By Topic

Reverse Engineering, 2008. WCRE '08. 15th Working Conference on

Date 15-18 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 62
  • [Front cover]

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (220 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (159 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (125 KB)  
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2008 , Page(s): x - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (163 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2008 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (106 KB)  
    Freely Available from IEEE
  • "Doctoral Symposium, Tool Demonstration Committees, and Additional Reviewers"

    Publication Year: 2008 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • Of Changes and their History: Some Ideas for Future IDEs

    Publication Year: 2008 , Page(s): 3
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (297 KB)  

    Changes are the heartbeat of a software system. Software has to change to reflect the adapting requirements of business, processes, and technology; otherwise it becomes progressively less useful. Because of that, software typically grows and becomes more complex inducing more time and effort for evolving it. Software archives provide rich sources of information about systems and their history of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering the Bazaar: Collaboration and Communication in Open Source Development

    Publication Year: 2008 , Page(s): 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    Open source project data has been a bonanza for software engineering research, much like Affymetrix's chips and gene sequencers have been for bio-informaticians. We are swimming in an ocean of data, merrily analyzing, clustering, correlating and model-fitting. However, while researchers have been busily mining the wealth of information in open source code repositories to study phenomena such as co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WCRE 1998 Most Influential Paper: Grokking Software Architecture

    Publication Year: 2008 , Page(s): 5 - 14
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    This paper is a retrospective arising from a WCRE paper published in 1998 promoting a relational approach to manipulate software architecture and to help solve various problems in software analysis. That paper explains how Tarskipsilas binary relational algebra, embedded in a language such as Grok, can solve such problems. Tarskipsilas notation is elegant and often efficiently executable when the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrieving Task-Related Clusters from Change History

    Publication Year: 2008 , Page(s): 17 - 26
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (459 KB) |  | HTML iconHTML  

    During software maintenance tasks, developers often spend an important amount of effort investigating source code. This effort can be reduced if tools are available to help developers navigate the source code effectively. For this purpose, we propose to search the change history of a software system to identify clusters of program elements related to a task. We evaluated the feasibility of this id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bayesian Network Based Approach for Change Coupling Prediction

    Publication Year: 2008 , Page(s): 27 - 36
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (544 KB) |  | HTML iconHTML  

    Source code coupling and change history are two important data sources for change coupling analysis. The popularity of public open source projects in recent years makes both sources available. Based on our previous research, in this paper, we inspect different dimensions of software changes including change significance or source code dependency levels, extract a set of features from the two sourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering New Change Patterns in Object-Oriented Systems

    Publication Year: 2008 , Page(s): 37 - 41
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (539 KB) |  | HTML iconHTML  

    Modern software has to evolve to meet the needs of stakeholders; but the nature and scope of this evolution is difficult to anticipate and manage. In this paper, we examine techniques which can discover interesting patterns of evolution in large object-oriented systems. To locate patterns, we use clustering to group together classes which change in the same manner at the same time. Then, we use dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical Coupling Based on Fine-Grained Change Information

    Publication Year: 2008 , Page(s): 42 - 46
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    Logical coupling reveals implicit dependencies between program entities, by measuring how often they changed together during development. Current approaches use coarse-grained change information extracted from the version control history of the software system under study. Entities that are registered as having changed during a commit transaction have their coupling increased by the same amount, r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies

    Publication Year: 2008 , Page(s): 49 - 58
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (935 KB) |  | HTML iconHTML  

    In this paper, we present a dynamic analysis approach to increase the understandability of a large software-intensive system, more particularly to enable the identification of dependencies between its execution entities. This approach analyzes the execution of a software system in a top-down fashion to cope with complexity and uses execution entities such as scenarios, components, and processes ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering CAPTCHAs

    Publication Year: 2008 , Page(s): 59 - 68
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1149 KB) |  | HTML iconHTML  

    CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear as bitmaps of text characters, in order to gain access to a low-cost resource such as webmail or a blog. CAPTCHAs are generated by software and the structure of a CAPTCHA gives hints to its implementation. Thus due to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Finite State Machines from Rich Internet Applications

    Publication Year: 2008 , Page(s): 69 - 73
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (614 KB) |  | HTML iconHTML  

    In the last years, rich Internet applications (RIAs) have emerged as a new generation of Web applications offering greater usability and interactivity than traditional ones. At the same time, RIAs introduce new issues and challenges in all the Web application lifecycle activities. As an example, a key problem with RIAs consists of defining suitable software models for representing them and validat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing and Integrating Dynamic Collaborations in IDEs

    Publication Year: 2008 , Page(s): 74 - 78
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    Static views of object-oriented source code as presented in a development environment (IDE) do not provide explicit representations of dynamic collaboration to describe how source artifacts communicate at runtime. Direct access within an IDE to explicit representations of dynamic collaborations would provide developers with useful insights into a system's behavior. In this paper we describe how we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Function Clones in Open Source Software

    Publication Year: 2008 , Page(s): 81 - 90
    Cited by:  Papers (18)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (506 KB) |  | HTML iconHTML  

    The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both text-based and AST-based clone detection techniques to yield highly accurate identification of cloned code in software systems. In this paper, we present a first empirical study of function clones in open source software using NICAD. We examine more than 15 open source C and Java systems, includi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Clones in Business Applications

    Publication Year: 2008 , Page(s): 91 - 100
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (588 KB) |  | HTML iconHTML  

    A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rules to achieve business objectives. An online bookstore business application contains several tasks such as buying a book, ordering a book, and sending out promotions. Business analysts specify business task... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Regularity in Source Code: Software Science and Zipf's Law

    Publication Year: 2008 , Page(s): 101 - 110
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (593 KB) |  | HTML iconHTML  

    Are there statistical regularities behind computer programming? In 1970s, Halstead proposed the software science theory which attempted to describe some of the regularities based on the direct measurement of lexical tokens in programs. The famous software science length equation models the relationship between program length and vocabulary. By analyzing the source code of twelve Java software syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pitfalls in Aspect Mining

    Publication Year: 2008 , Page(s): 113 - 122
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concernsin a software system, to improve the system's comprehensibility or enable its migration to an aspect-oriented solution. Unfortunately,most proposed aspect mining techniques have not lived up to their expectations yet. In this paper we provide a list of problems th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.