Telos: representing knowledge about information systems
ACM Transactions on Information Systems (TOIS)
Analyzing Error-Prone System Structure
IEEE Transactions on Software Engineering
Localization of Design Concepts in Legacy Systems
ICSM '94 Proceedings of the International Conference on Software Maintenance
Visualizing textual redundancy in legacy source
CASCON '94 Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research
Towards an integrated toolset for program understanding
CASCON '94 Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research
Domain-retargetable reverse engineering
Domain-retargetable reverse engineering
Domain-retargetable reverse engineering
Domain-retargetable reverse engineering
Controlling Software Projects: Management, Measurement, and Estimates
Controlling Software Projects: Management, Measurement, and Estimates
Query by outlines: a new paradigm to help manage programs
Proceedings of the 1999 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
Using textual redundancy to study The Mintainability of source
Advances in software engineering
Navigating the textual redundancy web in legacy source
CASCON '96 Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
Network-centric migration of embedded control software: a case study
CASCON '03 Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative research
Detection of Redundant Code Using R2D2
Software Quality Control
ICSR '08 Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems
Science of Computer Programming
Case study of a method for reengineering procedural systems into OO systems
ICSR'06 Proceedings of the 9th international conference on Reuse of Off-the-Shelf Components
Hi-index | 0.00 |
This paper demonstrates the use of an integrated toolset for program understanding. By leveraging the unique capabilities of individual tools, and exploiting their power in combination, the resultant toolset is able to facilitate specific reverse engineering tasks that would otherwise be difficult or impossible. This is illustrated by applying the integrated toolset to several typical reverse engineering scenarios, including code localization, data flow analysis, pattern matching, system clustering, and visualization, using a mid-size production program as the reference system.