BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × Belgium
1 × Greece
1 × Norway
1 × Portugal
1 × Spain
1 × Switzerland
2 × Hungary
2 × Ireland
2 × The Netherlands
4 × Italy
5 × Germany
7 × Canada
8 × USA
Collaborated with:
T.Eisenbarth J.Girard D.Simon J.Quante T.Mende S.Bazrafshan N.Göde R.Falke R.Tiarks A.Christl M.D.Storey G.Schied J.Czeranski P.Frenzel D.Lüdemann B.Katzmarski A.Hemel B.Scholz A.v.Deursen C.K.Roy M.F.Zibran B.J.Berger K.Sohr J.Peleska M.Leszak C.K.Roy J.R.Cordy G.Vogel G.Canfora H.M.Kienle T.Roehm W.Maalej F.Beckwermert G.Meier A.P.J.Breu K.Angstmann R.Klein J.Favre J.Rilling C.Hofmeister L.Moonen C.Riva R.Ferenc S.E.Sim R.C.Holt T.Gyimóthy E.Plödereder Y.Z.V M.Würthner
Talks about:
clone (13) detect (10) softwar (9) program (8) recoveri (6) use (6) architectur (5) reflexion (5) abstract (5) featur (5)

♂ Person: Rainer Koschke

DBLP DBLP: Koschke:Rainer

Facilitated 11 volumes:

ICSME 2015Ed
SANER 2015SCh
CSMR-WCRE 2014PrCo
WCRE 2013PrCo
WCRE 2013SCh
ICPC 2009Ed
SOFTVIS 2008Ed
ICSM 2006PrCh
SCAM 2004PrCh
WCRE 2001Ed
WCRE 2001GCh

Contributed to:

SCAM 20152015
CSMR-WCRE 20142014
SCAM 20142014
CSMR 20132013
ICSM 20132013
CSMR 20122012
ICPC 20122012
ICSE 20122012
WCRE 20122012
CSMR 20112011
ICSE 20112011
WCRE 20112011
CSMR 20102010
CSMR 20092009
SCAM 20092009
SCAM 20092011
CSMR 20082008
ICPC 20082009
WCRE 20072007
CSMR 20062006
WCRE 20062006
ASE 20052005
VISSOFT 20052005
WCRE 20052005
WCRE 20052007
WICSA 20052005
WICSA 20042004
IWPC 20032003
WCRE 20032003
ICSM 20022002
WCRE 20022002
CSMR 20012001
ICSM 20012001
IWPC 20012001
Software Visualization 20012001
WCRE 20012001
IWPC 20002000
WCRE 20002000
WCRE 19991999
WCRE 19981998
ASE 19971997
ICSM 19971997
WCRE 19971997
WCRE 19972000

Wrote 51 papers:

SCAM-2015-LudemannK #control flow #graph
From preprocessor-constrained parse graphs to preprocessor-constrained control flow (DL, RK), pp. 211–220.
CSMR-WCRE-2014-RoyZK #past present future
The vision of software clone management: Past, present, and future (CKR, MFZ, RK), pp. 18–33.
SCAM-2014-BazrafshanK #debugging #developer #performance
Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs (SB, RK), pp. 1–10.
CSMR-2013-BergerSK #architecture #security
Extracting and Analyzing the Implemented Security Architecture of Business Applications (BJB, KS, RK), pp. 285–294.
ICSM-2013-BazrafshanK #empirical
An Empirical Study of Clone Removals (SB, RK), pp. 50–59.
CSMR-2012-Koschke #clone detection #detection #scalability #using
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
ICPC-2012-KatzmarskiK #complexity #metric
Program complexity metrics and programmer opinions (BK, RK), pp. 17–26.
ICSE-2012-RoehmTKM #developer #how #question
How do professional developers comprehend software? (TR, RT, RK, WM), pp. 255–265.
WCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
CSMR-2011-MendeKP #case study #fault #integration #on the #predict #testing
On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study (TM, RK, JP), pp. 259–268.
ICSE-2011-GodeK #clone tracking #risk management
Frequency and risks of changes to clones (NG, RK), pp. 311–320.
WCRE-2011-BazrafshanKG #approximate #code search
Approximate Code Search in Program Histories (SB, RK, NG), pp. 109–118.
WCRE-2011-ScholzK #multi #protocol #source code #thread
Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
CSMR-2010-Koschke #analysis #incremental
Incremental Reflexion Analysis (RK), pp. 1–10.
CSMR-2010-MendeK #fault #modelling #predict
Effort-Aware Defect Prediction Models (TM, RK), pp. 107–116.
CSMR-2009-GodeK #clone detection #detection #incremental
Incremental Clone Detection (NG, RK), pp. 219–228.
CSMR-2009-MendeKL #evolution #fault #modelling #predict #scalability
Evaluating Defect Prediction Models for a Large Evolving Software System (TM, RK, ML), pp. 247–250.
SCAM-2009-TiarksKF #assessment #detection #state of the art #tool support
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools (RT, RK, RF), pp. 67–76.
SCAM-J-2009-TiarksKF11 #assessment #detection #state of the art #tool support
An extended assessment of type-3 clones as detected by state-of-the-art tools (RT, RK, RF), pp. 295–331.
CSMR-2008-MendeBKM #clone detection #detection #evolution #product line #using
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
ICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
WCRE-2007-FrenzelKBA #product line
Extending the Reflexion Method for Consolidating Software Variants into Product Lines (PF, RK, APJB, KA), pp. 160–169.
WCRE-2007-QuanteK #protocol
Dynamic Protocol Recovery (JQ, RK), pp. 219–228.
CSMR-2006-QuanteK #graph #process
Dynamic Object Process Graphs (JQ, RK), pp. 81–90.
WCRE-2006-KoschkeFF #clone detection #detection #syntax #using
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
ASE-2005-KoschkeQ #feature model #on the
On dynamic feature location (RK, JQ), pp. 86–95.
VISSOFT-2005-FalkeKKQ #dependence #visualisation
The Dominance Tree in Visualizing Software Dependencies (RF, RK, RK, JQ), pp. 83–88.
WCRE-2005-ChristlKS #automation #clustering
Equipping the Reflexion Method with Automated Clustering (AC, RK, MADS), pp. 89–98.
WCRE-J-2005-ChristlKS07 #automation #clustering
Automated clustering to support the reflexion method (AC, RK, MADS), pp. 255–274.
WICSA-2005-Koschke #architecture #reverse engineering #what
What Architects Should Know About Reverse Engineering and Rengineering (RK), pp. 4–10.
WICSA-2004-DeursenHKMR #architecture #named #re-engineering
Symphony: View-Driven Software Architecture Reconstruction (AvD, CH, RK, LM, CR), pp. 122–134.
IWPC-2003-DeursenFKR #case study #comprehension #education #evolution #experience
Experiences in Teaching Software Evolution and Program Comprehension (AvD, JMF, RK, JR), pp. 283–284.
WCRE-2003-KoschkeS #modelling
Hierarchical Reflexion Models (RK, DS), pp. 36–45.
ICSM-2002-EisenbarthKS #incremental #scalability #source code
Incremental Location of Combined Features for Large-Scale Programs (TE, RK, DS), pp. 273–282.
ICSM-2002-Koschke #architecture #component #comprehension #evolution
Atomic Architectural Component Recovery for Program Understanding and Evolution (RK), pp. 478–481.
WCRE-2002-EisenbarthKV
Static Trace Extraction (TE, RK, GV), p. 128–?.
CSMR-2001-EisenbarthKS #component #concept analysis
Derivation of Feature Component Maps by Means of Concept Analysis (TE, RK, DS), pp. 176–179.
ICSM-2001-EisenbarthKS #analysis #comprehension
Aiding Program Comprehension by Static and Dynamic Feature Analysis (TE, RK, DS), pp. 602–611.
IWPC-2001-EisenbarthKS #comprehension #concept analysis #execution #using
Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
SVIS-2001-Koschke #reverse engineering #visualisation
Software Visualization for Reverse Engineering (RK), pp. 138–150.
WCRE-2001-FerencSHKG #c #c++ #standard #towards
Towards a Standard Schema for C/C++ (RF, SES, RCH, RK, TG), pp. 49–58.
IWPC-2000-KoschkeE #clustering #evaluation #framework
A Framework for Experimental Evaluation of Clustering Techniques (RK, TE), pp. 201–210.
WCRE-2000-CanforaCK #approach #component
Revisiting the Delta IC Approach to Component Recovery (GC, JC, RK), pp. 140–149.
WCRE-2000-CzeranskiEKKPSZGW
Data Exchange in Bauhaus (JC, TE, HMK, RK, EP, DS, YZV, JFG, MW), pp. 293–295.
WCRE-2000-CzeranskiEKKS #tool support #using
Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
WCRE-1999-Koschke #automation #component #incremental
An Incremental Semi-Automatic Method for Component Recovery (RK), p. 256–?.
WCRE-1998-KoschkeG #analysis #representation #reverse engineering
An Intermediate Representation for Reverse Engineering Analyses (RK, JFG), pp. 241–250.
ASE-1997-GirardKS #approach #data type #detection
A Metric-based Approach to Detect Abstract Data Types and State Encapsulations (JFG, RK, GS), pp. 82–89.
ICSM-1997-GirardK #architecture #component #comprehension #towards
Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding (JFG, RK), pp. 58–65.
WCRE-1997-GirardKS #architecture #comparison #comprehension #data type #detection #encapsulation
Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding (JFG, RK, GS), pp. 66–75.
WCRE-J-1997-GirardK00 #comparison #data type
A comparison of abstract data types and objects recovery techniques (JFG, RK), pp. 149–181.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.