Proceedings of the 18th Working Conference on Reverse Engineering
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Martin Pinzger, Denys Poshyvanyk, Jim Buckley
Proceedings of the 18th Working Conference on Reverse Engineering
WCRE, 2011.

EVOL
DBLP
Scholar
Full names Links ISxN
@proceedings{WCRE-2011,
	address       = "Limerick, Ireland",
	editor        = "Martin Pinzger and Denys Poshyvanyk and Jim Buckley",
	isbn          = "978-1-4577-1948-6",
	publisher     = "{IEEE Computer Society}",
	title         = "{Proceedings of the 18th Working Conference on Reverse Engineering}",
	year          = 2011,
}

Contents (60 items)

WCRE-2011-HigoUNK #approach #clone detection #detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCRE-2011-UddinRSH #detection #effectiveness #on the #scalability
On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems (MSU, CKR, KAS, AH), pp. 13–22.
WCRE-2011-KeivanlooRC #clone detection #multi #realtime
Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
WCRE-2011-KashimaHYMI #reuse
An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS Projects (YK, YH, NY, YM, KI), pp. 28–32.
WCRE-2011-WangPV #automation #readability #segmentation
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
WCRE-2011-AliGA #clustering #object-oriented #requirements #source code #traceability
Requirements Traceability for Object Oriented Systems by Partitioning Source Code (NA, YGG, GA), pp. 45–54.
WCRE-2011-AryaniPLMN #dependence #predict #question #using
Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
WCRE-2011-GravinoRST #comprehension #design pattern #documentation #source code
Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments (CG, MR, GS, GT), pp. 67–76.
WCRE-2011-AbebeT #concept #identifier #towards
Towards the Extraction of Domain Concepts from the Identifiers (SLA, PT), pp. 77–86.
WCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality #using
Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
WCRE-2011-NonnenSI #research #source code
Locating the Meaning of Terms in Source Code Research on “Term Introduction” (JN, DS, PI), pp. 99–108.
WCRE-2011-BazrafshanKG #approximate #code search
Approximate Code Search in Program Histories (SB, RK, NG), pp. 109–118.
WCRE-2011-WangLJ #code search #dependence #graph #topic
Code Search via Topic-Enriched Dependence Graph Matching (SW, DL, LJ), pp. 119–123.
WCRE-2011-BeardKEL #debugging #information retrieval #locality
Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques (MDB, NAK, LHE, SKL), pp. 124–128.
WCRE-2011-HouY #api #case study #evolution
Exploring the Intent behind API Evolution: A Case Study (DH, XY), pp. 131–140.
WCRE-2011-LammelLPV #dot-net #framework
A Framework Profile of .NET (RL, RL, EP, AV), pp. 141–150.
WCRE-2011-ZibranER #api #usability
Useful, But Usable? Factors Affecting the Usability of APIs (MFZ, FZE, CKR), pp. 151–155.
WCRE-2011-ZhaoAH #automation
Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
WCRE-2011-AntunesNV #network #protocol #reverse engineering
Reverse Engineering of Protocols from Network Traces (JA, NFN, PV), pp. 169–178.
WCRE-2011-BergerBS #android #case study #security
An Android Security Case Study with Bauhaus (BJB, MB, KS), pp. 179–183.
WCRE-2011-TreudeFSS #case study #reverse engineering #security
An Exploratory Study of Software Reverse Engineering in a Security Context (CT, FMFF, MADS, MS), pp. 184–188.
WCRE-2011-CanforaCCP #debugging #empirical #how
How Long Does a Bug Survive? An Empirical Study (GC, MC, LC, MDP), pp. 191–200.
WCRE-2011-DaviesRW #debugging #dependence #evaluation
A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of Bugs (SD, MR, MW), pp. 201–210.
WCRE-2011-PosnettHD #fault #question
Got Issues? Do New Features and Code Improvements Affect Defects? (DP, AH, PTD), pp. 211–215.
WCRE-2011-HerraizSNH #case study #quality
Impact of Installation Counts on Perceived Quality: A Case Study on Debian (IH, ES, THDN, AEH), pp. 219–228.
WCRE-2011-ZhuWPXZ #composition #evolution #monitoring #quality #roadmap
Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views (TZ, YW, XP, ZX, WZ), pp. 229–238.
WCRE-2011-GuoWGG #empirical #validation
An Empirical Validation of the Benefits of Adhering to the Law of Demeter (YG, MW, EG, HCG), pp. 239–243.
WCRE-2011-TanPPZ #clustering #fault #predict #quality
Assessing Software Quality by Program Clustering and Defect Prediction (XT, XP, SP, WZ), pp. 244–248.
WCRE-2011-ScholzK #multi #protocol #source code #thread
Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
WCRE-2011-KhomhCZH #approach #case study #evaluation
An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox (FK, BC, YZ, AEH), pp. 261–270.
WCRE-2011-OlszakRJ #java #runtime
Meta-Level Runtime Feature Awareness for Java (AO, MR, BNJ), pp. 271–274.
WCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCRE-2011-FrankeEKW #lifecycle #mobile #reverse engineering
Reverse Engineering of Mobile Application Lifecycles (DF, CE, SK, CW), pp. 283–292.
WCRE-2011-RamonCM #reverse engineering
Reverse Engineering of Event Handlers of RAD-Based Applications (ÓSR, JSC, JGM), pp. 293–302.
WCRE-2011-DuszynskiKB #multi #reuse #source code
Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
WCRE-2011-HaslingerLE #feature model #modelling #reverse engineering #set #source code
Reverse Engineering Feature Models from Programs’ Feature Sets (ENH, RELH, AE), pp. 308–312.
WCRE-2011-NadiH #linux #mining
Make it or Break it: Mining Anomalies from Linux Kbuild (SN, RCH), pp. 315–324.
WCRE-2011-JaafarGHA #case study #metaprogramming
An Exploratory Study of Macro Co-changes (FJ, YGG, SH, GA), pp. 325–334.
WCRE-2011-ShangJAHGNF #case study #evolution #execution #scalability
An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems (WS, ZMJ, BA, AEH, MWG, MNN, PF), pp. 335–344.
WCRE-2011-FokinDCT #c++ #decompiler #named
SmartDec: Approaching C++ Decompilation (AF, ED, AC, KT), pp. 347–356.
WCRE-2011-SeppMS #precise #relational #static analysis
Precise Static Analysis of Binaries by Extracting Relational Information (AS, BM, AS), pp. 357–366.
WCRE-2011-YingM #refactoring
Refactoring Traditional Forms into Ajax-enabled Forms (MY, JM), pp. 367–371.
WCRE-2011-MurgiaTCCM #empirical #refactoring
An Empirical Study of Refactoring in the Context of FanIn and FanOut Coupling (AM, RT, SC, GC, MM), pp. 372–376.
WCRE-2011-SurianLLTLF #collaboration #developer #network #people #recommendation
Recommending People in Developers’ Collaboration Network (DS, NL, DL, HT, EPL, CF), pp. 379–388.
WCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code #using
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCRE-2011-AbdeenDS #composition #legacy #metric #object-oriented #scalability
Modularization Metrics: Assessing Package Organization in Legacy Large Object-Oriented Software (HA, SD, HAS), pp. 394–398.
WCRE-2011-SajnaniNL #architecture #towards
Application Architecture Discovery — Towards Domain-driven, Easily-Extensible Code Structure (HS, RN, CVL), pp. 401–405.
WCRE-2011-Mintchev #integration #legacy #program transformation
Renovation by Machine-Assisted Program Transformation in Production Reporting and Integration (SM), pp. 406–410.
WCRE-2011-KaushikTM #case study #debugging #testing #traceability
Reconstructing Traceability between Bugs and Test Cases: An Experimental Study (NK, LT, MM), pp. 411–414.
WCRE-2011-Qusef #concept #slicing #traceability
Recovering Test-to-Code Traceability Via Slicing and Conceptual Coupling (AQ), pp. 417–420.
WCRE-2011-Panchenko #code search #database #in memory #source code
In-Memory Database Support for Source Code Search and Analytics (OP), pp. 421–424.
WCRE-2011-Beard #debugging #information retrieval #locality #using
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCRE-2011-Raber #debugging #kernel #profiling
Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space (JR), pp. 431–432.
WCRE-2011-CheathamR
Function Insight: Highlighting Suspicious Sections in Binary Run Traces (MC, JR), pp. 433–434.
WCRE-2011-OlszakJ #comprehension #legacy
Understanding Legacy Features with Featureous (AO, BNJ), pp. 435–436.
WCRE-2011-CodobanMM #design #fault #named #problem
iProblems — An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects (MC, CM, RM), pp. 437–438.
WCRE-2011-MyersS #execution #using
Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
WCRE-2011-AlbertCFGG #automation #generative #java #named #testing
jPET: An Automatic Test-Case Generator for Java (EA, IC, AFM, MGZ, SG), pp. 441–442.
WCRE-2011-QusefBOLB #named #slicing
SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter (AQ, GB, RO, ADL, DB), pp. 443–444.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.