Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Similar documents
IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003

Sixth IEEE International Symposium on High Assurance Systems Engineering

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)

Future Trends of Distributed Computing Systems

Software Reliability Engineering

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001

Future Trends of Distributed Computing Systems

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

th International Conference on Telecommunications (ICT 2017)

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California

2017 International Conference on Communication Technologies (ComTech 2017)

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)

Real-Time Optimization by Extremum-Seeking Control

Multi-Core Programming

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

Building Executable Union Slices using Conditioned Slicing

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001

Proceedings of The Second International Conference on Web Information Systems Engineering

Practical Database Programming with Visual Basic.NET

INTERNATIONAL STANDARD

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001

COMPONENT-ORIENTED PROGRAMMING

Formalizing Fact Extraction


THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

Mastering UNIX Shell Scripting

Evolving Transformation Sequences using Genetic Algorithms

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability

Microprocessor Theory

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

VPN Connection. VPN Gateway. 17 December 2002

COSO Enterprise Risk Management

VPN Connection. 8 October 2002

DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo

Modeling Architecture for COBIT

ISO/IEC/ IEEE

Linux Command Line and Shell Scripting Bible

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

Magical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Copyright 1995 by the American Mathematical Society. All rights reserved. Printed in the United States of America.

Concrete Abstractions

Study Guide. Robert Schmidt Dane Charlton

Linux Command Line and Shell Scripting Bible. Third Edtion

Relational Database Index Design and the Optimizers

INTERNATIONAL STANDARD

This page intentionally left blank

Mapping PCI DSS v2.0 With COBIT 4.1 By Pritam Bankar, CISA, CISM, and Sharad Verma

Algorithms and Parallel Computing

Arnold N. Alderman Founder & President of Anagenesis, Inc. a technical marketing company

IEEE P Letter Ballot

MODERN MULTITHREADING

Ruby on Rails. Bible

TASK SCHEDULING FOR PARALLEL SYSTEMS

A Tree Kernel Based Approach for Clone Detection

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications

Annals of Mathematics Electronic License Agreement

ECBS Engineering of Computer-Based Systems. Novi Sad, Serbia April IEEE 19th International Conference and Workshops on

Overview of SBSE. CS454, Autumn 2017 Shin Yoo

Research on Industrial Security Theory

CCA CEU Application and Reviewer Information

Program Slicing. Keith Gallagher Computer Science Department University of Durham South Road Durham DH1 3LE, UK

iwork DUMmIES 2ND EDITION FOR

Home Inspection 2014

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Web Application Testing in Fifteen Years of WSE

Disclosure Statement and Licensing Declaration This declaration does not represent an implied license grant

IEEE P /Dx.x Draft Standard for Radio over Ethernet Encapsulations and Mappings

Advanced Slicing of Sequential and Concurrent Programs

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.

MacBook Air PORTABLE GENIUS

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

INTERNATIONAL STANDARD

AWS QC14:2009. Specification for the Certification of Welding Sales Representatives

Lecture Notes in Computer Science

Impact of Dependency Graph in Software Testing

Implementing Security and Tokens: Current Standards, Tools, and Practices

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Database Machines. Fourth International Workshop Grand Bahama Island, March D.J. DeWitt and H. Boral

HOW AND WHEN TO FLATTEN JAVA CLASSES?

1625 K Street NW Suite 750 Washington DC Tel:

PRINCIPLES AND PRACTICE

Advanced Data Mining And Applications: 9th International Conference, ADMA 2013, Hangzhou, China, December 14-16, 2013, Proceedings, Part I

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6

INTERNATIONAL STANDARD

Student Investigations for 16-19

JIS Mark Building Trust and Reliability

A Note on Interfacing Object Warehouses and Mass Storage Systems for Data Mining Applications *

Internet Engineering Task Force (IETF) Request for Comments: 8069 Category: Informational February 2017 ISSN:

INTERNATIONAL STANDARD

An Approach to the Generation of High-Assurance Java Card Applets

Transcription:

Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation

Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal, Canada Sponsored by Institute of Electrical and Electronics Engineers (IEEE) Los Alamitos, California Washington Brussels Tokyo

Copyright 2002 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ 08855-1331. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PR01793 ISBN 0-7695-1793-5 Library of Congress Number 2002109466 Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office 10662 Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., 1-4-2 P.O. Box 3014 Piscataway, NJ 08855-1331 Minami-Aoyama Los Alamitos, CA 90720-1314 Tel: + 1-732-981-0060 Minato-ku, Tokyo 107-0062 Tel: + 1-714-821-8380 Fax: + 1-732-981-9667 JAPAN Fax: + 1-714-821-4641 http://shop.ieee.org/store/ Tel: + 81-3-3408-3118 E-mail: cs.books@computer.org customer-service@ieee.org Fax: + 81-3-3408-3553 tokyo.ofc@computer.org Editorial production by Stephanie Kawada Cover art production by Joe Daigle/Studio Productions The Montreal photograph courtesy of the Tourisme Montréal, http://www.tourisme-montreal.org Printed in the United States of America by Applied Digital Imaging

Proceedings Table of Contents Message from the Program Committee Chairs...vii Conference Organization...viii Keynote Address Parallel Support for Source Code Analysis and Modification...3 I. D. Baxter Session I: Testing, Metrics, Maintenance Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation...17 S. Ghosh An Extensible Metrics Extraction Environment for Object-Oriented Programming Languages...26 T. J. Harmer and F. G. Wilkie Evaluating Clone Detection Tools for Use during Preventative Maintenance...36 E. Burd and J. Bailey A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language...44 F. V. Ramsey and J. J. Alpigini v

Session II: Source Transformation, Source Processing VADA: A Transformation-Based System for Variable Dependence Analysis...55 M. Harman, C. Fox, R. Hierons, L. Hu, S. Danicic, and J. Wegener Combining Source Transformation and Operator Overloading Techniques to Compute Derivatives for MATLAB Programs...65 C. H. Bischof, H. M. Bücker, B. Lang, A. Rasch, and A. Vehreschild Mechanized Operational Semantics of WSL...73 X. Zhang, M. Munro, M. Harman, and L. Hu Handling Preprocessor-Conditioned Declarations...83 L. Aversano, M. Di Penta, and I. D. Baxter Grammar Programming in TXL...93 T. R. Dean, J. R. Cordy, A. J. Malton, and K. A. Schneider Session III: Slicing An Interprocedural Amorphous Slicer for WSL...105 M. Harman, L. Hu, M. Munro, X. Zhang, S. Danicic, M. Daoudi, and L. Ouarbya Dynamic Slicing Object-Oriented Programs for Debugging...115 B. Xu, Z. Chen, and H. Yang Construction of the System Dependence Graph for Web Application Slicing...123 F. Ricca and P. Tonella Predicate-Based Dynamic Slicing of Message Passing Programs...133 J. Rilling, H. F. Li, and D. Goswami Session IV: Dependence Graphs, Static Analysis Using Dependence Graphs as a Support to Document Programs...145 F. Balmas Precise Call Graph Construction in the Presence of Function Pointers...155 A. Milanova, A. Rountev, and B. G. Ryder Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages...163 P. Bunus and P. Fritzson Visualization of Exception Propagation for Java Using Static Analysis...173 B.-M. Chang, J.-W. Jo, and S. H. Her Author Index...183 vi