Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
WCRE
WCRE 2009
Generate Citations
2009 16th Working Conference on Reverse Engineering
Oct. 13 2009 to Oct. 16 2009
Lille
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-viii
Papers
Steering Committee
Freely available from IEEE.
pp. xiii
Papers
Program Committee
Freely available from IEEE.
pp. xiv
Papers
Additional reviewers
Freely available from IEEE.
pp. xv
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the General Chair
Freely available from IEEE.
pp. ix
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. x-xi
Papers
Organizing Committee
Freely available from IEEE.
pp. xii
Papers
Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-3
by
Margaret-Anne D. Storey
Papers
Legacy and Future of Data Reverse Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 4
by
Jean-Luc Hainaut
Papers
Ten Years Later, Experiments with Clustering as a Software Remodularization Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 7
by
Nicolas Anquetil
,
Timothy C. Lethbridge
Papers
Who are Source Code Contributors and How do they Change?
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Massimiliano Di Penta
,
Daniel M. German
Papers
A Study of the Time Dependence of Code Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Omar Alam
,
Bram Adams
,
Ahmed E. Hassan
Papers
Relating Identifier Naming Flaws and Code Quality: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-35
by
Simon Butler
,
Michel Wermelinger
,
Yijun Yu
,
Helen Sharp
Papers
Techniques for Identifying the Country Origin of Mailing List Participants
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-40
by
Ran Tang
,
Ahmed E. Hassan
,
Ying Zou
Papers
NTrace: Function Boundary Tracing for Windows on IA-32
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-52
by
Johannes Passing
,
Alexander Schmidt
,
Martin von Löwis
,
Andreas Polze
Papers
Recovering Views of Inter-System Interaction Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-61
by
Christopher Ackermann
,
Mikael Lindvall
,
Rance Cleaveland
Papers
Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-71
by
David Lo
,
Ganesan Ramalingam
,
Venkatesh Prasad Ranganath
,
Kapil Vaswani
Papers
An Exploratory Study of the Impact of Code Smells on Software Change-proneness
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-84
by
Foutse Khomh
,
Massimiliano Di Penta
,
Yann-Gaël Guéhéneuc
Papers
An Empirical Study on Inconsistent Changes to Code Clones at Release Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-94
by
Nicolas Bettenburg
,
Weyi Shang
,
Walid Ibrahim
,
Bram Adams
,
Ying Zou
,
Ahmed E. Hassan
Papers
Lexicon Bad Smells in Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Surafel Lemma Abebe
,
Sonia Haiduc
,
Paolo Tonella
,
Andrian Marcus
Papers
Automatic Package Coupling and Cycle Minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Hani Abdeen
,
Stéphane Ducasse
,
Houari Sahraoui
,
Ilham Alloui
Papers
Identifying Cycle Causes with Enriched Dependency Structural Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Jannik Laval
,
Simon Denier
,
Stéphane Ducasse
,
Alexandre Bergel
Papers
The Logical Modularity of Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Daniel Ratiu
,
Radu Marinescu
,
Jan Jürjens
Papers
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-132
by
Ricardo Pérez-Castillo
,
Ignacio García-Rodríguez de Guzmán
,
Orlando Ávila-García
,
Mario Piattini
Papers
On the Relationship Between Change Coupling and Software Defects
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-144
by
Marco D'Ambros
,
Michele Lanza
,
Romain Robbes
Papers
Tracking Design Smells: Lessons from a Study of God Classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-154
by
Stéphane Vaucher
,
Foutse Khomh
,
Naouel Moha
,
Yann-Gaël Guéhéneuc
Papers
Bug-Inducing Language Constructs
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-159
by
Javed Ferzund
,
Syed Nadeem Ahsan
,
Franz Wotawa
Papers
Design Patterns and Change Proneness: A Replication Using Proprietary C# Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Matt Gatrell
,
Steve Counsell
,
Tracy Hall
Papers
Automatic Static Unpacking of Malware Binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-176
by
Kevin Coogan
,
Saumya Debray
,
Tasneem Kaochar
,
Gregg Townsend
Papers
Computing the Structural Difference between State-Based Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-186
by
Kirill Bogdanov
,
Neil Walkinshaw
Papers
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-191
by
Dominic Letarte
,
Ettore Merlo
Papers
Traceability Recovery Using Numerical Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-204
by
Giovanni Capobianco
,
Andrea De Lucia
,
Rocco Oliveto
,
Annibale Panichella
,
Sebastiano Panichella
Papers
Benchmarking Lightweight Techniques to Link E-Mails and Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-214
by
Alberto Bacchelli
,
Marco D'Ambros
,
Michele Lanza
,
Romain Robbes
Papers
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-224
by
Yiming Yang
,
Xin Peng
,
Wenyun Zhao
Papers
Characterizing Evolutionary Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-236
by
Adam Vanya
,
Steven Klusener
,
Nico van Rooijen
,
Hans van Vliet
Papers
Autumn Leaves: Curing the Window Plague in IDEs
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-246
by
David Roethlisberger
,
Oscar Nierstrasz
,
Stéphane Ducasse
Papers
Constructing a Resource Usage View of a Large and Complex Software-Intensive System
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-255
by
Trosky Boris Callo Arias
,
Pierre America
,
Paris Avgeriou
Papers
Static Detection of Disassembly Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-268
by
Nithya Krishnamoorthy
,
Saumya Debray
,
Keith Fligg
Papers
Reverse Engineering Sequence Diagrams for Enterprise JavaBeans with Business Method Interceptors
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Alexander Serebrenik
,
Serguei Roubtsov
,
Ella Roubtsova
,
Mark van den Brand
Papers
[Roster]
Freely available from IEEE.
pp. 330
Papers
Computing Structural Types of Clone Syntactic Blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-278
by
Ettore Merlo
,
Thierry Lavoie
Papers
Reverse Engineering Existing Web Service Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-283
by
Houda El Bouhissi
,
Mimoun Malki
Papers
Supporting Feature-Level Software Maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-290
by
Meghan Revelle
Papers
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-294
by
Fabrizio Perin
Papers
Approximate Graph Matching in Software Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-298
by
Sègla Kpodjedo
Papers
Evolving Software Systems Towards Adaptability
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-302
by
Mehdi Amoui
Papers
SQUAD: Software Quality Understanding through the Analysis of Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-306
by
Foutse Khomh
Papers
PRECISO: A Reverse Engineering Tool to Discover Web Services from Relational Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-310
by
Ricardo Pérez-Castillo
,
Ignacio García-Rodríguez de Guzmán
,
Ismael Caballero
,
Macario Polo
,
Mario Piattini
Papers
Recovering Class Models Stereotyped with Crosscutting Concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-312
by
Heitor Augustus Xavier Costa
,
Paulo Afonso Parreira Júnior
,
Valter Vieira de Camargo
,
Rosângela Aparecida Dellosso Penteado
Papers
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-314
by
Shinji Kawaguchi
,
Takanobu Yamashina
,
Hidetake Uwano
,
Kyohei Fushida
,
Yasutaka Kamei
,
Masataka Nagura
,
Hajimu Iida
Papers
Enhancing Quality of Code Clone Detection with Program Dependency Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-316
by
Yoshiki Higo
,
Shinji Kusumoto
Papers
JavaCompExt: Extracting Architectural Elements from Java Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-318
by
Nicolas Anquetil
,
Jean-Claude Royer
,
Pascal André
,
Gilles Ardourel
,
Petr Hnetynka
,
Tomáš Poch
,
Dragos Petrascu
,
Vladiela Petrascu
Papers
ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-320
by
Mario Luca Bernardi
,
Giuseppe Antonio Di Lucca
Papers
R.E.M. 2009 - International Workshop on Reverse Engineering Models from Software Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-324
by
Leon Moonen
,
Tarja Systä
Papers
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-326
by
Simon Denier
,
Tudor Gîrba
Papers
Author Index
Freely available from IEEE.
pp. 327-328
Showing 59 out of 59