ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
Latest Publications
TOTAL DOCUMENTS
41
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By IEEE
9780769533537
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Parfait - A Scalable Bug Checker for C Code
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.21
◽
2008
◽
Cited By ~ 8
Author(s):
Cristina Cifuentes
Download Full-text
Automated Migration of List Based JSP Web Pages to AJAX
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.29
◽
2008
◽
Cited By ~ 6
Author(s):
Jason Chu
◽
Thomas Dean
Keyword(s):
Web Pages
Download Full-text
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.24
◽
2008
◽
Cited By ~ 16
Author(s):
Lei Wang
◽
Qiang Zhang
◽
PengChao Zhao
Keyword(s):
Model Checking
◽
Program Analysis
◽
Automated Detection
Download Full-text
Constructing Subtle Faults Using Higher Order Mutation Testing
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.36
◽
2008
◽
Cited By ~ 95
Author(s):
Yue Jia
◽
Mark Harman
Keyword(s):
Mutation Testing
◽
Higher Order
Download Full-text
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.32
◽
2008
◽
Cited By ~ 1
Author(s):
Raffi T. Khatchadourian
◽
Awais Rashid
Download Full-text
On the Use of Data Flow Analysis in Static Profiling
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.18
◽
2008
◽
Cited By ~ 4
Author(s):
Cathal Boogerd
◽
Leon Moonen
Keyword(s):
Data Flow
◽
Flow Analysis
◽
Data Flow Analysis
◽
Use Of Data
Download Full-text
Modular Decompilation of Low-Level Code by Partial Evaluation
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.35
◽
2008
◽
Cited By ~ 2
Author(s):
Miguel Gómez-Zamalloa
◽
Elvira Albert
◽
Germán Puebla
Keyword(s):
Partial Evaluation
◽
Low Level
Download Full-text
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.16
◽
2008
◽
Cited By ~ 4
Author(s):
Petru Florin Mihancea
Keyword(s):
Class Hierarchies
◽
Visual Approach
Download Full-text
Beyond Annotations: A Proposal for Extensible Java (XJ)
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.34
◽
2008
◽
Cited By ~ 6
Author(s):
Tony Clark
◽
Paul Sammut
◽
James Willans
Download Full-text
CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation
◽
10.1109/scam.2008.10
◽
2008
◽
Cited By ~ 2
Author(s):
Nuno F. Rodrigues
◽
Luis S. Barbosa
Keyword(s):
Legacy Code
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close