The April 2013 Special Issue of The Institution of Engineering and Technology deals with papers discussed in the 11th ieee International workingconference on sourcecodeanalysis and manipulation. Eric Larson's p...
详细信息
The April 2013 Special Issue of The Institution of Engineering and Technology deals with papers discussed in the 11th ieee International workingconference on sourcecodeanalysis and manipulation. Eric Larson's paper on 'Program analysis Too Loopy? Set the Loops Aside' argues that it is possible to use loop summaries in the analysis instead of the loops themselves and investigates what would be the benefit of such an approach. The analysis pointed out some interesting statistics from the point of view of certain programming constructs that make loop analyses difficult. Minhaz F. Zibran, Chanchal K. Roy's paper titled 'Conflict-aware Optimal Scheduling of Prioritized code Clone Refactoring' discusses a constraint programming approach to schedule refactorings of code clones. The proposed effort model integrates a number of factors including context understanding, code modification and navigation, which is an interesting novel approach.
The proceedings contain 30 papers. The topics discussed include: optimizing away JavaScript obfuscation;does infrastructure as code adhere to semantic versioning? an analysis of ansible role evolution;MUTAMA: an autom...
ISBN:
(纸本)9781728192482
The proceedings contain 30 papers. The topics discussed include: optimizing away JavaScript obfuscation;does infrastructure as code adhere to semantic versioning? an analysis of ansible role evolution;MUTAMA: an automated multi-label tagging approach for software libraries on maven;static extraction of enforced authorization policies SEEAUTHZ;towards detecting inconsistent comments in java sourcecode automatically;does code review really remove coding convention violations?;failure of one, fall of many: an exploratory study of software features for defect prediction;adapting queries to database schema changes in hybrid polystores;and DCT: an scalable multi-objective module clustering tool.
The proceedings contain 29 papers. The topics discussed include: some assembly required-program analysis of embedded system code;user-input dependence analysis via graph reachability;is cloned code more stable than no...
ISBN:
(纸本)9780769533537
The proceedings contain 29 papers. The topics discussed include: some assembly required-program analysis of embedded system code;user-input dependence analysis via graph reachability;is cloned code more stable than non-cloned code?;exploiting the correspondence between micro patterns and class names;on the use of data flow analysis in static profiling;the semantic of abstract program slicing;the evolution and decay of statically detected sourcecode vulnerabilities;from indentation shapes to code structures;evaluating key statements analysis;aspect-aware points-to analysis;automated detection of code vulnerabilities based on program analysis;analysis and transformations for efficient query-based debugging;using power transformations to add structure to a legacy data model;and rejuvenate pointcut: a tool for pointcut expression recovery in evolving aspect-oriented software.
The proceedings contain 28 papers. The topics discussed include: characterizing leveraged stack over?ow posts;MOAD: modeling observation-based approximate dependency;towards constructing the SSA form using reaching de...
ISBN:
(纸本)9781728149370
The proceedings contain 28 papers. The topics discussed include: characterizing leveraged stack over?ow posts;MOAD: modeling observation-based approximate dependency;towards constructing the SSA form using reaching definitions over dominance frontiers;automatically generating fix suggestions in response to static codeanalysis warnings;rebasing in code review considered harmful: a large-scale empirical investigation;automatically curated data sets;an exploratory study on automatic architectural change analysis using natural language processing techniques;contextualizing rename decisions using refactorings and commit messages;and no accounting for taste: supporting developers' individual choices of coding styles.
The proceedings contain 27 papers. The topics discussed include: combining obfuscation and optimizations in the real world;obfuscating java programs by translating selected portions of bytecode to native libraries;ena...
ISBN:
(纸本)9781538682906
The proceedings contain 27 papers. The topics discussed include: combining obfuscation and optimizations in the real world;obfuscating java programs by translating selected portions of bytecode to native libraries;enabling the continuous analysis of security vulnerabilities with VulData7;towards anticipation of architectural smells using link prediction techniques;periodic developer metrics in software defect prediction;which method-stereotype changes are indicators of code smells?;semantics-based code search using input/output examples;detecting evolutionary coupling using transitive association rules;the case for adaptive change recommendation;and on the use of machine learning techniques towards the design of cloud based automatic code clone validation tools.
The proceedings contain 35 papers. The topics discussed include: effect of clone information on the performance of developers fixing cloned bugs;a comparative study of bug patterns in java cloned and non-cloned code;a...
ISBN:
(纸本)9780769553047
The proceedings contain 35 papers. The topics discussed include: effect of clone information on the performance of developers fixing cloned bugs;a comparative study of bug patterns in java cloned and non-cloned code;a change-type based empirical study on the stability of cloned code;toolset and program repository for code coverage-based test suite analysis and manipulation;the Ekeko/X program transformation tool;Flowgen: flowchart-based documentation framework for C++;PESTO: a tool for migrating DOM-based to visual web tests;Pangea: a workbench for statically analyzing multi-language software corpora;source meter sonar Qube plug-in;total ADS: automated software anomaly detection system;bulk fixing coding issues and its effects on software quality: is it worth refactoring?;instrumentation of annotated c programs for test generation;and impact of code refactoring using object-oriented methodology on a scientific computing application.
The proceedings contain 21 papers. The topics discussed include: computation of alias sets from shape graphs for comparison of shape analysis precision;assumption hierarchy for a CHA call graph construction algorithm;...
ISBN:
(纸本)9780769543475
The proceedings contain 21 papers. The topics discussed include: computation of alias sets from shape graphs for comparison of shape analysis precision;assumption hierarchy for a CHA call graph construction algorithm;tuning static data race analysis for automotive control software;security testing of web applications: a search-based approach for cross-site scripting vulnerabilities;exploring the development of micro-apps: a case study on the BlackBerry and Android platforms;a study of cloning in the Linux SCSI Drivers;a constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring;analyzing the effect of preprocessor annotations on code clones;the effect of Lexicon bad smells on concept location in sourcecode;recovering a balanced overview of topics in a software domain;a comparative study of code query technologies;and I2SD: reverse engineering sequence diagrams from enterprise Java beans with interceptors.
The proceedings contain 21 papers. The topics discussed include: language-independent clone detection applied to plagiarism detection;evaluating code clone genealogies at release level: an empirical study;AMBIDEXTER: ...
ISBN:
(纸本)9780769541785
The proceedings contain 21 papers. The topics discussed include: language-independent clone detection applied to plagiarism detection;evaluating code clone genealogies at release level: an empirical study;AMBIDEXTER: practical ambiguity detection;speeding up context-, object- and field-sensitive SDG generation;how good is static analysis at finding concurrency bugs?;parallel reachability and escape analyses;effective static analysis to find concurrency bugs in Java;encapsulating software platform logic by aspect-oriented programming: a case study in using aspects for language portability;refactoring support for modularity maintenance in Erlang;reconstruction of composite types for decompilation;recovering the memory behavior of executable programs;and MemSafe: ensuring the spatial and temporal memory safety of C at runtime.
The proceedings contain 23 papers. The topics discussed include: an evaluation of slicing algorithms for concurrent programs;barrier slicing for remote software trusting;statement-level cohesion metrics and their visu...
详细信息
ISBN:
(纸本)0769528805
The proceedings contain 23 papers. The topics discussed include: an evaluation of slicing algorithms for concurrent programs;barrier slicing for remote software trusting;statement-level cohesion metrics and their visualization;on temporal path conditions in dependence graphs;towards path-sensitive points-to analysis;extending attribute grammars with collection attributes-valuation and applications;reengineering standard Java runtime systems through dynamic bytecode instrumentation;an integrated crosscutting concern migration strategy and its application to JHOTDRAW;fast approximate matching of programs for protecting libre/open source software by using spatial indexes;finding inputs that reach a target expression;improved static resolution of dynamic class loading in Java;DATES: design analysis tool for enterprise systems;sourcecode composition with the reuseware composition framework;and quality assessment for embedded SQL.
The proceedings contain 20 papers. The topics discussed include: thr2csp: toward transforming threads into communicating sequential processes;chopping concurrent programs;properties of slicing definitions;improving si...
ISBN:
(纸本)9780769537931
The proceedings contain 20 papers. The topics discussed include: thr2csp: toward transforming threads into communicating sequential processes;chopping concurrent programs;properties of slicing definitions;improving side-effect analysis with lazy access path resolving;towards comparing and combining points-to analyses;static estimation of test coverage;an assessment of type-3 clones as detected by state-of-the-art tools;identifying 'linchpin vertices' that cause large dependence clusters;lightweight techniques for tracking unique program statements;maintaining fine-grained code metadata regardless of moving, copying and merging;an evaluation of current Java bytecode decompilers;engineering abstractions in model checking and testing;metric extraction framework based on a high-level description language;and recovering grammar relationships for the Java language specification.
暂无评论