Search dblp for Publications

export results for "toc:db/conf/scam/scam2001.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scam/AndersonBRT01,
  author       = {Paul Anderson and
                  David W. Binkley and
                  Genevieve Rosay and
                  Tim Teitelbaum},
  title        = {Flow Insensitive Points-To Sets},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {81--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972669},
  doi          = {10.1109/SCAM.2001.972669},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/AndersonBRT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/AntoniolVDCM01,
  author       = {Giuliano Antoniol and
                  Umberto Villano and
                  Massimiliano Di Penta and
                  Gerardo Casazza and
                  Ettore Merlo},
  title        = {Identifying Clones in the Linux Kernel},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {92--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SCAM.2001.10003},
  doi          = {10.1109/SCAM.2001.10003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/AntoniolVDCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BartoliniP01,
  author       = {Sandro Bartolini and
                  Cosimo Antonio Prete},
  title        = {An Object Level Transformation Technique to Improve the Performance
                  of Embedded Applications},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {26--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972663},
  doi          = {10.1109/SCAM.2001.972663},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BartoliniP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BiemanM01,
  author       = {James M. Bieman and
                  Vanessa Murdock},
  title        = {Finding Code on the World Wibe Web: {A} Preliminary Investigation},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {75--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972668},
  doi          = {10.1109/SCAM.2001.972668},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BiemanM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/BurdR01,
  author       = {Liz Burd and
                  Stephen Rank},
  title        = {Using Automated Source Code Analysis for Software Evolution},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {206--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972682},
  doi          = {10.1109/SCAM.2001.972682},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/BurdR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/ByersK01,
  author       = {David Byers and
                  Mariam Kamkar},
  title        = {Static Slicing and Parametric Polymorphism},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {181--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972679},
  doi          = {10.1109/SCAM.2001.972679},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/ByersK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/ChenXY01,
  author       = {Zhenqiang Chen and
                  Baowen Xu and
                  Hongji Yang},
  title        = {Detecting Dead Statements for Concurrent Programs},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972667},
  doi          = {10.1109/SCAM.2001.972667},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/ChenXY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CordyDMS01,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Software Engineering by Source Transformation-Experience with {TXL}},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {170--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972678},
  doi          = {10.1109/SCAM.2001.972678},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CordyDMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/DeruelleMBB01,
  author       = {Laurent Deruelle and
                  Nordine Melab and
                  Mourad Bouneffa and
                  Henri Basson},
  title        = {Analysis and Manipulation of Distributed Multi-Language Software Code},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {45--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972665},
  doi          = {10.1109/SCAM.2001.972665},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/DeruelleMBB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/HorganPW01,
  author       = {Jane Horgan and
                  James F. Power and
                  John Waldron},
  title        = {Measurement and Analysis of Runtime Profiling Data for Java Programs},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {124--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972673},
  doi          = {10.1109/SCAM.2001.972673},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/HorganPW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/KnieselCA01,
  author       = {G{\"{u}}nter Kniesel and
                  Pascal Costanza and
                  Michael Austermann},
  title        = {Jmangler-A Framework for Load-Time Transformation of Java Class Files},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {100--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972671},
  doi          = {10.1109/SCAM.2001.972671},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/KnieselCA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Knight01,
  author       = {Claire Knight},
  title        = {Smell the Coffee! Uncovering Java Analysis Issues},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {163--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972677},
  doi          = {10.1109/SCAM.2001.972677},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Knight01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Lucia01,
  author       = {Andrea De Lucia},
  title        = {Program Slicing: Methods and Applications},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {144--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972675},
  doi          = {10.1109/SCAM.2001.972675},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Lucia01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/MaggiS01,
  author       = {Paolo Maggi and
                  Riccardo Sisto},
  title        = {Using Data Flow Analysis to Infer Type Information in Java Bytecode},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {213},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972683},
  doi          = {10.1109/SCAM.2001.972683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/MaggiS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RebaudengoRVT01,
  author       = {Maurizio Rebaudengo and
                  Matteo Sonza Reorda and
                  Massimo Violante and
                  Marco Torchiano},
  title        = {A Source-to-Source Compiler for Generating Dependable Software},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972664},
  doi          = {10.1109/SCAM.2001.972664},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RebaudengoRVT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RiccaTB01,
  author       = {Filippo Ricca and
                  Paolo Tonella and
                  Ira D. Baxter},
  title        = {Restructuring Web Applications via Transformation Rules},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {152--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972676},
  doi          = {10.1109/SCAM.2001.972676},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RiccaTB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/RillingK01,
  author       = {Juergen Rilling and
                  Bhaskar Karanth},
  title        = {A Hybrid Program Slicing Framework},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {14--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972662},
  doi          = {10.1109/SCAM.2001.972662},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/RillingK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SchuppGM01,
  author       = {Sibylle Schupp and
                  Douglas P. Gregor and
                  David R. Musser},
  title        = {Library Transformations},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {111--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972672},
  doi          = {10.1109/SCAM.2001.972672},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SchuppGM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SharmaC01,
  author       = {Amit Sharma and
                  Miriam A. M. Capretz},
  title        = {Application Maintenance Using Software Agents},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972666},
  doi          = {10.1109/SCAM.2001.972666},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SharmaC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/SouterP01,
  author       = {Amie L. Souter and
                  Lori L. Pollock},
  title        = {Type Infeasible Call Chains},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {196--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972681},
  doi          = {10.1109/SCAM.2001.972681},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/SouterP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Vanter01,
  author       = {Michael L. Van de Vanter},
  title        = {Preserving the Documentary Structure of Source Code in Language-Based
                  Transformation Tools},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {133--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972674},
  doi          = {10.1109/SCAM.2001.972674},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Vanter01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/Ward01,
  author       = {Martin P. Ward},
  title        = {The Formal Transformation Approach to Source Code Analysis and Manipulation},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {187--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972680},
  doi          = {10.1109/SCAM.2001.972680},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/Ward01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/WeberSR01,
  author       = {Michael Weber and
                  Viren Shah and
                  Chris Ren},
  title        = {A Case Study in Detecting Software Security Vulnerabilities Using
                  Constraint Optimization},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {3--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972661},
  doi          = {10.1109/SCAM.2001.972661},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/WeberSR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scam/2001,
  title        = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7667/proceeding},
  isbn         = {0-7695-1387-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scam/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics