posted by user: jaichberg || 757 views || tracked by 1 users: [display]

SCAM 2022 : 22nd IEEE International Working Conference on Source Code Analysis and Manipulation


Conference Series : Source Code Analysis and Manipulation
When Oct 3, 2022 - Oct 4, 2022
Where Limassol, Cyprus
Abstract Registration Due Jun 17, 2022
Submission Deadline Jun 23, 2022
Notification Due Jul 25, 2022
Final Version Due Aug 1, 2022

Call For Papers

# Call for Research Track Papers

The 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2022) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2022 solicits high quality paper submissions.

## Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

- abstract interpretation
- bad smell detection
- bug location and prediction
- clone detection
- concern, concept, and feature localization and mining
- decompilation
- energy efficient source code
- natural language analysis of source code artifacts
- program comprehension
- program slicing
- program transformation and refactoring
- repository, revision, and change analysis
- security vulnerability analysis
- source level metrics
- source level optimization
- source-level testing and verification
- static and dynamic analysis

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE's website. All submissions must be in English and should be submitted electronically in PDF format. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper. All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

## Double-blind Review

We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:

- Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.)
- References to authors' own related work must be in the third person. (For example, not "We build on our previous work..." but rather "We build on the work of...")

If the program chairs find that authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

## Artifact Evaluation

This year, likewise past year, ICSME, SCAM, and VISSOFT have joined forces and present a single Artifact Evaluation Track for all three venues. Authors of (short and long) papers accepted in the SCAM 2022 are invited to submit their artifacts for evaluation to the ICSME 2022 Joint Artifact Evaluation Track.

## Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.

## Special Issue

Extended versions of papers accepted at one of the SCAM 2022 tracks will be invited for submission in Journal of Software: Evolution and Process, Wiley.

## Important Dates for Research Papers

All submission dates are at 23:59 AoE (Anywhere on Earth, UTC-12).
Abstract Submission: June 17th, 2022
Paper Submission: June 23th, 2022
Author Notification: July 25th, 2022
Camera Ready: August 1st, 2022

Related Resources

VISSOFT 2024   12th IEEE Working Conference on Software Visualization
IEEE BigData 2024   2024 IEEE International Conference on Big Data
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
AASDS 2024   Special Issue on Applications and Analysis of Statistics and Data Science
IEEE AIxVR 2024   IEEE International Conference on Artificial Intelligence & extended and Virtual Reality
CGO 2025   IEEE/ACM International Symposium on Code Generation and Optimization - R1
S&P 2025   The 45th IEEE Symposium on Security and Privacy
NLE Special Issue 2024   Natural Language Engineering- Special issue on NLP Approaches for Computational Analysis of Social Media Texts for Online Well-being and Social Order