Conference Information
SCAM 2014 : International Working Conference on Source Code Analysis and Manipulation
http://www.ieee-scam.org/2014/
Submission Date:
2014-06-23 Extended
Notification Date:
2014-08-01
Conference Date:
2014-09-28
Location:
Victoria, British Columbia, Canada
Years:
14
CCF: c   CORE: c   QUALIS: b3   Viewed: 2718   Tracked: 0   Attend: 0

Conference Location
Advertisment
Call For Papers
The aim of this working conference is to bring together researchers and practitioners working on theory, techniques and applications that concern analysis and/or manipulation of the source code of software systems. The term “source code” refers to any fully executable description of a software system, such as machine code, (very) high-level languages and executable graphical representations of systems. The term “analysis” refers to any (semi-)automated procedure that yields insight into source code, while “manipulation” refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is (rightfully!) directed towards other aspects of systems development and evolution, such as specification, design and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2014 solicits high quality paper submissions.
Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

    program transformation and refactoring
    static and dynamic analysis
    source level source metrics
    decompilation
    bug location and prediction
    security vulnerability analysis
    source level testing and verification
    concern, concept, and feature mining
    program comprehension
    bad smell detection
    abstract interpretation
    program slicing
    source level optimization
    green source code

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted research papers are limited to 10 pages. Papers must be clearly marked as a research paper. All papers submitted should follow the IEEE Computer Society Press Proceedings Author Guidelines. The papers should be submitted electronically via the conference web site (https://www.easychair.org/conferences/?conf=scam2014). Each submission will be reviewed by at least three members of the programme committee, judging the paper on its novelty, quality, evaluation and scientific rigor. Note that submitted papers should not have been published before, and should not have been submitted elsewhere in parallel to SCAM 2014.

SCAM 2014 will also feature a tool paper track for papers that report on the design and implementation of tools for source code analysis and manipulation. Tool papers are limited to 6 pages and are reviewed by a different program committee.

Proceedings

All accepted papers will appear in the proceedings which will be published by the IEEE Computer Society Press.
Last updated by Dou Sun in 2014-02-16
Related Publications
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
2009381744.7%
2008612337.7%
2007741925.7%
2006492040.8%
2005481837.5%
2004391641%
2003432148.8%
2002231773.9%
2001302170%
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
SmartGridCommInternational Conference on Smart Grid Communications2014-05-112014-07-122014-11-03
ICCSNTInternational Conference on Computer Science and Network Technology2013-07-202013-08-102013-10-12
CCSCInternational Conference on Cloud-Computing and Super-Computing2014-04-152014-04-252014-05-08
caa2IJCNNInternational Joint Conference on Neural Networks2015-01-152015-03-152015-07-11
ab4GRAPPInternational Conference on Computer Graphics Theory and Applications2014-10-202014-11-282015-03-11
MoWNeTInternational conference on selected topics in Mobile and Wireless Networking2014-06-012014-06-302014-09-08
b2EC-TELEuropean Conference on Technology Enhanced Learning: Towards Ubiquitous Learning2014-03-242014-06-042014-09-16
ASEAInternational Conference on Advanced Software Engineering & Its Applications2014-10-152014-10-202014-12-20
COMPUTATION TOOLSInternational Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking 2013-02-282013-05-27
cb1ISADSInternational Symposium on Autonomous Decentralized Systems2012-08-312012-11-152013-03-06
Comments
comments powered by Disqus