


default search action
10th WCRE 2003: Victoria, BC, Canada
- Arie van Deursen, Eleni Stroulia, Margaret-Anne D. Storey:

10th Working Conference on Reverse Engineering, WCRE 2003, Victoria, Canada, November 13-16, 2003. IEEE Computer Society 2003, ISBN 0-7695-2027-8
Invited Talk
- Gail C. Murphy:

Learning from the Past. 2-3
Low-Level Reverse Engineering
- Lori Vinciguerra, Linda M. Wills, Nidhi Kejriwal, Paul Martino, Ralph L. Vinciguerra:

An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java. 14-23 - Lewis Benton Baumstark Jr., Murat Guler, Linda M. Wills:

Extracting an Explicitly Data-Parallel Representation of Image-Processing Programs. 24-35
Software Architecture
- Rainer Koschke, Daniel Simon:

Hierarchical Reflexion Models. 36-45 - Christoph Stoermer, Liam O'Brien, Chris Verhoef:

Moving Towards Quality Attribute Driven Software Architecture Reconstruction. 46-56 - Lionel C. Briand, Yvan Labiche

, Y. Miao:
Towards the Reverse Engineering of UML Sequence Diagrams. 57-66 - Minmin Han, Christine Hofmeister, Robert L. Nord:

Reconstructing Software Architecture for J2EE Web Applications. 67-79
Visualization
- Michael John Pacione, Marc Roper

, Murray Wood
:
Comparative Evaluation of Dynamic Visualisation Tools. 80-89 - Michael Fischer, Martin Pinzger, Harald C. Gall

:
Analyzing and Relating Bug Report Data for Feature Tracking. 90-101
Software Process
- Ying Liu, Eleni Stroulia:

Reverse Engineering the Process of Small Novice Software Teams. 102-112 - Ulrike Kölsch, René Witte:

Fuzzy Extensions for Reverse Engineering Repository Models. 113-122 - Ahmed E. Hassan, Richard C. Holt:

Studying the Chaos of Code Development. 123-133 - Jennifer Bevan, E. James Whitehead Jr.:

Identification of Software Instabilities. 134-145
Software Evolution
- Lijie Zou, Michael W. Godfrey:

Detecting Merging and Splitting using Origin Analysis. 146-154 - Melis Dagpinar, Jens H. Jahnke:

Predicting Maintainability with Object-Oriented Metrics - An Empirical Comparison. 155-164 - Thierry Bodhuin, Enrico Guardabascio, Maria Tortorella:

Migration of non-decomposable software systems to the Web using screen proxies. 165-174 - Gerald C. Gannod, Huimin Zhu, Sudhakiran V. Mudiam:

On-the-fly Wrapping of Web Services to Support Dynamic Integration. 175-185
Extraction and Querying
- Jens Knodel, Martin Pinzger:

Improving Fact Extraction of Framework-Based Software Systems. 186-195 - Yuan Lin, Richard C. Holt, Andrew J. Malton:

Completeness of a Fact Extractor. 196-205 - Mario Latendresse:

RegReg: a Lightweight Generator of Robust Parsers for Irregular Languages. 206-215 - Dirk Beyer

, Andreas Noack, Claus Lewerentz
:
Simple and Efficient Relational Querying of Software Structures. 216-225
Distributed Systems
- Abdulmalik Al-Gahmi, Ciju John, Jonathan E. Cook, Bo Du:

Supporting Quick and Dirty CORBA Introspection and Manipulation. 228-237 - Maher Salah, Spiros Mancoridis:

Toward an environment for comprehending distributed systems. 238-247 - Alexandre Alvaro, Daniel Lucrédio, Vinicius Cardoso Garcia, Antônio Francisco do Prado, Luís Carlos Trevelin, Eduardo Santana de Almeida:

Orion-RE: A Component-Based Software Reengineering Environment . 248-259
Tools and Applications
- Atif M. Memon, Ishan Banerjee, Adithya Nagarajan:

GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing. 260-269 - Qin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holger M. Kienle, Hausi A. Müller

:
Leveraging Visio for Adoption-Centric Reverse Engineering Tools. 270-274 - Daniel L. Moise, Kenny Wong:

An Industrial Experience in Reverse Engineering. 275-284 - Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia:

Problems Creating Task-relevant Clone Detection Reference Data. 285-295
Program Analysis
- Christophe Alias, Denis Barthou

:
Algorithm Recognition based on Demand-Driven Data-flow Analysis. 296-305 - Markus Clermont:

Analyzing Large Spreadsheet Programs. 306-315 - Keith B. Gallagher

, David W. Binkley:
An Empirical Study of Computation Equivalence as Determined by Decomposition Slice Equivalence. 316-322 - Christopher Dahn, Spiros Mancoridis:

Using Program Transformation to Secure C Programs Against Buffer Overflows. 323-333
Reconstruction
- Periklis Andritsos, Vassilios Tzerpos:

Software Clustering based on Information Loss Minimization. 334-344 - Idris Hsi, Colin Potts, Melody M. Moore:

Ontological Excavation: Unearthing the core concepts of the application. 345-352 - Uri Dekel, Yossi Gil:

Revealing Class Structure with Concept Lattices. 353-365
Workshop Descriptions
- Jean-Marie Favre, Michael W. Godfrey, Andreas Winter:

First International Workshop on Meta-Models and Schemas for Reverse Engineering - ateM 2003. 366-367 - Arun Lakhotia, Andrew Walenstein, Rainer Koschke:

Second International Workshop on Detection of Software Clones. 368 - Ladan Tahvildari, Kostas Kontogiannis:

First International Workshop on Refactoring : Achievements, Challenges, and Effects (REFACE?03). 369-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














