SCAM 2021 - Opening Session
IEEE SCAM
SCAM 2021 - Opening Session
21:31
Validating the Use of Topic Models for Software Evolution
IEEE SCAM
Validating the Use of Topic Models for Software Evolution
27:19
Custom type-checking for programming, teaching, and research
IEEE SCAM
Custom type-checking for programming, teaching, and research
30:55
IntelliJ Platform SDK
IEEE SCAM
IntelliJ Platform SDK
12:15
DroidXP: A Benchmark for Supporting the Research on Mining Android Sandboxes
IEEE SCAM
DroidXP: A Benchmark for Supporting the Research on Mining Android Sandboxes
6:38
Towards Detecting Inconsistent Comments In Java Source Code Automatically
IEEE SCAM
Towards Detecting Inconsistent Comments In Java Source Code Automatically
6:48
Can Refactorings Indicate Design Tradeoffs?
IEEE SCAM
Can Refactorings Indicate Design Tradeoffs?
7:11
Keynote: Analyzing a Large Corpus of Configuration Files to Synthesize their Specifications
IEEE SCAM
Keynote: Analyzing a Large Corpus of Configuration Files to Synthesize their Specifications
52:22
DCT: An Scalable Multi-Objective Module Clustering Tool
IEEE SCAM
DCT: An Scalable Multi-Objective Module Clustering Tool
7:09
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications
IEEE SCAM
DepGraph: Localizing Performance Bottlenecks in Multi-Core Applications
13:33
An Investigation Into The Effect Of Control And Data Dependence Paths On Predicate Testability
IEEE SCAM
An Investigation Into The Effect Of Control And Data Dependence Paths On Predicate Testability
7:07
Adapting Queries To Database Schema Changes In Hybrid Polystores
IEEE SCAM
Adapting Queries To Database Schema Changes In Hybrid Polystores
7:09
AdHoc Test Generation Through Binary Rewriting
IEEE SCAM
AdHoc Test Generation Through Binary Rewriting
11:59
Annotation Practices In Android Apps
IEEE SCAM
Annotation Practices In Android Apps
11:58
An Approach for the Identification of Information Leakage in Automotive Infotainment systems
IEEE SCAM
An Approach for the Identification of Information Leakage in Automotive Infotainment systems
6:07
Understanding And Characterizing Changes In Bugs Priority: The Practitioners Perceptive
IEEE SCAM
Understanding And Characterizing Changes In Bugs Priority: The Practitioners Perceptive
12:56
Failure Of One, the Fall Of Many: An Exploratory Study Of Software Features For Defect Prediction
IEEE SCAM
Failure Of One, the Fall Of Many: An Exploratory Study Of Software Features For Defect Prediction
11:51
Looking for Software Defects? First Find the Nonconformists-An OutlierBased DefectPredictionApproach
IEEE SCAM
Looking for Software Defects? First Find the Nonconformists-An OutlierBased DefectPredictionApproach
12:59
Keynote: The Commoditization of Advanced Static Analysis
IEEE SCAM
Keynote: The Commoditization of Advanced Static Analysis
45:08
WALA, Taint, and the IDE
IEEE SCAM
WALA, Taint, and the IDE
19:14
Techniques for Efficient Automated Elimination of False Positives
IEEE SCAM
Techniques for Efficient Automated Elimination of False Positives
6:07
MUTAMA: An Automated Multi-label Tagging Approach for Software Libraries on Maven
IEEE SCAM
MUTAMA: An Automated Multi-label Tagging Approach for Software Libraries on Maven
7:10
GitHub Label Embeddings
IEEE SCAM
GitHub Label Embeddings
6:07
Does Infrastructure as Code Adhere to Semantic Versioning? An Analysis of Ansible Role Evolution
IEEE SCAM
Does Infrastructure as Code Adhere to Semantic Versioning? An Analysis of Ansible Role Evolution
12:08
Optimizing Away JavaScript Obfuscation
IEEE SCAM
Optimizing Away JavaScript Obfuscation
7:46
Pharo
IEEE SCAM
Pharo
29:48
Engineering a Converter between two Domain-Specific Languages for Sorting
IEEE SCAM
Engineering a Converter between two Domain-Specific Languages for Sorting
7:19
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C++
IEEE SCAM
The Role of Implicit Conversions in Erroneous Function Argument Swapping in C++
13:16
Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments
IEEE SCAM
Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments
11:09
Free the Bugs: Disclosing Blocking Violations in Reactive Programming
IEEE SCAM
Free the Bugs: Disclosing Blocking Violations in Reactive Programming
13:40
Fix that Fix Commit: A real-world remediation analysis of JavaScript projects
IEEE SCAM
Fix that Fix Commit: A real-world remediation analysis of JavaScript projects
6:59
Static Extraction of Enforced Authorization Policies - SeeAuthZ
IEEE SCAM
Static Extraction of Enforced Authorization Policies - SeeAuthZ
12:52
Does Code Review Really Remove Coding Convention Violations
IEEE SCAM
Does Code Review Really Remove Coding Convention Violations
12:01
Static Analysis with Soot
IEEE SCAM
Static Analysis with Soot
16:03
Automated Identification Of On Hold Self Admitted Technical Debt
IEEE SCAM
Automated Identification Of On Hold Self Admitted Technical Debt
10:30
Incremental Flow Analysis Through Computational Dependency Reification
IEEE SCAM
Incremental Flow Analysis Through Computational Dependency Reification
11:43
Compositional Information Flow Analysis For Web Assembly Programs
IEEE SCAM
Compositional Information Flow Analysis For Web Assembly Programs
12:05
A Parallel Worklist Algorithm For Modular Analyses
IEEE SCAM
A Parallel Worklist Algorithm For Modular Analyses
12:26
MAF: A Framework For Modular Static Analysis Of Higher Order Languages
IEEE SCAM
MAF: A Framework For Modular Static Analysis Of Higher Order Languages
7:24