


default search action
19th WCRE 2012: Kingston, ON, Canada
- 19th Working Conference on Reverse Engineering, WCRE 2012, Kingston, ON, Canada, October 15-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4536-1

- Keith B. Gallagher

, Cem Caner, Jenifer Deignan:
The Law and Reverse Engineering. 3-4 - Alberto Bacchelli, Nicolas Bettenburg, Latifa Guerrouj:

Workshop on Mining Unstructured Data (MUD) ... Because "Mining Unstructured Data is Like Fishing in Muddy Waters"! 5-6 - Andrew R. Bernat, Barton P. Miller:

Structured Binary Editing with a CFG Transformation Algebra. 9-18 - Marco Trudel, Carlo A. Furia, Martin Nordio, Bertrand Meyer

, Manuel Oriol:
C to O-O Translation: Beyond the Easy Stuff. 19-28 - Frens Vonken, Andy Zaidman

:
Refactoring with Unit Testing: A Match Made in Heaven? 29-38 - Joel Ossher, Hitesh Sajnani, Cristina Videira Lopes:

Astra: Bottom-up Construction of Structured Artifact Repositories. 41-50 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele:

Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler. 51-60 - Johannes Kinder:

Towards Static Analysis of Virtualization-Obfuscated Binaries. 61-70 - Andrea Capiluppi

, Paolo Falcarin
, Cornelia Boldyreff:
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations. 71-80 - Dan Han, Chenlei Zhang, Xiaochao Fan, Abram Hindle, Kenny Wong, Eleni Stroulia

:
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs. 83-92 - Daniela Steidl, Benjamin Hummel, Elmar Jürgens:

Using Network Analysis for Recommendation of Central Software Classes. 93-102 - Latifa Guerrouj, Philippe Galinier, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Massimiliano Di Penta

:
TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm. 103-112 - Janardan Misra, K. M. Annervaz, Vikrant S. Kaulgud, Shubhashis Sengupta

, Gary Titus:
Software Clustering: Unifying Syntactic and Semantic Features. 113-122 - Steven Davies

, Marc Roper
, Murray Wood
:
Using Bug Report Similarity to Enhance Bug Localisation. 125-134 - Soumaya Medini, Giuliano Antoniol, Yann-Gaël Guéhéneuc, Massimiliano Di Penta

, Paolo Tonella
:
SCAN: An Approach to Label and Relate Execution Trace Segments. 135-144 - Yinxing Xue, Zhenchang Xing, Stan Jarzabek:

Feature Location in a Collection of Product Variants. 145-154 - Celal Ziftci, Ingolf Krueger:

Feature Location Using Data Mining on Existing Test-Cases. 155-164 - Kunihiro Noda, Takashi Kobayashi

, Kiyoshi Agusa:
Execution Trace Abstraction Based on Meta Patterns Usage. 167-176 - Mona Erfani Joorabchi, Ali Mesbah

:
Reverse Engineering iOS Mobile Applications. 177-186 - Tiago Espinha, Andy Zaidman

, Hans-Gerhard Gross:
Understanding the Runtime Topology of Service-Oriented Systems. 187-196 - Anushri Jana, Ravindra Naik:

Precise Detection of Uninitialized Variables Using Dynamic Analysis - Extending to Aggregate and Vector Types. 197-201 - Ferdian Thung, David Lo

, Lingxiao Jiang
:
Automatic Defect Categorization. 205-214 - Yuan Tian, David Lo

, Chengnian Sun:
Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction. 215-224 - Feng Zhang, Foutse Khomh, Ying Zou, Ahmed E. Hassan:

An Empirical Study on Factors Impacting Bug Fixing Time. 225-234 - Surafel Lemma Abebe

, Venera Arnaoudova, Paolo Tonella
, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
Can Lexicon Bad Smells Improve Fault Prediction? 235-244 - François Gauthier, Ettore Merlo:

Fast Detection of Access Control Vulnerabilities in PHP Applications. 247-256 - João Brunet, Roberto Almeida Bittencourt

, Dalton Serey Guerrero, Jorge C. A. de Figueiredo:
On the Evolutionary Nature of Architectural Violations. 257-266 - Radu Vanciu, Marwan Abi-Antoun:

Ownership Object Graphs with Dataflow Edges. 267-276 - Simon Allier, Nicolas Anquetil

, André C. Hora
, Stéphane Ducasse:
A Framework to Compare Alert Ranking Algorithms. 277-285 - Cédric Teyton, Jean-Rémy Falleri

, Xavier Blanc:
Mining Library Migration Graphs. 289-298 - Anthony Cleve, Jean-Luc Hainaut:

What Do Foreign Keys Actually Mean? 299-307 - Makoto Ichii, Tomoyuki Myojin, Yuichiroh Nakagawa, Masaki Chikahisa, Hideto Ogawa:

A Rule-based Automated Approach for Extracting Models from Source Code. 308-317 - Natalia Negara, Eleni Stroulia

:
Automated Acceptance Testing of JavaScript Web Applications. 318-322 - Thierry Lavoie, Foutse Khomh, Ettore Merlo, Ying Zou:

Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection. 325-334 - Jean-Marie Favre, Ralf Lämmel

, Martin Leinberger
, Thomas Schmorleiz, Andrei Varanovich:
Linking Documentation and Source Code in a Software Chrestomathy. 335-344 - Ghizlane El-Boussaidi, Alvine Boaye Belle, Stéphane Vaucher, Hafedh Mili:

Reconstructing Architectural Views from Legacy Systems. 345-354 - Armijn Hemel, Rainer Koschke:

Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices. 357-366 - Nariman Ammar, Marwan Abi-Antoun:

Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks. 367-376 - Saleh M. Alnaeli, Abdulkareem Alali, Jonathan I. Maletic:

Empirically Examining the Parallelizability of Open Source Software System. 377-386 - Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:

Inter-Project Functional Clone Detection Toward Building Libraries - An Empirical Study on 13, 000 Projects. 387-391 - Chon Ju Kim, Phyllis G. Frankl:

AQUA: Android QUery Analyzer. 395-404 - Farouq Al-Omari, Iman Keivanloo, Chanchal K. Roy, Juergen Rilling:

Detecting Clones Across Microsoft .NET Programming Languages. 405-414 - Dawei Qi, William N. Sumner

, Feng Qin, Mai Zheng, Xiangyu Zhang, Abhik Roychoudhury
:
Modeling Software Execution Environment. 415-424 - Hakam W. Alomari

, Michael L. Collard, Jonathan I. Maletic:
A Very Efficient and Scalable Forward Static Slicing Approach. 425-434 - Daniele Romano, Paulius Raila, Martin Pinzger, Foutse Khomh:

Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes. 437-446 - Olga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey:

The Secret Life of Patches: A Firefox Case Study. 447-455 - Feng Zhang, Foutse Khomh, Ying Zou, Ahmed E. Hassan:

An Empirical Study of the Effect of File Editing Patterns on Software Quality. 456-465 - Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabané, Yann-Gaël Guéhéneuc, Esma Aïmeur:

SMURF: A SVM-based Incremental Anti-pattern Detection Approach. 466-475 - Oscar Chaparro

, Jairo Aponte, Fernando Ortega, Andrian Marcus
:
Towards the Automatic Extraction of Structural Business Rules from Legacy Databases. 479-488 - Miguel Garzón, Timothy C. Lethbridge

:
Exploring How to Develop Transformations and Tools for Automated Umplification. 491-494 - Hamoud Aljamaan

, Timothy C. Lethbridge
:
Towards Tracing at the Model Level. 495-498 - Marco Trudel, Carlo A. Furia, Martin Nordio:

Automatic C to O-O Translation with C2Eiffel. 501-502 - Markus von Detten:

Archimetrix: A Tool for Deficiency-Aware Software Architecture Reconstruction. 503-504 - Brendan Cleary, Margaret-Anne D. Storey, Laura Chan, Martin Salois, Frédéric Painchaud:

ATLANTIS - Assembly Trace Analysis Environment. 505-506 - Elian Angius, René Witte:

OpenTrace: An Open Source Workbench for Automatic Software Traceability Link Recovery. 507-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














