


default search action
17th SCAM 2017: Shanghai, China
- 17th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2017, Shanghai, China, September 17-18, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3238-3

Research Track
Program Analysis and Slicing
- Jordy Ruiz

, Hugues Cassé, Marianne De Michiel:
Working Around Loops for Infeasible Path Detection in Binary Programs. 1-10 - Guilherme B. de Pádua, Weiyi Shang:

Revisiting Exception Handling Practices with Exception Flow Analysis. 11-20 - David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:

Tree-Oriented vs. Line-Oriented Observation-Based Slicing. 21-30
Empirical Studies
- Marcelo Suzuki, Adriano Carvalho de Paula, Eduardo Guerra

, Cristina V. Lopes, Otávio Augusto Lazzarini Lemos:
An Exploratory Study of Functional Redundancy in Code Repositories. 31-40 - Mohammed Sayagh, Zhen Dong, Artur Andrzejak, Bram Adams

:
Does the Choice of Configuration Framework Matter for Developers? Empirical Study on 11 Java Configuration Frameworks. 41-50 - Alaaeddin Swidan

, Alexander Serebrenik
, Felienne Hermans:
How do Scratch Programmers Name Variables and Procedures? 51-60
Supporting Software Developers
- Jinshui Wang

, Xin Peng, Zhenchang Xing, Kun Fu, Wenyun Zhao:
Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process. 61-70 - Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:

Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java. 71-80 - Bin Lin

, Simone Scalabrino
, Andrea Mocci
, Rocco Oliveto, Gabriele Bavota
, Michele Lanza
:
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers. 81-90
Fact Extraction
- Giovanni Liva, Muhammad Taimoor Khan

, Martin Pinzger:
Extracting Timed Automata from Java Methods. 91-100 - Richárd Szalay, Zoltán Porkoláb, Dániel Krupp:

Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based Solution. 101-110 - Abdul Ali Bangash

, Hareem Sahar, Mirza Omer Beg:
A Methodology for Relating Software Structure with Energy Consumption. 111-120 - Mohammad Ghafari, Pascal Gadient

, Oscar Nierstrasz:
Security Smells in Android. 121-130
Code Smells and Clones
- Md. Saidur Rahman, Chanchal K. Roy:

On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study. 131-140
Engineering Track
- Thomas Atzenhofer, Reinhold Plösch:

Automatically Adding Missing Libraries to Java Projects to Foster Better Results from Static Analysis. 141-146 - Csaba Nagy, Anthony Cleve:

A Static Code Smell Detector for SQL Queries Embedded in Java Code. 147-152 - David Anderson, Mark Hills

:
Supporting Analysis of SQL Queries in PHP AiR. 153-158 - Mona Nashaat

, Karim Ali, James Miller:
Detecting Security Vulnerabilities in Object-Oriented PHP Programs. 159-164

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














