


default search action
12th WCRE 2005: Pittsburgh, PA, USA
- 12th Working Conference on Reverse Engineering, WCRE 2005, Pittsburgh, PA, USA, November 7-11, 2005. IEEE Computer Society 2005, ISBN 0-7695-2474-5

Introduction
- Message from the Program Chairs.

- Message from the General Chair: On the Meeting of Software Architecture and Reverse Engineering.

- Committees.

- Keynote Speakers.

Transformation and Symbolic Representation
- Deji Fatiregun, Mark Harman

, Robert M. Hierons
:
Search-Based Amorphous Slicing. 3-12 - Robert L. Akers, Ira D. Baxter, Michael Mehlich, Brian J. Ellis, Kenn R. Luecke:

Reengineering C++ Component Models via Automatic Program Transformation. 13-22 - Jacques Carette

, Pulak Kumar Chowdhury:
Symbolic Interpretation of Legacy Assembly Language. 23-32
Security
- Lei Wang, James R. Cordy, Thomas R. Dean:

Enhancing Security Using Legality Assertions. 35-44 - Sharath K. Udupa, Saumya K. Debray, Matias Madou:

Deobfuscation: Reverse Engineering Obfuscated Code. 45-54
Architecture Recovery
- Qingshan Li, Hua Chu, Shengming Hu, Ping Chen, Zhao Yun:

Architecture Recovery and Abstraction from the Perspective of Processes. 57-66 - Ahmed E. Hassan, Zhen Ming Jiang, Richard C. Holt:

Source versus Object Code Extraction for Recovering Software Architecture. 67-76
Clustering
- Bill Andreopoulos, Aijun An, Vassilios Tzerpos, Xiaogang Wang:

Multiple Layer Clustering of Large Software Systems. 79-88 - Andreas Christl, Rainer Koschke, Margaret-Anne D. Storey:

Equipping the Reflexion Method with Automated Clustering. 89-98 - Mircea Trifu, Volker Kuttruff:

Capturing Nontrivial Concerns in Object-Oriented Software. 99-108
Management and Applications
- Harry M. Sneed:

Estimating the Costs of a Reengineering Project. 111-119 - Jens Knodel, Isabel John

, Dharmalingam Ganesan, Martin Pinzger, Fernando Usero, José L. Arciniegas
, Claudio Riva:
Asset Recovery and Their Incorporation into Product Lines. 120-129
Analysis of Source Code Identifiers
- Adrian Kuhn, Stéphane Ducasse, Tudor Gîrba:

Enriching Reverse Engineering with Semantic Clustering. 133-142 - Sunghun Kim, Kai Pan, E. James Whitehead Jr.:

When Functions Change Their Names: Automatic Detection of Origin Relationships. 143-152
Reverse Engineering Object-Oriented Systems
- Adrian Trifu, Radu Marinescu:

Diagnosing Design Problems in Object Oriented Systems. 155-164 - Wei Wang, Vassilios Tzerpos:

Design Pattern Detection in Eiffel Systems. 165-174 - Andrew M. Sutton, Jonathan I. Maletic:

Mappings for Accurately Reverse Engineering UML Class Models from C++. 175-184
Representations and Schemas
- Andrew J. Malton, Richard C. Holt:

Boxology of NBA and TA: A Basis for Understanding Software Architecture. 187-195 - Nicholas A. Kraft, Brian A. Malloy, James F. Power

:
Toward an Infrastructure to Support Interoperability in Reverse Engineering. 196-205
Source Code Browsing
- Daniel L. Moise, Kenny Wong:

Extracting and Representing Cross-Language Dependencies in Diverse Software Systems. 209-218 - Steven Alexander Spoon, Olin Shivers:

Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages. 219-228
Workshops
- Bas Graaf, Liam O'Brien, Rafael Capilla

:
Reengineering towards Product Lines (R2PL 2005). 231 - Orla Greevy, Abdelwahab Hamou-Lhadj

, Andy Zaidman
:
Workshop on Program Comprehension through Dynamic Analysis (PCODA '05). 232 - Leon Moonen

, Spiros Mancoridis:
Workshop on Code Based Software Security Assessments (CoBaSSA 2005). 233 - Yijun Yu, John Mylopoulos, Yiqiao Wang, Sotirios Liaskos, Alexei Lapouchnian, Ying Zou, Martin Littou, Julio César Sampaio do Prado Leite

:
RETR: Reverse Engineering to Requirements. 234
Tutorials
- Philip Newcomb:

Architecture-Driven Modernization (ADM). 237 - Gerardo Canfora, Massimiliano Di Penta:

Architecting, Analyzing and Testing Service-Oriented Systems. 237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














