Abstract is missing.
- Folding: An Approach to Enable Program Understanding of Preprocessed LanguagesBernt Kullbach, Volker Riediger. 3-12 [doi]
- Generating Robust Parsers Using Island GrammarsLeon Moonen. 13 [doi]
- Node Coarsening Calculi for Program SlicingMark Harman, Robert M. Hierons, Sebastian Danicic, John Howroyd, Michael R. Laurence, Chris Fox. 25-34 [doi]
- Reverse Program Calculation Supported by Code SlicingGustavo Villavicencio, José Nuno Oliveira. 35 [doi]
- Towards a Standard Schema for C/C++Rudolf Ferenc, Susan Elliott Sim, Richard C. Holt, Rainer Koschke, Tibor Gyimóthy. 49-58 [doi]
- Union Schemas as a Basis for a C++ ExtractorThomas R. Dean, Andrew J. Malton, Richard C. Holt. 59 [doi]
- Requirements-Driven Software Re-engineering FrameworkLadan Tahvildari, Kostas Kontogiannis, John Mylopoulos. 71-80 [doi]
- Application of UML Associations and Their Adornments in Design RecoveryRalf Kollmann, Martin Gogolla. 81 [doi]
- CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark DecompositionsBrian S. Mitchell, Spiros Mancoridis. 93-102 [doi]
- Component Clustering Based on Maximal AssociationKamran Sartipi, Kostas Kontogiannis. 103-114 [doi]
- An Investigation into the Connectivity Properties of Source-Header Dependency GraphsGerald C. Gannod, Barbara D. Gannod. 115-126 [doi]
- From an Informal Textual Lexicon to a Well-Structured Lexical Database: An Experiment in Data Reverse EngineeringGérard P. Huet. 127-135 [doi]
- A Retrospective on Industrial Database Reverse Engineering Projects. Part 1Michael R. Blaha. 136-146 [doi]
- A Retrospective on Industrial Database Reverse Engineering Projects. Part 2Michael R. Blaha. 147 [doi]
- Maximizing Functional Cohesion of Comprehension Environments by Integrating User and Task KnowledgeJuergen Rilling. 157-165 [doi]
- Characterizing the Informal Knowledge Contained in SystemsNicolas Anquetil. 166-175 [doi]
- Program Comprehension Risks and Opportunities in Extreme ProgrammingArie van Deursen. 176 [doi]
- Wrapping Legacy COBOL Programs behind an XML-InterfaceHarry M. Sneed. 189 [doi]
- Wrapper Development for Legacy Data ReusePhilippe Thiran, Jean-Luc Hainaut. 198-207 [doi]
- Modeling the System-User Dialog Using Interaction TracesMohammad El-Ramly, Paul Iglinski, Eleni Stroulia, Paul G. Sorenson, Bruce Matichuk. 208 [doi]
- REportal: A Web-Based Portal Site for Reverse EngineeringSpiros Mancoridis, Timothy S. Souder, Yih-Farn Chen, Emden R. Gansner, Jeffrey L. Korn. 221-230 [doi]
- An Approach for Reverse Engineering of Web-Based ApplicationGiuseppe A. Di Lucca, Massimiliano Di Penta, Giuliano Antoniol, Gerardo Casazza. 231-240 [doi]
- Flexible Reverse Engineering of Web Pages with VAQUISTAJean Vanderdonckt, Laurent Bouillon, Nathalie Souchon. 241-248 [doi]
- Reverse Engineering to Achieve Maintainable WWW SitesCornelia Boldyreff, Richard Kewish. 249 [doi]
- Displaying Dependence Graphs: A Hierarchical ApproachFrancoise Balmas. 261-270 [doi]
- GUSTT: An Amorphous Slicing System which Combines Slicing and TransformationMark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang. 271-280 [doi]
- Preprocessor Conditional Removal by Simple Partial EvaluationIra D. Baxter, Michael Mehlich. 281-290 [doi]
- Parsing in a Hostile WorldDarius Blasband. 291-300 [doi]
- Identifying Similar Code with Program Dependence GraphsJens Krinke. 301-309 [doi]
- The Octagon Abstract DomainAntoine Miné. 310 [doi]
- Lessons Learned in Data Reverse EngineeringKathi Hogshead Davis. 323-327 [doi]
- Interactive Migration of Legacy Databases to Net-Centric TechnologiesYury Bychkov, Jens H. Jahnke. 328-334 [doi]
- Reengineering Relational Databases to Object-Oriented: Constructing the Class Hierarchy and Migrating the DataReda Alhajj, Faruk Polat. 335-344 [doi]
- Assisting the Comprehension of Legacy TransactionsSuzanne M. Embury, Jianhua Shao. 345 [doi]
- Comparing Type-Based and Proof-Directed DecompilationAlan Mycroft, Atsushi Ohori, Shin-ya Katsumata. 362-367 [doi]
- Decompiling Java Using Staged EncapsulationJerome Miecznikowski, Laurie J. Hendren. 368-374 [doi]
- Computer Security Analysis through Decompilation and High-Level DebuggingCristina Cifuentes, Trent Waddington, Mike Van Emmerik. 375-380 [doi]