default search action
18th WCRE 2011: Limerick, Ireland
- Martin Pinzger, Denys Poshyvanyk, Jim Buckley:
18th Working Conference on Reverse Engineering, WCRE 2011, Limerick, Ireland, October 17-20, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1948-6 - Yoshiki Higo, Yasushi Ueda, Minoru Nishino, Shinji Kusumoto:
Incremental Code Clone Detection: A PDG-based Approach. 3-12 - Md. Sharif Uddin, Chanchal K. Roy, Kevin A. Schneider, Abram Hindle:
On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems. 13-22 - Iman Keivanloo, Juergen Rilling, Philippe Charland:
Internet-scale Real-time Code Clone Search Via Multi-level Indexing. 23-27 - Yu Kashima, Yasuhiro Hayase, Norihiro Yoshida, Yuki Manabe, Katsuro Inoue:
An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS Projects. 28-32 - Xiaoran Wang, Lori L. Pollock, K. Vijay-Shanker:
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability. 35-44 - Nasir Ali, Yann-Gaël Guéhéneuc, Giuliano Antoniol:
Requirements Traceability for Object Oriented Systems by Partitioning Source Code. 45-54 - Amir Aryani, Fabrizio Perin, Mircea Lungu, Abdun Naser Mahmood, Oscar Nierstrasz:
Can We Predict Dependencies Using Domain information? 55-64 - Carmine Gravino, Michele Risi, Giuseppe Scanniello, Genoveffa Tortora:
Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments. 67-76 - Surafel Lemma Abebe, Paolo Tonella:
Towards the Extraction of Domain Concepts from the Identifiers. 77-86 - Scott Grant, James R. Cordy, David B. Skillicorn:
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code. 87-91 - Shaowei Wang, David Lo, Zhenchang Xing, Lingxiao Jiang:
Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel. 92-96 - Jan Nonnen, Daniel Speicher, Paul Imhoff:
Locating the Meaning of Terms in Source Code Research on "Term Introduction". 99-108 - Saman Bazrafshan, Rainer Koschke, Nils Göde:
Approximate Code Search in Program Histories. 109-118 - Shaowei Wang, David Lo, Lingxiao Jiang:
Code Search via Topic-Enriched Dependence Graph Matching. 119-123 - Matthew D. Beard, Nicholas A. Kraft, Letha H. Etzkorn, Stacy K. Lukins:
Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques. 124-128 - Daqing Hou, Xiaojia Yao:
Exploring the Intent behind API Evolution: A Case Study. 131-140 - Ralf Lämmel, Rufus Linke, Ekaterina Pek, Andrei Varanovich:
A Framework Profile of .NET. 141-150 - Minhaz F. Zibran, Farjana Z. Eishita, Chanchal K. Roy:
Useful, But Usable? Factors Affecting the Usability of APIs. 151-155 - Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Automatic Extraction of Secrets from Malware. 159-168 - João Antunes, Nuno Ferreira Neves, Paulo Veríssimo:
Reverse Engineering of Protocols from Network Traces. 169-178 - Bernhard J. Berger, Michaela Bunke, Karsten Sohr:
An Android Security Case Study with Bauhaus. 179-183 - Christoph Treude, Fernando Marques Figueira Filho, Margaret-Anne D. Storey, Martin Salois:
An Exploratory Study of Software Reverse Engineering in a Security Context. 184-188 - Gerardo Canfora, Michele Ceccarelli, Luigi Cerulo, Massimiliano Di Penta:
How Long Does a Bug Survive? An Empirical Study. 191-200 - Steven Davies, Marc Roper, Murray Wood:
A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of Bugs. 201-210 - Daryl Posnett, Abram Hindle, Premkumar T. Devanbu:
Got Issues? Do New Features and Code Improvements Affect Defects? 211-215 - Israel Herraiz, Emad Shihab, Thanh H. D. Nguyen, Ahmed E. Hassan:
Impact of Installation Counts on Perceived Quality: A Case Study on Debian. 219-228 - Tianmei Zhu, Yijian Wu, Xin Peng, Zhenchang Xing, Wenyun Zhao:
Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views. 229-238 - Yi Guo, Michael Würsch, Emanuel Giger, Harald C. Gall:
An Empirical Validation of the Benefits of Adhering to the Law of Demeter. 239-243 - Xi Tan, Xin Peng, Sen Pan, Wenyun Zhao:
Assessing Software Quality by Program Clustering and Defect Prediction. 244-248 - Bernhard Scholz, Rainer Koschke:
Object-Based Dynamic Protocol Recovery for Multi-Threading Programs. 251-260 - Foutse Khomh, Brian Chan, Ying Zou, Ahmed E. Hassan:
An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox. 261-270 - Andrzej Olszak, Martin Rytter, Bo Nørregaard Jørgensen:
Meta-Level Runtime Feature Awareness for Java. 271-274 - Andreas Fuhr, Tassilo Horn, Volker Riediger:
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code. 275-279 - Dominik Franke, Corinna Elsemann, Stefan Kowalewski, Carsten Weise:
Reverse Engineering of Mobile Application Lifecycles. 283-292 - Óscar Sánchez Ramón, Jesús Sánchez Cuadrado, Jesús García Molina:
Reverse Engineering of Event Handlers of RAD-Based Applications. 293-302 - Slawomir Duszynski, Jens Knodel, Martin Becker:
Analyzing the Source Code of Multiple Software Variants for Reuse Potential. 303-307 - Evelyn Nicole Haslinger, Roberto E. Lopez-Herrejon, Alexander Egyed:
Reverse Engineering Feature Models from Programs' Feature Sets. 308-312 - Sarah Nadi, Richard C. Holt:
Make it or Break it: Mining Anomalies from Linux Kbuild. 315-324 - Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Giuliano Antoniol:
An Exploratory Study of Macro Co-changes. 325-334 - Weiyi Shang, Zhen Ming Jiang, Bram Adams, Ahmed E. Hassan, Michael W. Godfrey, Mohamed N. Nasser, Parminder Flora:
An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems. 335-344 - Alexander Fokin, Egor Derevenetc, Alexander Chernov, Katerina Troshina:
SmartDec: Approaching C++ Decompilation. 347-356 - Alexander Sepp, Bogdan Mihaila, Axel Simon:
Precise Static Analysis of Binaries by Extracting Relational Information. 357-366 - Ming Ying, James Miller:
Refactoring Traditional Forms into Ajax-enabled Forms. 367-371 - Alessandro Murgia, Roberto Tonelli, Steve Counsell, Giulio Concas, Michele Marchesi:
An Empirical Study of Refactoring in the Context of FanIn and FanOut Coupling. 372-376 - Didi Surian, Nian Liu, David Lo, Hanghang Tong, Ee-Peng Lim, Christos Faloutsos:
Recommending People in Developers' Collaboration Network. 379-388 - Andy Kellens, Coen De Roover, Carlos Noguera, Reinout Stevens, Viviane Jonckers:
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions. 389-393 - Hani Abdeen, Stéphane Ducasse, Houari A. Sahraoui:
Modularization Metrics: Assessing Package Organization in Legacy Large Object-Oriented Software. 394-398 - Hitesh Sajnani, Ravindra Naik, Cristina Videira Lopes:
Application Architecture Discovery - Towards Domain-driven, Easily-Extensible Code Structure. 401-405 - Sava Mintchev:
Renovation by Machine-Assisted Program Transformation in Production Reporting and Integration. 406-410 - Nilam Kaushik, Ladan Tahvildari, Mark Moore:
Reconstructing Traceability between Bugs and Test Cases: An Experimental Study. 411-414 - Abdallah Qusef:
Recovering Test-to-Code Traceability Via Slicing and Conceptual Coupling. 417-420 - Oleksandr Panchenko:
In-Memory Database Support for Source Code Search and Analytics. 421-424 - Matthew D. Beard:
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques. 425-428 - Jason Raber:
Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space. 431-432 - Michelle Cheatham, Jason Raber:
Function Insight: Highlighting Suspicious Sections in Binary Run Traces. 433-434 - Andrzej Olszak, Bo Nørregaard Jørgensen:
Understanding Legacy Features with Featureous. 435-436 - Mihai Codoban, Cristina Marinescu, Radu Marinescu:
iProblems - An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects. 437-438 - Del Myers, Margaret-Anne D. Storey:
Focusing on Execution Traces Using Diver. 439-440 - Elvira Albert, Israel Cabanas, Antonio Flores-Montoya, Miguel Gómez-Zamalloa, Sergio Gutierrez:
jPET: An Automatic Test-Case Generator for Java. 441-442 - Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David W. Binkley:
SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter. 443-444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.