Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008

نویسندگان

  • James R. Cordy
  • Lu Zhang
چکیده

This issue of the Journal of Software: Evolution and Practice concentrates on the bottom line in computer software engineering—the source code itself. While much attention in the wider software engineering community is directed toward other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only complete and precise description of the behavior of the system. The analysis and manipulation of source code thus remains a pressing concern. The three papers in this issue were selected and extended from the best papers presented at the 12th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2012) held in Riva del Garda, Italy, in September 2012. The aim of the SCAM conference is to bring together researchers and practitioners working on the theory, techniques, and applications that concern analysis and/or manipulation of the source code of computer systems. It is the source code that contains the only truly precise description of the behavior of such systems. Many other conferences and workshops address the applications of source code analysis and manipulation. The aim of SCAM is to focus on the algorithms, tools, and techniques of source code analysis and manipulation themselves—what they can achieve and how they can be improved, refined, and combined. The SCAM 2012 conference received 40 regular paper submissions of outstanding quality, of which 16 papers were selected for presentation after review by at least three referees for relevance, soundness, and originality. For this special issue, seven of the very best of these were invited to submit extended and revised papers. However, this special issue was not meant to be closed only to invited papers. A public open call was published to invite outstanding papers by other authors on source code analysis and manipulation. In total, seven papers were submitted to this special issue. Each of the submissions was reviewed by a minimum of three expert referees. Following the first round of review, five papers were selected for final consideration in this special issue. The authors were asked to revise their papers in response to the referees’ comments, and the revised drafts were then reviewed for a second time for conformance to the referees’ comments. Following this second review, three papers were selected for publication in this special issue. The selected papers represent some of the very best work that has appeared at SCAM, and cover all of its main areas of interest, namely program transformation, represented by Chris Wilcox, Michelle Mills Strout, and James M. Bieman; feature location, represented by André L. Santos; and impact analysis, represented by Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, and Tibor Gyimóthy. In the first paper, ‘An optimization-based approach to LUT program transformations’, Wilcox et al. present an approach to cope with the trade-off between performance and accuracy. In computational software, programmers may replace calls to mathematical primitives (especially trigonometric formulas) with accesses to tables that use precomputed data (look-up tables (LUT)). However, when this alternative design is adopted, it involves substantial manual effort that is prone to programming error. This paper presents an automatic approach to refactor a scientific-computation program to a program that uses LUT. The trade-off between speed and accuracy in using LUT is addressed as a multi-objective optimization problem. The paper by André L. Santos, ‘GUI Code Tracing Through Direct Program Interaction’, presents a novel approach to feature location in Graphical User Interface (GUI) code, that is, the identification of the portions of the program that are executed when a graphical widget is triggered. The approach relies

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society

The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...

متن کامل

Special issue on source code analysis and manipulation (SCAM 2006)

The aim of SCAM is to bring together researchers and practitioners working on theory, techniques and applications, concerning analysis and/or manipulation of the source code of computer systems. While much attention in the wider software engineering community is properly directed toward other aspects of systems' development and evolution, such as specification, design and requirements engineeri...

متن کامل

Source code analysis and manipulation

The special section contains nine papers which are extended versions of papers originally published in the proceedings of the IEEE workshop on Source Code Analysis and Manipulation (SCAM 2001). The papers cover the spectrum of analysis and manipulation work from traditional transformation application areas concerned with optimisation through to more novel application areas such as transformatio...

متن کامل

In This Issue Editorial 1 Introduction to the Special Issue 2

And now for some thing completely different-a " Spanish " Informer. That's right – this edition is a one-off special, focusing exclusively on the IR scene in Spain. There's a great mix of articles, covering both the latest developments from the academic community and a review of one of the newest and most influential commercial research organisations – Yahoo's Barcelona labs. All this has been ...

متن کامل

Guest Editorial Signal Processing For Wireless Communications - Selected Areas in Communications, IEEE Journal on

PART I of this special issue on signal processing for wireless communications, published in October 1998, contained 21 papers on diversity and antenna arrays, blind techniques, and orthogonal frequency division multiplexing (OFDM)-related techniques. In this issue, we present 22 papers on equalization and signal detection and multiuser detection and code division multiple access (CDMA)-related ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information & Software Technology

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2009