default search action
19th WCRE 2012: Kingston, ON, Canada
- 19th Working Conference on Reverse Engineering, WCRE 2012, Kingston, ON, Canada, October 15-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4536-1
- Keith B. Gallagher, Cem Caner, Jenifer Deignan:
The Law and Reverse Engineering. 3-4 - Alberto Bacchelli, Nicolas Bettenburg, Latifa Guerrouj:
Workshop on Mining Unstructured Data (MUD) ... Because "Mining Unstructured Data is Like Fishing in Muddy Waters"! 5-6 - Andrew R. Bernat, Barton P. Miller:
Structured Binary Editing with a CFG Transformation Algebra. 9-18 - Marco Trudel, Carlo A. Furia, Martin Nordio, Bertrand Meyer, Manuel Oriol:
C to O-O Translation: Beyond the Easy Stuff. 19-28 - Frens Vonken, Andy Zaidman:
Refactoring with Unit Testing: A Match Made in Heaven? 29-38 - Joel Ossher, Hitesh Sajnani, Cristina Videira Lopes:
Astra: Bottom-up Construction of Structured Artifact Repositories. 41-50 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele:
Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler. 51-60 - Johannes Kinder:
Towards Static Analysis of Virtualization-Obfuscated Binaries. 61-70 - Andrea Capiluppi, Paolo Falcarin, Cornelia Boldyreff:
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations. 71-80 - Dan Han, Chenlei Zhang, Xiaochao Fan, Abram Hindle, Kenny Wong, Eleni Stroulia:
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs. 83-92 - Daniela Steidl, Benjamin Hummel, Elmar Jürgens:
Using Network Analysis for Recommendation of Central Software Classes. 93-102 - Latifa Guerrouj, Philippe Galinier, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Massimiliano Di Penta:
TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm. 103-112 - Janardan Misra, K. M. Annervaz, Vikrant S. Kaulgud, Shubhashis Sengupta, Gary Titus:
Software Clustering: Unifying Syntactic and Semantic Features. 113-122 - Steven Davies, Marc Roper, Murray Wood:
Using Bug Report Similarity to Enhance Bug Localisation. 125-134 - Soumaya Medini, Giuliano Antoniol, Yann-Gaël Guéhéneuc, Massimiliano Di Penta, Paolo Tonella:
SCAN: An Approach to Label and Relate Execution Trace Segments. 135-144 - Yinxing Xue, Zhenchang Xing, Stan Jarzabek:
Feature Location in a Collection of Product Variants. 145-154 - Celal Ziftci, Ingolf Krueger:
Feature Location Using Data Mining on Existing Test-Cases. 155-164 - Kunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa:
Execution Trace Abstraction Based on Meta Patterns Usage. 167-176 - Mona Erfani Joorabchi, Ali Mesbah:
Reverse Engineering iOS Mobile Applications. 177-186 - Tiago Espinha, Andy Zaidman, Hans-Gerhard Gross:
Understanding the Runtime Topology of Service-Oriented Systems. 187-196 - Anushri Jana, Ravindra Naik:
Precise Detection of Uninitialized Variables Using Dynamic Analysis - Extending to Aggregate and Vector Types. 197-201 - Ferdian Thung, David Lo, Lingxiao Jiang:
Automatic Defect Categorization. 205-214 - Yuan Tian, David Lo, Chengnian Sun:
Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction. 215-224 - Feng Zhang, Foutse Khomh, Ying Zou, Ahmed E. Hassan:
An Empirical Study on Factors Impacting Bug Fixing Time. 225-234 - Surafel Lemma Abebe, Venera Arnaoudova, Paolo Tonella, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
Can Lexicon Bad Smells Improve Fault Prediction? 235-244 - François Gauthier, Ettore Merlo:
Fast Detection of Access Control Vulnerabilities in PHP Applications. 247-256 - João Brunet, Roberto Almeida Bittencourt, Dalton Serey Guerrero, Jorge C. A. de Figueiredo:
On the Evolutionary Nature of Architectural Violations. 257-266 - Radu Vanciu, Marwan Abi-Antoun:
Ownership Object Graphs with Dataflow Edges. 267-276 - Simon Allier, Nicolas Anquetil, André C. Hora, Stéphane Ducasse:
A Framework to Compare Alert Ranking Algorithms. 277-285 - Cédric Teyton, Jean-Rémy Falleri, Xavier Blanc:
Mining Library Migration Graphs. 289-298 - Anthony Cleve, Jean-Luc Hainaut:
What Do Foreign Keys Actually Mean? 299-307 - Makoto Ichii, Tomoyuki Myojin, Yuichiroh Nakagawa, Masaki Chikahisa, Hideto Ogawa:
A Rule-based Automated Approach for Extracting Models from Source Code. 308-317 - Natalia Negara, Eleni Stroulia:
Automated Acceptance Testing of JavaScript Web Applications. 318-322 - Thierry Lavoie, Foutse Khomh, Ettore Merlo, Ying Zou:
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection. 325-334 - Jean-Marie Favre, Ralf Lämmel, Martin Leinberger, Thomas Schmorleiz, Andrei Varanovich:
Linking Documentation and Source Code in a Software Chrestomathy. 335-344 - Ghizlane El-Boussaidi, Alvine Boaye Belle, Stéphane Vaucher, Hafedh Mili:
Reconstructing Architectural Views from Legacy Systems. 345-354 - Armijn Hemel, Rainer Koschke:
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices. 357-366 - Nariman Ammar, Marwan Abi-Antoun:
Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks. 367-376 - Saleh M. Alnaeli, Abdulkareem Alali, Jonathan I. Maletic:
Empirically Examining the Parallelizability of Open Source Software System. 377-386 - Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Inter-Project Functional Clone Detection Toward Building Libraries - An Empirical Study on 13, 000 Projects. 387-391 - Chon Ju Kim, Phyllis G. Frankl:
AQUA: Android QUery Analyzer. 395-404 - Farouq Al-Omari, Iman Keivanloo, Chanchal K. Roy, Juergen Rilling:
Detecting Clones Across Microsoft .NET Programming Languages. 405-414 - Dawei Qi, William N. Sumner, Feng Qin, Mai Zheng, Xiangyu Zhang, Abhik Roychoudhury:
Modeling Software Execution Environment. 415-424 - Hakam W. Alomari, Michael L. Collard, Jonathan I. Maletic:
A Very Efficient and Scalable Forward Static Slicing Approach. 425-434 - Daniele Romano, Paulius Raila, Martin Pinzger, Foutse Khomh:
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes. 437-446 - Olga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey:
The Secret Life of Patches: A Firefox Case Study. 447-455 - Feng Zhang, Foutse Khomh, Ying Zou, Ahmed E. Hassan:
An Empirical Study of the Effect of File Editing Patterns on Software Quality. 456-465 - Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Esma Aïmeur:
SMURF: A SVM-based Incremental Anti-pattern Detection Approach. 466-475 - Oscar Chaparro, Jairo Aponte, Fernando Ortega, Andrian Marcus:
Towards the Automatic Extraction of Structural Business Rules from Legacy Databases. 479-488 - Miguel Garzón, Timothy C. Lethbridge:
Exploring How to Develop Transformations and Tools for Automated Umplification. 491-494 - Hamoud Aljamaan, Timothy C. Lethbridge:
Towards Tracing at the Model Level. 495-498 - Marco Trudel, Carlo A. Furia, Martin Nordio:
Automatic C to O-O Translation with C2Eiffel. 501-502 - Markus von Detten:
Archimetrix: A Tool for Deficiency-Aware Software Architecture Reconstruction. 503-504 - Brendan Cleary, Margaret-Anne D. Storey, Laura Chan, Martin Salois, Frédéric Painchaud:
ATLANTIS - Assembly Trace Analysis Environment. 505-506 - Elian Angius, René Witte:
OpenTrace: An Open Source Workbench for Automatic Software Traceability Link Recovery. 507-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.