| 717 | -- | 720 | Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang. Source code analysis and manipulation |
| 721 | -- | 732 | Amie L. Souter, Lori L. Pollock. Characterization and automatic identification of type infeasible call chains |
| 733 | -- | 741 | Zhenqiang Chen, Baowen Xu, Hongji Yang, Jianjun Zhao. Concurrent Ada dead statements detection |
| 743 | -- | 754 | Paul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum. Flow insensitive points-to sets |
| 755 | -- | 765 | Giuliano Antoniol, Umberto Villano, Ettore Merlo, Massimiliano Di Penta. Analyzing cloning evolution in the Linux kernel |
| 767 | -- | 782 | Michael L. van de Vanter. The documentary structure of source code |
| 783 | -- | 795 | Sandro Bartolini, Cosimo Antonio Prete. A cache-aware program transformation technique suitable for embedded systems |
| 797 | -- | 810 | Sibylle Schupp, Douglas Gregor, David R. Musser, Shin-Ming Liu. Semantic and behavioral library transformations |
| 811 | -- | 825 | Filippo Ricca, Paolo Tonella, Ira D. Baxter. Web application transformations based on rewrite rules |
| 827 | -- | 837 | James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider. Source transformation in software engineering using the TXL transformation system |