


default search action
17th WCRE 2010: Beverly, MA, USA
- Giuliano Antoniol, Martin Pinzger, Elliot J. Chikofsky:

17th Working Conference on Reverse Engineering, WCRE 2010, 13-16 October 2010, Beverly, MA, USA. IEEE Computer Society 2010, ISBN 978-0-7695-4123-5
Mining Software Repositories I
- Dawn J. Lawrie

, David W. Binkley, Christopher Morrell:
Normalizing Source Code Vocabulary. 3-12 - Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, Bram Adams

, Ahmed E. Hassan, Ying Zou:
Studying the Impact of Clones on Software Defects. 13-21 - Angela Lozano, Andy Kellens, Kim Mens

, Gabriela Arévalo:
Mining Source Code for Structural Regularities. 22-31
Program Comprehension
- Sonia Haiduc, Jairo Aponte, Laura Moreno, Andrian Marcus

:
On the Use of Automated Text Summarization Techniques for Summarizing Source Code. 35-44 - Ana L. Milanova, Yin Liu:

Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs. 45-54 - Verónica Uquillas Gómez, Stéphane Ducasse, Theo D'Hondt:

Visually Supporting Source Code Changes Integration: The Torch Dashboard. 55-64
Dynamic Analysis
- Michaela Greiler, Hans-Gerhard Groß, Arie van Deursen

:
Understanding Plug-in Test Suites from an Extensibility Perspective. 67-76 - Michael Perscheid, Bastian Steinert, Robert Hirschfeld, Felix Geller, Michael Haupt:

Immediacy through Interactivity: Online Analysis of Run-time Behavior. 77-86 - Hassen Grati, Houari A. Sahraoui, Pierre Poulin:

Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization. 87-96
Software Evoluation
- Fabian Beck, Stephan Diehl

:
Evaluating the Impact of Software Evolution on Software Clustering. 99-108 - Yinxing Xue, Zhenchang Xing, Stan Jarzabek:

Understanding Feature Evolution in a Family of Product Variants. 109-118 - Huzefa H. Kagdi, Malcom Gethers, Denys Poshyvanyk

, Michael L. Collard:
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code. 119-128
Reverse Engineering and Security
- Saumya K. Debray, Jay Patel:

Reverse Engineering Self-Modifying Code: Unpacker Extraction. 131-140 - Sunny Wong, Melissa Aaron, Jeffrey Segall, Kevin Lynch, Spiros Mancoridis:

Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software. 141-149 - Gengbiao Chen, Zhuo Wang, Ruoyu Zhang, Kan Zhou, Shiqiu Huang, Kangqi Ni, Zhengwei Qi, Kai Chen, Haibing Guan:

A Refined Decompiler to Generate C Code with High Readability. 150-154 - Filippo Ricca, Alessandro Marchetto

:
Heroes in FLOSS Projects: An Explorative Study. 155-159
Architecture Recovery
- Roberto Almeida Bittencourt

, Gustavo Jansen de Souza Santos, Dalton Dario Serey Guerrero, Gail C. Murphy:
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques. 163-172 - Dharmalingam Ganesan, Mikael Lindvall, Lamont Ruley, Robert Wiegand, Vuong Ly, Tina Tsui:

Architectural Analysis of Systems Based on the Publisher-Subscriber Style. 173-182 - Andreas Marx, Fabian Beck

, Stephan Diehl
:
Computer-Aided Extraction of Software Components. 183-192
Remodularization and Reengineering
- Gabriele Bavota

, Andrea De Lucia
, Andrian Marcus
, Rocco Oliveto:
Software Re-Modularization Based on Structural and Semantic Metrics. 195-204 - Chandan Raj Rupakheti, Daqing Hou:

An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java. 205-214 - Michael Athanasopoulos, Kostas Kontogiannis:

Identification of REST-like Resources from Legacy Service Descriptions. 215-219 - Timothy C. Lethbridge

, Andrew Forward, Omar Bahy Badreddin:
Umplification: Refactoring to Incrementally Add Abstraction to a Program. 220-224
Code Clone Detection
- Gehan M. K. Selim, King Chun Foo, Ying Zou:

Enhancing Source-Based Clone Detection Using Intermediate Representation. 227-236 - Benjamin Biegel, Stephan Diehl

:
Highly Configurable and Extensible Code Clone Detection. 237-241 - Ian J. Davis, Michael W. Godfrey:

From Whence It Came: Detecting Source Code Clones by Analyzing Assembler. 242-246
Mining Software Repositories 2
- Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams

, Ahmed E. Hassan, Ken-ichi Matsumoto:
Predicting Re-opened Bugs: A Case Study on the Eclipse Project. 249-258 - Thanh H. D. Nguyen, Bram Adams

, Ahmed E. Hassan:
A Case Study of Bias in Bug-Fix Datasets. 259-268 - Didi Surian

, David Lo
, Ee-Peng Lim
:
Mining Collaboration Patterns from a Large Developer Network. 269-273
Workshop
- Nicolas Bettenburg, Bram Adams

:
Workshop on Mining Unstructured Data (MUD) because "Mining Unstructured Data is Like Fishing in Muddy Waters"! 277-278 - Abdelwahab Hamou-Lhadj

, David Röthlisberger, Andy Zaidman
, Orla Greevy:
Workshop on Program Comprehension through Dynamic Analysis (PCODA10). 279-280 - Mira Kajko-Mattsson, Alain April:

International Workshop on Processes for Software Evolution and Maintenance (WoSEMP 2010). 281-282
Doctoral Symposium
- Venera Arnaoudova:

Improving Source Code Quality through the Definition of Linguistic Antipatterns. 285-288 - Roberto Almeida Bittencourt

:
Conformance Checking during Software Evolution. 289-292 - Ferdaous Boughanmi:

Multi-Language and Heterogeneously-licensed Software Analysis. 293-296 - Laleh Mousavi Eshkevari:

Linguistic Driven Refactoring of Source Code Identifiers. 297-300 - Latifa Guerrouj:

Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers. 301-304 - Abram Hindle:

Software Process Recovery: Recovering Process from Artifacts. 305-308 - Aminata Sabané:

Improving System Testability and Testing with Microarchitectures. 309-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














