Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICSM
ICSM 1994
Generate Citations
Proceedings International Conference on Software Maintenance
Sept. 19 1994 to Sept. 23 1994
Victoria, BC, Canada
Table of Contents
Software evolution in practice for the U.S. Department of Energy. Experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-436
by
Wilson
Software salvaging based on conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-433
by
Canfora
,
Cimitile
,
De Lucia
,
Di Lucca
Localization of design concepts in legacy systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-423
by
Kontogiannis
,
DiMori
,
Bernstein
,
Merlo
A precise method for identifying reusable abstract data types in code
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-413
by
Canfora
,
Cimitile
,
Tortorella
,
Munro
Software maintenance metrics: a case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-401
by
Pigoski
,
Nelson
Complexity metrics for rule-based expert systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-391
by
Zhisong Chen
,
Suen
Canonical modeling of software complexity and fault correction activity
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-381
by
Lanning
,
Khoshgoftaar
Programming through disciplined modification
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-371
by
Jacquot
Inter-module renaming and reorganizing: examples of program manipulation in-the-large
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-361
by
Ammann
,
Cameron
Extension of a transformation system for maintenance: dealing with data-intensive programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-353
by
Hongji Yang
,
Bennett
Domain-retargetable reverse engineering. II. Personalized user interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-342
by
Tilley
Domain analysis and reverse engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-335
by
DeBaud
,
Moopen
,
Rugaber
Reverse engineering requirements for process-control software
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-325
by
Hildreth
Software maintenance in Norway: a survey investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-313
by
Krogstie
,
Solvberg
Dimensions of software evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-303
by
Perry
Incremental process support for code reengineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-290
by
Heineman
,
Kaiser
Data-centered program understanding
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-281
by
Joiner
,
Tsai
,
Chen
,
Subramanian
,
Sun
,
Gandamaneni
Abstracting plan-like program information: a demonstration
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-271
by
Eng-Siong Tan
,
Dietz
An experiment on the effect of design recording on impact analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-259
by
Abbattista
,
Lanubile
,
Mastelloni
,
Visaggio
Semantic Diff: a tool for summarizing the effects of modifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-252
by
Jackson
,
Ladd
The impact analysis task in software maintenance: a model and a case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-242
by
Queille
,
Voidrot
,
Wilde
,
Munro
Reuse of modular software with automated comment analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-231
by
Matwin
,
Ahmad
Evolving software processes by tailoring the behavior of software objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-221
by
Belkhatir
,
Melo
Change impact identification in object oriented software maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-211
by
Kung
,
Gao
,
Hsia
,
Wen
,
Toyoshima
,
Chen
Design extraction by adiabatic multi-perspective abstraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-200
by
Khan
Enhancing code for readability and comprehension using SGML
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-190
by
Cowan
,
German
,
Lucena
,
von Staa
Understanding C programs using the Combined C Graph representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-180
by
Kinloch
,
Munro
An evaluation of the state of the art for application management
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-169
by
Boldyreff
,
Burd
,
Hather
Using software maintainability models to track code health
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-160
by
Ash
,
Alderete
,
Yao
,
Oman
,
Lowtber
Re-engineering legacy systems to meet quality requirements: an experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-153
by
Antonini
,
Canfora
,
Cimitile
Debugging practices for complex legacy software systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-143
by
Regelson
,
Anderson
Querying source code using an algebraic query language
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
Paul
,
Prakash
Substring matching for clone detection and change tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-126
by
Johnson
Issues in software process automation-from a practical perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-118
by
Cherinka
,
Overstreet
,
Cadwell
,
Ricci
Transferring re-engineering technology to a software development and maintenance organization: an experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-108
by
Solinger
,
Engberts
,
Ning
Combining static and dynamic analysis of concurrent programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-98
by
Anger
,
Rodriguez
,
Young
Inference of graphical AUIDL specifications for the reverse engineering of user interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-88
by
Merlo
,
Gagne
,
Thiboutot
Knowledge-based user interface migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-79
by
Moore
,
Rugaber
,
Seaver
Improving code churn predictions during the system test and maintenance phases
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-67
by
Khoshgoftaar
,
Szabo
Verification of results in software maintenance through external replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
Daly
,
Brooks
,
Miller
,
Roper
,
Wood
A change analysis process to characterize software maintenance projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-49
by
Briand
,
Basili
,
Yong-Mi Kim
,
Squier
Domain based regression testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-35
by
von Mayrhauser
,
Mraz
,
Walls
Selecting regression tests for object-oriented software
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-25
by
Rothermel
,
Harrold
A framework for partial data flow analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-13
by
Gupta
,
Soffa
Proceedings International Conference on Software Maintenance
Freely available from IEEE.
pp. 0_1-0_1
Showing 45 out of 45