama and
                  Shinichiro Yamamoto},
  title        = {A {CASE} Tool Platform Using an {XML} Representation of Java Source
                  Code},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {158--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.1},
  doi          = {10.1109/SCAM.2004.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/MaruyamaY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/NaumannULF04,
  author       = {Uwe Naumann and
                  Jean Utke and
                  Andrew Lyons and
                  Michael W. Fagan},
  title        = {Control Flow Reversal for Adjoint Code Generation},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {55--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.9},
  doi          = {10.1109/SCAM.2004.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/NaumannULF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RoblesG04,
  author       = {Gregorio Robles and
                  Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona},
  title        = {Executable Source Code and Non-Executable Source Code: Analysis and
                  Relationships},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {149--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.12},
  doi          = {10.1109/SCAM.2004.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RoblesG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Rothermel04,
  author       = {Gregg Rothermel},
  title        = {Using Source-Code Analysis to Help End-User Programmers Create Dependable
                  Software},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.25},
  doi          = {10.1109/SCAM.2004.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Rothermel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SuWHM04,
  author       = {Bogong Su and
                  Jian Wang and
                  Erh{-}Wen Hu and
                  Joseph B. Manzano},
  title        = {Software De-Pipelining Technique},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {7--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.20},
  doi          = {10.1109/SCAM.2004.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SuWHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/TourweM04,
  author       = {Tom Tourw{\'{e}} and
                  Kim Mens},
  title        = {Mining Aspectual Views using Formal Concept Analysis},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {97--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.15},
  doi          = {10.1109/SCAM.2004.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/TourweM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/WahlerSGF04,
  author       = {Vera Wahler and
                  Dietmar Seipel and
                  J{\"{u}}rgen Wolff von Gudenberg and
                  Gregor Fischer},
  title        = {Clone Detection in Source Code by Frequent Itemset Techniques},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {128--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.6},
  doi          = {10.1109/SCAM.2004.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/WahlerSGF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/XuLZS04,
  author       = {Xia Xu and
                  Chung{-}Horng Lung and
                  Marzia Zaman and
                  Anand Srinivasan},
  title        = {Program Restructuring Through Clustering Techniques},
  booktitle    = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  pages        = {75--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SCAM.2004.18},
  doi          = {10.1109/SCAM.2004.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/XuLZS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scam/2004,
  title        = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9523/proceeding},
  isbn         = {0-7695-2144-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics