Abstract is missing.
- 90 Perspiration: Engineering Static Analysis Techniques for Industrial ApplicationsPaul Anderson. 3-12 [doi]
- Some Assembly Required - Program Analysis of Embedded System CodeAnsgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried. 15-24 [doi]
- User-Input Dependence Analysis via Graph ReachabilityBernhard Scholz, Chenyi Zhang, Cristina Cifuentes. 25-34 [doi]
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor s BehaviorsKatsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi. 35-44 [doi]
- An Empirical Study of Function Overloading in C++Cheng Wang, Daqing Hou. 47-56 [doi]
- Is Cloned Code More Stable than Non-cloned Code?Jens Krinke. 57-66 [doi]
- Exploiting the Correspondence between Micro Patterns and Class NamesJeremy Singer, Chris C. Kirkham. 67-76 [doi]
- On the Use of Data Flow Analysis in Static ProfilingCathal Boogerd, Leon Moonen. 79-88 [doi]
- The Semantics of Abstract Program SlicingDamiano Zanardini. 89-98 [doi]
- The Evolution and Decay of Statically Detected Source Code VulnerabilitiesMassimiliano Di Penta, Luigi Cerulo, Lerina Aversano. 101-110 [doi]
- From Indentation Shapes to Code StructuresAbram Hindle, Michael W. Godfrey, Richard C. Holt. 111-120 [doi]
- Evaluating Key Statements AnalysisDavid W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi. 121-130 [doi]
- Fast and Precise Points-to AnalysisJonas Lundberg, Tobias Gutzmann, Welf Löwe. 133-142 [doi]
- Aspect-Aware Points-to AnalysisQiang Sun, Jianjun Zhao. 143-152 [doi]
- Automatic Determination of May/Must Set Usage in Data-Flow AnalysisAndrew Stone, Michelle Strout, Shweta Behere. 153-162 [doi]
- Automated Detection of Code Vulnerabilities Based on Program Analysis and Model CheckingLei Wang, Qiang Zhang, PengChao Zhao. 165-173 [doi]
- Analysis and Transformations for Efficient Query-Based DebuggingMichael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu. 174-183 [doi]
- Change Impact Graphs: Determining the Impact of Prior Code ChangesDaniel M. Germán, Gregorio Robles, Ahmed E. Hassan. 184-193 [doi]
- Using Program Transformations to Add Structure to a Legacy Data ModelMariano Ceccato, Thomas Roy Dean, Paolo Tonella. 197-206 [doi]
- Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies ReengineeringPetru Florin Mihancea. 207-216 [doi]
- Automated Migration of List Based JSP Web Pages to AJAXJason Chu, Thomas Dean. 217-226 [doi]
- Beyond Annotations: A Proposal for Extensible Java (XJ)Tony Clark, Paul Sammut, James S. Willans. 229-238 [doi]
- Modular Decompilation of Low-Level Code by Partial EvaluationMiguel Gómez-Zamalloa, Elvira Albert, Germán Puebla. 239-248 [doi]
- Constructing Subtle Faults Using Higher Order Mutation TestingYue Jia, Mark Harman. 249-258 [doi]
- Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented SoftwareRaffi Khatchadourian, Awais Rashid. 261-262 [doi]
- Parfait - A Scalable Bug Checker for C CodeCristina Cifuentes. 263-264 [doi]
- CoordInspector: A Tool for Extracting Coordination Data from Legacy CodeNuno F. Rodrigues, Luís Soares Barbosa. 265-266 [doi]
- Precise Analysis of Java Programs Using JOANADennis Giffhorn, Christian Hammer. 267-268 [doi]
- DTS - A Software Defects Testing SystemZhao Hong Yang, Yun-Zhan Gong, Xiao Qing, Wang Ya Wen. 269-270 [doi]