8. Workshop Software-Reengineering

[1]  Jens Knodel,et al.  Experiences with product line development of embedded systems at Testo AG , 2006, 10th International Software Product Line Conference (SPLC'06).

[2]  Stephan Neuhaus,et al.  Isolating Intrusions by Automatic Experiments , 2006, NDSS.

[3]  Werner Sommer Product Innovation Lifecycle Maintenance and Solution Management at SAP , 2006, CSMR.

[4]  Jens Knodel,et al.  Static evaluation of software architectures , 2006, Conference on Software Maintenance and Reengineering (CSMR'06).

[5]  Rainer Koschke,et al.  Dynamic object process graphs , 2006, Conference on Software Maintenance and Reengineering (CSMR'06).

[6]  Rainer Koschke,et al.  Static object trace extraction for programs with pointers , 2005, J. Syst. Softw..

[7]  Andreas Zeller,et al.  Lightweight Defect Localization for Java , 2005, ECOOP.

[8]  Rainer Schmidberger,et al.  Projekte der Lehre mit hochschulexternen Kunden , 2005 .

[9]  Tom Mens,et al.  A survey of software refactoring , 2004, IEEE Transactions on Software Engineering.

[10]  Rainer Koschke,et al.  Hierarchical reflexion models , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..

[11]  Samuel T. King,et al.  Backtracking intrusions , 2003, SOSP '03.

[12]  Carl K. Chang,et al.  Event-Based Traceability for Managing Evolutionary Change , 2003, IEEE Trans. Software Eng..

[13]  Ramanath Subramanyam,et al.  Empirical Analysis of CK Metrics for Object-Oriented Design Complexity: Implications for Software Defects , 2003, IEEE Trans. Software Eng..

[14]  Rainer Koschke,et al.  Locating Features in Source Code , 2003, IEEE Trans. Software Eng..

[15]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[16]  Mira Kajko-Mattsson Corrective Maintenance Maturity Model: Problem Management , 2002, International Conference on Software Maintenance, 2002. Proceedings..

[17]  Sandro Morasca,et al.  Deriving models of software fault-proneness , 2002, SEKE '02.

[18]  David Notkin,et al.  Software Reflexion Models: Bridging the Gap between Design and Implementation , 2001, IEEE Trans. Software Eng..

[19]  Kim B. Clark,et al.  The Option Value of Modularity in Design: An Example From Design Rules, Volume 1: The Power of Modularity , 2000 .

[20]  Klaus Schmid,et al.  PuLSE: a methodology to develop software product lines , 1999, SSR '99.

[21]  Martin Fowler,et al.  Refactoring - Improving the Design of Existing Code , 1999, Addison Wesley object technology series.

[22]  Reidar Conradi,et al.  Version models for software configuration management , 1998, CSUR.

[23]  L. D. Moura,et al.  Clone detection using abstract syntax trees , 1998, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272).

[24]  Harry M. Sneed,et al.  Measuring reusability of legacy software systems , 1998, Softw. Process. Improv. Pract..

[25]  Gregor Snelting,et al.  Reengineering of configurations based on mathematical concept analysis , 1996, TSEM.

[26]  Jean-Francois Girard,et al.  Reengineering User Interfaces , 1995, IEEE Softw..

[27]  Harry M. Sneed,et al.  Planning the Reengineering of Legacy Systems , 1995, IEEE Softw..

[28]  Harry M. Sneed,et al.  Downsizing large application programs , 1993, 1993 Conference on Software Maintenance.

[29]  Kenji Takahashi,et al.  An active hypertext model for system requirements , 1993, Proceedings of 1993 IEEE 7th International Workshop on Software Specification and Design.

[30]  Elaine J. Weyuker,et al.  Evaluating Software Complexity Measures , 2010, IEEE Trans. Software Eng..