Default Cover Image

2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)

Sept. 17 2017 to Sept. 18 2017

Shanghai, China

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-vi
Message from the ChairsFreely available from IEEE.pp. vii-vii
Organizing CommitteeFreely available from IEEE.pp. viii-viii
Program CommitteeFreely available from IEEE.pp. ix-x
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xi-xii
Sponsors and SupportersFreely available from IEEE.pp. xiii-xiii
Working Around Loops for Infeasible Path Detection in Binary ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Revisiting Exception Handling Practices with Exception Flow AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Tree-Oriented vs. Line-Oriented Observation-Based SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
How do Scratch Programmers Name Variables and Procedures?Full-text access may be available. Sign in or learn about subscription options.pp. 51-60
Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Harvesting the Wisdom of the Crowd to Infer Method Nullness in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Extracting Timed Automata from Java MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based SolutionFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
A Methodology for Relating Software Structure with Energy ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
Security Smells in AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Automatically Adding Missing Libraries to Java Projects to Foster Better Results from Static AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
A Static Code Smell Detector for SQL Queries Embedded in Java CodeFull-text access may be available. Sign in or learn about subscription options.pp. 147-152
Supporting Analysis of SQL Queries in PHP AiRFull-text access may be available. Sign in or learn about subscription options.pp. 153-158
Detecting Security Vulnerabilities in Object-Oriented PHP ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 159-164
Author indexFreely available from IEEE.pp. 165-165
[Publisher's information]Freely available from IEEE.pp. 166-166
Showing 29 out of 29