{"title":"来自椅子的信息","authors":"R. Cigno, P. Felber, Adriana Iamnitchi","doi":"10.1109/P2P.2013.6688692","DOIUrl":null,"url":null,"abstract":"Dag allemaal! On behalf of the SCAM 2013 Conference and Program Committee, we would like to welcome you to the capital of Dutch industrial design, i.e., Eindhoven, the Netherlands, for the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, co-located with the 29th IEEE International Conference on Software Maintenance (ICSM 2013). Some of you might ask whether, after 12 highly successful editions chock-full of innovative ideas, case studies and tools, one still needs a 13th edition: isn’t SCAM a solved problem? Of course, the chairs of the conference and (more importantly) the SCAM community will answer NO to that question. It is true that more and more attention in the wider software engineering community is being directed towards other aspects of systems development and evolution, such as specification, requirements engineering, design, evolution and maintenance. However, a fundamental artefact in all these domains is still the source code, which contains the precise, and sometimes only, definitive description of the behaviour of a system. Hence, even in a world of mobile applications, web services, model-driven engineering and cloud computing, new and innovative SCAM techniques will still be required, even essential. So, for the 13th time in a row, the SCAM working conference aims to bring together researchers and practitioners working on theory, techniques and applications for the analysis and manipulation of the source code of computer systems, in order to help researchers tackle the software engineering challenges and problems of today and tomorrow. SCAM focuses on the techniques and tools themselves what they can achieve, how they can be improved, refined and combined. It does this through a highly interactive format: paper presentations are kept short and focused, with ample time reserved for general discussion of challenges and controversial opinions raised during each session. An important side-effect of these discussions is that it helps the community to stay focused and become a tighter group. This year we received 29 research papers and 15 tool papers, from which we have selected 14 excellent research papers and 10 amazing tool papers for presentation and inclusion in the proceedings. The papers cover a broad range of topics including: static analysis, dynamic analysis, source code transformation, metrics, software mining, databases/ontologies and source code visualization. We want to thank the authors of all submissions for sharing their research with the SCAM community. Every paper was fully reviewed by three or more program committee members for relevance, soundness and originality, and discussed openly by the entire program committee before a unanimous, final decision was made. Hence, a big thank you to the program committee and external reviewers for their timely and constructive reviews, and special thanks to those who actively participated in the discussions of the final selections. This year’s SCAM also features an expanded tools track, where each accepted tool paper will be presented during one of the regular paper sessions and demonstrated live in a hands-on tool demonstration session. Tool papers were evaluated by a separate committee, using the same acceptance criteria as the main track, complemented by tool-specific criteria like making the tool (and example data) available for download and explaining the tool’s architecture and inner workings. These criteria follow directly from SCAM’s vision of providing a platform for sharing new advances and results with fellow researchers and practitioners, enabling the rapid progress of the field. We gratefully acknowledge the several sponsors of SCAM 2013 who have made the event possible: the IEEE Computer Society Technical Council on Software Engineering, Semantic Designs Inc. and GrammaTech Inc. Last but not least, also a special thanks to the organizers of ICSM 2013 for their help in co-location and to the outstanding SCAM 2013 Organizing Committee: social media wizards Veronika Bauer and Felienne Hermans for taking care of advertising the conference on the various social media channels that matter; Davy Landman for the flashy website; the long-suffering Dave Binkley for financial arrangements; the ever-diligent Marcin Zalewski, for managing and producing the proceedings, and Sacha Claessens and Martijn Labbers for the amazing local arrangements in Eindhoven. We hope that you will find the conference stimulating and rewarding, and that you have a very enjoyable visit to Eindhoven and its surrounding regions (including Belgium ;-)). Welkom in Eindhoven!","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Message from the chairs\",\"authors\":\"R. Cigno, P. Felber, Adriana Iamnitchi\",\"doi\":\"10.1109/P2P.2013.6688692\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Dag allemaal! On behalf of the SCAM 2013 Conference and Program Committee, we would like to welcome you to the capital of Dutch industrial design, i.e., Eindhoven, the Netherlands, for the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, co-located with the 29th IEEE International Conference on Software Maintenance (ICSM 2013). Some of you might ask whether, after 12 highly successful editions chock-full of innovative ideas, case studies and tools, one still needs a 13th edition: isn’t SCAM a solved problem? Of course, the chairs of the conference and (more importantly) the SCAM community will answer NO to that question. It is true that more and more attention in the wider software engineering community is being directed towards other aspects of systems development and evolution, such as specification, requirements engineering, design, evolution and maintenance. However, a fundamental artefact in all these domains is still the source code, which contains the precise, and sometimes only, definitive description of the behaviour of a system. Hence, even in a world of mobile applications, web services, model-driven engineering and cloud computing, new and innovative SCAM techniques will still be required, even essential. So, for the 13th time in a row, the SCAM working conference aims to bring together researchers and practitioners working on theory, techniques and applications for the analysis and manipulation of the source code of computer systems, in order to help researchers tackle the software engineering challenges and problems of today and tomorrow. SCAM focuses on the techniques and tools themselves what they can achieve, how they can be improved, refined and combined. It does this through a highly interactive format: paper presentations are kept short and focused, with ample time reserved for general discussion of challenges and controversial opinions raised during each session. An important side-effect of these discussions is that it helps the community to stay focused and become a tighter group. This year we received 29 research papers and 15 tool papers, from which we have selected 14 excellent research papers and 10 amazing tool papers for presentation and inclusion in the proceedings. The papers cover a broad range of topics including: static analysis, dynamic analysis, source code transformation, metrics, software mining, databases/ontologies and source code visualization. We want to thank the authors of all submissions for sharing their research with the SCAM community. Every paper was fully reviewed by three or more program committee members for relevance, soundness and originality, and discussed openly by the entire program committee before a unanimous, final decision was made. Hence, a big thank you to the program committee and external reviewers for their timely and constructive reviews, and special thanks to those who actively participated in the discussions of the final selections. This year’s SCAM also features an expanded tools track, where each accepted tool paper will be presented during one of the regular paper sessions and demonstrated live in a hands-on tool demonstration session. Tool papers were evaluated by a separate committee, using the same acceptance criteria as the main track, complemented by tool-specific criteria like making the tool (and example data) available for download and explaining the tool’s architecture and inner workings. These criteria follow directly from SCAM’s vision of providing a platform for sharing new advances and results with fellow researchers and practitioners, enabling the rapid progress of the field. We gratefully acknowledge the several sponsors of SCAM 2013 who have made the event possible: the IEEE Computer Society Technical Council on Software Engineering, Semantic Designs Inc. and GrammaTech Inc. Last but not least, also a special thanks to the organizers of ICSM 2013 for their help in co-location and to the outstanding SCAM 2013 Organizing Committee: social media wizards Veronika Bauer and Felienne Hermans for taking care of advertising the conference on the various social media channels that matter; Davy Landman for the flashy website; the long-suffering Dave Binkley for financial arrangements; the ever-diligent Marcin Zalewski, for managing and producing the proceedings, and Sacha Claessens and Martijn Labbers for the amazing local arrangements in Eindhoven. We hope that you will find the conference stimulating and rewarding, and that you have a very enjoyable visit to Eindhoven and its surrounding regions (including Belgium ;-)). Welkom in Eindhoven!\",\"PeriodicalId\":262204,\"journal\":{\"name\":\"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/P2P.2013.6688692\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/P2P.2013.6688692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dag allemaal! On behalf of the SCAM 2013 Conference and Program Committee, we would like to welcome you to the capital of Dutch industrial design, i.e., Eindhoven, the Netherlands, for the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, co-located with the 29th IEEE International Conference on Software Maintenance (ICSM 2013). Some of you might ask whether, after 12 highly successful editions chock-full of innovative ideas, case studies and tools, one still needs a 13th edition: isn’t SCAM a solved problem? Of course, the chairs of the conference and (more importantly) the SCAM community will answer NO to that question. It is true that more and more attention in the wider software engineering community is being directed towards other aspects of systems development and evolution, such as specification, requirements engineering, design, evolution and maintenance. However, a fundamental artefact in all these domains is still the source code, which contains the precise, and sometimes only, definitive description of the behaviour of a system. Hence, even in a world of mobile applications, web services, model-driven engineering and cloud computing, new and innovative SCAM techniques will still be required, even essential. So, for the 13th time in a row, the SCAM working conference aims to bring together researchers and practitioners working on theory, techniques and applications for the analysis and manipulation of the source code of computer systems, in order to help researchers tackle the software engineering challenges and problems of today and tomorrow. SCAM focuses on the techniques and tools themselves what they can achieve, how they can be improved, refined and combined. It does this through a highly interactive format: paper presentations are kept short and focused, with ample time reserved for general discussion of challenges and controversial opinions raised during each session. An important side-effect of these discussions is that it helps the community to stay focused and become a tighter group. This year we received 29 research papers and 15 tool papers, from which we have selected 14 excellent research papers and 10 amazing tool papers for presentation and inclusion in the proceedings. The papers cover a broad range of topics including: static analysis, dynamic analysis, source code transformation, metrics, software mining, databases/ontologies and source code visualization. We want to thank the authors of all submissions for sharing their research with the SCAM community. Every paper was fully reviewed by three or more program committee members for relevance, soundness and originality, and discussed openly by the entire program committee before a unanimous, final decision was made. Hence, a big thank you to the program committee and external reviewers for their timely and constructive reviews, and special thanks to those who actively participated in the discussions of the final selections. This year’s SCAM also features an expanded tools track, where each accepted tool paper will be presented during one of the regular paper sessions and demonstrated live in a hands-on tool demonstration session. Tool papers were evaluated by a separate committee, using the same acceptance criteria as the main track, complemented by tool-specific criteria like making the tool (and example data) available for download and explaining the tool’s architecture and inner workings. These criteria follow directly from SCAM’s vision of providing a platform for sharing new advances and results with fellow researchers and practitioners, enabling the rapid progress of the field. We gratefully acknowledge the several sponsors of SCAM 2013 who have made the event possible: the IEEE Computer Society Technical Council on Software Engineering, Semantic Designs Inc. and GrammaTech Inc. Last but not least, also a special thanks to the organizers of ICSM 2013 for their help in co-location and to the outstanding SCAM 2013 Organizing Committee: social media wizards Veronika Bauer and Felienne Hermans for taking care of advertising the conference on the various social media channels that matter; Davy Landman for the flashy website; the long-suffering Dave Binkley for financial arrangements; the ever-diligent Marcin Zalewski, for managing and producing the proceedings, and Sacha Claessens and Martijn Labbers for the amazing local arrangements in Eindhoven. We hope that you will find the conference stimulating and rewarding, and that you have a very enjoyable visit to Eindhoven and its surrounding regions (including Belgium ;-)). Welkom in Eindhoven!