Abstract is missing.
- The Experimental Paradigm in Reverse Engineering: Role, Challenges, and LimitationsLionel C. Briand. 3-8 [doi]
- Bits of History, Challenges for the Future and Autonomic Computing TechnologyHausi A. Müller. 9-18 [doi]
- Cloning Considered Harmful Considered HarmfulCory Kapser, Michael W. Godfrey. 19-28 [doi]
- A common framework for aspect mining based on crosscutting concern sortsMarius Marin, Leon Moonen, Arie van Deursen. 29-38 [doi]
- Understanding Software Architectures by Visualization--An Experiment with Graphical ElementsJens Knodel, Dirk Muthig, Matthias Naab. 39-50 [doi]
- QUARK: Empirical Assessment of Automaton-based Specification MinersDavid Lo, Siau-Cheng Khoo. 51-60 [doi]
- An Orchestrated Multi-view Software Architecture Reconstruction EnvironmentKamran Sartipi, Nima Dezhkam, Hossein Safyallah. 61-70 [doi]
- An Industrial Case Study of Program Artifacts Viewed During Maintenance TasksLijie Zou, Michael W. Godfrey. 71-82 [doi]
- How Programs Represent Reality (and how they don t)Daniel Ratiu, Florian Deissenboeck. 83-92 [doi]
- On Computing the Canonical Features of Software SystemsJay Kothari, Trip Denton, Spiros Mancoridis, Ali Shokoufandeh. 93-102 [doi]
- An Empirical Study of Executable Concept Slice SizeDavid W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi. 103-114 [doi]
- A Service-Oriented Componentization Framework for Java Software SystemsShimin Li, Ladan Tahvildari. 115-124 [doi]
- Reverse Engineering of System Interfaces A Report from the FieldHarry M. Sneed, Stephan H. Sneed. 125-133 [doi]
- A UML-based Approach for Abstracting Application Interfaces to REST-like ServicesMarkku Laitkorpi, Johannes Koskinen, Tarja Systä. 134-146 [doi]
- Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHPEttore Merlo, Dominic Letarte, Giuliano Antoniol. 147-156 [doi]
- Data Reverse Engineering using System Dependency GraphsAnthony Cleve, Jean Henrard, Jean-Luc Hainaut. 157-166 [doi]
- Extracting Output Formats from ExecutablesJunghee Lim, Thomas W. Reps, Ben Liblit. 167-178 [doi]
- EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software SystemsMichael Fischer, Harald Gall. 179-188 [doi]
- Reverse Engineering with Logical CouplingMarco D Ambros, Michele Lanza. 189-198 [doi]
- Animated Visualization of Software History using Evolution StoryboardsDirk Beyer, Ahmed E. Hassan. 199-210 [doi]
- Discovering Organizational Aspects from the Source Code History Log during the Product Line Planning Phase--A Case StudyDharmalingam Ganesan, Dirk Muthig, Jens Knodel, Kentaro Yoshimura. 211-220 [doi]
- Extracting Change-patterns from CVS RepositoriesSalah Bouktif, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 221-230 [doi]
- Visualization of CVS Repository InformationXinrong Xie, Denys Poshyvanyk, Andrian Marcus. 231-242 [doi]
- Extracting Facts from Perl CodeDaniel L. Moise, Kenny Wong. 243-252 [doi]
- Clone Detection Using Abstract Syntax Suffix TreesRainer Koschke, Raimar Falke, Pierre Frenzel. 253-262 [doi]
- Refactoring Detection based on UMLDiff Change-Facts QueriesZhenchang Xing, Eleni Stroulia. 263-274 [doi]
- Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case StudyMarco Lormans, Hans-Gerhard Gross, Arie van Deursen, Rini van Solingen, André Stehouwer. 275-284 [doi]
- How Outsourcing Affects the Quality of Mission Critical SoftwareAndrea Capiluppi, Jamie Millen, Cornelia Boldyreff. 285-287 [doi]
- Reverse Engineering in Support of Litigation: Experiences in an Adversarial EnvironmentAnthony Cox, Trevor J. Smedley. 288-292 [doi]
- MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the WebMassimo Colosimo, Andrea De Lucia, Giuseppe Scanniello, Genoveffa Tortora. 293-294 [doi]
- PODoJA: Packaging Optimizer for Downloadable Java ApplicationsThierry Bodhuin. 295-296 [doi]
- CPP2XMI: Reverse Engineering of UML Class, Sequence, and Activity Diagrams from C++ Source CodeE. Korshunova, Marija Petkovic, Mark G. J. van den Brand, Mohammad Reza Mousavi. 297-298 [doi]
- FINT: Tool Support for Aspect MiningMarius Marin, Leon Moonen, Arie van Deursen. 299-300 [doi]
- On the Use of Process Trails to Understand Software DevelopmentLuigi Cerulo. 303-304 [doi]
- Pattern-based Reengineering of Software SystemsMatthias Meyer. 305-306 [doi]
- Concept and implementation of the programming language and translator, for embedded systems, based on machine code decompilation and equivalence between source and executable codeSamir Ribic. 307-308 [doi]
- Quality Assessment of Enterprise Software SystemsCristina Marinescu. 309-310 [doi]
- Code Based Software Security AssessmentsLeon Moonen, Spiros Mancoridis. 313 [doi]
- Empirical Studies in Reverse EngineeringMarco Torchiano. 314 [doi]
- Program COmprehension through Dynamic AnalysisAndy Zaidman, Orla Greevy, Abdelwahab Hamou-Lhadj. 315 [doi]
- Design Pattern Detection for Reverse EngineeringFrancesca Arcelli Fontana, Claudia Raibulet, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Jason McC. Smith. 316 [doi]
- Case Studies for Reverse EngineersSusan Elliott Sim. 319 [doi]
- Workshop Introduction Astrenet Aspect AnalysisMark Harman, Sue Black, Paolo Tonella. 323 [doi]
- An Analysis of the Correctness and Completeness of Aspect WeavingGünter Kniesel, Uwe Bardey. 324-333 [doi]
- Mining Control Flow Graphs for Crosscutting ConcernsJens Krinke. 334-342 [doi]