nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Change impact graphs: Determining the impact of prior codechanges
|
German, Daniel M. |
|
2009 |
51 |
10 |
p. 1394-1408 15 p. |
artikel |
2 |
Decompilation of Java bytecode to Prolog by partial evaluation
|
Gómez-Zamalloa, Miguel |
|
2009 |
51 |
10 |
p. 1409-1427 19 p. |
artikel |
3 |
Fast and precise points-to analysis
|
Lundberg, Jonas |
|
2009 |
51 |
10 |
p. 1428-1439 12 p. |
artikel |
4 |
Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008
|
Cordy, James R. |
|
2009 |
51 |
10 |
p. 1377-1378 2 p. |
artikel |
5 |
Higher Order Mutation Testing
|
Jia, Yue |
|
2009 |
51 |
10 |
p. 1379-1393 15 p. |
artikel |
6 |
IFC Editorial Board
|
|
|
2009 |
51 |
10 |
p. IFC- 1 p. |
artikel |
7 |
May/must analysis and the DFAGen data-flow analysis generator
|
Stone, Andrew |
|
2009 |
51 |
10 |
p. 1440-1453 14 p. |
artikel |
8 |
Recovering structured data types from a legacy data model with overlays
|
Ceccato, Mariano |
|
2009 |
51 |
10 |
p. 1454-1468 15 p. |
artikel |
9 |
The life and death of statically detected vulnerabilities: An empirical study
|
Penta, Massimiliano Di |
|
2009 |
51 |
10 |
p. 1469-1484 16 p. |
artikel |