Default Cover Image

Source Code Analysis and Manipulation, Fourth IEEE International Workshop on

Sept. 15 2004 to Sept. 16 2004

Chicago, Illinois

ISBN: 0-7695-2144-4

Table of Contents

Message from the ChairsFreely available from IEEE.pp. vii
Conference organizationFreely available from IEEE.pp. viii
list-reviewerFreely available from IEEE.pp. x
Decompilation
Software De-Pipelining TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 7-16
Decompilation
Abstracting stack to detect obfuscated calls in binariesFull-text access may be available. Sign in or learn about subscription options.pp. 17-26
Slicing
Context-Sensitivity Matters, But Context Does NotFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Slicing
Some Notes on Interprocedural Program SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 36-42
Slicing
Formalizing Executable Dynamic and Forward SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 43-52
Restructuring
Control Flow Reversal for Adjoint Code GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 55-64
Restructuring
Evolving Transformation Sequences using Genetic AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 66-75
Restructuring
Program Restructuring Through Clustering TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 75-84
Restructuring
Amorphous Procedure ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Aspect-Oriented Programming
Mining Aspectual Views using Formal Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 97-106
Aspect-Oriented Programming
Adding Distribution to Existing Applications by Means of Aspect Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 107-116
Maintenance
Specifying the Law of Demeter and C++ Programming Guidelines with FCLFull-text access may be available. Sign in or learn about subscription options.pp. 119-127
Maintenance
Clone Detection in Source Code by Frequent Itemset TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Maintenance
Predicting Class Testability using Object-Oriented MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
Source Code
Executable Source Code and Non-Executable Source Code: Analysis and RelationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 149-157
Source Code
A CASE Tool Platform Using an XML Representation of Java Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 158-167
Showing 19 out of 19