| |||||||||||||
SCAM 2015 : 15th IEEE International Working Conference on Source Code Analysis and ManipulationConference Series : Source Code Analysis and Manipulation | |||||||||||||
Link: http://www.ieee-scam.org/2015/index.html | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Call for papers
Conference Aims The 15th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2015) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is (rightfully!) directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2015 solicits high quality paper submissions. Covered Topics and Paper Formats We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to: program transformation and refactoring static and dynamic analysis source level source metrics decompilation bug location and prediction security vulnerability analysis source-level testing and verification concern, concept, and feature mining program comprehension bad smell detection abstract interpretation program slicing source level optimization energy efficient source code SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop. Papers must not exceed 10 pages and must conform to the IEEE proceedings paper format guidelines (see here) and must be clearly marked as a research paper. The papers should be submitted electronically in PDF format via easychair. Each submission will be reviewed by at least three members of the programme committee, judging the paper on its novelty, quality, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper. SCAM 2015 will also feature a tool paper track for papers that report on the design and implementation of tools for source code analysis and manipulation. Tool papers are limited to 6 pages and are reviewed by a different program committee. A separate Call For Papers for the tool track will be announced. Proceedings All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library. Special Issue A set of the best papers from SCAM 2015 will be invited to be considered for revision, extension, and publication in a special issue of the Journal of Software: Evolution and Process (JSEP). Important Dates Abstract Deadline: 19 June 2015 Paper Deadline: 26 June 2015 Notification: 2 August 2015 |
|