Default Cover Image

11th Working Conference on Reverse Engineering

Nov. 8 2004 to Nov. 12 2004

Delft, The Netherlands

ISSN: 1095-1350

ISBN: 0-7695-2243-2

Table of Contents

Introduction
Message from the Program ChairsFreely available from IEEE.pp. viii
Keynotes
Model Engineering for Software ModernizationFreely available from IEEE.pp. 4-4
Industrial Experiences
Experiences with an Industrial Long-Term Reengineering ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 8-16
Industrial Experiences
Reengineering ReportsFull-text access may be available. Sign in or learn about subscription options.pp. 17-26
Industrial Experiences
Using a Decompiler for Real-World Source RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
Platform- and Language-Specific Re-engineering
Toward Seamless Migration of Java AWT-Based Applications to Personal Wireless DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 38-47
Platform- and Language-Specific Re-engineering
TUAnalyzer — Analyzing Templates in C++ CodeFull-text access may be available. Sign in or learn about subscription options.pp. 48-57
Platform- and Language-Specific Re-engineering
Updating Legacy Databases through Wrappers: Data Consistency ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 58-67
Visualization
A Novel Software Visualisation Model to Support Software ComprehensionFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Visualization
Exploring Software Evolution Using SpectrographsFull-text access may be available. Sign in or learn about subscription options.pp. 80-89
Visualization
A Reverse Engineering Approach to Support Software Maintenance: Version Control Knowledge ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 90-99
Visualization
Insights into System-Wide Code DuplicationFull-text access may be available. Sign in or learn about subscription options.pp. 100-109
Pattern Discovery (A)
Aspect Mining through the Formal Concept Analysis of Execution TracesFull-text access may be available. Sign in or learn about subscription options.pp. 112-121
Pattern Discovery (A)
Detecting Implicit Collaboration PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 122-131
Pattern Discovery (A)
Identifying Aspects Using Fan-In AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 132-141
Low-Level Transformations
Refactoring — Improving Coupling and Cohesion of Existing CodeFull-text access may be available. Sign in or learn about subscription options.pp. 144-151
Low-Level Transformations
Loop Squashing Transformations for Amorphous SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 152-160
Low-Level Transformations
Imposing order on program statements to assist anti-virus scannersFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Pattern Discovery (B)
Fingerprinting Design PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 172-181
Pattern Discovery (B)
XIRC: A Kernel for Cross-Artifact Information Engineering in Software Development EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 182-191
Pattern Discovery (B)
Quantifying the Quality of Object-Oriented Design: The Factor-Strategy ModelFull-text access may be available. Sign in or learn about subscription options.pp. 192-201
Extracting High-Level Information
CacOphoNy: Metamodel-Driven Architecture RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 204-213
Extracting High-Level Information
An Information Retrieval Approach to Concept Location in Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 214-223
Extracting High-Level Information
Model-Driven Business Process RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 224-233
Extracting High-Level Information
Combined Software and Hardware Comprehension in Reverse EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 234-243
Metrics-Based Methods
An Initial Approach to Assessing Program Comprehensibility Using Spatial Complexity, Number of Concepts and Typographical StyleFull-text access may be available. Sign in or learn about subscription options.pp. 246-255
Metrics-Based Methods
Slice-Based Cohesion Metrics and Software InterventionFull-text access may be available. Sign in or learn about subscription options.pp. 256-265
Metrics-Based Methods
The Efficiency of Specification FragmentsFull-text access may be available. Sign in or learn about subscription options.pp. 266-275
Clustering
The Small World of Software Reverse EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Clustering
A Framework for the Comparison of Nested Software DecompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 284-292
Showing 31 out of 31