Journal of Software: Evolution and Process

Cover image for Vol. 26 Issue 6

Special Issue: Source code analysis and manipulation, SCAM 2012

June 2014

Volume 26, Issue 6

Pages i–iii, 531–588

Issue edited by: Mariano Ceccato, Zheng Li, James R. Cordy

  1. Issue Information

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. Issue Information (pages i–iii)

      Article first published online: 13 JUN 2014 | DOI: 10.1002/smr.1627

  2. Editorial

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
  3. Special Issue Papers

    1. Top of page
    2. Issue Information
    3. Editorial
    4. Special Issue Papers
    1. An optimization-based approach to lookup table program transformations (pages 533–551)

      Chris Wilcox, Michelle Mills Strout and James M. Bieman

      Article first published online: 21 SEP 2013 | DOI: 10.1002/smr.1620

      Thumbnail image of graphical abstract

      Scientific programmers can improve the performance of function evaluation by precomputing and storing results in a lookup table (LUT), thereby replacing costly evaluation code with an inexpensive memory access. A code transformation that replaces computation with LUT code can improve performance; however, accuracy is reduced because of error inherent in reconstructing values from LUT data. LUTs are commonly used to approximate expensive elementary functions.

    2. GUI code tracing through direct program interaction (pages 552–568)

      André L. Santos

      Article first published online: 8 APR 2014 | DOI: 10.1002/smr.1650

      Thumbnail image of graphical abstract

      This paper proposes a navigation mechanism for tracing user interface elements of a running program to their representation in the source code. The mechanism realization relies on program instrumentation. We developed a prototype implementation of the proposed mechanism that implies an acceptable instrumentation overhead, suitable for being used on industrial-scale programs. We performed a user study that revealed that the time spent to accomplish maintenance tasks does not change significantly as program size increases.

    3. Impact analysis in the presence of dependence clusters using Static Execute After in WebKit (pages 569–588)

      Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes and Tibor Gyimóthy

      Article first published online: 11 SEP 2013 | DOI: 10.1002/smr.1614

      Thumbnail image of graphical abstract

      Using the Static Execute After relation derived from a static program dependence analysis method, the paper deals with prediction capability in change impact analysis, formation and properties of large dependence clusters and applications to selective regression testing. The methods are investigated empirically using a large open source system, WebKit.

SEARCH

SEARCH BY CITATION