default search action
3rd WCRE 1996: Monterey, CA, USA
- 3rd Working Conference on Reverse Engineering, WCRE '96, Monterey, CA, USA, November 8-10, 1996. IEEE Computer Society 1996, ISBN 0-8186-7674-4
Experiments with Large Systems
- James M. Neighbors:
Finding Reusable Software Components in Large Systems. 2-10 - Bruce A. Lewis, David J. McConnell:
Reengineering Real-Time Embedded Software onto a Parallel Processing Platform. 11-
Experiments for Evaluation
- Steven Woods, Alex Quilici:
Some Experiments Toward Understanding How Program Plan Recognition Algorithms Scale. 21-30 - Margaret-Anne D. Storey, Kenny Wong, P. Fong, D. Hooper, K. Hopkins, Hausi A. Müller:
On Designing an Experiment to Evaluate a Reverse Engineering Tool. 31-
User Interface Migration
- Melody M. Moore:
Rule-Based Detection for Reverse Engineering User Interfaces. 42-
Reverse Engineering Binary and Assembler Code
- Cristina Cifuentes:
Partial Automation of an Integrated Reverse Engineering Environment of Binary Code. 50-56 - Paul H. Morris, Robert E. Filman:
Mandrake: A Tool for Reverse-Engineering IBM Assembly Code. 57-66 - Tom Lake, Tim Blanchard:
Reverse Engineering of Assembler Programs: A Model-Based Approach and its Logical Basis. 67-75 - Susan N. Roberts, Richard L. Piazza, D. G. Katz:
A Portable Assembler Reverse Engineering Environment (PARE). 76-
Object Model Transformation
- Michael R. Blaha, William J. Premerlani:
A Catalog of Object Model Transformations. 87-
Reengineering Infrastructure
- Spencer Rugaber, Linda M. Wills:
Creating a Research Infrastructure for Reengineering. 98-
Wrapping
- Harry M. Sneed:
Encapsulating Legacy Software for Use in Client/Server Systems. 104-
Data Reverse Engineering
- Andrew J. McAllister:
Reverse Engineering a Medical Database. 121-130 - Jean-Luc Hainaut, Jean Henrard, Didier Roland, Vincent Englebert, Jean-Marc Hick:
Structure Elicitation in Database Reverse Engineering. 131-140 - Kathi Hogshead Davis:
Combining a Flexible Data Model and Phase Schema Translation in Data Model Reverse Engineering. 141-
Visualizing Recovered Architectures
- Melissa P. Chase, David R. Harris, Susan N. Roberts, Alexander S. Yeh:
Analysis and Presentation of Recovered Software Architectures. 153-162 - Richard C. Holt, J. Y. Pak:
GASE: visualizing Software Evolution-in-the-Large. 163-
Recovering Objects
- Harry M. Sneed:
Object-Oriented Cobol Recycling. 169-178 - Rosângela A. D. Penteado, Fernão Stella R. Germano, Paulo César Masiero:
An Overall Process Based on Fusion to Reverse Engineer Legacy Code. 179-188 - Elizabeth Burd, Malcolm Munro, Clazien D. Wezeman:
Extracting Reusable Modules from Legacy Code: Considering the Issues of Module Granularity. 189-
Recognition
- Paolo Tonella, Roberto Fiutem, Giuliano Antoniol, Ettore Merlo:
Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study. 198-207 - Christian Krämer, Lutz Prechelt:
Design Recovery by Automated Search for Structural Design Patterns in Object-Oriented Softwar. 208-
Domain-Oriented Recovery
- Jean-Marc DeBaud:
Lessons from a Domain-Based Reengineering Effort. 217-226 - John M. Gravley, Arun Lakhotia:
Identifying Enumeration Types Modeled with Symbolic Constants. 227-
Addendum: Papers Reprinted from ICSM '96
Reverse Engineering I
- E. J. Younger, Z. Luo, Keith H. Bennett, Tim M. Bull:
Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis. 239-248 - Gerald C. Gannod, Betty H. C. Cheng:
Using Informal and Formal Techniques for the Reverse Engineering of C Programs. 249-258 - Salwa K. Abd-El-Hafiz:
Evaluation of a Knowledge-Based Approach to Program Understanding. 259-
Reverse Engineering II
- Norman Wilde, Christopher Casey:
Early Field Experience with the Software Recounaissance Technique for Program Comprehension. 270-276 - Roberto Fiutem, Paolo Tonella, Giuliano Antoniol, Ettore Merlo:
A Cliche-Based Environment to Support Architectural Reverse Engineering. 277-286 - Jean-Marie Favre:
Preprocessors from an Abstract Point of View. 287-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.