Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/scam/scam2004.bht:"
@inproceedings{DBLP:conf/scam/BinkleyDGHKO04, author = {David W. Binkley and Sebastian Danicic and Tibor Gyim{\'{o}}thy and Mark Harman and {\'{A}}kos Kiss and Lahcen Ouarbya}, title = {Formalizing Executable Dynamic and Forward Slicing}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.13}, doi = {10.1109/SCAM.2004.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BinkleyDGHKO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/BruntinkD04, author = {Magiel Bruntink and Arie van Deursen}, title = {Predicting Class Testability using Object-Oriented Metrics}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {136--145}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.16}, doi = {10.1109/SCAM.2004.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/BruntinkD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoT04, author = {Mariano Ceccato and Paolo Tonella}, title = {Adding Distribution to Existing Applications by Means of Aspect Oriented Programming}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {107--116}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.3}, doi = {10.1109/SCAM.2004.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/FatiregunHH04, author = {Deji Fatiregun and Mark Harman and Robert M. Hierons}, title = {Evolving Transformation Sequences using Genetic Algorithms}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {66--75}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.11}, doi = {10.1109/SCAM.2004.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/FatiregunHH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Gallagher04, author = {Keith B. Gallagher}, title = {Some Notes on Interprocedural Program Slicing}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {36--42}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.21}, doi = {10.1109/SCAM.2004.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Gallagher04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/HarmanBSH04, author = {Mark Harman and David W. Binkley and Ranjit Singh and Robert M. Hierons}, title = {Amorphous Procedure Extraction}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {85--94}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.4}, doi = {10.1109/SCAM.2004.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/HarmanBSH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/HouHR04, author = {Daqing Hou and H. James Hoover and Piotr Rudnicki}, title = {Specifying the Law of Demeter and {C++} Programming Guidelines with {FCL}}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {119--127}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.22}, doi = {10.1109/SCAM.2004.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/HouHR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Krinke04, author = {Jens Krinke}, title = {Context-Sensitivity Matters, But Context Does Not}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {29--35}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.8}, doi = {10.1109/SCAM.2004.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Krinke04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/LakhotiaK04, author = {Arun Lakhotia and Eric Uday Kumar}, title = {Abstracting Stack to Detect Obfuscated Calls in Binaries}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.2}, doi = {10.1109/SCAM.2004.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/LakhotiaK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/MaruyamaY04, author = {Katsuhisa Maruyama and Shinichiro Yamamoto}, title = {A {CASE} Tool Platform Using an {XML} Representation of Java Source Code}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {158--167}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.1}, doi = {10.1109/SCAM.2004.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/MaruyamaY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/NaumannULF04, author = {Uwe Naumann and Jean Utke and Andrew Lyons and Michael W. Fagan}, title = {Control Flow Reversal for Adjoint Code Generation}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {55--64}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.9}, doi = {10.1109/SCAM.2004.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/NaumannULF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/RoblesG04, author = {Gregorio Robles and Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona}, title = {Executable Source Code and Non-Executable Source Code: Analysis and Relationships}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {149--157}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.12}, doi = {10.1109/SCAM.2004.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/RoblesG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/Rothermel04, author = {Gregg Rothermel}, title = {Using Source-Code Analysis to Help End-User Programmers Create Dependable Software}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.25}, doi = {10.1109/SCAM.2004.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/Rothermel04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/SuWHM04, author = {Bogong Su and Jian Wang and Erh{-}Wen Hu and Joseph B. Manzano}, title = {Software De-Pipelining Technique}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {7--16}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.20}, doi = {10.1109/SCAM.2004.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/SuWHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/TourweM04, author = {Tom Tourw{\'{e}} and Kim Mens}, title = {Mining Aspectual Views using Formal Concept Analysis}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {97--106}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.15}, doi = {10.1109/SCAM.2004.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/TourweM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/WahlerSGF04, author = {Vera Wahler and Dietmar Seipel and J{\"{u}}rgen Wolff von Gudenberg and Gregor Fischer}, title = {Clone Detection in Source Code by Frequent Itemset Techniques}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {128--135}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.6}, doi = {10.1109/SCAM.2004.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/WahlerSGF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/XuLZS04, author = {Xia Xu and Chung{-}Horng Lung and Marzia Zaman and Anand Srinivasan}, title = {Program Restructuring Through Clustering Techniques}, booktitle = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, pages = {75--84}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SCAM.2004.18}, doi = {10.1109/SCAM.2004.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/XuLZS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scam/2004, title = {4th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2004), 15-16 September 2004, Chicago, IL, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://ieeexplore.ieee.org/xpl/conhome/9523/proceeding}, isbn = {0-7695-2144-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scam/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.