Title |
Author |
A Case Study in Detecting Software Security Vulnerabilities using Constraint Optimisation |
Micheale Weber, Viren Shah, Chris Ren |
A Hybrid Program Slicing Framework |
Juergen Rilling, Bhaskar Karanth |
A Source Level Optimisation Technique to Improve Cache Exploitation in Embedded Systems |
S. Bartolini, C. A. Prete |
A source-to-source compiler for generating dependable software |
Massimo Violante |
Analysis and Manipulation of Distributed Multi-Language Software Code |
L. Deruelle, N. Melab, M. Bouneffa, H. Basson |
Application Maintenance using Software Agents |
Amit Sharma, Miriam A. M. Capretz |
Detecting Dead Statements for Concurrent Programs |
Z.Chen, B. Xu, H. Yang |
Finding Code on the World Wide Web: A Preliminary Investigation |
James M. Bieman, Vanessa Murdock |
Flow Insensitive Points-to Sets |
David Binkley, Genevieve Rosay, Tim Teitelbaum, Paul Anderson |
Identifying Clones in the Linux Kernel |
G. Casazza, G. Antoniol, U. Villano, E.Merlo, M. Di Penta |
Jmangler -- A Framework for Load-Time Transformation of Java Class Files |
Gunter Kniesel, Pascal Costanza, Micheal Austermann |
Library Transformations |
Sibylle Schupp, Douglas Gregor, David Musser, Shin-Ming Liu |
Measurement and Analysis of Runtime Profiling Data for Java Programs |
Jane Horgan, James Power, John Waldron |
Preserving the Documentary Structure of Source Code in Language-based Transformation Tools |
Micheal L., Van De Vanter |
Restructuring Web Application via Transformation Rules |
Filippo Ricca, Paolo Tonella, Ira D. Baxter |
Smell the Coffee! Uncovering Java Analysis Issues |
Claire Knight, Malcolm Munro |
Software Engineering by Source Transformation -- Experience with TXL |
James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider |
Static Slicing and Parametric Polymorphism |
David Byers, Mariam Kamkar |
Type Infeasible Call Chains |
Amie L. Souter, Lori L. Pollock |
Using Automated Source Code Analysis For Software Evolution |
Liz Burd, Stephen Rank |
Using Data Flow Analysis to Infer Type Information in Java Bytecode |
Palolo Maggi, Riccardo Sisto |