Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scam/scam2001.bht:"
@inproceedings{DBLP:conf/scam/AndersonBRT01, author = {Paul Anderson and David W. Binkley and Genevieve Rosay and Tim Teitelbaum}, title = {Flow Insensitive Points-To Sets}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {81--91}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972669}, doi = {10.1109/SCAM.2001.972669}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/AndersonBRT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/AntoniolVDCM01, author = {Giuliano Antoniol and Umberto Villano and Massimiliano Di Penta and Gerardo Casazza and Ettore Merlo}, title = {Identifying Clones in the Linux Kernel}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {92--99}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.ieeecomputersociety.org/10.1109/SCAM.2001.10003}, doi = {10.1109/SCAM.2001.10003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/AntoniolVDCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BartoliniP01, author = {Sandro Bartolini and Cosimo Antonio Prete}, title = {An Object Level Transformation Technique to Improve the Performance of Embedded Applications}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {26--34}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972663}, doi = {10.1109/SCAM.2001.972663}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BartoliniP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BiemanM01, author = {James M. Bieman and Vanessa Murdock}, title = {Finding Code on the World Wibe Web: {A} Preliminary Investigation}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {75--80}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972668}, doi = {10.1109/SCAM.2001.972668}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BiemanM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BurdR01, author = {Liz Burd and Stephen Rank}, title = {Using Automated Source Code Analysis for Software Evolution}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {206--212}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972682}, doi = {10.1109/SCAM.2001.972682}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BurdR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/ByersK01, author = {David Byers and Mariam Kamkar}, title = {Static Slicing and Parametric Polymorphism}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {181--186}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972679}, doi = {10.1109/SCAM.2001.972679}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/ByersK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/ChenXY01, author = {Zhenqiang Chen and Baowen Xu and Hongji Yang}, title = {Detecting Dead Statements for Concurrent Programs}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972667}, doi = {10.1109/SCAM.2001.972667}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/ChenXY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CordyDMS01, author = {James R. Cordy and Thomas R. Dean and Andrew J. Malton and Kevin A. Schneider}, title = {Software Engineering by Source Transformation-Experience with {TXL}}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {170--180}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972678}, doi = {10.1109/SCAM.2001.972678}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CordyDMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/DeruelleMBB01, author = {Laurent Deruelle and Nordine Melab and Mourad Bouneffa and Henri Basson}, title = {Analysis and Manipulation of Distributed Multi-Language Software Code}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {45--56}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972665}, doi = {10.1109/SCAM.2001.972665}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/DeruelleMBB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/HorganPW01, author = {Jane Horgan and James F. Power and John Waldron}, title = {Measurement and Analysis of Runtime Profiling Data for Java Programs}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {124--132}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972673}, doi = {10.1109/SCAM.2001.972673}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/HorganPW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/KnieselCA01, author = {G{\"{u}}nter Kniesel and Pascal Costanza and Michael Austermann}, title = {Jmangler-A Framework for Load-Time Transformation of Java Class Files}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {100--110}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972671}, doi = {10.1109/SCAM.2001.972671}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/KnieselCA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Knight01, author = {Claire Knight}, title = {Smell the Coffee! Uncovering Java Analysis Issues}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {163--169}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972677}, doi = {10.1109/SCAM.2001.972677}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Knight01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Lucia01, author = {Andrea De Lucia}, title = {Program Slicing: Methods and Applications}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {144--151}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972675}, doi = {10.1109/SCAM.2001.972675}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Lucia01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/MaggiS01, author = {Paolo Maggi and Riccardo Sisto}, title = {Using Data Flow Analysis to Infer Type Information in Java Bytecode}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {213}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972683}, doi = {10.1109/SCAM.2001.972683}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/MaggiS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RebaudengoRVT01, author = {Maurizio Rebaudengo and Matteo Sonza Reorda and Massimo Violante and Marco Torchiano}, title = {A Source-to-Source Compiler for Generating Dependable Software}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {35--44}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972664}, doi = {10.1109/SCAM.2001.972664}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RebaudengoRVT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RiccaTB01, author = {Filippo Ricca and Paolo Tonella and Ira D. Baxter}, title = {Restructuring Web Applications via Transformation Rules}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {152--162}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972676}, doi = {10.1109/SCAM.2001.972676}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RiccaTB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RillingK01, author = {Juergen Rilling and Bhaskar Karanth}, title = {A Hybrid Program Slicing Framework}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {14--25}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972662}, doi = {10.1109/SCAM.2001.972662}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RillingK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SchuppGM01, author = {Sibylle Schupp and Douglas P. Gregor and David R. Musser}, title = {Library Transformations}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {111--123}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972672}, doi = {10.1109/SCAM.2001.972672}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SchuppGM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SharmaC01, author = {Amit Sharma and Miriam A. M. Capretz}, title = {Application Maintenance Using Software Agents}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972666}, doi = {10.1109/SCAM.2001.972666}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SharmaC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SouterP01, author = {Amie L. Souter and Lori L. Pollock}, title = {Type Infeasible Call Chains}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {196--205}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972681}, doi = {10.1109/SCAM.2001.972681}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SouterP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Vanter01, author = {Michael L. Van de Vanter}, title = {Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {133--143}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972674}, doi = {10.1109/SCAM.2001.972674}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Vanter01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Ward01, author = {Martin P. Ward}, title = {The Formal Transformation Approach to Source Code Analysis and Manipulation}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {187--195}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972680}, doi = {10.1109/SCAM.2001.972680}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Ward01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/WeberSR01, author = {Michael Weber and Viren Shah and Chris Ren}, title = {A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {3--13}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972661}, doi = {10.1109/SCAM.2001.972661}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/WeberSR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scam/2001, title = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://ieeexplore.ieee.org/xpl/conhome/7667/proceeding}, isbn = {0-7695-1387-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.