Abstract is missing.
- Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work DoneTao Xie. 1-3 [doi]
- Collections Frameworks for Points-To AnalysisTobias Gutzmann, Jonas Lundberg, Welf Löwe. 4-13 [doi]
- Building Useful Program Analysis Tools Using an Extensible Java CompilerEdward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan. 14-23 [doi]
- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKitLajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy. 24-33 [doi]
- Closed Symbolic Execution for Verifying Program TerminationGermán Vidal. 34-43 [doi]
- Alias-Aware Propagation of Simple Pattern-Based Properties in PHP ApplicationsFrançois Gauthier, Ettore Merlo. 44-53 [doi]
- CAWDOR: Compiler Assisted Worm DefenseJun Yuan, Rob Johnson. 54-63 [doi]
- Folding Repeated Instructions for Improving Token-Based Code Clone DetectionHiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto. 64-73 [doi]
- Evolution of Near-Miss ClonesSaman Bazrafshan. 74-83 [doi]
- Optimizing Expression Selection for Lookup Table Program TransformationChris Wilcox, Michelle Mills Strout, James M. Bieman. 84-93 [doi]
- Cross-Language Code Analysis and RefactoringPhilip Mayer, Andreas Schroeder. 94-103 [doi]
- When Does a Refactoring Induce Bugs? An Empirical StudyGabriele Bavota, Bernardino De Carluccio, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Orazio Strollo. 104-113 [doi]
- Aucsmith-Like Obfuscation of Java BytecodeAndrea Zambon. 114-119 [doi]
- AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java SystemsChristian Zoller, Axel Schmolitzky. 120-125 [doi]
- Dynamic Trace-Based Data Dependency Analysis for Parallelization of C ProgramsMihai T. Lazarescu, Luciano Lavagno. 126-131 [doi]
- Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARKHariharan Thiagarajan, John Hatcliff, Jason Belt, Robby. 132-137 [doi]
- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 BinariesUlf Kargen, Nahid Shahmehri. 138-143 [doi]
- Combining Conceptual and Domain-Based Couplings to Detect Database and Code DependenciesMalcom Gethers, Amir Aryani, Denys Poshyvanyk. 144-153 [doi]
- What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity MetricJurgen J. Vinju, Michael W. Godfrey. 154-163 [doi]
- Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse ReleasesJohn Businge, Alexander Serebrenik, Mark van den Brand. 164-173 [doi]
- Improving Bug Location Using Binary Class RelationshipsNasir Ali, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 174-183 [doi]
- On the Use of Stemming for Concern Location and Bug Localization in JavaEmily Hill, Shivani Rao, Avinash C. Kak. 184-193 [doi]