The Community for Technology Leaders
2013 20th Working Conference on Reverse Engineering (WCRE) (1998)
Honolulu, Hawaii
Oct. 12, 1998 to Oct. 14, 1998
ISBN: 0-8186-8967-6

Change and Adaptive Maintenance Detection in Java Software Systems (Abstract)

Scott Kerr , University of Waterloo
Derek Rayside , University of Waterloo
Kostas Kontogiannis , University of Waterloo
pp. 10

Evaluating Architectural Extractors (Abstract)

C. Trudeau , University of Waterloo
M.N. Armstrong , University of Waterloo
pp. 30

A Graph-Based Object Identification Process for Procedural Programs (Abstract)

Ramachenga R. Valasareddi , Louisiana State University
Doris L. Carver , Louisiana State University
pp. 50

Incremental Migration Strategies: Data Flow Analysis for Wrapping (Abstract)

Andrea de Lucia , University of Sannio
Ugo de Carlini , University of Naples ?Federico II?
Aniello Cimitile , University of Sannio
pp. 59

On the Knowledge Required to Understand a Program (Abstract)

Spencer Rugaber , Georgia Institute of Technology
Linda Wills , Georgia Institute of Technology
Richard Clayton , Georgia Institute of Technology
pp. 69

Managing Recovered Function and Structure of Legacy Software Components (Abstract)

Alexander S. Yeh , The MITRE Corporation
David R. Harris , The MITRE Corporation
Steven M. Christey , The MITRE Corporation
Melissa P. Chase , The MITRE Corporation
pp. 79

Native Patterns (Abstract)

Alex Sellink , University Amsterdam
Chris Verhoef , University Amsterdam
pp. 89

PACKRAT: A Software Reengineering Case Study (Abstract)

Betty H.C. Cheng , Michigan State University
Gora Sudindranath , Michigan State University
Gerald C. Gannod , Arizona State University
Mark E. Fagnani , Michigan State University
pp. 125

Program Comprehension in Multi-Language Systems (Abstract)

Jürgen Ebert , University of Koblenz-Landau
Bernt Kullbach , University of Koblenz-Landau
Andreas Winter , University of Koblenz-Landau
Peter Dahm , University of Koblenz-Landau
pp. 135

Requirements for Integrating Software Architecture and Reengineering Models: CORUM II (Abstract)

Rick Kazman , Carnegie Mellon University
Steven G. Woods , Carnegie Mellon University
S. Jeromy Carrière , Carnegie Mellon University
pp. 154

Requirements for Repository Software (Abstract)

Erica Marvak , Johnson Controls Inc.
Michael Blaha , OMT Associates Inc
David LaPlant , Johnson Controls Inc.
pp. 164

Reverse Engineering by Mining Dynamic Repositories (Abstract)

I. Jurisica , IBM Toronto Lab
H. Dayani-Fard , IBM Toronto Lab
pp. 174

On Reverse Engineering of Vendor Databases (Abstract)

Michael Blaha , OMT Associates Inc
pp. 183

ROMEO: Reverse Engineering from 00 Source Code to OMT Design (Abstract)

Anthony Bryant , Sunderland University
Neil Willis , Sunderland University
Lantzos Theodoros , Leeds Metropolitan University
Helen M. Edwards , Leeds Metropolitan University
pp. 191

Scalable Visualizations to Support Reverse Engineering: A Framework for Evaluation (Abstract)

Karl S. Mathias , Auburn University
James H. Cross Ii , Auburn University
Larry A. Barowski , Auburn University
T. Dean Hendrix , Auburn University
pp. 201

A Visual Representation Model for Software Subsystem Decomposition (Abstract)

Carlos Montes de Oca , Louisiana State University
Doris L. Carver , Louisiana State University
pp. 231

An Intermediate Representation for Reverse Engineering Analyses (Abstract)

M. Würthner , University of Stuttgart
R. Koschke , University of Stuttgart
J.-F. Girard , University of Stuttgart
pp. 241
Panel Position Papers

Reverse Engineering Research Should Target Cooperative Information System Requirements (Abstract)

Margaret-Anne Storey , University of Victoria
Hausi A. Miller , University of Victoria
Kenny Wong , University of Victoria
pp. 255

Author Index (PDF)

pp. 256
78 ms
(Ver 3.3 (11022016))