Default Cover Image

Proceedings International Conference on Software Maintenance

Sept. 19 1994 to Sept. 23 1994

Victoria, BC, Canada

Table of Contents

Software evolution in practice for the U.S. Department of Energy. Experience reportFull-text access may be available. Sign in or learn about subscription options.pp. 434-436
Software salvaging based on conditionsFull-text access may be available. Sign in or learn about subscription options.pp. 424-433
Localization of design concepts in legacy systemsFull-text access may be available. Sign in or learn about subscription options.pp. 414-423
A precise method for identifying reusable abstract data types in codeFull-text access may be available. Sign in or learn about subscription options.pp. 404-413
Software maintenance metrics: a case studyFull-text access may be available. Sign in or learn about subscription options.pp. 392-401
Complexity metrics for rule-based expert systemsFull-text access may be available. Sign in or learn about subscription options.pp. 382-391
Canonical modeling of software complexity and fault correction activityFull-text access may be available. Sign in or learn about subscription options.pp. 374-381
Programming through disciplined modificationFull-text access may be available. Sign in or learn about subscription options.pp. 362-371
Inter-module renaming and reorganizing: examples of program manipulation in-the-largeFull-text access may be available. Sign in or learn about subscription options.pp. 354-361
Extension of a transformation system for maintenance: dealing with data-intensive programsFull-text access may be available. Sign in or learn about subscription options.pp. 344-353
Domain-retargetable reverse engineering. II. Personalized user interfacesFull-text access may be available. Sign in or learn about subscription options.pp. 336-342
Domain analysis and reverse engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 326-335
Reverse engineering requirements for process-control softwareFull-text access may be available. Sign in or learn about subscription options.pp. 316-325
Software maintenance in Norway: a survey investigationFull-text access may be available. Sign in or learn about subscription options.pp. 304-313
Dimensions of software evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 296-303
Incremental process support for code reengineeringFull-text access may be available. Sign in or learn about subscription options.pp. 282-290
Data-centered program understandingFull-text access may be available. Sign in or learn about subscription options.pp. 272-281
Abstracting plan-like program information: a demonstrationFull-text access may be available. Sign in or learn about subscription options.pp. 262-271
An experiment on the effect of design recording on impact analysisFull-text access may be available. Sign in or learn about subscription options.pp. 253-259
Semantic Diff: a tool for summarizing the effects of modificationsFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
The impact analysis task in software maintenance: a model and a case studyFull-text access may be available. Sign in or learn about subscription options.pp. 234-242
Reuse of modular software with automated comment analysisFull-text access may be available. Sign in or learn about subscription options.pp. 222-231
Evolving software processes by tailoring the behavior of software objectsFull-text access may be available. Sign in or learn about subscription options.pp. 212-221
Change impact identification in object oriented software maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 202-211
Design extraction by adiabatic multi-perspective abstractionFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Enhancing code for readability and comprehension using SGMLFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Understanding C programs using the Combined C Graph representationFull-text access may be available. Sign in or learn about subscription options.pp. 172-180
An evaluation of the state of the art for application managementFull-text access may be available. Sign in or learn about subscription options.pp. 161-169
Using software maintainability models to track code healthFull-text access may be available. Sign in or learn about subscription options.pp. 154-160
Re-engineering legacy systems to meet quality requirements: an experience reportFull-text access may be available. Sign in or learn about subscription options.pp. 146-153
Debugging practices for complex legacy software systemsFull-text access may be available. Sign in or learn about subscription options.pp. 137-143
Querying source code using an algebraic query languageFull-text access may be available. Sign in or learn about subscription options.pp. 127-136
Substring matching for clone detection and change trackingFull-text access may be available. Sign in or learn about subscription options.pp. 120-126
Issues in software process automation-from a practical perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 109-118
Transferring re-engineering technology to a software development and maintenance organization: an experience reportFull-text access may be available. Sign in or learn about subscription options.pp. 100-108
Combining static and dynamic analysis of concurrent programsFull-text access may be available. Sign in or learn about subscription options.pp. 89-98
Inference of graphical AUIDL specifications for the reverse engineering of user interfacesFull-text access may be available. Sign in or learn about subscription options.pp. 80-88
Knowledge-based user interface migrationFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
Improving code churn predictions during the system test and maintenance phasesFull-text access may be available. Sign in or learn about subscription options.pp. 58-67
Verification of results in software maintenance through external replicationFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
A change analysis process to characterize software maintenance projectsFull-text access may be available. Sign in or learn about subscription options.pp. 38-49
Domain based regression testingFull-text access may be available. Sign in or learn about subscription options.pp. 26-35
Selecting regression tests for object-oriented softwareFull-text access may be available. Sign in or learn about subscription options.pp. 14-25
A framework for partial data flow analysisFull-text access may be available. Sign in or learn about subscription options.pp. 4-13
Showing 45 out of 45