Message from the General Chair (PDF)
Message from the WCRE Program Chairs (PDF)
Messages from the Workshop Chairs (PDF)
Conference Committee (PDF)
Folding: An Approach to Enable Program Understanding of Preprocessed Languages (Abstract)
Node Coarsening Calculi for Program Slicing (Abstract)
Reverse Program Calculation Supported by Code Slicing (Abstract)
Towards a Standard Schema for C/C++ (Abstract)
Union Schemas as a Basis for a C++ Extractor (Abstract)
Requirements-Driven Software Re-engineering Framework (Abstract)
Application of UML Associations and Their Adornments in Design Recovery (Abstract)
Component Clustering Based on Maximal Association (Abstract)
An Investigation into the Connectivity Properties of Source-Header Dependency Graphs (Abstract)
A Retrospective on Industrial Database Reverse Engineering Projects-Part 1 (Abstract)
A Retrospective on Industrial Database Reverse Engineering Projects-Part 2 (Abstract)
Maximizing Functional Cohesion of Comprehension Environments by Integrating User and Task Knowledge (Abstract)
Characterizing the Informal Knowledge Contained in Systems (Abstract)
Program Comprehension Risks and Opportunities in Extreme Programming (Abstract)
Wrapping Legacy COBOL Programs behind an XML-Interface (Abstract)
Wrapper Development for Legacy Data Reuse (Abstract)
Modeling the System-User Dialog Using Interaction Traces (Abstract)
REportal: A Web-based Portal Site for Reverse Engineering (Abstract)
An Approach for Reverse Engineering of Web-Based Applications (Abstract)
Flexible Reverse Engineering of Web Pages with VAQUISTA (Abstract)
Reverse Engineering to Achieve Maintainable WWW Sites (Abstract)
Displaying dependence graphs: a hierarchical approach (Abstract)
GUSTT: An Amorphous Slicing System which Combines Slicing and Transformation (Abstract)
Preprocessor Conditional Removal by Simple Partial Evaluation (Abstract)
Identifying Similar Code with Program Dependence Graphs (Abstract)
The Octagon Abstract Domain (Abstract)
Lessons Learned in Data Reverse Engineering (PDF)
Interactive Migration of Legacy Databases to Net-Centric Technologies (Abstract)
Assisting the Comprehension of Legacy Transactions (Abstract)
Comparing Type-Based and Proof-Directed Decompilation (Abstract)
Decompiling Java using staged encapsulation (Abstract)
Computer Security Analysis through Decompilation and High-Level Debugging (Abstract)
Author Index (PDF)