ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
Latest Publications
TOTAL DOCUMENTS
25
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
0769513875
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Type infeasible call chains
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972681
◽
2002
◽
Cited By ~ 1
Author(s):
A.L. Souter
◽
L.L. Pollock
Download Full-text
Analysis and manipulation of distributed multi-language software code
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972665
◽
2002
◽
Cited By ~ 9
Author(s):
L. Deruelle
◽
N. Melab
◽
M. Bouneffa
◽
H. Basson
Keyword(s):
Software Code
Download Full-text
JMangler - a framework for load-time transformation of Java class files
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972671
◽
2002
◽
Cited By ~ 10
Author(s):
G. Kniesel
◽
P. Costanza
◽
M. Austermann
Keyword(s):
Time Transformation
Download Full-text
Using automated source code analysis for software evolution
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972682
◽
2002
◽
Author(s):
L. Burd
◽
S. Rank
Keyword(s):
Software Evolution
◽
Source Code
◽
Source Code Analysis
◽
Code Analysis
Download Full-text
The formal transformation approach to source code analysis and manipulation
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972680
◽
2002
◽
Cited By ~ 18
Author(s):
M.P. Ward
Keyword(s):
Source Code
◽
Source Code Analysis
◽
Code Analysis
◽
Transformation Approach
Download Full-text
A case study in detecting software security vulnerabilities using constraint optimization
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972661
◽
2002
◽
Cited By ~ 7
Author(s):
M. Weber
◽
V. Shah
◽
C. Ren
Keyword(s):
Software Security
◽
Constraint Optimization
◽
Security Vulnerabilities
Download Full-text
Identifying clones in the Linux kernel
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972670
◽
2002
◽
Cited By ~ 16
Author(s):
G. Casazza
◽
G. Antoniol
◽
U. Villano
◽
E. Merlo
◽
M. Di Penta
Keyword(s):
Linux Kernel
Download Full-text
A hybrid program slicing framework
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972662
◽
2002
◽
Cited By ~ 5
Author(s):
J. Rilling
◽
B. Karanth
Keyword(s):
Program Slicing
◽
Hybrid Program
Download Full-text
A source-to-source compiler for generating dependable software
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972664
◽
2002
◽
Cited By ~ 46
Author(s):
M. Rebaudengo
◽
M.S. Reorda
◽
M. Violante
◽
M. Torchiano
Download Full-text
An object level transformation technique to improve the performance of embedded applications
Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation SCAM-0
◽
10.1109/scam.2001.972663
◽
2002
◽
Author(s):
S. Bartolini
◽
C.A. Prete
Keyword(s):
Transformation Technique
◽
Embedded Applications
◽
Object Level
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close