default search action
13th WCRE 2006: Benevento, Italy
- 13th Working Conference on Reverse Engineering (WCRE 2006), 23-27 October 2006, Benevento, Italy. IEEE Computer Society 2006, ISBN 0-7695-2719-1
Keynotes
- Lionel C. Briand:
The Experimental Paradigm in Reverse Engineering: Role, Challenges, and Limitations. 3-8 - Hausi A. Müller:
Bits of History, Challenges for the Future and Autonomic Computing Technology. 9-18
Empirical Studies
- Cory Kapser, Michael W. Godfrey:
"Cloning Considered Harmful" Considered Harmful. 19-28 - Marius Marin, Leon Moonen, Arie van Deursen:
A common framework for aspect mining based on crosscutting concern sorts. 29-38 - Jens Knodel, Dirk Muthig, Matthias Naab:
Understanding Software Architectures by Visualization--An Experiment with Graphical Elements. 39-50
Program Comprehension
- David Lo, Siau-Cheng Khoo:
QUARK: Empirical Assessment of Automaton-based Specification Miners. 51-60 - Kamran Sartipi, Nima Dezhkam, Hossein Safyallah:
An Orchestrated Multi-view Software Architecture Reconstruction Environment. 61-70 - Lijie Zou, Michael W. Godfrey:
An Industrial Case Study of Program Artifacts Viewed During Maintenance Tasks. 71-82
Concept and Feature Location
- Daniel Ratiu, Florian Deissenboeck:
How Programs Represent Reality (and how they don't). 83-92 - Jay Kothari, Trip Denton, Spiros Mancoridis, Ali Shokoufandeh:
On Computing the Canonical Features of Software Systems. 93-102 - David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi:
An Empirical Study of Executable Concept Slice Size. 103-114
Migration towards SOA
- Shimin Li, Ladan Tahvildari:
A Service-Oriented Componentization Framework for Java Software Systems. 115-124 - Harry M. Sneed, Stephan H. Sneed:
Reverse Engineering of System Interfaces A Report from the Field. 125-133 - Markku Laitkorpi, Johannes Koskinen, Tarja Systä:
A UML-based Approach for Abstracting Application Interfaces to REST-like Services. 134-146
Data Reverse Engineering
- Ettore Merlo, Dominic Letarte, Giuliano Antoniol:
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP. 147-156 - Anthony Cleve, Jean Henrard, Jean-Luc Hainaut:
Data Reverse Engineering using System Dependency Graphs. 157-166 - Junghee Lim, Thomas W. Reps, Ben Liblit:
Extracting Output Formats from Executables. 167-178
Visualizing Software Evolution
- Michael Fischer, Harald C. Gall:
EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems. 179-188 - Marco D'Ambros, Michele Lanza:
Reverse Engineering with Logical Coupling. 189-198 - Dirk Beyer, Ahmed E. Hassan:
Animated Visualization of Software History using Evolution Storyboards. 199-210
Mining Software Repositories
- Dharmalingam Ganesan, Dirk Muthig, Jens Knodel, Kentaro Yoshimura:
Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase--A Case Study. 211-220 - Salah Bouktif, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Extracting Change-patterns from CVS Repositories. 221-230 - Xinrong Xie, Denys Poshyvanyk, Andrian Marcus:
Visualization of CVS Repository Information. 231-242
Program Analysis
- Daniel L. Moise, Kenny Wong:
Extracting Facts from Perl Code. 243-252 - Rainer Koschke, Raimar Falke, Pierre Frenzel:
Clone Detection Using Abstract Syntax Suffix Trees. 253-262 - Zhenchang Xing, Eleni Stroulia:
Refactoring Detection based on UMLDiff Change-Facts Queries. 263-274
Industrial Track
- Marco Lormans, Hans-Gerhard Groß, Arie van Deursen, Rini van Solingen, André Stehouwer:
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study. 275-284 - Andrea Capiluppi, Jamie Millen, Cornelia Boldyreff:
How Outsourcing Affects the Quality of Mission Critical Software. 285-287 - Anthony Cox, Trevor J. Smedley:
Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment. 288-292
Tool Demonstrations
- Massimo Colosimo, Andrea De Lucia, Giuseppe Scanniello, Genoveffa Tortora:
MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the Web. 293-294 - Thierry Bodhuin:
PODoJA: Packaging Optimizer for Downloadable Java Applications. 295-296 - E. Korshunova, Marija Petkovic, M. G. J. van den Brand, Mohammad Reza Mousavi:
CPP2XMI: Reverse Engineering of UML Class, Sequence, and Activity Diagrams from C++ Source Code. 297-298 - Marius Marin, Leon Moonen, Arie van Deursen:
FINT: Tool Support for Aspect Mining. 299-300
PhD Symposium
- Luigi Cerulo:
On the Use of Process Trails to Understand Software Development. 303-304 - Matthias Meyer:
Pattern-based Reengineering of Software Systems. 305-306 - Samir Ribic:
Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable code. 307-308 - Cristina Marinescu:
Quality Assessment of Enterprise Software Systems. 309-310
Workshops
- Leon Moonen, Spiros Mancoridis:
Code Based Software Security Assessments. 313 - Marco Torchiano:
Empirical Studies in Reverse Engineering. 314 - Andy Zaidman, Orla Greevy, Abdelwahab Hamou-Lhadj:
Program COmprehension through Dynamic Analysis. 315 - Francesca Arcelli Fontana, Claudia Raibulet, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Jason McC. Smith:
Design Pattern Detection for Reverse Engineering. 316
Tutorial
- Susan Elliott Sim:
Case Studies for Reverse Engineers. 319
IEEE International Astrenet Aspect Analysis (AAA) Workshop
- Mark Harman, Sue Black, Paolo Tonella:
Workshop Introduction Astrenet Aspect Analysis. 323 - Günter Kniesel, Uwe Bardey:
An Analysis of the Correctness and Completeness of Aspect Weaving. 324-333 - Jens Krinke:
Mining Control Flow Graphs for Crosscutting Concerns. 334-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.