Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icsm/Bennett98
%A Bennett, Keith H.
%B ICSM
%D 1998
%I IEEE Computer Society
%K dblp
%P 247-
%T Do Program Transformations Help Reverse Engineering?
%U http://dblp.uni-trier.de/db/conf/icsm/icsm1998.html#Bennett98
%@ 0-8186-8779-7
@inproceedings{conf/icsm/Bennett98,
added-at = {2015-06-10T00:00:00.000+0200},
author = {Bennett, Keith H.},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/278f75d2572f2931dfc258bbf195e4089/dblp},
booktitle = {ICSM},
crossref = {conf/icsm/1998},
ee = {http://doi.ieeecomputersociety.org/10.1109/ICSM.1998.738516},
interhash = {c0abc1ca56011009eeae96ff1bd4d459},
intrahash = {78f75d2572f2931dfc258bbf195e4089},
isbn = {0-8186-8779-7},
keywords = {dblp},
pages = {247-},
publisher = {IEEE Computer Society},
timestamp = {2016-02-02T16:41:12.000+0100},
title = {Do Program Transformations Help Reverse Engineering?},
url = {http://dblp.uni-trier.de/db/conf/icsm/icsm1998.html#Bennett98},
year = 1998
}