The following publications are possibly variants of this publication:
- Programmable Reverse EngineeringScott R. Tilley, Kenny Wong, Margaret-Anne D. Storey, Hausi A. Müller. ijseke, 4(4):501-520, 1994. [doi]
- Domain-Retargetable Reverse EngineeringScott R. Tilley, Hausi A. Müller, Michael J. Whitney, Kenny Wong. ICSM 1993: 142-151
- On Designing an Experiment to Evaluate a Reverse Engineering ToolMargaret-Anne D. Storey, Kenny Wong, P. Fong, D. Hooper, K. Hopkins, Hausi A. Müller. WCRE 1996: 31 [doi]
- Leveraging Visio for Adoption-Centric Reverse Engineering ToolsQin Zhu, Yu Chen, Piotr Kaminski, Anke Weber, Holger M. Kienle, Hausi A. Müller. WCRE 2003: 270-274 [doi]
- Understanding Software Systems Using Reverse Engineering TechnologyHausi A. Müller, Kenny Wong, Scott R. Tilley. COODBSE 1994: 240-252
- Legal Concerns of Web Site Reverse EngineeringHolger M. Kienle, Daniel M. Germán, Hausi A. Müller. WSE 2004: 41-50 [doi]
- Investigating Reverse Engineering Technologies for the CAS Program Understanding ProjectErich B. Buss, Renato de Mori, W. Morven Gentleman, John Henshaw, J. Howard Johnson, Kostas Kontogiannis, Ettore Merlo, Hausi A. Müller, John Mylopoulos, Santanu Paul, Atul Prakash, Martin Stanley, Scott R. Tilley, Joel Troster, Kenny Wong. IBMSJ, 33(3):477-500, 1994.