posted by user: jaichberg || 465 views || tracked by 1 users: [display]

SCAM 2021 : 21st IEEE International Working Conference on Source Code Analysis and Manipulation

FacebookTwitterLinkedInGoogle


Conference Series : Source Code Analysis and Manipulation
 
Link: http://www.ieee-scam.org/2021/
 
When Sep 27, 2021 - Sep 28, 2021
Where Virtual
Abstract Registration Due Jun 24, 2021
Submission Deadline Jun 30, 2021
Notification Due Aug 2, 2021
Final Version Due Aug 9, 2021
 

Call For Papers

The 21th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2021) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2021 solicits high quality paper submissions.

# Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

- abstract interpretation
- bad smell detection
- bug location and prediction
- clone detection
- concern, concept, and feature localization and mining
- decompilation
- energy efficient source code
- natural language analysis of source code artifacts
- program comprehension
- program slicing
- program transformation and refactoring
- repository, revision, and change analysis
- security vulnerability analysis
- source level metrics
- source level optimization
- source-level testing and verification
- static and dynamic analysis

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Before submitting please follow the guidelines in How to Submit. Additionally, papers must not exceed 12 pages (the last 2 pages can be used for references only) and the papers should be submitted electronically in PDF format via EasyChair. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper.

Related Resources

SCAM 2022   22nd IEEE International Working Conference on Source Code Analysis and Manipulation
CGO 2023   ACM/IEEE International Symposium on Code Generation and Optimization
IEEE ICA 2022   The 6th IEEE International Conference on Agents
IROS 2023   IEEE/RSJ International Conference on Intelligent Robots and Systems
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
CloudCom 2022   The 13th IEEE International Conference on Cloud Computing Technology and Science
IEEE ICIVC 2023   IEEE--2023 8th International Conference on Image, Vision and Computing (ICIVC 2023)
CLUSTER 2023   cluster 2023 : IEEE Cluster Conference
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,