Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation
DOI: 10.1109/scam.2002.1134108
|View full text |Cite
|
Sign up to set email alerts
|

Handling preprocessor-conditioned declarations

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(34 citation statements)
references
References 6 publications
0
34
0
Order By: Relevance
“…Based on data from our other data sources, we believe that low-level implementation dependencies represent at least 45 % of configuration constraints, which is very promising to automated tools. On the other hand, the three other categories of configuration constraints we found show that automated analysis is not sufficient to extract a complete variability 5. Short for "fast user-space mutex", which is a Linux kernel system call that programmers can use to implement basic locking model.…”
Section: Constraint Classification Discussionmentioning
confidence: 92%
See 2 more Smart Citations
“…Based on data from our other data sources, we believe that low-level implementation dependencies represent at least 45 % of configuration constraints, which is very promising to automated tools. On the other hand, the three other categories of configuration constraints we found show that automated analysis is not sufficient to extract a complete variability 5. Short for "fast user-space mutex", which is a Linux kernel system call that programmers can use to implement basic locking model.…”
Section: Constraint Classification Discussionmentioning
confidence: 92%
“…More details on conditional symbol tables can be found in related publications on variability-aware module systems [5], [29]. In contrast to the file-local preprocessor, parser, and type constraint analyses, linker analysis is global across all translation units.…”
Section: Constraintsmentioning
confidence: 99%
See 1 more Smart Citation
“…Feature SSL adds class SSL (Lines 7-10) to the email client's code base and refines class Trans to encrypt outgoing messages (Lines [11][12][13][14][15]. To this effect, the refinement of Trans adds a new field key (Line 12) and overrides the method send of class Trans (Lines 13-15).…”
Section: An Overview Of Ffjmentioning
confidence: 99%
“…Many researchers have attempted analysis and rewrite systems for unpreprocessed C code (Aversano et al, 2002;Hu et al, 2000;Overbey & Johnson, 2009;Vidacs et al, 2004;Tartler et al, 2011;Garrido & Johnson, 2005;Baxter & Mehlich, 2001;Livadas & Small, 1994). For example, Ernst et al (2002) identify problematic patterns and quantify them in a large code base, Tartler et al (2011) search for code blocks that are dead in all feature configurations, and Hu et al (2000) use control flow graphs to analyze the inclusion structure of files.…”
Section: Related Workmentioning
confidence: 99%