By Topic

2011 18th Working Conference on Reverse Engineering

17-20 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 76
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (294 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (465 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (1044 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2011, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Keynote I: Evolving Critical Systems

    Publication Year: 2011, Page(s): xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Increasingly software can be considered to be critical, due to the business or other functionality which it supports. Upgrades or changes to such software are expensive and risky, primarily because the software has not been designed and built for ease of change. Expertise, tools and methodologies which support the design and implementation of software systems that evolve without risk (of failure o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote II: Architecture-Driven Modernization of the European Air Traffic Management System

    Publication Year: 2011, Page(s):xix - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    This case study describes the modernization technology and processes employed by Thales Air Systems SA. (Thales), a leading European and major global provider of ATM systems and its modernization solution provider, The Software Revolution, Inc, to modernize its Flight Data Processing system from 2005 through 2011. This paper provides an overview of the EATMS project that commenced with the initial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WCRE 2001 Most Influential Paper: Robust Parsing using Island Grammars Revisited

    Publication Year: 2011, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Incremental Code Clone Detection: A PDG-based Approach

    Publication Year: 2011, Page(s):3 - 12
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    It has been noted in recent years that the presence of code clones makes software maintenance more difficult. Unintended code inconsistencies may occur due to the presence of code clones. In order to avoid problems caused by code clones, it is necessary to identify where code clones exist in a software system. Consequently, various kinds of code clone detection techniques have been proposed before... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems

    Publication Year: 2011, Page(s):13 - 22
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Clone detection techniques essentially cluster textually, syntactically and/or semantically similar code fragments in or across software systems. For large datasets, similarity identification is costly both in terms of time and memory, and especially so when detecting near-miss clones where lines could be modified, added and/or deleted in the copied fragments. The capability and effectiveness of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-scale Real-time Code Clone Search Via Multi-level Indexing

    Publication Year: 2011, Page(s):23 - 27
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Finding lines of code similar to a code fragment across large knowledge bases in fractions of a second is a new branch of code clone research also known as real-time code clone search. Among the requirements real-time code clone search has to meet are scalability, short response time, scalable incremental corpus updates, and support for type-1, type-2, and type-3 clones. We conducted a set of empi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS Projects

    Publication Year: 2011, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Because licensing an open source software (OSS) product restricts its reuse, the developer of the product has to consider the impact on reuse when choosing the license. However, to the best of our knowledge, there are no quantitative studies on the impact of software licenses on software reuse. To identify the impact, this paper presents a quantitative investigation into the relationship between t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability

    Publication Year: 2011, Page(s):35 - 44
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    With the goal of increasing program readability for easier understanding, coding guidelines often include formatting standards such as indenting loop and conditional branch body statements. Similarly, good programming practice suggests that programmers use blank lines to visibly delineate between code segments that represent different algorithmic steps or high level actions. Unfortunately, program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Traceability for Object Oriented Systems by Partitioning Source Code

    Publication Year: 2011, Page(s):45 - 54
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Requirements trace ability ensures that source code is consistent with documentation and that all requirements have been implemented. During software evolution, features are added, removed, or modified, the code drifts away from its original requirements. Thus trace ability recovery approaches becomes necessary to re-establish the trace ability relations between requirements and source code. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can We Predict Dependencies Using Domain information?

    Publication Year: 2011, Page(s):55 - 64
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    Software dependencies play a vital role in program comprehension, change impact analysis and other software maintenance activities. Traditionally, these activities are supported by source code analysis, however, the source code is sometimes inaccessible, and not all stakeholders have adequate knowledge to perform such analysis. For example, non-technical domain experts and consultants raise most m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments

    Publication Year: 2011, Page(s):67 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    We present the results of a controlled experiment and a differentiated replication that have been carried out to assess the effect of the documentation of design patterns on the comprehension of source code. The two experiments involved Master Students in Computer Science at the University of Basilicas a and at University of Salerno, respectively. The participants to the original experiment perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the Extraction of Domain Concepts from the Identifiers

    Publication Year: 2011, Page(s):77 - 86
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Program identifiers represent an invaluable source of information for developers who are not familiar with the code to be evolved. Domain concepts and inter-concept relationships can be automatically extracted by means of natural language processing techniques applied to the program identifiers. However, the ontology produced by this approach tends to be very large and to include implementation de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code

    Publication Year: 2011, Page(s):87 - 91
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (631 KB) | HTML iconHTML

    In this work, we explore the relationship between topic models and co-maintenance history by introducing a visualization that compares conceptual cohesion within change lists. We explain how this view of the project history can give insight about the semantic architecture of the code, and we identify a number of patterns that characterize particular kinds of maintenance tasks. We examine the relat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel

    Publication Year: 2011, Page(s):92 - 96
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Many software maintenance activities need to find code units (functions, files, etc.) that implement a certain concern (features, bugs, etc.). To facilitate such activities, many approaches have been proposed to automatically link code units with concerns described in natural languages, which are termed as concern localization and often employ Information Retrieval (IR) techniques. There has not b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.