Sciweavers

SCAM
2006
IEEE
14 years 6 months ago
Comparative Study of Refactoring Haskell and Erlang Programs
Refactoring is about changing the design of existing code without changing its behaviour, but with the aim of making code easier to understand, modify, or reuse. Taking Haskell an...
Huiqing Li, Simon Thompson
SCAM
2006
IEEE
14 years 6 months ago
Evaluating C++ Design Pattern Miner Tools
Many articles and tools have been proposed over the years for mining design patterns from source code. These tools differ in several aspects, thus their fair comparison is hard. B...
Lajos Jeno Fülöp, Tamas Gyovai, Rudolf F...
SCAM
2006
IEEE
14 years 6 months ago
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
Weilei Zhang, Barbara G. Ryder
SCAM
2006
IEEE
14 years 6 months ago
SMART C: A Semantic Macro Replacement Translator for C
Programmers often want to transform the source or binary representations of their programs (e.g., to optimize, add dynamic safety checks, or add profile gathering code). Unfortun...
Matthew Jacobs, E. Christopher Lewis
SCAM
2006
IEEE
14 years 6 months ago
Stop-List Slicing
Traditional program slicing requires two parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the...
Keith Gallagher, David Binkley, Mark Harman
SCAM
2006
IEEE
14 years 6 months ago
Data Representation Alternatives in Semantically Augmented Numerical Models
Transformations of numerical source code may require the augmentation of the original variables with new data to represent additional data the transformed program operates on. Aut...
Michael W. Fagan, Laurent Hascoët, Jean Utke
SCAM
2006
IEEE
14 years 6 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
SCAM
2006
IEEE
14 years 6 months ago
Factoring Differences for Iterative Change Management
An approach for factoring source-code differences is presented. A single large difference between two versions of a program is decomposed into factors (i.e., smaller changes). The...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
SCAM
2006
IEEE
14 years 6 months ago
Evolving TXL
Adrian D. Thurston, James R. Cordy