Sciweavers

CSMR
2008
IEEE
14 years 6 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu
CIKM
2009
Springer
14 years 6 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
WCRE
2009
IEEE
14 years 6 months ago
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Simon Denier, Tudor Gîrba
WCRE
2009
IEEE
14 years 6 months ago
SQUAD: Software Quality Understanding through the Analysis of Design
—Object-oriented software quality models usually use metrics of classes and of relationships among classes to assess the quality of systems. However, software quality does not de...
Foutse Khomh
WCRE
2009
IEEE
14 years 6 months ago
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality Assurance
Abstract—Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In partic...
Fabrizio Perin
WCRE
2009
IEEE
14 years 6 months ago
Supporting Feature-Level Software Maintenance
The proposed research defines data fusion approaches to support software maintenance tasks at the feature level. Static, dynamic, and textual sources of information are combined t...
Meghan Revelle
WCRE
2009
IEEE
14 years 6 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...
WCRE
2009
IEEE
14 years 6 months ago
Autumn Leaves: Curing the Window Plague in IDEs
—Navigating large software systems is difficult as the various artifacts are distributed in a huge space, while the relationships between different artifacts often remain hidden...
David Röthlisberger, Oscar Nierstrasz, St&eac...
WCRE
2009
IEEE
14 years 6 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
WCRE
2009
IEEE
14 years 6 months ago
Benchmarking Lightweight Techniques to Link E-Mails and Source Code
—During the evolution of a software system, a large amount of information, which is not always directly related to the source code, is produced. Several researchers have provided...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza, ...