Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SCAM
SCAM 2017
Generate Citations
2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)
Sept. 17 2017 to Sept. 18 2017
Shanghai, China
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vi
Message from the Chairs
Freely available from IEEE.
pp. vii-vii
Organizing Committee
Freely available from IEEE.
pp. viii-viii
Program Committee
Freely available from IEEE.
pp. ix-x
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xi-xii
Sponsors and Supporters
Freely available from IEEE.
pp. xiii-xiii
Working Around Loops for Infeasible Path Detection in Binary Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Jordy Ruiz
,
Hugues Cassé
,
Marianne de Michiel
Revisiting Exception Handling Practices with Exception Flow Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Guilherme B. de Pádua
,
Weiyi Shang
Tree-Oriented vs. Line-Oriented Observation-Based Slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
David Binkley
,
Nicolas Gold
,
Syed Islam
,
Jens Krinke
,
Shin Yoo
An Exploratory Study of Functional Redundancy in Code Repositories
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Marcelo Suzuki
,
Adriano Carvalho de Paula
,
Eduardo Guerra
,
Cristina V. Lopes
,
Otavio Augusto Lazzarini Lemos
Does the Choice of Configuration Framework Matter for Developers? Empirical Study on 11 Java Configuration Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Mohammed Sayagh
,
Zhen Dong
,
Artur Andrzejak
,
Bram Adams
How do Scratch Programmers Name Variables and Procedures?
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Alaaeddin Swidan
,
Alexander Serebrenik
,
Felienne Hermans
Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Jinshui Wang
,
Xin Peng
,
Zhenchang Xing
,
Kun Fu
,
Wenyun Zhao
Harvesting the Wisdom of the Crowd to Infer Method Nullness in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-80
by
Manuel Leuenberger
,
Haidar Osman
,
Mohammad Ghafari
,
Oscar Nierstrasz
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-90
by
Bin Lin
,
Simone Scalabrino
,
Andrea Mocci
,
Rocco Oliveto
,
Gabriele Bavota
,
Michele Lanza
Extracting Timed Automata from Java Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-100
by
Giovanni Liva
,
Muhammad Taimoor Khan
,
Martin Pinzger
Towards Better Symbol Resolution for C/C++ Programs: A Cluster-Based Solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-110
by
Richárd Szalay
,
Zoltán Porkoláb
,
Dániel Krupp
A Methodology for Relating Software Structure with Energy Consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Abdul Ali Bangash
,
Hareem Sahar
,
Mirza Omer Beg
Security Smells in Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-130
by
Mohammad Ghafari
,
Pascal Gadient
,
Oscar Nierstrasz
On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-140
by
Md Saidur Rahman
,
Chanchal K. Roy
Automatically Adding Missing Libraries to Java Projects to Foster Better Results from Static Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-146
by
Thomas Atzenhofer
,
Reinhold Plösch
A Static Code Smell Detector for SQL Queries Embedded in Java Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-152
by
Csaba Nagy
,
Anthony Cleve
Supporting Analysis of SQL Queries in PHP AiR
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
David Anderson
,
Mark Hills
Detecting Security Vulnerabilities in Object-Oriented PHP Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-164
by
Mona Nashaat
,
Karim Ali
,
James Miller
Author index
Freely available from IEEE.
pp. 165-165
[Publisher's information]
Freely available from IEEE.
pp. 166-166
Showing 29 out of 29