


default search action
Science of Computer Programming, Volume 105
Volume 105, July 2015
- Bram Adams
, Juergen Rilling:
Special Section on Source Code Analysis and Manipulation (SCAM 2013). 1-2 - Árpád Beszédes
, Lajos Schrettner, Béla Csaba
, Tamás Gergely
, Judit Jász
, Tibor Gyimóthy
:
Empirical investigation of SEA-based dependence cluster properties. 3-25 - Luigi Cerulo, Massimiliano Di Penta
, Alberto Bacchelli
, Michele Ceccarelli
, Gerardo Canfora
:
Irish: A Hidden Markov Model to detect coded information islands in free text. 26-43 - Michaël Marcozzi, Wim Vanhoof
, Jean-Luc Hainaut:
Relational symbolic execution of SQL code for unit testing of database programs. 44-72
- Angela Lozano, Kim Mens
, Andy Kellens:
Usage contracts: Offering immediate feedback on violations of structural source-code regularities. 73-91 - Richard Banach
, Michael J. Butler
, Shengchao Qin
, Nitika Verma
, Huibiao Zhu:
Core Hybrid Event-B I: Single Hybrid Event-B machines. 92-123 - Vasvi Kakkad, Andrew E. Santosa
, Alan D. Fekete, Bernhard Scholz:
Computing end-to-end delays in stream query processing. 124-144 - Jan Midtgaard
, Aleksandar S. Dimovski
, Claus Brabrand, Andrzej Wasowski
:
Systematic derivation of correct variability-aware program analyses. 145-170

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.