Journal: Information \& Software Technology

Volume 44, Issue 13

717 -- 720Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang. Source code analysis and manipulation
721 -- 732Amie L. Souter, Lori L. Pollock. Characterization and automatic identification of type infeasible call chains
733 -- 741Zhenqiang Chen, Baowen Xu, Hongji Yang, Jianjun Zhao. Concurrent Ada dead statements detection
743 -- 754Paul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum. Flow insensitive points-to sets
755 -- 765Giuliano Antoniol, Umberto Villano, Ettore Merlo, Massimiliano Di Penta. Analyzing cloning evolution in the Linux kernel
767 -- 782Michael L. van de Vanter. The documentary structure of source code
783 -- 795Sandro Bartolini, Cosimo Antonio Prete. A cache-aware program transformation technique suitable for embedded systems
797 -- 810Sibylle Schupp, Douglas Gregor, David R. Musser, Shin-Ming Liu. Semantic and behavioral library transformations
811 -- 825Filippo Ricca, Paolo Tonella, Ira D. Baxter. Web application transformations based on rewrite rules
827 -- 837James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider. Source transformation in software engineering using the TXL transformation system