The Community for Technology Leaders
Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261) (1998)
Honolulu, Hawaii
Oct. 12, 1998 to Oct. 14, 1998
ISBN: 0-8186-8967-6
TABLE OF CONTENTS
Papers

Change and Adaptive Maintenance Detection in Java Software Systems (Abstract)

Derek Rayside , University of Waterloo
Scott Kerr , University of Waterloo
Kostas Kontogiannis , University of Waterloo
pp. 10

Evaluating Architectural Extractors (Abstract)

M.N. Armstrong , University of Waterloo
C. Trudeau , University of Waterloo
pp. 30

A Graph-Based Object Identification Process for Procedural Programs (Abstract)

Ramachenga R. Valasareddi , Louisiana State University
Doris L. Carver , Louisiana State University
pp. 50

Incremental Migration Strategies: Data Flow Analysis for Wrapping (Abstract)

Aniello Cimitile , University of Sannio
Andrea de Lucia , University of Sannio
Ugo de Carlini , University of Naples ?Federico II?
pp. 59

On the Knowledge Required to Understand a Program (Abstract)

Richard Clayton , Georgia Institute of Technology
Spencer Rugaber , Georgia Institute of Technology
Linda Wills , Georgia Institute of Technology
pp. 69

Managing Recovered Function and Structure of Legacy Software Components (Abstract)

Melissa P. Chase , The MITRE Corporation
Steven M. Christey , The MITRE Corporation
David R. Harris , The MITRE Corporation
Alexander S. Yeh , The MITRE Corporation
pp. 79

Native Patterns (Abstract)

Alex Sellink , University Amsterdam
Chris Verhoef , University Amsterdam
pp. 89

PACKRAT: A Software Reengineering Case Study (Abstract)

Gerald C. Gannod , Arizona State University
Gora Sudindranath , Michigan State University
Mark E. Fagnani , Michigan State University
Betty H.C. Cheng , Michigan State University
pp. 125

Program Comprehension in Multi-Language Systems (Abstract)

Bernt Kullbach , University of Koblenz-Landau
Andreas Winter , University of Koblenz-Landau
Peter Dahm , University of Koblenz-Landau
Jürgen Ebert , University of Koblenz-Landau
pp. 135

Requirements for Integrating Software Architecture and Reengineering Models: CORUM II (Abstract)

Rick Kazman , Carnegie Mellon University
Steven G. Woods , Carnegie Mellon University
S. Jeromy Carrière , Carnegie Mellon University
pp. 154

Requirements for Repository Software (Abstract)

Michael Blaha , OMT Associates Inc
David LaPlant , Johnson Controls Inc.
Erica Marvak , Johnson Controls Inc.
pp. 164

Reverse Engineering by Mining Dynamic Repositories (Abstract)

H. Dayani-Fard , IBM Toronto Lab
I. Jurisica , IBM Toronto Lab
pp. 174

On Reverse Engineering of Vendor Databases (Abstract)

Michael Blaha , OMT Associates Inc
pp. 183

ROMEO: Reverse Engineering from 00 Source Code to OMT Design (Abstract)

Lantzos Theodoros , Leeds Metropolitan University
Helen M. Edwards , Leeds Metropolitan University
Anthony Bryant , Sunderland University
Neil Willis , Sunderland University
pp. 191

Scalable Visualizations to Support Reverse Engineering: A Framework for Evaluation (Abstract)

James H. Cross Ii , Auburn University
T. Dean Hendrix , Auburn University
Larry A. Barowski , Auburn University
Karl S. Mathias , Auburn University
pp. 201

A Visual Representation Model for Software Subsystem Decomposition (Abstract)

Carlos Montes de Oca , Louisiana State University
Doris L. Carver , Louisiana State University
pp. 231

An Intermediate Representation for Reverse Engineering Analyses (Abstract)

R. Koschke , University of Stuttgart
J.-F. Girard , University of Stuttgart
M. Würthner , University of Stuttgart
pp. 241
Panel Position Papers

Reverse Engineering Research Should Target Cooperative Information System Requirements (Abstract)

Hausi A. Miller , University of Victoria
Kenny Wong , University of Victoria
Margaret-Anne Storey , University of Victoria
pp. 255

Author Index (PDF)

pp. 256
79 ms
(Ver 3.3 (11022016))