Abstract is missing.
- A Case Study in Detecting Software Security Vulnerabilities Using Constraint OptimizationMichael Weber, Viren Shah, Chris Ren. 3-13 [doi]
- A Hybrid Program Slicing FrameworkJuergen Rilling, Bhaskar Karanth. 14-25 [doi]
- An Object Level Transformation Technique to Improve the Performance of Embedded ApplicationsSandro Bartolini, Cosimo Antonio Prete. 26-34 [doi]
- A Source-to-Source Compiler for Generating Dependable SoftwareMaurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Marco Torchiano. 35-44 [doi]
- Analysis and Manipulation of Distributed Multi-Language Software CodeLaurent Deruelle, Nordine Melab, Mourad Bouneffa, Henri Basson. 45-56 [doi]
- Application Maintenance Using Software AgentsAmit Sharma, Miriam A. M. Capretz. 57-66 [doi]
- Detecting Dead Statements for Concurrent ProgramsZhenqiang Chen, Baowen Xu, Hongji Yang. 67-74 [doi]
- Finding Code on the World Wibe Web: A Preliminary InvestigationJames M. Bieman, Vanessa Murdock. 75-80 [doi]
- Flow Insensitive Points-To SetsPaul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum. 81-91 [doi]
- Identifying Clones in the Linux KernelGiuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo. 92-99 [doi]
- Jmangler-A Framework for Load-Time Transformation of Java Class FilesGünter Kniesel, Pascal Costanza, Michael Austermann. 100-110 [doi]
- Library TransformationsSibylle Schupp, Douglas Gregor, David R. Musser. 111-123 [doi]
- Measurement and Analysis of Runtime Profiling Data for Java ProgramsJane Horgan, James F. Power, John Waldron. 124-132 [doi]
- Preserving the Documentary Structure of Source Code in Language-Based Transformation ToolsMichael L. van de Vanter. 133-143 [doi]
- Program Slicing: Methods and ApplicationsAndrea De Lucia. 144-151 [doi]
- Restructuring Web Applications via Transformation RulesFilippo Ricca, Paolo Tonella, Ira D. Baxter. 152-162 [doi]
- Smell the Coffee! Uncovering Java Analysis IssuesClaire Knight. 163-169 [doi]
- Software Engineering by Source Transformation-Experience with TXLJames R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider. 170-180 [doi]
- Static Slicing and Parametric PolymorphismDavid Byers, Mariam Kamkar. 181-186 [doi]
- The Formal Transformation Approach to Source Code Analysis and ManipulationMartin P. Ward. 187-195 [doi]
- Type Infeasible Call ChainsAmie L. Souter, Lori L. Pollock. 196-205 [doi]
- Using Automated Source Code Analysis for Software EvolutionLiz Burd, Stephen Rank. 206-212 [doi]
- Using Data Flow Analysis to Infer Type Information in Java BytecodePaolo Maggi, Riccardo Sisto. 213 [doi]