<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">===========================================================================<br>13th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)<br>===========================================================================<br><br><b>*Deadline extended*</b><br><br>Abstracts<span class="Apple-tab-span" style="white-space: pre; ">        </span><strike>April 28, 2013</strike> <b>May 5, 2013</b><br>Submission<span class="Apple-tab-span" style="white-space: pre; ">        </span><strike>May 5, 2013</strike> <b>May 8, 2013</b><br>Notification<span class="Apple-tab-span" style="white-space: pre; ">        </span>June 17, 2013<br>Camera ready version<span class="Apple-tab-span" style="white-space: pre; ">        </span>July 1, 2013<br>Working Conference<span class="Apple-tab-span" style="white-space: pre; ">        </span>September 22-23, 2013<br><br>For further information, please refer to the website: <a href="http://www.ieee-scam.org/2013">http://www.ieee-scam.org/2013</a><br><br>===========================================================================<br>13th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)<br><br>September 22-23, 2013 <br>Eindhoven, The Netherlands <br>Co-located with ICSM 2013<br><br><a href="http://www.ieee-scam.org/2013">http://www.ieee-scam.org/2013</a><br>Twitter: @ieeescam<br><br>===========================================================================<br><br>Conference aims<br><br>The aim of this working conference is to bring together researchers and practitioners working on theory, techniques and applications that concern analysis and/or manipulation of the source code of software systems. The term “source code” refers to any fully executable description of a software system, such as machine code, (very) high level languages and executable graphical representations of systems. The term “analysis” refers to any (semi-)automated procedure that yields insight into source code, while “manipulation” refers to any automated or semi-automated procedure that takes and returns source code.<br><br>While much attention in the wider software engineering community is (rightfully!) directed towards other aspects of systems development and evolution, such as specification, design and requirements engineering, it is the source code that contains the only precise description of the behaviour of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2013 solicits high quality paper submissions.<br><br>Covered topics and paper formats:<br><br>We welcome the submission of high quality papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:<br><br>program transformation and refactoring<br>static and dynamic analysis<br>source level software metrics<br>decompilation<br>bug location and prediction<br>security and vulnerability analysis<br>source level testing and verification<br>concern, concept and feature mining<br>program comprehension<br>bad smell detection<br>abstract interpretation<br>program slicing<br>source level optimization<br>green source code<br>and much more!<br><br>SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted research papers are limited to 10 pages. Papers must be clearly marked as a research paper. All papers submitted should follow the IEEE Computer Society Press Proceedings Author Guidelines. The papers should be submitted electronically via the conference web site:<a href="https://www.easychair.org/conferences/?conf=scam2013">https://www.easychair.org/conferences/?conf=scam2013</a> (select the ”SCAM 2013 Research Track”). Each submission will be reviewed by at least three members of the programme committee, judging the paper on its novelty, quality, evaluation and scientific rigour. Note that submitted papers should not have been published before, and should not have been submitted elsewhere in parallel to SCAM 2013.<br><br><br>Proceedings<br><br>All accepted papers will appear in the proceedings, which will be published by the IEEE Computer Society Press.<br><br>Special Issue<br><br>The best research and tool papers will receive an award at SCAM 2013. Furthermore, the top papers from SCAM 2013 will be considered for revision, extension, and publication in a special issue. More details will follow.<br><br></body></html>