Journal: Information \& Software Technology

Volume 51, Issue 10

1377 -- 1378James R. Cordy, Lu Zhang. Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008
1379 -- 1393Yue Jia, Mark Harman. Higher Order Mutation Testing
1394 -- 1408Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles. Change impact graphs: Determining the impact of prior codechanges
1409 -- 1427Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla. Decompilation of Java bytecode to Prolog by partial evaluation
1428 -- 1439Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe. Fast and precise points-to analysis
1440 -- 1453Andrew Stone, Michelle Strout, Shweta Behere. May/must analysis and the DFAGen data-flow analysis generator
1454 -- 1468Mariano Ceccato, Thomas Roy Dean, Paolo Tonella. Recovering structured data types from a legacy data model with overlays
1469 -- 1484Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano. The life and death of statically detected vulnerabilities: An empirical study