15 | -- | 17 | John Perry Barlow. Dad s Invisible Guard-All Shield |
19 | -- | 21 | Roger C. Schank. Tractor Factories and Research in Software Design |
22 | -- | 25 | Richard C. Waters, Elliot J. Chikofsky. Reverse Engineeing - Introduction to the Special Section |
26 | -- | 41 | Peter H. Aiken, Alice H. Muntz, Russ Richards. DoD Legacy Systems: Reverse Engineering Data Requirements |
42 | -- | 0 | William J. Premerlani, Michael R. Blaha. An Approach for Reverse Engineering of Relational Databases |
50 | -- | 57 | Jim Q. Ning, Andre Engberts, Wojtek Kozaczynski. Automated Support for Legacy Code Understanding |
58 | -- | 70 | Lawrence Markosian, Philip Newcomb, Russell Brand, Scott Burson, Ted Kitzmiller. Using an Enabling Technology to Reengineer Legacy Systems |
72 | -- | 82 | Ted J. Biggerstaff, Bharat G. Mitbander, Dallas E. Webster. Program Understanding and the Concept Assigment Problem |
84 | -- | 93 | Alex Quilici. A Memory-Based Approach to Recognizing Programing Plans |
94 | -- | 101 | Karl J. Lieberherr, Ignacio Silva-Lepe, Cun Xiao. Adaptive Object-Oriented Programming Using Graph-Based Customization |
102 | -- | 113 | Iris Vessey, Sue A. Conger. Requirements Specification: Learning Object, Process, and Data Methodologies |
146 | -- | 0 | Peter G. Neumann. Alternative Passwords |