Default Cover Image

2009 16th Working Conference on Reverse Engineering

Oct. 13 2009 to Oct. 16 2009

Lille

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-viii
Papers
Steering CommitteeFreely available from IEEE.pp. xiii
Papers
Program CommitteeFreely available from IEEE.pp. xiv
Papers
Additional reviewersFreely available from IEEE.pp. xv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the General ChairFreely available from IEEE.pp. ix
Papers
Message from the Program ChairsFreely available from IEEE.pp. x-xi
Papers
Organizing CommitteeFreely available from IEEE.pp. xii
Papers
Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 3-3
Papers
Legacy and Future of Data Reverse EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 4
Papers
Ten Years Later, Experiments with Clustering as a Software Remodularization MethodFull-text access may be available. Sign in or learn about subscription options.pp. 7
Papers
Who are Source Code Contributors and How do they Change?Full-text access may be available. Sign in or learn about subscription options.pp. 11-20
Papers
A Study of the Time Dependence of Code ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Relating Identifier Naming Flaws and Code Quality: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 31-35
Papers
Techniques for Identifying the Country Origin of Mailing List ParticipantsFull-text access may be available. Sign in or learn about subscription options.pp. 36-40
Papers
NTrace: Function Boundary Tracing for Windows on IA-32Full-text access may be available. Sign in or learn about subscription options.pp. 43-52
Papers
Recovering Views of Inter-System Interaction BehaviorsFull-text access may be available. Sign in or learn about subscription options.pp. 53-61
Papers
Mining Quantified Temporal Rules: Formalism, Algorithms, and EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Papers
An Exploratory Study of the Impact of Code Smells on Software Change-pronenessFull-text access may be available. Sign in or learn about subscription options.pp. 75-84
Papers
An Empirical Study on Inconsistent Changes to Code Clones at Release LevelFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
Papers
Lexicon Bad Smells in SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
Papers
Automatic Package Coupling and Cycle MinimizationFull-text access may be available. Sign in or learn about subscription options.pp. 103-112
Papers
Identifying Cycle Causes with Enriched Dependency Structural MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Papers
The Logical Modularity of ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 123-127
Papers
On the Relationship Between Change Coupling and Software DefectsFull-text access may be available. Sign in or learn about subscription options.pp. 135-144
Papers
Tracking Design Smells: Lessons from a Study of God ClassesFull-text access may be available. Sign in or learn about subscription options.pp. 145-154
Papers
Bug-Inducing Language ConstructsFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Papers
Design Patterns and Change Proneness: A Replication Using Proprietary C# SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Automatic Static Unpacking of Malware BinariesFull-text access may be available. Sign in or learn about subscription options.pp. 167-176
Papers
Computing the Structural Difference between State-Based ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 177-186
Papers
Extraction of Inter-procedural Simple Role Privilege Models from PHP CodeFull-text access may be available. Sign in or learn about subscription options.pp. 187-191
Papers
Traceability Recovery Using Numerical AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 195-204
Papers
Benchmarking Lightweight Techniques to Link E-Mails and Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 205-214
Papers
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 215-224
Papers
Characterizing Evolutionary ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 227-236
Papers
Autumn Leaves: Curing the Window Plague in IDEsFull-text access may be available. Sign in or learn about subscription options.pp. 237-246
Papers
Constructing a Resource Usage View of a Large and Complex Software-Intensive SystemFull-text access may be available. Sign in or learn about subscription options.pp. 247-255
Papers
Static Detection of Disassembly ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 259-268
Papers
[Roster]Freely available from IEEE.pp. 330
Papers
Computing Structural Types of Clone Syntactic BlocksFull-text access may be available. Sign in or learn about subscription options.pp. 274-278
Papers
Reverse Engineering Existing Web Service ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 279-283
Papers
Supporting Feature-Level Software MaintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 287-290
Papers
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 291-294
Papers
Approximate Graph Matching in Software EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 295-298
Papers
Evolving Software Systems Towards AdaptabilityFull-text access may be available. Sign in or learn about subscription options.pp. 299-302
Papers
SQUAD: Software Quality Understanding through the Analysis of DesignFull-text access may be available. Sign in or learn about subscription options.pp. 303-306
Papers
SHINOBI: A Tool for Automatic Code Clone Detection in the IDEFull-text access may be available. Sign in or learn about subscription options.pp. 313-314
Papers
Enhancing Quality of Code Clone Detection with Program Dependency GraphFull-text access may be available. Sign in or learn about subscription options.pp. 315-316
Papers
R.E.M. 2009 - International Workshop on Reverse Engineering Models from Software ArtifactsFull-text access may be available. Sign in or learn about subscription options.pp. 323-324
Papers
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software ReengineeringFull-text access may be available. Sign in or learn about subscription options.pp. 325-326
Papers
Author IndexFreely available from IEEE.pp. 327-328
Showing 59 out of 59