By Topic

14th Working Conference on Reverse Engineering (WCRE 2007)

Date 28-31 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 53
  • 14th Working Conference on Reverse Engineering - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • 14th Working Conference on Reverse Engineering - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 14th Working Conference on Reverse Engineering - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 14th Working Conference on Reverse Engineering - Table of contents

    Publication Year: 2007, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • The Dark Side of Software Reverse Engineering

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (25 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering Tools: A Perspective from the Trenches

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (27 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interprocedural Static Single Assignment Form

    Publication Year: 2007, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In this paper we describe interprocedural static single assignment form (ISSA) with optimizations as implemented in the Bauhaus project. We explain our framework which uses an abstract program representation enabling us to use different pointer analyses ranging from fast but imprecise to slow but precise ones. Our implementation includes the computation of (may and must) side effects and optimizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Approach to Grammar Recovery for a Dialect of the C++ Language

    Publication Year: 2007, Page(s):11 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    In this paper we present the design and implementation of a fully automated technique for reverse engineering or recovering a grammar from existing language artifacts. The technique that we describe uses only test cases and a parse tree, and we apply the technique to a dialect of the C++ language. However, given test cases and a parse tree for a language or a dialect of a language, our technique c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parametric Process Model Inference

    Publication Year: 2007, Page(s):21 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual deterioration of code due to repeated maintenance activities. We present an approach for reverse engineering process model abstractions from legacy code. Such a process model can provide a quick initial understanding of an app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Documenting Typical Crosscutting Concerns

    Publication Year: 2007, Page(s):31 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Our analysis of crosscutting concerns in real-life software systems (totaling over 500,000 LOC) and in reports from literature indicated a number of properties that allow for their decomposition in primitive building blocks which are atomic crosscutting concerns. We classify these blocks in crosscutting concern sorts, and we use them to describe the cross- cutting structure of many (well-known) de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal Exploration of Software Models: A Tool Feature to Enhance Software Understanding

    Publication Year: 2007, Page(s):41 - 49
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    We present an eclipse plugin called temporal model explorer (TME) that allows a software engineer to animate how software has changed over time by sliding a scrollbar. The engineer can instantly study changes made at any level of detail. Rationale for changes can also be manipulated, and filters can be applied to hide aspects of the history that are not of interest. Although simple, we hypothesize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Implied Scenarios from Execution Traces

    Publication Year: 2007, Page(s):50 - 59
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    A scenario describes how one or more system components interact to provide a certain set of functionalities. Because each scenario only represents a partial view of the overall system behavior, scenario-based specifications may hide unexpected interactions (called implied scenarios) which are not part of any scenario individually. Implied scenarios may either indicate gaps in the original scenario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Examining the Effects of Global Data Usage on Software Maintainability

    Publication Year: 2007, Page(s):60 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    As the useful life expectancy of software continues to increase, the task of maintaining the source code has become the dominant phase of the software life-cycle. In order to improve the ability of software to age and successfully evolve over time, it is important to identify system design and programming practices which may result in increasing the difficulty of maintaining the source code. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes

    Publication Year: 2007, Page(s):70 - 79
    Cited by:  Papers (30)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Comments are valuable especially for program understanding and maintenance, but do developers comment their code? To which extent do they add comments or adapt them when they evolve the code? We examine the question whether source code and associated comments are really changed together along the evolutionary history of a software system. In this paper, we describe an approach to map code and comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Assessment Based on Attribute Series of Software Evolution

    Publication Year: 2007, Page(s):80 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value series based on evolution attributes such as number of authors, commit messages, lines of code, bug fix count, etc. Daily data points of these evolution attributes were captured over a period of two months to predict the defec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ADM Approach to Reengineer Relational Databases towards Web Services

    Publication Year: 2007, Page(s):90 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Nowadays, software technology is evolving very quickly according to new trends in technology, such as SOA (service oriented architecture) and web services. The SOA paradigm claims (1) to develop software as a set of services and (2) to handle legacy applications and artefacts using standardized technology, exposing their functionalities as services. On the other hand, paradigms like MDA (model- dr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications

    Publication Year: 2007, Page(s):100 - 109
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A specific concern for these applications is to understand the persistent data (usually stored in a RDBMS), and its manipulation in the object-oriented source code. While foreign keys are an important means for indicating relat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering Data Models via Guarded Dependences

    Publication Year: 2007, Page(s):110 - 119
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    This paper presents an algorithm for reverse engineering semantically sound object-oriented data models from programs written in weakly-typed languages like COBOL. Our inference is based on a novel form of guarded transitive data dependence, and improves upon prior semantics-based model inference algorithms by producing simpler, easier to understand, models, and by inferring them more efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Super-Repositories

    Publication Year: 2007, Page(s):120 - 129
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1337 KB) | HTML iconHTML

    Reverse engineering and software evolution research has been focused mostly on analyzing single software systems. However, rarely a project exists in isolation; instead, projects exist in parallel within a larger context given by a company, a research group or the open-source community. Technically, such a context manifests itself in the form of super-repositories, containers of several projects d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.