Madrid
Madrid
Madrid
Madrid

Welcome to SCAM'18!

The aim of the International Working Conference on Source Code Analysis & Manipulation (SCAM) is to bring together researchers and practitioners working on theory, techniques and applications which concern analysis and/or manipulation of the source code of computer systems. While much attention in the wider software engineering community is properly directed towards other aspects of systems development and evolution, such as specification, design and requirements engineering, it is the source code that contains the only precise description of the behaviour of the system. The analysis and manipulation of source code thus remains a pressing concern.

With an outstanding keynote titled:
From Start-ups to Scale-ups: Open Problems, Challenges and Myths in
Static and Dynamic Program Analysis for Testing and Verification

(tentative) presented by:
Prof. Mark Harman and Prof. Peter O'Hearn
Facebook, Inc. and University College London.

SCAM 2018 will be held in Madrid, Spain co-located with ICSME 2018.

Please check back later for updates, and follow us on Twitter to keep informed.

Research Track Accepted Papers

TBA

Engineering Track Accepted Papers

TBA

Program
TBA

Call for Research Track Papers

The 18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2018) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2018 solicits high quality paper submissions.

Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

  • program transformation and refactoring
  • static and dynamic analysis
  • natural language analysis of source code artifacts
  • repository, revision, and change analysis
  • source level metrics
  • decompilation
  • bug location and prediction
  • security vulnerability analysis
  • source-level testing and verification
  • clone detection
  • concern, concept, and feature localization and mining
  • program comprehension
  • bad smell detection
  • abstract interpretation
  • program slicing
  • source level optimization
  • energy efficient source code

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop. Papers must not exceed 10 pages including all text, references, appendices and figures and must conform to the IEEE proceedings paper format guidelines and must be clearly marked as a research paper. Templates in Latex and Word are available on IEEE's website. All submissions must be in English.

The papers should be submitted electronically in PDF format via EasyChair. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper.

SCAM 2018 also features an engineering paper track for papers that report on the design and implementation of tools for source code analysis and manipulation.

Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.

Special Issue

A set of the best papers from SCAM 2018 will be invited to be considered for revision, extension, and publication in a special journal issue.

Important Dates for Research Papers

  • Abstract Deadline: June 8, 2018
  • Paper Deadline: June 15, 2018
  • Notification: July 9, 2018
  • Camera Ready Deadline: Aug 13, 2018

Call for Engineering Track Papers

In addition to the research track (see separate CFP), the 18th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2018) will also feature an Engineering track. This track welcomes six-page papers that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and the real world studies enabled by these advances. To be clear, this is not the addition of a new track to SCAM but rather a significant expansion to the scope of the tools track of previous SCAMs.

What artefacts qualify as “engineering track” material?

  • tools: software (or hardware!) programs that facilitate SCAMmy activities.
  • libraries: reusable API-enabled frameworks for the above.
  • infrastructure: while libraries are purely software, infrastructure can include projects that provide/facilitate access to data and analysis.
  • data: reusable datasets for other researchers to replicated and innovate with.
  • real world studies enabled by these advances. Here the focus is on how the {tool,infrastructure, etc} enabled the study, and not so much the study itself. The novelty of the research question is less important than the engineering challenges faced in the study.

A successful SCAM engineering track paper should:

  1. Fall under the topics mentioned for the SCAM 2018 research track.
  2. Discuss engineering work artefacts that have NOT been published before. However, previous work involving the tool, but for which the tool was not the main contribution, are acceptable.
  3. Motivate the use cases (and hence the existence) of the engineering work.
  4. Relate the engineering project to earlier work, if any.
  5. Describe the experiences gained in developing this contribution.

Optionally (and encouraged):

  1. Any empirical results or user feedback is welcome.
  2. Contain the URL of a website where the tool/library/data etcetera can be downloaded, together with example data and clear installation guidelines, preferably but not necessarily open source.
  3. Contain the URL to a video demonstrating the usage of the contribution.

Note that the submission length has a limit of six pages, in contrast to the two to four pages of traditional tool demo papers. The expectation is that authors use the space to discuss artefact motivation, design, and use cases in much more detail. For example, a use case would be well illustrated by a demo scenario with screenshots.

Each submission will be reviewed by members of the engineering track program committee. Authors of accepted papers will be required to present their artefacts at the conference. All accepted engineering track papers will be published in the conference proceedings. The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artefacts for source code analysis and manipulation. The artefacts can range from an early research prototype to a polished product ready for deployment. Papers about commercial products are allowed, as long as the guidelines described above are followed.

Videos and other demo material may be taken into account by reviewers as they review the paper. However, such material will not become part of the permanent record of the conference, so the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source (e.g., YouTube), or made available in such a way that the tools chair can download them once and redistribute them to reviewers

Proceedings

All accepted papers will appear in the proceedings which will be published by the IEEE Computer Society Press.

Important Dates

  • Abstract Deadline: June 8, 2018
  • Paper Deadline: June 15, 2018
  • Notification: July 9, 2018
  • Camera Ready Deadline: Aug 13, 2018
  • Conference: Sep 23-24, 2018

Submission

The submission should be maximum six pages, in IEEE format, submitted via EasyChair. Please use the IEEE templates in preparing your manuscripts:

Research Track

Chairs
Members

Engineering Track

Chairs
Members

SCAM Steering Committee

Madrid

Madrid, Spain

Madrid is the capital and largest city of Spain, as well as the capital of the autonomous community of the same name (Comunidad de Madrid). The population of the city is roughly 3.3 million with a metro area population of almost 6.5 million. Madrid is best known for its great cultural and artistic heritage, a good example of which is the El Prado museum (a detailed travel guide can be found here). Madrid also boasts some of the liveliest nightlife in the world.

Sponsorship Opportunities

What is SCAM?

  • Flagship gathering of the source code analysis community
  • Attended by a focused gathering of 50 to 80 members of academia, industry, and government
  • Professional development: keynotes by field leaders, latest research, engineering track

Benefits to Supporters

  • Excellent recruiting venue for highly qualified software engineers
  • Invitation to Social Gatherings
  • Organization's logo on SCAM publicity materials including:
    • Conference website, proceedings, and program
    • Signage and banners at the conference
  • Provide corporate information to attendees

Support Level Opportunities

  • Three levels of support:
    • Silver
    • Gold
    • Platinum
  • Sponsorship can be associated with a specific conference activity.

Banquet Address

  • An opportunity at the conference banquet to give a brief introduction to your company.
Level Social Functions Conference Passes Logo on Publicity Gift in the Bag Banquet Address
Platinum 3
Gold 2
Silver 1

For further information, please contact the general chair, Árpád Beszédes, University of Szeged