Journal: Communications of the ACM

Volume 37, Issue 5

15 -- 17John Perry Barlow. Dad s Invisible Guard-All Shield
19 -- 21Roger C. Schank. Tractor Factories and Research in Software Design
22 -- 25Richard C. Waters, Elliot J. Chikofsky. Reverse Engineeing - Introduction to the Special Section
26 -- 41Peter H. Aiken, Alice H. Muntz, Russ Richards. DoD Legacy Systems: Reverse Engineering Data Requirements
42 -- 0William J. Premerlani, Michael R. Blaha. An Approach for Reverse Engineering of Relational Databases
50 -- 57Jim Q. Ning, Andre Engberts, Wojtek Kozaczynski. Automated Support for Legacy Code Understanding
58 -- 70Lawrence Markosian, Philip Newcomb, Russell Brand, Scott Burson, Ted Kitzmiller. Using an Enabling Technology to Reengineer Legacy Systems
72 -- 82Ted J. Biggerstaff, Bharat G. Mitbander, Dallas E. Webster. Program Understanding and the Concept Assigment Problem
84 -- 93Alex Quilici. A Memory-Based Approach to Recognizing Programing Plans
94 -- 101Karl J. Lieberherr, Ignacio Silva-Lepe, Cun Xiao. Adaptive Object-Oriented Programming Using Graph-Based Customization
102 -- 113Iris Vessey, Sue A. Conger. Requirements Specification: Learning Object, Process, and Data Methodologies
146 -- 0Peter G. Neumann. Alternative Passwords