Next: Keynote Address
Up: Call for Papers SCAM
Previous: Important Dates
  Contents
Technical Program
A printer-friendly version of the program is also available
in postscript
and
PDF
formats.
In keeping with the spirit and format of a workshop, SCAM will have a highly discursive nature,
with four theme-based discussion tracks
and a keynote presentation, aimed at structuring and stimulating discussion.
Authors will have a 15 minute slot to present their work.
This is 10 minutes (maximum) for
talking with 5 minutes (minimum) for questions. Authors are encouraged
not to attempt to present the details of their paper in this time.
Rather, respecting the
discussion-centered goal of SCAM,
authors are encouraged to use a few slides to present points, claims,
issues and topics for discussion and to use their time allocation to attempt to
set the agenda for the ensuing discussions.
Each session has a specifically allocated discussion time at the end of the
presentations to allow for this.
8:00 - 9:00 |
Continental breakfast |
9:00 - 9:45 |
Keynote address |
9:45 - 10:00 |
short break |
10:00 - 11:30 |
Session I: Testing, Metrics, Maintenance |
11:30 - 12:00 |
refreshment break |
12:00 - 1:30 |
Session II: Source Transformation, Source Processing |
1:30 - 2:30 |
lunch |
2:30 - 4:00 |
Session III: Slicing |
4:00 - 4:30 |
refreshment break |
4:30 - 6:00 |
Session IV: Dependence Graphs, Static Analysis |
6:00 - 6:30 |
Wrap up / closing / elections |
|
|
|
|
7:00 - ?:?? |
SCAM reception (shared with attendess from WSE 2002, WESS 2002 and DBMR 2002) |
|
|
Subsections
Next: Keynote Address
Up: Call for Papers SCAM
Previous: Important Dates
  Contents