Abstract is missing.
- Genetic programming for Reverse EngineeringMark Harman, William B. Langdon, Westley Weimer. 1-10 [doi]
- The first decade of GUI ripping: Extensions, applications, and broader impactsAtif M. Memon, Ishan Banerjee, Bao N. Nguyen, Bryan Robbins. 11-20 [doi]
- Reverse Engineering in IndustryRalf Lämmel. 21 [doi]
- Who allocated my memory? Detecting custom memory allocators in C binariesXi Chen, Asia Slowinska, Herbert Bos. 22-31 [doi]
- MemPick: High-level data structure detection in C/C++ binariesIstván Haller, Asia Slowinska, Herbert Bos. 32-41 [doi]
- Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysisBrendan Cleary, Patrick Gorman, Eric Verbeek, Margaret-Anne D. Storey, Martin Salois, Frédéric Painchaud. 42-51 [doi]
- Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctnessMatthew Smithson, Khaled Elwazeer, Kapil Anand, Aparna Kotha, Rajeev Barua. 52-61 [doi]
- An incremental update framework for efficient retrieval from software libraries for bug localizationShivani Rao, Henry Medeiros, Avinash C. Kak. 62-71 [doi]
- Accurate developer recommendation for bug resolutionXin Xia, David Lo, Xinyu Wang, Bo Zhou. 72-81 [doi]
- Has this bug been reported?Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang. 82-91 [doi]
- Automatic recovery of root causes from bug-fixing changesFerdian Thung, David Lo, Lingxiao Jiang. 92-101 [doi]
- Distilling useful clones by contextual differencingZhenchang Xing, Yinxing Xue, Stan Jarzabek. 102-111 [doi]
- Effects of cloned code on software maintainability: A replicated developer studyDebarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft, Jan Harder. 112-121 [doi]
- The influence of non-technical factors on code reviewOlga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey. 122-131 [doi]
- Understanding project dissemination on a social coding siteJing Jiang, Li Zhang, Lei Li. 132-141 [doi]
- What help do developers seek, when and how?Hongwei Li, Zhenchang Xing, Xin Peng, Wenyun Zhao. 142-151 [doi]
- Towards understanding how developers spend their effort during maintenance activitiesZéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 152-161 [doi]
- Leveraging specifications of subcomponents to mine precise specifications of composite componentsZiying Dai, Xiaoguang Mao, Yan Lei, Liqian Chen. 162-171 [doi]
- A model-driven graph-matching approach for design pattern detectionMario Luca Bernardi, Marta Cimitile, Giuseppe Antonio Di Lucca. 172-181 [doi]
- Automated library recommendationFerdian Thung, David Lo, Julia L. Lawall. 182-191 [doi]
- Automatic discovery of function mappings between similar librariesCédric Teyton, Jean-Rémy Falleri, Xavier Blanc. 192-201 [doi]
- Find your library expertsCédric Teyton, Jean-Rémy Falleri, Floréal Morandat, Xavier Blanc. 202-211 [doi]
- Towards automatically improving package structure while respecting original design decisionsHani Abdeen, Houari A. Sahraoui, Osama Shata, Nicolas Anquetil, Stéphane Ducasse. 212-221 [doi]
- Heuristics for discovering architectural violationsCristiano Amaral Maffort, Marco Tulio Valente, Mariza Andrade da Silva Bigonha, Nicolas Anquetil, Andre Hora. 222-231 [doi]
- Recommending Move Method refactorings using dependency setsVitor Sales, Ricardo Terra, Luis Fernando Miranda, Marco Tulio Valente. 232-241 [doi]
- Do developers care about code smells? An exploratory surveyAiko Fallas Yamashita, Leon Moonen. 242-251 [doi]
- LigRE: Reverse-engineering of control and data flow models for black-box XSS detectionFabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz. 252-261 [doi]
- Circe: A grammar-based oracle for testing Cross-site scripting in web applicationsAndrea Avancini, Mariano Ceccato. 262-271 [doi]
- Capture-replay vs. programmable web testing: An empirical assessment during test case evolutionMaurizio Leotta, Diego Clerissi, Filippo Ricca, Paolo Tonella. 272-281 [doi]
- Clustering static analysis defect reports to reduce maintenance costsZachary P. Fry, Westley. 282-291 [doi]
- Lehman's laws in agile and non-agile projectsKelley Duran, Gabbie Burns, Paul Snell. 292-300 [doi]
- Inferring Extended Finite State Machine models from software executionsNeil Walkinshaw, Ramsay Taylor, John Derrick. 301-310 [doi]
- Comparing and combining evolutionary couplings from interactions and commitsFasil Bantelay, Motahareh Bahrami Zanjani, Huzefa H. Kagdi. 311-320 [doi]
- Improving SOA antipatterns detection in Service Based Systems by mining execution tracesMathieu Nayrolles, Naouel Moha, Petko Valtchev. 321-330 [doi]
- Mining system specific rules from change patternsAndre Hora, Nicolas Anquetil, Stéphane Ducasse, Marco Tulio Valente. 331-340 [doi]
- Empirical evidence of code decay: A systematic mapping studyAjay Bandi, Byron J. Williams, Edward B. Allen. 341-350 [doi]
- Mining the relationship between anti-patterns dependencies and fault-pronenessFehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh. 351-360 [doi]
- Leveraging historical co-change information for requirements traceabilityNasir Ali, Fehmi Jaafar, Ahmed E. Hassan. 361-370 [doi]
- Using relationships for matching textual domain models with existing codeRaghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, Sachin Kale. 371-380 [doi]
- On the effectiveness of accuracy of automated feature location techniqueTakashi Ishio, Shinpei Hayashi, Hiroshi Kazato, Tsuyoshi Oshima. 381-390 [doi]
- On the effect of program exploration on maintenance tasksZéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Bram Adams. 391-400 [doi]
- Documenting APIs with examples: Lessons learned with the APIMiner platformJoão Eduardo Montandon, Hudson Borges, Daniel Felix, Marco Tulio Valente. 401-408 [doi]
- Extracting business rules from COBOL: A model-based frameworkValerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, Jacques Perronnet. 409-416 [doi]
- Evaluating architecture stability of software projectsLerina Aversano, Marco Molfetta, Maria Tortorella. 417-424 [doi]
- Migrating a large scale legacy application to SOA: Challenges and lessons learnedRavi Khadka, Amir Saeidi, Slinger Jansen, Jurriaan Hage, Geer P. Haas. 425-432 [doi]
- Assessing the complexity of upgrading software modulesBram Schoenmakers, Niels van den Broek, Istvan Nagy, Bogdan Vasilescu, Alexander Serebrenik. 433-440 [doi]
- Analyzing PL/1 legacy ecosystems: An experience reportErik Aeschlimann, Mircea Lungu, Oscar Nierstrasz, Carl F. Worms. 441-448 [doi]
- PsybOt malware: A step-by-step decompilation case studyLukás Durfina, Jakub Kroustek, Petr Zemek. 449-456 [doi]
- Reusing reused codeTomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto. 457-461 [doi]
- Specification extraction by symbolic executionJosef Pichler. 462-466 [doi]
- An IDE-based context-aware meta search engineMohammad Masudur Rahman, Shamima Yeasmin, Chanchal K. Roy. 467-471 [doi]
- An approach to clone detection in behavioural modelsElizabeth P. Antony, Manar H. Alalfi, James R. Cordy. 472-476 [doi]
- MemBrush: A practical tool to detect custom memory allocators in C binariesXi Chen, Asia Slowinska, Herbert Bos. 477-478 [doi]
- MemPick: A tool for data structure detectionIstván Haller, Asia Slowinska, Herbert Bos. 479-480 [doi]
- Gelato: GEneric language tools for model-driven analysis of legacy software systemsAmir Saeidi, Jurriaan Hage, Ravi Khadka, Slinger Jansen. 481-482 [doi]
- Extracting business rules from COBOL: A model-based toolValerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, Jacques Perronnet. 483-484 [doi]
- Detecting dependencies in Enterprise JavaBeans with SQuAVisiTAlexandru Sutii, Serguei A. Roubtsov, Alexander Serebrenik. 485-486 [doi]
- REdiffs: Refactoring-aware difference viewer for javaShinpei Hayashi, Sirinut Thangthumachit, Motoshi Saeki. 487-488 [doi]
- CCCD: Concolic code clone detectionDaniel E. Krutz, Emad Shihab. 489-490 [doi]
- 3rd workshop on Mining Unstructured DataAlberto Bacchelli, Nicolas Bettenburg, Latifa Guerrouj, Sonia Haiduc. 491-492 [doi]
- Workshop on open and original problems in software language engineeringAnya Helene Bagge, Vadim Zaytsev. 493-494 [doi]