


default search action
20th WCRE 2013: Koblenz, Germany
- Ralf Lämmel, Rocco Oliveto, Romain Robbes:

20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, October 14-17, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-2931-3
Invited Papers
- Mark Harman

, William B. Langdon, Westley Weimer:
Genetic programming for Reverse Engineering. 1-10 - Atif M. Memon, Ishan Banerjee, Bao N. Nguyen, Bryan Robbins:

The first decade of GUI ripping: Extensions, applications, and broader impacts. 11-20 - Ralf Lämmel

:
Reverse Engineering in Industry. 21 - Xi Chen, Asia Slowinska, Herbert Bos

:
Who allocated my memory? Detecting custom memory allocators in C binaries. 22-31 - István Haller, Asia Slowinska, Herbert Bos

:
MemPick: High-level data structure detection in C/C++ binaries. 32-41 - Brendan Cleary, Patrick Gorman, Eric Verbeek, Margaret-Anne D. Storey, Martin Salois, Frédéric Painchaud:

Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis. 42-51 - Matthew Smithson, Khaled Elwazeer, Kapil Anand, Aparna Kotha, Rajeev Barua:

Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctness. 52-61
Bug Management
- Shivani Rao, Henry Medeiros

, Avinash C. Kak:
An incremental update framework for efficient retrieval from software libraries for bug localization. 62-71 - Xin Xia

, David Lo
, Xinyu Wang, Bo Zhou:
Accurate developer recommendation for bug resolution. 72-81 - Kaiping Liu, Hee Beng Kuan Tan, Hongyu Zhang

:
Has this bug been reported? 82-91 - Ferdian Thung, David Lo

, Lingxiao Jiang
:
Automatic recovery of root causes from bug-fixing changes. 92-101
Clones
- Zhenchang Xing, Yinxing Xue, Stan Jarzabek:

Distilling useful clones by contextual differencing. 102-111 - Debarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft, Jan Harder:

Effects of cloned code on software maintainability: A replicated developer study. 112-121
Human Studies
- Olga Baysal, Oleksii Kononenko, Reid Holmes, Michael W. Godfrey:

The influence of non-technical factors on code review. 122-131 - Jing Jiang, Li Zhang, Lei Li:

Understanding project dissemination on a social coding site. 132-141 - Hongwei Li

, Zhenchang Xing, Xin Peng, Wenyun Zhao:
What help do developers seek, when and how? 142-151 - Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol:

Towards understanding how developers spend their effort during maintenance activities. 152-161
Re-documenting Legacy Code
- Ziying Dai, Xiaoguang Mao

, Yan Lei, Liqian Chen:
Leveraging specifications of subcomponents to mine precise specifications of composite components. 162-171 - Mario Luca Bernardi

, Marta Cimitile
, Giuseppe Antonio Di Lucca
:
A model-driven graph-matching approach for design pattern detection. 172-181
Recommendation Systems
- Ferdian Thung, David Lo

, Julia Lawall:
Automated library recommendation. 182-191 - Cédric Teyton, Jean-Rémy Falleri

, Xavier Blanc:
Automatic discovery of function mappings between similar libraries. 192-201 - Cédric Teyton, Jean-Rémy Falleri

, Floréal Morandat, Xavier Blanc:
Find your library experts. 202-211
Refactoring and Re-modularization
- Hani Abdeen, Houari A. Sahraoui, Osama Shata, Nicolas Anquetil

, Stéphane Ducasse:
Towards automatically improving package structure while respecting original design decisions. 212-221 - Cristiano Amaral Maffort, Marco Túlio Valente

, Mariza Andrade da Silva Bigonha
, Nicolas Anquetil
, André C. Hora
:
Heuristics for discovering architectural violations. 222-231 - Vitor Sales, Ricardo Terra, Luis Fernando Miranda, Marco Túlio Valente

:
Recommending Move Method refactorings using dependency sets. 232-241 - Aiko Fallas Yamashita, Leon Moonen

:
Do developers care about code smells? An exploratory survey. 242-251
Security and Testing
- Fabien Duchene, Sanjay Rawat

, Jean-Luc Richier, Roland Groz:
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection. 252-261 - Andrea Avancini, Mariano Ceccato

:
Circe: A grammar-based oracle for testing Cross-site scripting in web applications. 262-271 - Maurizio Leotta

, Diego Clerissi, Filippo Ricca, Paolo Tonella
:
Capture-replay vs. programmable web testing: An empirical assessment during test case evolution. 272-281
Software Maintenance
- Zachary P. Fry, Westley Weimer:

Clustering static analysis defect reports to reduce maintenance costs. 282-291 - Kelley Duran, Gabbie Burns, Paul Snell:

Lehman's laws in agile and non-agile projects. 292-300 - Neil Walkinshaw

, Ramsay Taylor
, John Derrick
:
Inferring Extended Finite State Machine models from software executions. 301-310 - Fasil Bantelay, Motahareh Bahrami Zanjani, Huzefa H. Kagdi:

Comparing and combining evolutionary couplings from interactions and commits. 311-320
Software Quality
- Mathieu Nayrolles, Naouel Moha, Petko Valtchev

:
Improving SOA antipatterns detection in Service Based Systems by mining execution traces. 321-330 - André C. Hora

, Nicolas Anquetil
, Stéphane Ducasse, Marco Túlio Valente
:
Mining system specific rules from change patterns. 331-340 - Ajay Bandi

, Byron J. Williams, Edward B. Allen:
Empirical evidence of code decay: A systematic mapping study. 341-350 - Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel

, Foutse Khomh:
Mining the relationship between anti-patterns dependencies and fault-proneness. 351-360
Traceability and Feature Location
- Nasir Ali, Fehmi Jaafar, Ahmed E. Hassan:

Leveraging historical co-change information for requirements traceability. 361-370 - Raghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, Sachin Kale:

Using relationships for matching textual domain models with existing code. 371-380 - Takashi Ishio

, Shinpei Hayashi
, Hiroshi Kazato, Tsuyoshi Oshima:
On the effectiveness of accuracy of automated feature location technique. 381-390 - Zéphyrin Soh, Foutse Khomh, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Bram Adams

:
On the effect of program exploration on maintenance tasks. 391-400
Practice Papers I
- João Eduardo Montandon

, Hudson Borges, Daniel Felix, Marco Túlio Valente
:
Documenting APIs with examples: Lessons learned with the APIMiner platform. 401-408 - Valerio Cosentino, Jordi Cabot

, Patrick Albert, Philippe Bauquel, Jacques Perronnet:
Extracting business rules from COBOL: A model-based framework. 409-416 - Lerina Aversano

, Marco Molfetta, Maria Tortorella:
Evaluating architecture stability of software projects. 417-424 - Ravi Khadka, Amir Saeidi, Slinger Jansen

, Jurriaan Hage
, Geer P. Haas:
Migrating a large scale legacy application to SOA: Challenges and lessons learned. 425-432 - Bram Schoenmakers, Niels van den Broek, Istvan Nagy, Bogdan Vasilescu

, Alexander Serebrenik
:
Assessing the complexity of upgrading software modules. 433-440 - Erik Aeschlimann, Mircea Lungu, Oscar Nierstrasz

, Carl F. Worms:
Analyzing PL/1 legacy ecosystems: An experience report. 441-448 - Lukás Durfina, Jakub Kroustek, Petr Zemek:

PsybOt malware: A step-by-step decompilation case study. 449-456
ERA Track
- Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:

Reusing reused code. 457-461 - Josef Pichler:

Specification extraction by symbolic execution. 462-466 - Mohammad Masudur Rahman

, Shamima Yeasmin, Chanchal K. Roy:
An IDE-based context-aware meta search engine. 467-471 - Elizabeth P. Antony, Manar H. Alalfi

, James R. Cordy:
An approach to clone detection in behavioural models. 472-476
Tool Demonstrations
- Xi Chen, Asia Slowinska, Herbert Bos

:
MemBrush: A practical tool to detect custom memory allocators in C binaries. 477-478 - István Haller, Asia Slowinska, Herbert Bos

:
MemPick: A tool for data structure detection. 479-480 - Amir Saeidi, Jurriaan Hage

, Ravi Khadka, Slinger Jansen
:
Gelato: GEneric language tools for model-driven analysis of legacy software systems. 481-482 - Valerio Cosentino, Jordi Cabot

, Patrick Albert, Philippe Bauquel, Jacques Perronnet:
Extracting business rules from COBOL: A model-based tool. 483-484 - Alexandru Sutii, Serguei A. Roubtsov, Alexander Serebrenik

:
Detecting dependencies in Enterprise JavaBeans with SQuAVisiT. 485-486 - Shinpei Hayashi

, Sirinut Thangthumachit, Motoshi Saeki:
REdiffs: Refactoring-aware difference viewer for java. 487-488 - Daniel E. Krutz, Emad Shihab:

CCCD: Concolic code clone detection. 489-490
Workshop Summaries
- Alberto Bacchelli, Nicolas Bettenburg, Latifa Guerrouj, Sonia Haiduc:

3rd workshop on Mining Unstructured Data. 491-492 - Anya Helene Bagge

, Vadim Zaytsev:
Workshop on open and original problems in software language engineering. 493-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














