


Остановите войну!
for scientists:


default search action
13th WCRE 2006: Benevento, Italy
- 13th Working Conference on Reverse Engineering (WCRE 2006), 23-27 October 2006, Benevento, Italy. IEEE Computer Society 2006, ISBN 0-7695-2719-1
Keynotes
- Lionel C. Briand:
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations. 3-8 - Hausi A. Müller
:
Bits of History, Challenges for the Future and Autonomic Computing Technology. 9-18
Empirical Studies
- Cory Kapser, Michael W. Godfrey:
"Cloning Considered Harmful" Considered Harmful. 19-28 - Marius Marin, Leon Moonen
, Arie van Deursen
:
A common framework for aspect mining based on crosscutting concern sorts. 29-38 - Jens Knodel, Dirk Muthig, Matthias Naab:
Understanding Software Architectures by Visualization--An Experiment with Graphical Elements. 39-50
Program Comprehension
- David Lo
, Siau-Cheng Khoo:
QUARK: Empirical Assessment of Automaton-based Specification Miners. 51-60 - Kamran Sartipi
, Nima Dezhkam, Hossein Safyallah:
An Orchestrated Multi-view Software Architecture Reconstruction Environment. 61-70 - Lijie Zou, Michael W. Godfrey:
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks. 71-82
Concept and Feature Location
- Daniel Ratiu, Florian Deissenboeck:
How Programs Represent Reality (and how they don't). 83-92 - Jay Kothari, Trip Denton, Spiros Mancoridis, Ali Shokoufandeh:
On Computing the Canonical Features of Software Systems. 93-102 - David W. Binkley, Nicolas Gold, Mark Harman
, Zheng Li
, Kiarash Mahdavi:
An Empirical Study of Executable Concept Slice Size. 103-114
Migration towards SOA
- Shimin Li, Ladan Tahvildari:
A Service-Oriented Componentization Framework for Java Software Systems. 115-124 - Harry M. Sneed, Stephan H. Sneed:
Reverse Engineering of System Interfaces A Report from the Field. 125-133 - Markku Laitkorpi, Johannes Koskinen, Tarja Systä:
A UML-based Approach for Abstracting Application Interfaces to REST-like Services. 134-146
Data Reverse Engineering
- Ettore Merlo, Dominic Letarte, Giuliano Antoniol:
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP. 147-156 - Anthony Cleve, Jean Henrard, Jean-Luc Hainaut:
Data Reverse Engineering using System Dependency Graphs. 157-166 - Junghee Lim, Thomas W. Reps, Ben Liblit
:
Extracting Output Formats from Executables. 167-178
Visualizing Software Evolution
- Michael Fischer, Harald C. Gall
:
EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems. 179-188 - Marco D'Ambros, Michele Lanza:
Reverse Engineering with Logical Coupling. 189-198 - Dirk Beyer
, Ahmed E. Hassan:
Animated Visualization of Software History using Evolution Storyboards. 199-210
Mining Software Repositories
- Dharmalingam Ganesan, Dirk Muthig, Jens Knodel, Kentaro Yoshimura:
Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase--A Case Study. 211-220 - Salah Bouktif, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Extracting Change-patterns from CVS Repositories. 221-230 - Xinrong Xie, Denys Poshyvanyk
, Andrian Marcus
:
Visualization of CVS Repository Information. 231-242
Program Analysis
- Daniel L. Moise, Kenny Wong:
Extracting Facts from Perl Code. 243-252 - Rainer Koschke, Raimar Falke, Pierre Frenzel:
Clone Detection Using Abstract Syntax Suffix Trees. 253-262 - Zhenchang Xing, Eleni Stroulia
:
Refactoring Detection based on UMLDiff Change-Facts Queries. 263-274
Industrial Track
- Marco Lormans, Hans-Gerhard Groß, Arie van Deursen
, Rini van Solingen, André Stehouwer:
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study. 275-284 - Andrea Capiluppi
, Jamie Millen, Cornelia Boldyreff:
How Outsourcing Affects the Quality of Mission Critical Software. 285-287 - Anthony Cox, Trevor J. Smedley:
Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment. 288-292
Tool Demonstrations
- Massimo Colosimo, Andrea De Lucia
, Giuseppe Scanniello
, Genoveffa Tortora:
MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the Web. 293-294 - Thierry Bodhuin:
PODoJA: Packaging Optimizer for Downloadable Java Applications. 295-296 - E. Korshunova, Marija Petkovic, M. G. J. van den Brand
, Mohammad Reza Mousavi
:
CPP2XMI: Reverse Engineering of UML Class, Sequence, and Activity Diagrams from C++ Source Code. 297-298 - Marius Marin, Leon Moonen
, Arie van Deursen
:
FINT: Tool Support for Aspect Mining. 299-300
PhD Symposium
- Luigi Cerulo
:
On the Use of Process Trails to Understand Software Development. 303-304 - Matthias Meyer:
Pattern-based Reengineering of Software Systems. 305-306 - Samir Ribic:
Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code. 307-308 - Cristina Marinescu:
Quality Assessment of Enterprise Software Systems. 309-310
Workshops
- Leon Moonen
, Spiros Mancoridis:
Code Based Software Security Assessments. 313 - Marco Torchiano
:
Empirical Studies in Reverse Engineering. 314 - Andy Zaidman
, Orla Greevy, Abdelwahab Hamou-Lhadj:
Program COmprehension through Dynamic Analysis. 315 - Francesca Arcelli Fontana, Claudia Raibulet
, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Jason McC. Smith:
Design Pattern Detection for Reverse Engineering. 316
Tutorial
- Susan Elliott Sim:
Case Studies for Reverse Engineers. 319
IEEE International Astrenet Aspect Analysis (AAA) Workshop
- Mark Harman
, Sue Black, Paolo Tonella
:
Workshop Introduction Astrenet Aspect Analysis. 323 - Günter Kniesel, Uwe Bardey:
An Analysis of the Correctness and Completeness of Aspect Weaving. 324-333 - Jens Krinke
:
Mining Control Flow Graphs for Crosscutting Concerns. 334-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.