Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
SCAM
2003
IEEE
12 years 5 months ago
Static Slicing of Reactive Programs
Aditya Rajeev Kulkarni, S. Ramesh
SCAM
2003
IEEE
12 years 5 months ago
Barrier Slicing and Chopping
One of the critiques on program slicing is that slices presented to the user are hard to understand. This is partly due to bad user interfaces, but mainly related to the problem t...
Jens Krinke
SCAM
2003
IEEE
12 years 5 months ago
Parse-Tree Annotations Meet Re-Engineering Concerns
We characterise a computational model for processing annotated parse trees. The model is basically rewriting-based with specific provisions for dealing with annotations along the...
Jan Kort, Ralf Lämmel
SCAM
2003
IEEE
12 years 5 months ago
Interprocedural Static Slicing of Binary Executables
Ákos Kiss, Judit Jász, Gábor ...
SCAM
2003
IEEE
12 years 5 months ago
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques
Many static analyses aim at assigning to each control point of a program an invariant property that characterizes any state of a trace corresponding to this point. The choice of t...
Matthieu Martel
SCAM
2003
IEEE
12 years 5 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
SCAM
2003
IEEE
12 years 5 months ago
CPP Denotational Semantics
This paper shows that CPP, the preprocessor of the C language, can be seen as a programming language in which directives are statements, parametrized macros are functions, files a...
Jean-Marie Favre
SCAM
2003
IEEE
12 years 5 months ago
Slicing the SCAM Mug: A Case Study in Semantic Slicing
In this paper we describe an improved formalisation of slicing in WSL transformation theory and apply the result to a particularly challenging slicing problem: the SCAM mug [1]. W...
Martin P. Ward
SCAM
2003
IEEE
12 years 5 months ago
The Java System Dependence Graph
The Program Dependence Graph was introduced by Ottenstein and Ottenstein in 1984. It was suggested to be a suitable internal program representation for monolithic programs, for th...
Neil Walkinshaw, Marc Roper, Murray Wood
SCAM
2003
IEEE
12 years 5 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
books