| |||||||||||||||||
SCAM 2018 : Source Code Analysis and ManipulationConference Series : Source Code Analysis and Manipulation | |||||||||||||||||
Link: http://www.ieee-scam.org/2018/#call | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
The 18th IEEE International Working Conference on Source Code Analysis and
Manipulation (SCAM 2018) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2018 solicits high quality paper submissions. # Covered Topics and Paper Formats We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to: - program transformation and refactoring - static and dynamic analysis - natural language analysis of source code artifacts - repository, revision, and change analysis - source level metrics - decompilation - bug location and prediction - security vulnerability analysis - source-level testing and verification - clone detection - concern, concept, and feature localization and mining - program comprehension - bad smell detection - abstract interpretation - program slicing - source level optimization - energy efficient source code SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop. Papers must not exceed 10 pages including all text, references, appendices and figures and must conform to the IEEE proceedings paper format guidelines and must be clearly marked as a research paper. Templates in Latex and Word are available on IEEE's website (https://www.ieee.org/conferences_events/conferences/publishing/templates.html) All submissions must be in English. The papers should be submitted electronically in PDF format via EasyChair. (https://easychair.org/conferences/?conf=scam2018) Submission will be reviewed by at least three members of the program committee (http://www.ieee-scam.org/2018/#progcom), judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper. SCAM 2018 also features an engineering paper track (http://www.ieee-scam.org/2018/#engcall) for papers that report on the design and implementation of tools for source code analysis and manipulation. # Proceedings All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library. ## Special Issue A set of the best papers from SCAM 2018 will be invited to be considered for revision, extension, and publication in a special issue of Journal of Systems and Software. (https://www.journals.elsevier.com/journal-of-systems-and-software) # Important Dates for Research Papers - Abstract Deadline: June 8, 2018 - Paper Deadline: June 15, 2018 - Notification: July 9, 2018 - Camera Ready Deadline: Aug 13, 2018 |
|