@inproceedings{discovery1333826,
           pages = {10 -- 14},
            note = {{\copyright} 2011 IEEE. Personal use of this material (accepted version) is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.},
          number = {Source Code Analysis and Manipulation (SCAM), 2011 11th IEEE International Working Conference on },
         journal = {Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011},
           title = {Knitting music and programming: Reflections on the frontiers of source code analysis},
            year = {2011},
       booktitle = {2011 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)},
       publisher = {IEEE},
        abstract = {Source Code Analysis and Manipulation (SCAM) underpins virtually every operational software system. Despite the impact and ubiquity of SCAM principles and techniques in software engineering, there are still frontiers to be explored. Looking "inward" to existing techniques, one finds frontiers of performance, efficiency, accuracy, and usability, looking "outward" one finds new languages, new problems, and thus new approaches. This paper presents a reflective framework for characterizing source languages and domains. It draws on current research projects in music program analysis, musical score processing, and machine knitting to identify new frontiers for SCAM. The paper also identifies opportunities for SCAM to inspire, and be inspired by, problems and techniques in other domains.},
             url = {http://dx.doi.org/10.1109/SCAM.2011.10},
          author = {Gold, N}
}