


default search action
22nd SCAM 2022: Limassol, Cyprus
- 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2021, Limassol, Cyprus, October 3, 2022. IEEE 2022, ISBN 978-1-6654-9609-4

- Mariano Ceccato, Banani Roy, Mohammad Ghafari:

Message from the General Chair and Program Co-Chairs SCAM 2022. ix-x - Thomas Hirsch, Birgit Hofer

:
Pruning Boolean Expressions to Shorten Dynamic Slices. 1-11 - Stefan Schott

, Felix Pauck:
Benchmark Fuzzing for Android Taint Analyses. 12-23 - Hiroki Inayoshi, Shohei Kakei

, Shoichi Saito:
Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps. 24-34 - Mehrdad Abdi, Serge Demeyer:

Test Transplantation through Dynamic Test Slicing. 35-39 - Dave W. Binkley, Leon Moonen:

Assessing the Impact of Execution Environment on Observation-Based Slicing. 40-44 - Richárd Szalay, Zoltán Porkoláb:

Semi-Automatic Refactoring to C++20 Modules: A Semi-Success Story. 45-55 - Aurel Ikama, Vincent Du, Philippe Belias, Biruk Asmare Muse, Foutse Khomh, Mohammad Hamdaqa:

Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication. 56-65 - Manuel De Stefano, Fabiano Pecorelli, Dario Di Nucci

, Andrea De Lucia:
A preliminary evaluation on the relationship among architectural and test smells. 66-70 - Mohammed Latif Siddiq

, Shafayat H. Majumder
, Maisha R. Mim, Sourov Jajodia, Joanna C. S. Santos:
An Empirical Study of Code Smells in Transformer-based Code Generation Techniques. 71-82 - Riley VanDonge, Naser Ezzati-Jivan:

N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing. 83-93 - Liang Tan, Christoph Bockisch:

Checking Refactoring Detection Results Using Code Changes Encoding for Improved Accuracy. 94-104 - Ching-Chi Chuang, Luís Cruz

, Robbert van Dalen, Vladimir Mikovski, Arie van Deursen
:
Removing dependencies from large software projects: are you really sure? 105-115 - Anushka Bhave

, Roopak Sinha
:
Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT. 116-120 - Yunior Pacheco

, Ahmed Zerouali, Coen De Roover
:
Mining for Framework Instantiation Pattern Interplays. 121-131 - Lile Lin, Zhiqiu Huang, Yaoshen Yu

, Yapeng Liu:
Multi-Modal Code Summarization with Retrieved Summary. 132-142 - Daniel Atzberger, Nico Scordialo, Tim Cech

, Willy Scheibel, Matthias Trapp, Jürgen Döllner:
CodeCV: Mining Expertise of GitHub Users from Coding Activities. 143-147 - Alin-Petru Rosu

, Petru Florin Mihancea
:
Towards the Detection of Hidden Familial Type Correlations in Java Code. 148-152 - Boladji Vinny Adjibi

, Fatou Ndiaye Mbodji, Tegawendé F. Bissyandé, Kevin Allix, Jacques Klein:
The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android. 153-163 - Balázs Rózsa, Gábor Antal, Rudolf Ferenc:

Don't DIY: Automatically transform legacy Python code to support structural pattern matching. 164-169 - Jim Buffenbarger:

Building LLVM and GCC, with Amake. 170-175 - Daniel Domínguez-Álvarez, Alessandra Gorla, Juan Caballero:

On the Usage of Programming Languages in the iOS Ecosystem. 176-180 - Wouter Van den Brink, Marcus Gerhold, Vadim Zaytsev

:
Deriving Modernity Signatures for PHP Systems with Static Analysis. 181-185 - Bram Vandenbogaerde

, Quentin Stiévenart
, Coen De Roover
:
Summary-Based Compositional Analysis for Soft Contract Verification. 186-196 - Tukaram Muske, Alexander Serebrenik:

Classification and Ranking of Delta Static Analysis Alarms. 197-207 - Naelson Oliveira, Márcio Ribeiro, Rodrigo Bonifácio, Rohit Gheyi, Igor Wiese, Baldoino Fonseca:

Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring. 208-218 - Niloofar Mansoor, Tukaram Muske, Alexander Serebrenik, Bonita Sharif

:
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms. 219-229 - Ranjith Krishnamurthy

, Goran Piskachev, Eric Bodden:
To what extent can we analyze Kotlin programs using existing Java taint analysis tools? 230-235 - Idriss Riouak

, Görel Hedin
, Christoph Reichenbach
, Niklas Fors
:
JFeature: Know Your Corpus. 236-241 - Judit Jász

, Péter Hegedüs, Ákos Milánkovich
, Rudolf Ferenc
:
An End-to-End Framework for Repairing Potentially Vulnerable Source Code. 242-247 - Gergö Balogh

, István Baráth:
First Steps towards a Methodology for Unified Graph's Discrepancy Analysis. 248-252 - Haruka Yoshioka, Yoshiki Higo, Shinji Kusumoto:

Improving Weighted-SBFL by Blocking Spectrum. 253-263 - Jens Dietrich

, Shawn Rasheed, Amjed Tahir:
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies. 264-275 - Qusay Idrees Sarhan

, Árpád Beszédes:
Experimental Evaluation of A New Ranking Formula for Spectrum based Fault Localization. 276-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














