System Structure Analysis: Clustering with Data Bindings
IEEE Transactions on Software Engineering - Annals of discrete mathematics, 24
PROUST: Knowledge-Based Program Understanding
IEEE Transactions on Software Engineering
Implications of automated restructuring of COBOL
ACM SIGPLAN Notices
The State of Software Maintenance
IEEE Transactions on Software Engineering
Eliminating go to's while preserving program structure
Journal of the ACM (JACM)
Program Translation Via Abstraction and Reimplementation
IEEE Transactions on Software Engineering
Integrating noninterfering versions of programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
TuringTool: A User Interface to Aid in the Software Maintenance Task
IEEE Transactions on Software Engineering
The C Information Abstraction System
IEEE Transactions on Software Engineering
The programmer's apprentice
Properties of data flow frameworks: a unified model
Acta Informatica
LaSSIE: a knowledge-based software information system
Communications of the ACM - Special issue on software engineering
A reusable toolset for software dependency analysis
Journal of Systems and Software - Special issue on software maintenance
Using Program Slicing in Software Maintenance
IEEE Transactions on Software Engineering
A Control-Flow Normalization Algorithm and its Complexity
IEEE Transactions on Software Engineering
Software reverse engineering: a case study
Software—Practice & Experience
A Logic-Based Approach to Reverse Engineering Tools Production
IEEE Transactions on Software Engineering - Special issue on software maintenance
Program Concept Recognition and Transformation
IEEE Transactions on Software Engineering - Special issue on software maintenance
Overview of reverse engineering and reuse research
Information and Software Technology
The REDO compendium: reverse engineering for software maintenance
The REDO compendium: reverse engineering for software maintenance
Migrating legacy systems: gateways, interfaces & the incremental approach
Migrating legacy systems: gateways, interfaces & the incremental approach
Software Reengineering
Flow Analysis of Computer Programs
Flow Analysis of Computer Programs
Reverse Engineering and Software Maintenance: A Practical Approach
Reverse Engineering and Software Maintenance: A Practical Approach
Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Error Density and Size in Ada Software
IEEE Software
Techniques for Selective Revalidation
IEEE Software
The Book Paradigm for Improved Maintenance
IEEE Software
Recognizing Design Decisions in Programs
IEEE Software
Extracting and Restructuring the Design of Large Systems
IEEE Software
Knowledge-Based Program Analysis
IEEE Software
Recognizing a Program's Design: A Graph-Parsing Approach
IEEE Software
A Framework for Source Code Search Using Program Patterns
IEEE Transactions on Software Engineering
Experience With the Accuracy of Software Maintenance Task Effort Prediction Models
IEEE Transactions on Software Engineering
Beauty and the Beast or A Formal Semantic Description of the ControlConstructs of Cobol and its Implementation
Semantics-based Reverse Engineering
Semantics-based Reverse Engineering
Towards automated modification of legacy assets
Annals of Software Engineering
Recovering business rules from legacy source code for system modernization
RuleML'07 Proceedings of the 2007 international conference on Advances in rule interchange and applications
Obtaining a COBOL grammar from legacy code for reengineering purposes
Algebraic'97 Proceedings of the 2nd international conference on Theory and Practice of Algebraic Specifications
Hi-index | 0.00 |
To facilitate research in the field of reverse engineering and system renovation we have compiled an annotated bibliography. We put the contributions not only in alphabetical order but also grouped by topic so that readers focusing on a certain topic can read their annotations in the alphabetical listing. We also compiled an annotated list of pointers to information about reverse engineering and system renovation that can be reached via Internet. For the sake of ease we also incorporated a brief introduction to the field of reverse engineering.