Author of the publication

Do Program Transformations Help Reverse Engineering?

. ICSM, page 247-. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypothesis-based concept assignment in software maintenance., and . IEE Proceedings - Software, 149 (4): 103-110 (2002)Message Transport on the Cambridge Ring-A Simulation study., and . Softw., Pract. Exper., 11 (7): 711-716 (1981)A Model for a Broadband Cellular Wireless Network for Digital Communications., , and . Computer Networks and ISDN Systems, 26 (4): 391-402 (1993)Approaches to program comprehension., , , and . Journal of Systems and Software, 14 (2): 79-84 (1991)Do Program Transformations Help Reverse Engineering?. ICSM, page 247-. IEEE Computer Society, (1998)An Architectural Model for Service-Based Software with Ultra Rapid Evolution., , , , , and . ICSM, page 292-300. IEEE Computer Society, (2001)Private Information Retrieval in the Presence of Malicious Failures., , and . COMPSAC, page 805-812. IEEE Computer Society, (2002)Prototype Implementations of an Architectural Model for Service-Based Flexible Software., , , , , , , and . HICSS, page 76. IEEE Computer Society, (2002)New co-editor for journal of software maintenance.. Journal of Software Maintenance, 4 (4): 181 (1992)Formal methods for legacy systems., and . Journal of Software Maintenance, 7 (3): 203-219 (1995)