| 1377 | -- | 1378 | James R. Cordy, Lu Zhang. Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008 |
| 1379 | -- | 1393 | Yue Jia, Mark Harman. Higher Order Mutation Testing |
| 1394 | -- | 1408 | Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles. Change impact graphs: Determining the impact of prior codechanges |
| 1409 | -- | 1427 | Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla. Decompilation of Java bytecode to Prolog by partial evaluation |
| 1428 | -- | 1439 | Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe. Fast and precise points-to analysis |
| 1440 | -- | 1453 | Andrew Stone, Michelle Strout, Shweta Behere. May/must analysis and the DFAGen data-flow analysis generator |
| 1454 | -- | 1468 | Mariano Ceccato, Thomas Roy Dean, Paolo Tonella. Recovering structured data types from a legacy data model with overlays |
| 1469 | -- | 1484 | Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano. The life and death of statically detected vulnerabilities: An empirical study |