default search action
17th SCAM 2017: Shanghai, China
- 17th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2017, Shanghai, China, September 17-18, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3238-3
Research Track
Program Analysis and Slicing
- Jordy Ruiz, Hugues Cassé, Marianne De Michiel:
Working Around Loops for Infeasible Path Detection in Binary Programs. 1-10 - Guilherme B. de Pádua, Weiyi Shang:
Revisiting Exception Handling Practices with Exception Flow Analysis. 11-20 - David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
Tree-Oriented vs. Line-Oriented Observation-Based Slicing. 21-30
Empirical Studies
- Marcelo Suzuki, Adriano Carvalho de Paula, Eduardo Guerra, Cristina V. Lopes, Otávio Augusto Lazzarini Lemos:
An Exploratory Study of Functional Redundancy in Code Repositories. 31-40 - Mohammed Sayagh, Zhen Dong, Artur Andrzejak, Bram Adams:
Does the Choice of Configuration Framework Matter for Developers? Empirical Study on 11 Java Configuration Frameworks. 41-50 - Alaaeddin Swidan, Alexander Serebrenik, Felienne Hermans:
How do Scratch Programmers Name Variables and Procedures? 51-60
Supporting Software Developers
- Jinshui Wang, Xin Peng, Zhenchang Xing, Kun Fu, Wenyun Zhao:
Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process. 61-70 - Manuel Leuenberger, Haidar Osman, Mohammad Ghafari, Oscar Nierstrasz:
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java. 71-80 - Bin Lin, Simone Scalabrino, Andrea Mocci, Rocco Oliveto, Gabriele Bavota, Michele Lanza:
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers. 81-90
Fact Extraction
- Giovanni Liva, Muhammad Taimoor Khan, Martin Pinzger:
Extracting Timed Automata from Java Methods. 91-100 - Richárd Szalay, Zoltán Porkoláb, Dániel Krupp:
Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based Solution. 101-110 - Abdul Ali Bangash, Hareem Sahar, Mirza Omer Beg:
A Methodology for Relating Software Structure with Energy Consumption. 111-120 - Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz:
Security Smells in Android. 121-130
Code Smells and Clones
- Md. Saidur Rahman, Chanchal K. Roy:
On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study. 131-140
Engineering Track
- Thomas Atzenhofer, Reinhold Plösch:
Automatically Adding Missing Libraries to Java Projects to Foster Better Results from Static Analysis. 141-146 - Csaba Nagy, Anthony Cleve:
A Static Code Smell Detector for SQL Queries Embedded in Java Code. 147-152 - David Anderson, Mark Hills:
Supporting Analysis of SQL Queries in PHP AiR. 153-158 - Mona Nashaat, Karim Ali, James Miller:
Detecting Security Vulnerabilities in Object-Oriented PHP Programs. 159-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.