Martin Pinzger, Denys Poshyvanyk, Jim Buckley
Proceedings of the 18th Working Conference on Reverse Engineering
WCRE, 2011.
@proceedings{WCRE-2011, address = "Limerick, Ireland", editor = "Martin Pinzger and Denys Poshyvanyk and Jim Buckley", isbn = "978-1-4577-1948-6", publisher = "{IEEE Computer Society}", title = "{Proceedings of the 18th Working Conference on Reverse Engineering}", year = 2011, }
Contents (60 items)
- WCRE-2011-HigoUNK #approach #clone detection #detection #incremental
- Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
- WCRE-2011-UddinRSH #detection #effectiveness #on the #scalability
- On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems (MSU, CKR, KAS, AH), pp. 13–22.
- WCRE-2011-KeivanlooRC #clone detection #multi #realtime
- Internet-scale Real-time Code Clone Search Via Multi-level Indexing (IK, JR, PC), pp. 23–27.
- WCRE-2011-KashimaHYMI #reuse
- An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS Projects (YK, YH, NY, YM, KI), pp. 28–32.
- WCRE-2011-WangPV #automation #readability #segmentation
- Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
- WCRE-2011-AliGA #clustering #object-oriented #requirements #source code #traceability
- Requirements Traceability for Object Oriented Systems by Partitioning Source Code (NA, YGG, GA), pp. 45–54.
- WCRE-2011-AryaniPLMN #dependence #predict #question #using
- Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
- WCRE-2011-GravinoRST #comprehension #design pattern #documentation #source code
- Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments (CG, MR, GS, GT), pp. 67–76.
- WCRE-2011-AbebeT #concept #identifier #towards
- Towards the Extraction of Domain Concepts from the Identifiers (SLA, PT), pp. 77–86.
- WCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
- WCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality #using
- Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
- WCRE-2011-NonnenSI #research #source code
- Locating the Meaning of Terms in Source Code Research on “Term Introduction” (JN, DS, PI), pp. 99–108.
- WCRE-2011-BazrafshanKG #approximate #code search
- Approximate Code Search in Program Histories (SB, RK, NG), pp. 109–118.
- WCRE-2011-WangLJ #code search #dependence #graph #topic
- Code Search via Topic-Enriched Dependence Graph Matching (SW, DL, LJ), pp. 119–123.
- WCRE-2011-BeardKEL #debugging #information retrieval #locality
- Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques (MDB, NAK, LHE, SKL), pp. 124–128.
- WCRE-2011-HouY #api #case study #evolution
- Exploring the Intent behind API Evolution: A Case Study (DH, XY), pp. 131–140.
- WCRE-2011-LammelLPV #dot-net #framework
- A Framework Profile of .NET (RL, RL, EP, AV), pp. 141–150.
- WCRE-2011-ZibranER #api #usability
- Useful, But Usable? Factors Affecting the Usability of APIs (MFZ, FZE, CKR), pp. 151–155.
- WCRE-2011-ZhaoAH #automation
- Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
- WCRE-2011-AntunesNV #network #protocol #reverse engineering
- Reverse Engineering of Protocols from Network Traces (JA, NFN, PV), pp. 169–178.
- WCRE-2011-BergerBS #android #case study #security
- An Android Security Case Study with Bauhaus (BJB, MB, KS), pp. 179–183.
- WCRE-2011-TreudeFSS #case study #reverse engineering #security
- An Exploratory Study of Software Reverse Engineering in a Security Context (CT, FMFF, MADS, MS), pp. 184–188.
- WCRE-2011-CanforaCCP #debugging #empirical #how
- How Long Does a Bug Survive? An Empirical Study (GC, MC, LC, MDP), pp. 191–200.
- WCRE-2011-DaviesRW #debugging #dependence #evaluation
- A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of Bugs (SD, MR, MW), pp. 201–210.
- WCRE-2011-PosnettHD #fault #question
- Got Issues? Do New Features and Code Improvements Affect Defects? (DP, AH, PTD), pp. 211–215.
- WCRE-2011-HerraizSNH #case study #quality
- Impact of Installation Counts on Perceived Quality: A Case Study on Debian (IH, ES, THDN, AEH), pp. 219–228.
- WCRE-2011-ZhuWPXZ #composition #evolution #monitoring #quality #roadmap
- Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views (TZ, YW, XP, ZX, WZ), pp. 229–238.
- WCRE-2011-GuoWGG #empirical #validation
- An Empirical Validation of the Benefits of Adhering to the Law of Demeter (YG, MW, EG, HCG), pp. 239–243.
- WCRE-2011-TanPPZ #clustering #fault #predict #quality
- Assessing Software Quality by Program Clustering and Defect Prediction (XT, XP, SP, WZ), pp. 244–248.
- WCRE-2011-ScholzK #multi #protocol #source code #thread
- Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
- WCRE-2011-KhomhCZH #approach #case study #evaluation
- An Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla Firefox (FK, BC, YZ, AEH), pp. 261–270.
- WCRE-2011-OlszakRJ #java #runtime
- Meta-Level Runtime Feature Awareness for Java (AO, MR, BNJ), pp. 271–274.
- WCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
- Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
- WCRE-2011-FrankeEKW #lifecycle #mobile #reverse engineering
- Reverse Engineering of Mobile Application Lifecycles (DF, CE, SK, CW), pp. 283–292.
- WCRE-2011-RamonCM #reverse engineering
- Reverse Engineering of Event Handlers of RAD-Based Applications (ÓSR, JSC, JGM), pp. 293–302.
- WCRE-2011-DuszynskiKB #multi #reuse #source code
- Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
- WCRE-2011-HaslingerLE #feature model #modelling #reverse engineering #set #source code
- Reverse Engineering Feature Models from Programs’ Feature Sets (ENH, RELH, AE), pp. 308–312.
- WCRE-2011-NadiH #linux #mining
- Make it or Break it: Mining Anomalies from Linux Kbuild (SN, RCH), pp. 315–324.
- WCRE-2011-JaafarGHA #case study #metaprogramming
- An Exploratory Study of Macro Co-changes (FJ, YGG, SH, GA), pp. 325–334.
- WCRE-2011-ShangJAHGNF #case study #evolution #execution #scalability
- An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems (WS, ZMJ, BA, AEH, MWG, MNN, PF), pp. 335–344.
- WCRE-2011-FokinDCT #c++ #decompiler #named
- SmartDec: Approaching C++ Decompilation (AF, ED, AC, KT), pp. 347–356.
- WCRE-2011-SeppMS #precise #relational #static analysis
- Precise Static Analysis of Binaries by Extracting Relational Information (AS, BM, AS), pp. 357–366.
- WCRE-2011-YingM #refactoring
- Refactoring Traditional Forms into Ajax-enabled Forms (MY, JM), pp. 367–371.
- WCRE-2011-MurgiaTCCM #empirical #refactoring
- An Empirical Study of Refactoring in the Context of FanIn and FanOut Coupling (AM, RT, SC, GC, MM), pp. 372–376.
- WCRE-2011-SurianLLTLF #collaboration #developer #network #people #recommendation
- Recommending People in Developers’ Collaboration Network (DS, NL, DL, HT, EPL, CF), pp. 379–388.
- WCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code #using
- Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
- WCRE-2011-AbdeenDS #composition #legacy #metric #object-oriented #scalability
- Modularization Metrics: Assessing Package Organization in Legacy Large Object-Oriented Software (HA, SD, HAS), pp. 394–398.
- WCRE-2011-SajnaniNL #architecture #towards
- Application Architecture Discovery — Towards Domain-driven, Easily-Extensible Code Structure (HS, RN, CVL), pp. 401–405.
- WCRE-2011-Mintchev #integration #legacy #program transformation
- Renovation by Machine-Assisted Program Transformation in Production Reporting and Integration (SM), pp. 406–410.
- WCRE-2011-KaushikTM #case study #debugging #testing #traceability
- Reconstructing Traceability between Bugs and Test Cases: An Experimental Study (NK, LT, MM), pp. 411–414.
- WCRE-2011-Qusef #concept #slicing #traceability
- Recovering Test-to-Code Traceability Via Slicing and Conceptual Coupling (AQ), pp. 417–420.
- WCRE-2011-Panchenko #code search #database #in memory #source code
- In-Memory Database Support for Source Code Search and Analytics (OP), pp. 421–424.
- WCRE-2011-Beard #debugging #information retrieval #locality #using
- Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
- WCRE-2011-Raber #debugging #kernel #profiling
- Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space (JR), pp. 431–432.
- WCRE-2011-CheathamR
- Function Insight: Highlighting Suspicious Sections in Binary Run Traces (MC, JR), pp. 433–434.
- WCRE-2011-OlszakJ #comprehension #legacy
- Understanding Legacy Features with Featureous (AO, BNJ), pp. 435–436.
- WCRE-2011-CodobanMM #design #fault #named #problem
- iProblems — An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects (MC, CM, RM), pp. 437–438.
- WCRE-2011-MyersS #execution #using
- Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
- WCRE-2011-AlbertCFGG #automation #generative #java #named #testing
- jPET: An Automatic Test-Case Generator for Java (EA, IC, AFM, MGZ, SG), pp. 441–442.
- WCRE-2011-QusefBOLB #named #slicing
- SCOTCH: Slicing and Coupling Based Test to Code Trace Hunter (AQ, GB, RO, ADL, DB), pp. 443–444.
9 ×#source code
8 ×#case study
7 ×#using
6 ×#debugging
6 ×#reverse engineering
4 ×#empirical
4 ×#evolution
4 ×#legacy
4 ×#named
3 ×#automation
8 ×#case study
7 ×#using
6 ×#debugging
6 ×#reverse engineering
4 ×#empirical
4 ×#evolution
4 ×#legacy
4 ×#named
3 ×#automation