Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
fm2011.lero.ie
WCRE is the premier research conference on the theory and practice of recovering information from existing software and
systems. WCRE explores innovative methods of extracting the many kinds of information that can be recovered from
software, software engineering documents, and systems arti-facts, and examines innovative ways of using this information
in system renovation and program understanding.
GENERAL CHAIRSJim Buckley
University of Limerick, Ireland
Elliot ChikofskyEngineering Management & Integration, USA
PROGRAM CHAIRSMartin Pinzger
Delft University of Technology, The NetherlandsDenys Poshyvanyk
The College of William and Mary, USA
DOCTORAL SYMPOSIUMMichele Lanza
University of Lugano, Switzerland
Radu MarinescuUniversity of Timisoara, Romania
WORKSHOP CHAIRSMichael Collard
The University of Akron, USA
Jens KnodelFraunhofer IESE, Germany
TOOL DEMO CHAIRSMircea Lungu
University of Berne, Switzerland
Huzefa KagdiWinston-Salem State University, USA
PUBLICITY CHAIRMichaela Greiler
Delft University of Technology, The Netherlands
http://www.cs.wm.edu/semeru/wcre2011
fm2011.lero.ie
FULL TECHNICAL PAPERS (TITLES)Make it or Break it: Mining Anomalies in Linux KbuildObject-Based Dynamic Protocol Recovery for Multi-Threading ProgramsRecommending People in Developers’ Collaboration NetworkAutomatic Extraction of Secrets from MalwareAutomatic Segmentation of Method Code into Meaningful Blocks to Improve ReadabilityLocating the Meaning of Terms in Source CodeRequirements Traceability for Object Oriented Systems by Partitioning Source CodeApproximate Code Search in Program HistoriesA Novel Analysis of Co-changeIncremental Code Clone Detection: A PDG-based ApproachSmartDec: approaching C++ decompilationCan we predict dependencies using domain information?Reverse Engineering of Mobile Application LifecyclesAssessing the Doc. of Design Patterns on Code Comprehension: Two Controlled ExperimentsHow Long does a Bug Survive? An Empirical StudyReverse Engineering of Event Handlers of RAD-Based ApplicationsA preliminary evaluation of text-based/dependency-based techniques for determining the origin of bugsImpact of Installation Counts on Perceived Quality: A Case Study on DebianMonitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity ViewsAn Expl. Study of the Evolution of Communicated Info. about the Execution of Large SystemsTowards the Extraction of Domain Concepts from the IdentifiersPrecise Static Analysis of Binaries by Extracting Relational InformationReverse Engineering of Protocols from Network TracesAn Entropy Evaluation Approach for Triaging Field Crashes: A Case Study of Mozilla FirefoxExploring the Intent behind API Evolution: A Case Study On the Effectiveness of Simhashing in Clone Detection on Large Scale Software SystemAn empirical study of framework design and usage for .NET
SHORT TECHNICAL PAPERS (TITLES)An Empirical Validation of the Benefits of Adhering to the Law of DemeterAn Investigation into the Impact of Software Licenses on Copy- and-Paste Reuse in OSS ProjectsReasoning over the evolution of source code with quantified regular path expressionsRefactoring Traditional Forms into Ajax-enabled FormsMeta-Level Runtime Feature Awareness for JavaAnalyzing the Source Code of Multiple Software Variants for Reuse PotentialUsing Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy CodeAn Android Security Case Study with BauhausAn Empirical Study of Refactoring in the Context of FanIn and FanOut CouplingReverse Engineering Feature Models From Programs’ Feature SetsAssessing Software Quality by Program Clustering and Defect PredictionModularization Metrics: Assessing Package Org. in Legacy Large Object-Oriented SoftwareCode Search via Topic-Enriched Dependency Graph MatchingReverse Engineering Co-maintenance Relationships Using Conceptual Analysis of CodeConcern Localization using Information Retrieval: An Empirical Study on Linux KernelMeasuring the Accuracy of Information Retrieval Based Bug Localization TechniquesGot Issues? Do New Features and Code Improvements Affect Defects?Internet-scale Real-time Code Clone Search via Multi-level IndexingUseful, but usable? Factors Affecting the Usability of APIsAn Exploratory Study of Software Reverse Engineering in a Security Context
KEYNOTESProfessor Mike HincheyEvolving Critical Systems
Mr Philip H. NewcombArchitecture-Driven Modernization of the European Air Traffic Management System