Sciweavers

SCAM
2003
IEEE
14 years 1 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
SCAM
2003
IEEE
14 years 1 months ago
CPP Denotational Semantics
This paper shows that CPP, the preprocessor of the C language, can be seen as a programming language in which directives are statements, parametrized macros are functions, files a...
Jean-Marie Favre
SCAM
2003
IEEE
14 years 1 months ago
Slicing the SCAM Mug: A Case Study in Semantic Slicing
In this paper we describe an improved formalisation of slicing in WSL transformation theory and apply the result to a particularly challenging slicing problem: the SCAM mug [1]. W...
Martin P. Ward
SCAM
2003
IEEE
14 years 1 months ago
The Java System Dependence Graph
The Program Dependence Graph was introduced by Ottenstein and Ottenstein in 1984. It was suggested to be a suitable internal program representation for monolithic programs, for th...
Neil Walkinshaw, Marc Roper, Murray Wood
SCAM
2003
IEEE
14 years 1 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
SCAM
2003
IEEE
14 years 1 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...
SCAM
2003
IEEE
14 years 1 months ago
Online Cycle Detection and Difference Propagation for Pointer Analysis
This paper presents and evaluates a number of techniques to improve the execution time of interprocedural pointer analysis in the context of large C programs. The analysis is form...
David J. Pearce, Paul H. J. Kelly, Chris Hankin
SCAM
2003
IEEE
14 years 1 months ago
XOgastan: XML-Oriented gcc AST Analysis and Transformations
Software maintenance, program analysis and transformation tools almost always rely on static source code analysis as the first and fundamental step to gather information. In the ...
Giuliano Antoniol, Massimiliano Di Penta, Gianluca...
QSIC
2003
IEEE
14 years 1 months ago
Character String Predicate Based Automatic Software Test Data Generation
A character string is an important element in programming. A problem that needs further research is how to automatically generate software test data for character strings. This pa...
Ruilian Zhao, Michael R. Lyu