{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:39:29Z","timestamp":1730313569746,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,21]]},"DOI":"10.1145\/1146238.1146260","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"191-202","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["The case for analysis preserving language transformation"],"prefix":"10.1145","author":[{"given":"Xiaolan","family":"Zhang","sequence":"first","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Larry","family":"Koved","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Sam","family":"Weber","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Guillaume","family":"Marceau","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Liangzhao","family":"Zeng","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2006,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Security Focus Bugtraq Posting. http:\/\/cert.unistuttgart.de\/archive\/bugtraq\/2001\/03\/msg00420.html.  Security Focus Bugtraq Posting. http:\/\/cert.unistuttgart.de\/archive\/bugtraq\/2001\/03\/msg00420.html."},{"key":"e_1_3_2_1_2_1","unstructured":"The SUIF 2 Compiler System. Available at http:\/\/suif.stanford.edu\/suif\/suif2\/index.html.  The SUIF 2 Compiler System. Available at http:\/\/suif.stanford.edu\/suif\/suif2\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"The vortex project. Available at http:\/\/www.cs.washington.edu\/research\/projects\/cecil\/www\/vortex.html.  The vortex project. Available at http:\/\/www.cs.washington.edu\/research\/projects\/cecil\/www\/vortex.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647228.719242"},{"key":"e_1_3_2_1_5_1","unstructured":"American National Standards Institute 1430 Broadway New York NY 10018 USA. ANSI Fortran X3.9-1978 1978. Approved April 3 1978 (also known as Fortran 77).  American National Standards Institute 1430 Broadway New York NY 10018 USA. ANSI Fortran X3.9-1978 1978. Approved April 3 1978 (also known as Fortran 77)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/380921.380932"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"e_1_3_2_1_8_1","first-page":"337","volume-title":"Proceedings of the 2nd International Conference on Software Engineering","author":"Balzer R. M.","year":"1986"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999466"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"131","article-title":"Checking for race conditions in file accesses","volume":"9","author":"Bishop M.","year":"1996","journal-title":"Computing Systems"},{"volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium","year":"2004","author":"Chen H.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586142"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647166.717972"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143148"},{"volume-title":"University of Tennessy","year":"1998","author":"Doolin D. M.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972777"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_19_1","first-page":"229","volume-title":"Proceedings of the 1994 InternationalConference on Computer Languages","author":"Erosa A. M.","year":"1994"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2005.02.004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512531"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_1_25_1","unstructured":"IBM. The toronto portable optimizer.  IBM. The toronto portable optimizer."},{"key":"e_1_3_2_1_27_1","unstructured":"Jazillian Inc. How to convert c to java. Available at http:\/\/jazillian.com\/how.html.  Jazillian Inc. How to convert c to java. Available at http:\/\/jazillian.com\/how.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766902"},{"volume-title":"Proceedings of the USENIX Security Symposium","year":"2004","author":"Johnson R.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"e_1_3_2_1_31_1","first-page":"177","volume-title":"Proceedings of the Tenth USENIX Security Symposium","author":"Larochelle D.","year":"2001"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_33_1","unstructured":"J. Martin. Ephedra - a c to java migration environment April 2002. Ph.D. Dissertation University of Victoria Kanada. Available at http:\/\/ovid.tigris.org\/Ephedra\/.   J. Martin. Ephedra - a c to java migration environment April 2002. Ph.D. Dissertation University of Victoria Kanada. Available at http:\/\/ovid.tigris.org\/Ephedra\/."},{"key":"e_1_3_2_1_34_1","unstructured":"J. Morgenthaler. Static Analysis for a Software Transformation Tool. PhD thesis 1997.   J. Morgenthaler. Static Analysis for a Software Transformation Tool. PhD thesis 1997."},{"volume-title":"Proceedings of the Third Workshop on Runtime Verification (RV'03)","year":"2003","author":"Nethercote N.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","unstructured":"Novosoft. C to java converter. Available at http:\/\/in.tech.yahoo.com\/020513\/94\/1nxuw.html.  Novosoft. C to java converter. Available at http:\/\/in.tech.yahoo.com\/020513\/94\/1nxuw.html."},{"key":"e_1_3_2_1_37_1","unstructured":"R. W. O'Callahan. The shrike toolkit. Available at http:\/\/org.eclipse.cme\/contributions\/shrike\/.  R. W. O'Callahan. The shrike toolkit. Available at http:\/\/org.eclipse.cme\/contributions\/shrike\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_16"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504286"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765931.1765945"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_42_1","first-page":"201","volume-title":"Proceedings of the Tenth USENIX Security Symposium","author":"Shankar U.","year":"2001"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.232013"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108810"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/520033.858239"},{"volume-title":"Proceedings of the 11th USENIX Security Symposium","year":"2002","author":"Wright C.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996846"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720279"},{"volume-title":"Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference","year":"2004","author":"Zhang X.","key":"e_1_3_2_1_50_1"}],"event":{"name":"ISSTA06: International Symposium on Software Testing and Analysis 2006","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Portland Maine USA","acronym":"ISSTA06"},"container-title":["Proceedings of the 2006 international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1146238.1146260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T08:27:54Z","timestamp":1673512074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1146238.1146260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,21]]},"references-count":49,"alternative-id":["10.1145\/1146238.1146260","10.1145\/1146238"],"URL":"https:\/\/doi.org\/10.1145\/1146238.1146260","relation":{},"subject":[],"published":{"date-parts":[[2006,7,21]]},"assertion":[{"value":"2006-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}