Home  Sitemap  Kontakt 





 


TZI

---------------
 
 
Publikationen

All Publications of the Software Engineering Group

Books

  • BIB

    S. Bazrafshan. Empirical Research towards a Relevance Assessment of Software Clones. PhD Dissertation, University of Bremen, Germany, 2017.

    @phdthesis{Bazrafshan:Diss:17,
      author = {Saman Bazrafshan},
      school = {University of Bremen, Germany},
      year   = {2017},
      type   = {{PhD} Dissertation},
      title  = {Empirical Research towards a Relevance Assessment of Software Clones},
    }
  • BIB

    P. Frenzel. Erweiterung der Reflexionsmethode zur Zusammenfassung von Produktarchitekturen zu einer Produktlinienarchitektur. Dissertation, Universität Bremen, AG Softwaretechnik, Fachbereich Mathematik und Informatik, January 2014.

    @phdthesis{Frenzel:Diss:14,
      author  = {Pierre Frenzel},
      school  = {Universit{\"a}t Bremen},
      title   = {Erweiterung der Reflexionsmethode zur Zusammenfassung von Produktarchitekturen zu einer Produktlinienarchitektur},
      address = {AG Softwaretechnik, Fachbereich Mathematik und Informatik},
      month   = {January},
      year    = {2014},
      type    = {Dissertation},
    }
  • BIB

    R. Falke. Erkennung von Falsch-Positiven Softwareklonen mittels Lernverfahren. PhD Dissertation, University of Bremen, Germany, 2014.

    @phdthesis{Falke:Diss:14,
      author    = {Raimar Falke},
      publisher = {Logos Verlag},
      school    = {University of Bremen, Germany},
      isbn      = {978-3-8325-3651-0},
      title     = {Erkennung von Falsch-Positiven Softwareklonen mittels Lernverfahren},
      year      = {2014},
      type      = {{PhD} Dissertation},
    }
  • BIB

    R. Koschke, Y. Higo, N. Göde, editors. Proceedings of the International Workshop on Software Clones, volume 63, 2014. Electronic Communications of the EASST.

    @proceedings{Koschke:IWSC:14,
      editor    = {Rainer Koschke and Yoshiki Higo and Nils G{\"o}de},
      volume    = {63},
      publisher = {Electronic Communications of the EASST},
      issn      = {1863-2122},
      year      = {2014},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    R. Koschke, E. Jürgens, J. \"Rilling, editors. Proceedings of the International Workshop on Software Clones, 2013. ACM Press.

    @proceedings{Koschke:IWSC:13,
      editor    = {Rainer Koschke and Elmar J{\"u}rgens and J{\"u}rgen Rilling},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2013},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, J. Krinke, C. Roy, editors. Proceedings of the International Workshop on Software Clones, 2012. ACM Press.

    @proceedings{Inoue:IWSC:12,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke and Jens Krinke and Chanchal Roy},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2012},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071), volume 2, Dagstuhl, Germany, 2012. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.

    @proceedings{Koschke:Dagstuhl:12,
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {{Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)}},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      year      = {2012},
      urn       = {urn:nbn:de:0030-drops-34775},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2011. ACM Press.

    @proceedings{Inoue:IWSC:11,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    T. Mende. On the Evaluation of Defect Prediction Models. PhD Dissertation, University of Bremen, Germany, 2011.

    @phdthesis{Mende:Diss:11,
      author    = {Thilo Mende},
      publisher = {Verlag MV-Wissenschaft},
      school    = {University of Bremen, Germany},
      isbn      = {978-3-86991-500-5},
      title     = {On the Evaluation of Defect Prediction Models},
      year      = {2011},
      type      = {{PhD} Dissertation},
    }
  • BIB

    N. Göde. Clone Evolution. PhD dissertation, University of Bremen, Bremen, Germany, 2011.

    @phdthesis{Goede:Diss,
      author    = {Nils G\"{o}de},
      publisher = {Logos Verlag},
      school    = {University of Bremen},
      isbn      = {978-3-8325-2920-8},
      title     = {Clone Evolution},
      address   = {Bremen, Germany},
      year      = {2011},
      type      = {{PhD} dissertation},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2010. ACM Press.

    @proceedings{Inoue:IWSC:10,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2010},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    J. Quante. Dynamic Object Process Graphs. PhD dissertation, University of Bremen, Bremen, Germany, 2009.

    @phdthesis{Quante:Diss,
      author    = {Jochen Quante},
      publisher = {MV-Verlag},
      school    = {University of Bremen},
      isbn      = {978-3-86582-869-9},
      title     = {Dynamic Object Process Graphs},
      address   = {Bremen, Germany},
      year      = {2009},
      type      = {{PhD} dissertation},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2009. ACM Press.

    @proceedings{Inoue:IWSC:09,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Hölscher. Autonomous units as a rule based concept for the modeling of autonomous and cooperating processes. PhD Dissertation, University of Bremen, Germany, 2008.

    @phdthesis{Hoelscher:Diss:2008,
      author    = {Karsten H{\"o}lscher},
      publisher = {Logos Verlag},
      school    = {University of Bremen, Germany},
      isbn      = {978-3-8325-2090-8},
      title     = {Autonomous units as a rule based concept for the modeling of autonomous and cooperating processes},
      year      = {2008},
      type      = {{PhD} Dissertation},
    }
  • BIB

    R. Koschke, O. Herzog, K. Rödiger, M. Ronthaler, editors. INFORMATIK 2007 — Informatik trifft Logistik: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V., volume P-109 (Band 1) und P-110 (Band 2) of Lecture Notes in Informatics (LNI), Bonn, September 2007.

    @proceedings{Koschke:GI:07,
      editor       = {Rainer Koschke and Otthein Herzog and Karl-Heinz R{\"o}diger and Marc Ronthaler},
      title        = {{INFORMATIK 2007 --- Informatik trifft Logistik: Beitr{\"a}ge der 37. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V.}},
      series       = {Lecture Notes in Informatics (LNI)},
      address      = {Bonn},
      month        = {September},
      volume       = {P-109 (Band 1) und P-110 (Band 2)},
      year         = {2007},
      organization = {Gesellschaft f{\"u}r Informatik e.V.},
    }
  • BIB

    R. Koschke, E. Merlo, A. Walenstein, editors. Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.

    @proceedings{Koschke:Dagstuhl-Proc:07,
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Duplication, Redundancy, and Similarity in Software},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2009-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB

    C. Maeder. Zur Kontextanalyse einer algebraischen Programmiersprache. TU Berlin, June 2001.

    @phdthesis{Maeder:Diss:01,
      author = {Christian Maeder},
      month  = {June},
      school = {TU Berlin},
      year   = {2001},
      title  = {Zur Kontextanalyse einer algebraischen Programmiersprache},
    }
  • BIB

    R. Koschke. Atomic Architectural Component Recovery for Program Understanding and Evolution. Institute of Software Technology, University of Stuttgart, Germany, 1999.

    @phdthesis{Koschke:Thesis:99,
      author = {Rainer Koschke},
      school = {Institute of Software Technology, University of Stuttgart, Germany},
      year   = {1999},
      title  = {Atomic Architectural Component Recovery for Program Understanding and Evolution},
    }

Bookchapters

  • BIB

    R. Koschke. Software Engineering: International Summer Schools, Architecture Reconstruction, 140–173. Springer Verlag, 2009. edited by Andrea De Lucia and Filomena Ferrucci.

    @inbook{Koschke:ISSSE:09,
      author    = {Rainer Koschke},
      chapter   = {Architecture Reconstruction},
      publisher = {Springer Verlag},
      isbn      = {3-540-95887-8},
      title     = {Software Engineering: International Summer Schools},
      note      = {edited by Andrea De Lucia and Filomena Ferrucci},
      year      = {2009},
      pages     = {140--173},
    }
  • BIB

    R. Koschke. Software Evolution, Identifying and Removing Software Clones, 15–39. Springer Verlag, 2008. Editors: Serge Demeyer and Tom Mens.

    @inbook{Koschke:Buch:08,
      author    = {Rainer Koschke},
      chapter   = {Identifying and Removing Software Clones},
      publisher = {Springer Verlag},
      title     = {Software Evolution},
      booktitle = {Software Evolution},
      note      = {Editors: Serge Demeyer and Tom Mens},
      year      = {2008},
      pages     = {15--39},
    }
  • BIB

    R. Koschke, E. Plödereder. F. Lehner, editor. Ansätze des Programmverstehens, 159–176. Deutscher Universitätsverlag/Gabler Vieweg Westdeutscher Verlag, 1996.

    @inbook{Koschke:Buch:96,
      author    = {Rainer Koschke and Erhard Pl{\"o}dereder},
      editor    = {Franz Lehner},
      publisher = {Deutscher Universit{\"a}tsverlag/Gabler Vieweg Westdeutscher Verlag},
      booktitle = {{Softwarewartung und Reengineering - Erfahrungen und Entwicklungen}},
      year      = {1996},
      pages     = {159--176},
      title     = {{Ans{\"a}tze des Programmverstehens}},
    }

Journal Articles

  • BIB DOI

    T. Mustafa, K. Sohr. Understanding the Implemented Access Control Policy of Android System Services with Slicing and Extended Static Checking. Int. J. Inf. Secur. August 2015; 14(4):347–366.

    @article{Mustafa:2015:UIA:2807721.2807786,
      author     = {Tanveer Mustafa and Karsten Sohr},
      numpages   = {20},
      publisher  = {Springer-Verlag},
      issue_date = {August 2015},
      doi        = {10.1007/s10207-014-0260-y},
      acmid      = {2807786},
      title      = {Understanding the Implemented Access Control Policy of Android System Services with Slicing and Extended Static Checking},
      url        = {http://dx.doi.org/10.1007/s10207-014-0260-y},
      journal    = {Int. J. Inf. Secur.},
      issn       = {1615-5262},
      number     = {4},
      month      = {August},
      volume     = {14},
      year       = {2015},
      keywords   = {Android, Extended static checking, Java Modeling Language, Slicing},
      pages      = {347--366},
      address    = {Berlin, Heidelberg},
    }
  • BIB DOI

    W. Maalej, R. Tiarks, T. Roehm, R. Koschke. On the Comprehension of Program Comprehension. ACM Transactions on Software Engineering and Methodology September 2014; 23(4):31:1–31:37.

    @article{Maalej:TOSEM:14,
      author     = {Walid Maalej and Rebecca Tiarks and Tobias Roehm and Rainer Koschke},
      numpages   = {37},
      publisher  = {ACM Press},
      issue_date = {August 2014},
      doi        = {10.1145/2622669},
      acmid      = {2622669},
      title      = {On the Comprehension of Program Comprehension},
      url        = {http://doi.acm.org/10.1145/2622669},
      journal    = {ACM Transactions on Software Engineering and Methodology},
      issn       = {1049-331X},
      number     = {4},
      month      = {September},
      volume     = {23},
      year       = {2014},
      keywords   = {Empirical software engineering, context-aware software engineering, information needs, knowledge sharing, program comprehension},
      articleno  = {31},
      pages      = {31:1--31:37},
    }
  • BIB DOI

    R. Koschke. Large-scale inter-system clone detection using suffix trees and hashing. Journal of Software: Evolution and Process August 2014; 26(8):747–769.

    @article{Koschke:JSEP:14,
      author  = {Rainer Koschke},
      doi     = {DOI: 10.1002/smr.1592},
      title   = {Large-scale inter-system clone detection using suffix trees and hashing},
      journal = {Journal of Software: Evolution and Process},
      number  = {8},
      month   = {August},
      volume  = {26},
      year    = {2014},
      pages   = {747--769},
    }
  • BIB

    O. Riemann, R. Koschke. Robust Parsing of Cloned Token Sequences. Electronic Communications of the EASST 2014; 63:20 pages. Proceedings of the International Workshop on Software Clones 2014.

    @article{Riemann:IWSC:14,
      author  = {Ole Riemann and Rainer Koschke},
      note    = {Proceedings of the International Workshop on Software Clones 2014},
      title   = {Robust Parsing of Cloned Token Sequences},
      journal = {Electronic Communications of the EASST},
      issn    = {1863-2122},
      volume  = {63},
      year    = {2014},
      pages   = {20 pages},
    }
  • BIB DOI

    J. Harder, N. Göde. Cloned code: stable code. Journal of Software: Evolution and Process October 2013; 25(10):1063–1088.

    @article{Harder:JSEP:13,
      author  = {Jan Harder and Nils G\"{o}de},
      doi     = {10.1002/smr.1551},
      title   = {Cloned code: stable code},
      url     = {http://dx.doi.org/10.1002/smr.1551},
      journal = {Journal of Software: Evolution and Process},
      issn    = {2047--7481},
      number  = {10},
      month   = {October},
      volume  = {25},
      year    = {2013},
      pages   = {1063--1088},
    }
  • BIB DOI

    N. Göde, R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process February 2013; 25(2):165–192.

    @article{Goede:JSME:13,
      author  = {Nils G\"{o}de and Rainer Koschke},
      doi     = {10.1002/smr.520},
      title   = {Studying clone evolution using incremental clone detection},
      journal = {Journal of Software: Evolution and Process},
      issn    = {2047-7473},
      number  = {2},
      month   = {February},
      volume  = {25},
      year    = {2013},
      pages   = {165--192},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. Journal of Software: Evolution and Process 2013; 25(6):601–638. Special Issue of CSMR'2010.

    @article{Koschke:JSME:13,
      author  = {Rainer Koschke},
      note    = {Special Issue of CSMR'2010},
      title   = {Incremental Reflexion Analysis},
      journal = {Journal of Software: Evolution and Process},
      number  = {6},
      volume  = {25},
      year    = {2013},
      pages   = {601--638},
    }
  • BIB DOI

    K. Sohr, M. Kuhlmann, M. Gogolla, H. Hu, G. Ahn. Comprehensive Two-level Analysis of Role-based Delegation and Revocation Policies with UML and OCL. Inf. Softw. Technol. December 2012; 54(12):1396–1417.

    @article{Sohr:2012:CTA:2365358.2365402,
      author     = {Karsten Sohr and Mirco Kuhlmann and Martin Gogolla and Hongxin Hu and Gail-Joon Ahn},
      numpages   = {22},
      publisher  = {Butterworth-Heinemann},
      issue_date = {December, 2012},
      doi        = {10.1016/j.infsof.2012.06.008},
      acmid      = {2365402},
      title      = {Comprehensive Two-level Analysis of Role-based Delegation and Revocation Policies with UML and OCL},
      url        = {http://dx.doi.org/10.1016/j.infsof.2012.06.008},
      journal    = {Inf. Softw. Technol.},
      issn       = {0950-5849},
      number     = {12},
      month      = {December},
      volume     = {54},
      year       = {2012},
      keywords   = {Delegation, OCL, RBAC, Revocation, UML},
      pages      = {1396--1417},
      address    = {Newton, MA, USA},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements. International Journal On Advances in Security July 2012; 5(1&2):46–67.

    @article{Bunke:IJOAS:2012,
      author    = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher = {XPS (Xpert Publishing Services)},
      title     = {Organizing Security Patterns Related to Security and Pattern Recognition Requirements},
      journal   = {International Journal On Advances in Security},
      issn      = {1942-2636},
      number    = {1\&2},
      month     = {July},
      volume    = {5},
      year      = {2012},
      pages     = {46--67},
    }
  • BIB

    R. Santiago, C. Maeder. Linguistic Variables of Type-N - a Mathematical Model. Tendencias em Matematica Aplicada e Computacional (TEMA) April 2011; 12(1):21–30.

    @article{Regivan:SBMAC:11,
      author    = {Regivan Santiago and Christian Maeder},
      publisher = {SBMAC, Brasil},
      title     = {{Linguistic Variables of Type-N - a Mathematical Model}},
      journal   = {Tendencias em Matematica Aplicada e Computacional (TEMA)},
      number    = {1},
      month     = {April},
      volume    = {12},
      pages     = {21--30},
      year      = {2011},
      keywords  = {Fuzzy Sets, Type-n Fuzzy sets, systems of type-n, n-homogeneous linguistic variables, heterogeneous linguistic variables},
      abstract  = {This work proposes a generalization for the notions of Linguistic Variables and Fuzzification Process. The idea is to provide a concept of fuzzy systems in which the linguistic terms of a linguistic variable are not necessarily connected with fuzzy sets of the same type. Those systems are called here Systems of Type-n. We introduce concepts like n-Homogeneous linguistic variables which emphasizes the occurrence of different levels of uncertainty in such Fuzzy systems. The most important result is the statement of the General Fuzzification Expression (GFE) which establishes how the fuzzification process must be calculated in every system of type-n.},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An extended assessment of type-3 clones as detected by state-of-the-art tools. Software Quality Journal 2011; 19(2):295–331.

    @article{Tiarks:SQJ:11,
      author  = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      title   = {An extended assessment of type-3 clones as detected by state-of-the-art tools},
      journal = {Software Quality Journal},
      number  = {2},
      volume  = {19},
      year    = {2011},
      pages   = {295--331},
    }
  • BIB

    R. Koschke, P. Frenzel, A. Breu, K. Angstmann. Extending the reflexion method for consolidating software variants into product lines. Software Quality Journal December 2009; 17(4):331–366.

    @article{Koschke:SQJ:09,
      author  = {Rainer Koschke and Pierre Frenzel and Andreas Breu and Karsten Angstmann},
      title   = {Extending the reflexion method for consolidating software variants into product lines},
      journal = {Software Quality Journal},
      number  = {4},
      month   = {December},
      volume  = {17},
      year    = {2009},
      pages   = {331--366},
    }
  • BIB

    T. Mende, R. Koschke, F. Beckwermert. An Evaluation of Code Similarity Identification for the Grow-and-Prune Model. Journal on Software Maintenance and Evolution March–April 2009; 21(2):143 – 169.

    @article{Mende:JSME:09,
      author  = {Thilo Mende and Rainer Koschke and Felix Beckwermert},
      title   = {An Evaluation of Code Similarity Identification for the Grow-and-Prune Model},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {21},
      year    = {2009},
      pages   = {143 -- 169},
    }
  • BIB

    K. Hölscher, H. \"Kreowski, S. Kuske. Autonomous Units to Model Interacting Sequential and Parallel Processes. Fundamenta Informaticae 2009; 92:233–257.

    @article{Hoelscher:Journal:2009,
      author  = {Karsten H{\"o}lscher and Hans-J{\"o}rg Kreowski and Sabine Kuske},
      volume  = {92},
      journal = {Fundamenta Informaticae},
      year    = {2009},
      pages   = {233--257},
      title   = {Autonomous Units to Model Interacting Sequential and Parallel Processes},
    }
  • BIB DOI

    C. Roy, J. Cordy, R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Journal of Science of Computer Programming 2009; 74(7):470-495. Special Issue on Program Comprehension (ICPC 2008), unter den fünf am häufigsten zitierten Artikeln von Science of Computer Programming seit 2007.

    @article{Roy:JSCP:09,
      author   = {Chanchal Roy and James Cordy and Rainer Koschke},
      note     = {{Special Issue on Program Comprehension (ICPC 2008)}, unter den f{\"u}nf am h{\"a}ufigsten zitierten Artikeln von Science of Computer Programming seit 2007},
      doi      = {doi:10.1016/j.scico.2009.02.007},
      title    = {Comparison and evaluation of code clone detection techniques and tools: A qualitative approach},
      journal  = {Journal of Science of Computer Programming},
      number   = {7},
      pages    = {470-495},
      volume   = {74},
      year     = {2009},
      abstract = {Over the last decade many techniques and tools for software clone detection have been proposed. In this paper, we provide a qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools, and organize the large amount of information into a coherent conceptual framework. We begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools. We then classify, compare and evaluate the techniques and tools in two different dimensions. First, we classify and compare approaches based on a number of facets, each of which has a set of (possibly overlapping) attributes. Second, we qualitatively evaluate the classified techniques and tools with respect to a taxonomy of editing scenarios designed to model the creation of Type-1, Type-2, Type-3 and Type-4 clones. Finally, we provide examples of how one might use the results of this study to choose the most appropriate clone detection tool or technique in the context of a particular set of goals and constraints. The primary contributions of this paper are: (1) a schema for classifying clone detection techniques and tools and a classification of current clone detectors based on this schema, and (2) a taxonomy of editing scenarios that produce different clone types and a qualitative evaluation of current clone detectors based on this taxonomy.},
      mongth   = {May},
    }
  • BIB

    B. Cornelissen, A. Zaidman, A. Deursen, L. Moonen, R. Koschke. A Systematic Survey of Program Comprehension through Dynamic Analysis. IEEE Computer Society Transactions on Software Engineering 2009; 35(5):684–702.

    @article{Cornelissen:TSE:09,
      author  = {Bas Cornelissen and Andy Zaidman and Arie Deursen and Leon Moonen and Rainer Koschke},
      title   = {A Systematic Survey of Program Comprehension through Dynamic Analysis},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {5},
      volume  = {35},
      year    = {2009},
      pages   = {684--702},
    }
  • BIB DOI

    K. Sohr, M. Drouineaud, G. Ahn, M. Gogolla. Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. on Knowl. and Data Eng. July 2008; 20(7):924–939.

    @article{Sohr:2008:AMR:1383051.1383240,
      author     = {Karsten Sohr and Michael Drouineaud and Gail-Joon Ahn and Martin Gogolla},
      numpages   = {16},
      publisher  = {IEEE Educational Activities Department},
      issue_date = {July 2008},
      doi        = {10.1109/TKDE.2008.28},
      acmid      = {1383240},
      title      = {Analyzing and Managing Role-Based Access Control Policies},
      url        = {http://dx.doi.org/10.1109/TKDE.2008.28},
      journal    = {IEEE Trans. on Knowl. and Data Eng.},
      issn       = {1041-4347},
      number     = {7},
      month      = {July},
      volume     = {20},
      year       = {2008},
      keywords   = {Access controls, Access controls, Protection mechanisms, Protection mechanisms},
      pages      = {924--939},
      address    = {Piscataway, NJ, USA},
    }
  • BIB

    J. Buckley, A. LeGear, C. Exton, R. Cadogan, T. Johnston, B. Looby, R. Koschke. Encapsulating targeted component abstractions using software Reflexion Modelling. Journal on Software Maintenance and Evolution March–April 2008; 20(2):107–134.

    @article{Buckley:JSME:08,
      author  = {Jim Buckley and Andrew LeGear and Chris Exton and Ross Cadogan and Trevor Johnston and Bill Looby and Rainer Koschke},
      title   = {Encapsulating targeted component abstractions using software Reflexion Modelling},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {20},
      year    = {2008},
      pages   = {107--134},
    }
  • BIB DOI

    R. Falke, R. Koschke, P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering 2008; 13(6):601–643.

    @article{falke:emse:08,
      author  = {Raimar Falke and Rainer Koschke and Pierre Frenzel},
      doi     = {10.1007/s10664-008-9073-9},
      title   = {Empirical Evaluation of Clone Detection Using Syntax Suffix Trees},
      journal = {Empirical Software Engineering},
      issn    = {1382-3256},
      number  = {6},
      volume  = {13},
      year    = {2008},
      pages   = {601--643},
    }
  • BIB DOI

    J. Quante, R. Koschke. Dynamic Object Process Graphs. Journal of Systems and Software 2008; 81:481–501.

    @article{Quante:JSS:08,
      author  = {Jochen Quante and Rainer Koschke},
      doi     = {10.1016/j.jss.2007.06.005},
      title   = {Dynamic Object Process Graphs},
      journal = {Journal of Systems and Software},
      volume  = {81},
      year    = {2008},
      annote  = {Special Issue for IEEE Conference on Software Maintenance and Reengineering (CSMR) 2006},
      issue   = {4},
      pages   = {481--501},
    }
  • BIB

    S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE Computer Society Transactions on Software Engineering September 2007; 33(9):577–591.

    @article{Bellon:TSE:07,
      author  = {Stefan Bellon and Rainer Koschke and Giulio Antoniol and Jens Krinke and Ettore Merlo},
      title   = {Comparison and Evaluation of Clone Detection Tools},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {9},
      month   = {September},
      volume  = {33},
      year    = {2007},
      pages   = {577--591},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Automated Clustering to Support the Reflexion Method. Journal of Systems and Software 2007; 49(3):255–274. Special Issue on WCRE 2005.

    @article{Christl:IST:07,
      author  = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      volume  = {49},
      title   = {Automated Clustering to Support the Reflexion Method},
      journal = {Journal of Systems and Software},
      number  = {3},
      note    = {Special Issue on WCRE 2005},
      year    = {2007},
      pages   = {255--274},
    }
  • BIB

    R. Koschke, G. Canfora, J. \"Czeranski. Revisiting the Delta-IC Approach. Journal of Science of Computer Programming 2006; 60(2):171–188.

    @article{Koschke:JSCP:06,
      author  = {Rainer Koschke and Gerardo Canfora and J{\"o}rg Czeranski},
      title   = {Revisiting the Delta-IC Approach},
      journal = {Journal of Science of Computer Programming},
      number  = {2},
      volume  = {60},
      year    = {2006},
      pages   = {171--188},
    }
  • BIB

    K. Hölscher, P. Ziemann, M. Gogolla. On Translating UML Models into Graph Transformation Systems. Journal of Visual Languages and Computing 2006; 17(1):78–105.

    @article{Hoelscher:Journal:2006,
      author  = {Karsten H{\"o}lscher and Paul Ziemann and Martin Gogolla},
      title   = {On Translating {UML} Models into Graph Transformation Systems},
      journal = {Journal of Visual Languages and Computing},
      number  = {1},
      volume  = {17},
      year    = {2006},
      pages   = {78--105},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Object Trace Extraction for Programs with Pointers. Journal of Systems and Software September 2005; 77(3):263–284.

    @article{Eisenbarth:JSS:05,
      author   = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      title    = {Static Object Trace Extraction for Programs with Pointers},
      journal  = {Journal of Systems and Software},
      number   = {3},
      abstract = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general. In addition, this article describes four case studies we conducted to explore the efficiency of our algorithm, the size of the resulting static traces, and the influence of the underlying points-to analysis on this size.},
      month    = {September},
      volume   = {77},
      year     = {2005},
      pages    = {263--284},
    }
  • BIB DOI

    K. Sohr, G. Ahn, L. Migge. Articulating and Enforcing Authorisation Policies with UML and OCL. SIGSOFT Softw. Eng. Notes May 2005; 30(4):1–7.

    @article{Sohr:2005:AEA:1082983.1083215,
      author     = {Karsten Sohr and Gail-Joon Ahn and Lars Migge},
      numpages   = {7},
      publisher  = {ACM},
      issue_date = {July 2005},
      doi        = {10.1145/1082983.1083215},
      acmid      = {1083215},
      title      = {Articulating and Enforcing Authorisation Policies with UML and OCL},
      url        = {http://doi.acm.org/10.1145/1082983.1083215},
      journal    = {SIGSOFT Softw. Eng. Notes},
      issn       = {0163-5948},
      number     = {4},
      month      = {May},
      volume     = {30},
      year       = {2005},
      pages      = {1--7},
      address    = {New York, NY, USA},
    }
  • BIB DOI

    R. Koschke. Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten. Informatik – Forschung und Entwicklung, Springer Verlag April 2005; 19(3).

    @article{Koschke:InFE:05,
      author  = {Rainer Koschke},
      doi     = {10.1007/s00450-005-0180-1},
      title   = {{Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten}},
      journal = {{Informatik -- Forschung und Entwicklung, Springer Verlag}},
      number  = {3},
      month   = {April},
      volume  = {19},
      year    = {2005},
    }
  • BIB

    A. Walenstein, A. Lakhotia, R. Koschke. Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes March 2004; 29(2):1–5.

    @article{Walenstein:SEN:04,
      author  = {Andrew Walenstein and Arun Lakhotia and Rainer Koschke},
      title   = {Second International Workshop on Detection of Software Clones: workshop report},
      journal = {ACM SIGSOFT Software Engineering Notes},
      number  = {2},
      month   = {March},
      volume  = {29},
      year    = {2004},
      pages   = {1--5},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Viewpoints in Software Architecture Reconstruction. Softwaretechnik Trends 2004; 24(2).

    @article{Deursen:ST:04,
      author  = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {Viewpoints in Software Architecture Reconstruction},
    }
  • BIB

    R. Koschke, D. Simon. Symphony Fallstudie: Hierarchische Reflexion Modelle. Softwaretechnik Trends 2004; 24(2).

    @article{Koschke:ST:04,
      author  = {Rainer Koschke and Daniel Simon},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {{Symphony Fallstudie: Hierarchische Reflexion Modelle}},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Locating Features in Source Code. IEEE Computer Society Transactions on Software Engineering March 2003; 29(3):210–224.

    @article{Eisenbarth:TSE:03,
      author   = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      title    = {Locating Features in Source Code},
      journal  = {IEEE Computer Society Transactions on Software Engineering},
      number   = {3},
      abstract = {Understanding the implementation of a certain feature of a system requires identification of the computational units of the system that contribute to this feature. In many cases, the mapping of features to the source code is poorly documented. In this paper, we present a semiautomatic technique that reconstructs the mapping for features that are triggered by the user and exhibit an observable behavior. The mapping is in general not injective; that is, a computational unit may contribute to several features. Our technique allows for the distinction between general and specific computational units with respect to a given set of features. For a set of features, it also identifies jointly and distinctly required computational units. The presented technique combines dynamic and static analyses to rapidly focus on the system's parts that relate to a specific set of features. Dynamic information is gathered based on a set of scenarios invoking the features. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features. Furthermore, we show how our method allows incremental exploration of features while preserving the "mental map" the analyst has gained through the analysis.},
      month    = {March},
      volume   = {29},
      year     = {2003},
      annote   = {Special issue on ICSM 2001},
      pages    = {210--224},
    }
  • BIB

    R. Koschke. Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey. Journal on Software Maintenance and Evolution March 2003; 15:87–109.

    @article{Koschke:JSME:03,
      author  = {Rainer Koschke},
      title   = {Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey},
      journal = {Journal on Software Maintenance and Evolution},
      month   = {March},
      volume  = {15},
      year    = {2003},
      pages   = {87--109},
    }
  • BIB

    J. F. Girard, R. Koschke. A Comparison of Abstract Data Type and Objects Recovery Techniques. Journal Science of Computer Programming, Elsevier Science March 2000; 6(2–3):149-181.

    @article{Girard:JSCP:00,
      author  = {Jean-Francois Girard and Rainer Koschke},
      title   = {A Comparison of Abstract Data Type and Objects Recovery Techniques},
      journal = {Journal Science of Computer Programming, Elsevier Science},
      number  = {2--3},
      month   = {March},
      volume  = {6},
      year    = {2000},
      pages   = {149-181},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. Journal on Automated Software Engineering, Kluwer Academic Publishers 1999; 6(4).

    @article{Girard:JASE:99,
      author  = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      volume  = {6},
      journal = {Journal on Automated Software Engineering, Kluwer Academic Publishers},
      year    = {1999},
      number  = {4},
      title   = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }

Conference and Workshop Articles

  • BIB

    B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors, International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6–8, 2016. Proceedings, Springer Verlag, 2016; 56–71.

    @inproceedings{Berger:ESSOS:16,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Juan Caballero and Eric Bodden and Elias Athanasopoulos},
      publisher = {Springer Verlag},
      isbn      = {978-3-319-30806-7},
      title     = {Automatically Extracting Threats from Extended Data Flow Diagrams},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6--8, 2016. Proceedings},
      year      = {2016},
      pages     = {56--71},
    }
  • BIB

    R. Koschke, S. Bazrafshan. Software-Clone Rates in Open-Source Programs Written in C or C++. International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER), volume 3, IEEE Computer Society Press, 2016; 1–7.

    @inproceedings{Koschke:IWSC:16,
      author    = {Rainer Koschke and Saman Bazrafshan},
      publisher = {IEEE Computer Society Press},
      title     = {Software-Clone Rates in Open-Source Programs Written in C or C++},
      booktitle = {International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER)},
      volume    = {3},
      year      = {2016},
      pages     = {1--7},
    }
  • BIB

    R. Drechsler, G. R. Fey, R. Koschke, W. Nebel. Vision for the Design of Long-term Autonomous Systems. International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), 2015. Invited Talk.

    @inproceedings{Drechsler:ReCoSoC:15,
      author    = {Rolf Drechsler and Görschwin Fey and Rainer Koschke and Wolfgang Nebel},
      note      = {Invited Talk},
      booktitle = {International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)},
      year      = {2015},
      title     = {Vision for the Design of Long-term Autonomous Systems},
    }
  • BIB

    H. Basit, M. Hammad, R. Koschke. What Do We Need to Know about Clones? Deriving Information Needs from User Goals. International Workshop on Software Clones, IEEE Computer Society Press, 2015; 51–57.

    @inproceedings{Basit:IWSC:15,
      author    = {Hamid Basit and Muhammad Hammad and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Workshop on Software Clones},
      year      = {2015},
      pages     = {51--57},
      title     = {What Do We Need to Know about Clones? Deriving Information Needs from User Goals},
    }
  • BIB

    D. Lüdemann, R. Koschke. From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2015; 211–220.

    @inproceedings{Luedemann:SCAM:15,
      author    = {Dierk L{\"u}demann and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2015},
      pages     = {211--220},
      title     = {From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow},
    }
  • BIB

    H. Basit, M. Hammad, R. Koschke. A Survey on Goal-Oriented Visualization of Clone Data. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, 2015; 46–55.

    @inproceedings{Basit:VISSOFT:15,
      author    = {Hamid Basit and Muhammad Hammad and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE Working Conference on Software Visualization},
      year      = {2015},
      pages     = {46--55},
      title     = {A Survey on Goal-Oriented Visualization of Clone Data},
    }
  • BIB DOI

    L. Hamann, K. Sohr, M. Gogolla. Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. F. Piessens, J. Caballero, N. Bielova, editors, Proceedings of the 7th International Symposium on Engineering Secure Software and Systems, Springer International Publishing, 2015; 211–226. Cham.

    @inproceedings{Hamann2015,
      author    = {Lars Hamann and Karsten Sohr and Martin Gogolla},
      editor    = {Frank Piessens and Juan Caballero and Nataliia Bielova},
      publisher = {Springer International Publishing},
      doi       = {10.1007/978-3-319-15618-7_16},
      isbn      = {978-3-319-15618-7},
      title     = {Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study},
      url       = {http://dx.doi.org/10.1007/978-3-319-15618-7_16},
      booktitle = {Proceedings of the 7th International Symposium on Engineering Secure Software and Systems},
      address   = {Cham},
      location  = {Milan, Italy},
      year      = {2015},
      pages     = {211--226},
    }
  • BIB DOI

    M. Bunke. On the Description of Software Security Patterns. Proceedings of the 19th European Conference on Pattern Languages of Programs, ACM, 2014; 34:1–34:10. New York, NY, USA.

    @inproceedings{Bunke:EUROPLOP:2014,
      author    = {Michaela Bunke},
      numpages  = {10},
      publisher = {ACM},
      doi       = {10.1145/2721956.2721990},
      isbn      = {978-1-4503-3416-7},
      title     = {On the Description of Software Security Patterns},
      url       = {http://doi.acm.org/10.1145/2721956.2721990},
      series    = {EuroPLoP '14},
      booktitle = {Proceedings of the 19th European Conference on Pattern Languages of Programs},
      acmid     = {2721990},
      location  = {Irsee, Germany},
      year      = {2014},
      keywords  = {design patterns, patterns, security patterns},
      articleno = {34},
      pages     = {34:1--34:10},
      address   = {New York, NY, USA},
    }
  • BIB

    S. Bazrafshan, R. Koschke. Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2014; 1–10.

    @inproceedings{Bazrafshan:SCAM:14,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2014},
      pages     = {1--10},
      title     = {Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs},
    }
  • BIB

    C. Roy, M. Zibran, R. Koschke. The Vision of Software Clone Management: Past, Present and the Future. IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, IEEE Computer Society Press, 2014; 18–33. Invited Keynote Paper.

    @inproceedings{Roy:CSMRWCRE:14,
      author    = {Chanchal Roy and Minhaz Zibran and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {The Vision of Software Clone Management: Past, Present and the Future},
      booktitle = {IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week},
      note      = {Invited Keynote Paper},
      year      = {2014},
      pages     = {18--33},
    }
  • BIB

    S. Bartsch, B. Berger, E. Bodden, A. Brucker, J. Heider, M. Kus, S. \"Maseberg, K. Sohr, M. Volkamer. Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. V. Stefan, E. Weippl, editors, Sicherheit 2014 Sicherheit, Schutz und Zuverlässigkeit, volume 228 of LNI, GI, 2014; 283–291.

    @inproceedings{Bartsch:GI:2014,
      author    = {Steffen Bartsch and Bernhard Berger and Eric Bodden and Achim Brucker and Jens Heider and Mehmet Kus and S{\"o}nke Maseberg and Karsten Sohr and Melanie Volkamer},
      editor    = {Volkmar Stefan and Edgar Weippl},
      publisher = {GI},
      isbn      = {978-3-88579-622-0},
      title     = {Zertifizierte Datensicherheit f{\"u}r Android-Anwendungen auf Basis statischer Programmanalysen},
      series    = {LNI},
      booktitle = {Sicherheit 2014 Sicherheit, Schutz und Zuverl{\"a}ssigkeit},
      volume    = {228},
      year      = {2014},
      pages     = {283--291},
    }
  • BIB

    S. Bartsch, B. Berger, M. Bunke, K. Sohr. The Transitivity-of-Trust Problem in Android Application Interaction. Eighth International Conference on Availability, Reliability and Security (ARES), 2013, IEEE Computer Society Press, 2013; 291–296.

    @inproceedings{Bartsch:ARES:2013,
      author    = {Steffen Bartsch and Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES), 2013},
      year      = {2013},
      pages     = {291--296},
      title     = {The Transitivity-of-Trust Problem in Android Application Interaction},
    }
  • BIB

    S. Bazrafshan, R. Koschke. An Empirical Study of Clone Removals. International Conference on Software Maintenance, IEEE Computer Society Press, 2013; 50-59.

    @inproceedings{Bazrafshan:ICSM:2013,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {2013},
      pages     = {50-59},
      title     = {An Empirical Study of Clone Removals},
    }
  • BIB

    D. Chatterji, J. Carver, N. Kraft, J. Harder. Effects of Cloned Code on Software Maintainability: A Replicated Developer Study. Working Conference on Reverse Engineering, 2013; 112–121.

    @inproceedings{Chatterji:WCRE:2013,
      author    = {Debarshi Chatterji and Jeffrey Carver and Nicholas Kraft and Jan Harder},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2013},
      pages     = {112--121},
      title     = {Effects of Cloned Code on Software Maintainability: A Replicated Developer Study},
    }
  • BIB

    J. Harder. How Multiple Developers Affect Clone Evolution. International Conference on Software Maintenance, IEEE Computer Society, 2013; 30-39.

    @inproceedings{Harder:ICSM:2013,
      author    = {Jan Harder},
      publisher = {IEEE Computer Society},
      booktitle = {International Conference on Software Maintenance},
      year      = {2013},
      pages     = {30-39},
      title     = {How Multiple Developers Affect Clone Evolution},
    }
  • BIB

    S. Bazrafshan. No Clones, No Trouble? International Workshop on Software Clones, IEEE Computer Society, 2013; 37–38. Position Paper.

    @inproceedings{Bazrafshan:IWSC:13,
      author    = {Saman Bazrafshan},
      publisher = {IEEE Computer Society},
      title     = {No Clones, No Trouble?},
      booktitle = {International Workshop on Software Clones},
      note      = {Position Paper},
      year      = {2013},
      pages     = {37--38},
    }
  • BIB

    J. Harder. The Limits of Clone Model Standardization. International Workshop on Software Clones, IEEE Computer Society, 2013; 10–11. Position Paper.

    @inproceedings{Harder:IWSC:13,
      author    = {Jan Harder},
      publisher = {IEEE Computer Society},
      title     = {The Limits of Clone Model Standardization},
      booktitle = {International Workshop on Software Clones},
      note      = {Position Paper},
      year      = {2013},
      pages     = {10--11},
    }
  • BIB DOI

    B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors, European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2013; 285–294.

    @inproceedings{berger:csmr:13,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Anthony Cleve and Fillipo Ricca and Maura Cerioli},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/CSMR.2013.37},
      isbn      = {978-0-7695-4948-4},
      title     = {Extracting and Analyzing the Implemented Security Architecture of Business Applications},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      issn      = {1534-5351},
      year      = {2013},
      keywords  = {reverse engineering;software security;static analysis;threat modeling},
      pages     = {285--294},
    }
  • BIB

    M. Codescu, T. Mossakowski, C. Maeder. Checking conservativity with Hets. R. Heckel, S. Milius, editors, Algebra and Coalgebra in Computer Science, 5th International Conference, CALCO 2013, September 3-6, Warsaw, Poland, volume 8089 of Lecture Notes in Computer Science, Springer Verlag, 2013; 315–321.

    @inproceedings{Codescu:Hets:13,
      author    = {Mihai Codescu and Till Mossakowski and Christian Maeder},
      editor    = {Reiko Heckel and Stefan Milius},
      publisher = {Springer Verlag},
      title     = {{Checking conservativity with Hets}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Algebra and Coalgebra in Computer Science, 5th International Conference, CALCO 2013, September 3-6, Warsaw, Poland},
      volume    = {8089},
      year      = {2013},
      pages     = {315--321},
    }
  • BIB DOI

    C. Rubio-Medrano, G. Ahn, K. Sohr. Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference, IEEE Computer Society, 2013; 21–26. Washington, DC, USA.

    @inproceedings{Rubio-Medrano:2013:VAC:2546398.2546459,
      author    = {Carlos Rubio-Medrano and Gail-Joon Ahn and Karsten Sohr},
      numpages  = {6},
      publisher = {IEEE Computer Society},
      doi       = {10.1109/COMPSAC.2013.7},
      isbn      = {978-0-7695-4986-6},
      title     = {Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned},
      url       = {http://dx.doi.org/10.1109/COMPSAC.2013.7},
      series    = {COMPSAC '13},
      booktitle = {Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference},
      acmid     = {2546459},
      year      = {2013},
      keywords  = {security, access control, formal verification},
      pages     = {21--26},
      address   = {Washington, DC, USA},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors, Dagstuhl Reports, volume 2, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2012; 21–57. Dagstuhl, Germany.

    @inproceedings{koschke_et_al:DR:2012:3477,
      author    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      urn       = {urn:nbn:de:0030-drops-34775},
      year      = {2012},
      pages     = {21--57},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    S. Bazrafshan. Evolution of Near-Miss Clones. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2012; 74–83.

    @inproceedings{Bazrafshan:SCAM:2012,
      author    = {Saman Bazrafshan},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2012},
      pages     = {74--83},
      title     = {Evolution of Near-Miss Clones},
    }
  • BIB

    A. Hemel, R. Koschke. Reverse Engineering Variability in Source Code Using Clone Detection – A Case Study for Linux Variants of Consumer Electronic Devices. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2012; 357–366.

    @inproceedings{Hemel:WCRE:12,
      author    = {Armijn Hemel and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2012},
      pages     = {357--366},
      title     = {Reverse Engineering Variability in Source Code Using Clone Detection -- A Case Study for Linux Variants of Consumer Electronic Devices},
    }
  • BIB

    B. Berger, K. Sohr. An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. D. Gritzalis, S. Furnell, M. Theoharidou, editors, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, volume 376 of IFIP Advances in Information and Communication Technology, Springer Verlag, 2012; 25–36.

    @inproceedings{Berger:SEC:12,
      author    = {Bernhard Berger and Karsten Sohr},
      editor    = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-30435-4},
      title     = {An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling},
      series    = {IFIP Advances in Information and Communication Technology},
      booktitle = {Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings},
      volume    = {376},
      year      = {2012},
      pages     = {25--36},
    }
  • BIB

    B. Katzmarski, R. Koschke. Program complexity metrics and programmer opinions. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 17–26.

    @inproceedings{Katzmarski:ICPC:12,
      author    = {Bernhard Katzmarski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Program complexity metrics and programmer opinions},
      ee        = {http://dx.doi.org/10.1109/ICPC.2012.6240486},
      booktitle = {International Conference on Program Comprehension},
      year      = {2012},
      pages     = {17--26},
    }
  • BIB DOI

    J. Harder, R. Tiarks. A Controlled Experiment on Software Clones. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 219–228.

    @inproceedings{Harder:ICPC:12,
      author    = {Jan Harder and Rebecca Tiarks},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/ICPC.2012.6240491},
      title     = {A Controlled Experiment on Software Clones},
      booktitle = {International Conference on Program Comprehension},
      year      = {2012},
      pages     = {219--228},
    }
  • BIB DOI

    C. Kapser, J. Harder, I. Baxter. A Common Conceptual Model for Clone Detection Results. 6th International Workshop on Software Clones, IEEE Computer Society, 2012.

    @inproceedings{Kapser:IWSC:2012,
      author    = {Cory Kapser and Jan Harder and Ira Baxter},
      publisher = {IEEE Computer Society},
      booktitle = {6th International Workshop on Software Clones},
      year      = {2012},
      doi       = {http://dx.doi.org/10.1109/IWSC.2012.6227870},
      title     = {A Common Conceptual Model for Clone Detection Results},
    }
  • BIB

    R. Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2012; 309–318.

    @inproceedings{Koschke:CSMR:12,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2012},
      pages     = {309--318},
      title     = {Large-Scale Inter-System Clone Detection Using Suffix Trees},
    }
  • BIB

    T. Roehm, R. Tiarks, R. Koschke, W. Maalej. How Do Professional Developers Comprehend Software? International Conference on Software Engineering, ACM Press, 2012; 255–265. Distinguished Paper Award.

    @inproceedings{Roehm:ICSE:12,
      author    = {Tobias Roehm and Rebecca Tiarks and Rainer Koschke and Walid Maalej},
      publisher = {ACM Press},
      title     = {How Do Professional Developers Comprehend Software?},
      booktitle = {International Conference on Software Engineering},
      note      = {Distinguished Paper Award},
      year      = {2012},
      pages     = {255--265},
    }
  • BIB

    S. Autexier, D. Dietrich, D. Hutter, C. Lüth, C. Maeder. SmartTies - Management of Safety-Critical Developments. T. Margaria, B. Steffen, editors, Leveraging Applications of Formal Methods, Verification and Validation. 5th International Symposium, ISoLA 2012, October 15-18, Heraclion, Greece, volume 7609 of Lecture Notes in Computer Science, Springer Verlag, 2012; 238–252.

    @inproceedings{Autexier:LNCS:12,
      author    = {Serge Autexier and Dominik Dietrich and Dieter Hutter and Christoph L{\"{u}}th and Christian Maeder},
      editor    = {Tiziana Margaria and Bernhard Steffen},
      publisher = {Springer Verlag},
      title     = {{SmartTies - Management of Safety-Critical Developments}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. 5th International Symposium, ISoLA 2012, October 15-18, Heraclion, Greece},
      volume    = {7609},
      year      = {2012},
      keywords  = {Change Management, Safety-Critical Systems, Formal Methods, Graph Rewriting},
      pages     = {238--252},
    }
  • BIB

    N. Göde, R. Koschke. Frequency and Risks of Changes to Clones. International Conference on Software Engineering, ACM Press, 2011; 311–320.

    @inproceedings{Goede:ICSE:11,
      author    = {Nils G\"{o}de and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      pages     = {311--320},
      title     = {Frequency and Risks of Changes to Clones},
    }
  • BIB

    M. Codescu, T. Mossakowski, A. \'Riesco, C. Maeder. Integrating Maude into Hets. M. Johnson, D. Pavlovic, editors, Algebraic Methodology and Software Technologyy. 13th International Conference, AMAST 2010, June 23-25, Lac-Beauport, Canada, volume 6486 of Lecture Notes in Computer Science, Springer Verlag, 2011; 60–75.

    @inproceedings{Codescu:Hets:11,
      author    = {Mihai Codescu and Till Mossakowski and Adri{\'{a}}n Riesco and Christian Maeder},
      editor    = {Michael Johnson and Dusko Pavlovic},
      publisher = {Springer Verlag},
      title     = {{Integrating Maude into Hets}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Algebraic Methodology and Software Technologyy. 13th International Conference, {AMAST} 2010, June 23-25, Lac-Beauport, Canada},
      volume    = {6486},
      year      = {2011},
      pages     = {60--75},
    }
  • BIB

    B. Scholz, R. Koschke. Object-Based Dynamic Protocol Recovery for Multi-Threading Programs. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 251–260.

    @inproceedings{Scholz:WCRE:11,
      author    = {Bernhard Scholz and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {251--260},
      title     = {Object-Based Dynamic Protocol Recovery for Multi-Threading Programs},
    }
  • BIB

    S. Bazrafshan, R. Koschke, N. Göde. Approximate Code Search in Program Histories. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 109–118.

    @inproceedings{Bazrafshan:WCRE:11,
      author    = {Saman Bazrafshan and Rainer Koschke and Nils G\"{o}de},
      publisher = {IEEE Computer Society Press},
      isbn      = {978-0-7695-4582-0},
      title     = {Approximate Code Search in Program Histories},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {109--118},
    }
  • BIB

    B. Berger, M. Bunke, K. Sohr. An Android Security Case Study with Bauhaus. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 179–183.

    @inproceedings{Berger:WCRE:11,
      author    = {Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {179--183},
      title     = {An Android Security Case Study with Bauhaus},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns. International Conferences on Pervasive Patterns and Applications (PATTERNS), XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.

    @inproceedings{Bunke:PATTERNS:11,
      author       = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher    = {XPS (Xpert Publishing Services)},
      isbn         = {978-1-61208-158-8},
      title        = {Application-Domain Classification for Security Patterns},
      booktitle    = {International Conferences on Pervasive Patterns and Applications (PATTERNS)},
      year         = {2011},
      organization = {IARIA Conferences},
      pages        = {138--143},
    }
  • BIB

    M. Bunke, K. Sohr. An Architecture-Centric Approach to Detecting Security Patterns in Software. International Symposium on Engineering Secure Software and Systems, volume 6542 of Lecture Notes in Computer Science, Springer Verlag, 2011; 156–166.

    @inproceedings{Bunke:ESSOS:2011,
      author    = {Michaela Bunke and Karsten Sohr},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-19124-4},
      title     = {An Architecture-Centric Approach to Detecting Security Patterns in Software},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems},
      volume    = {6542},
      year      = {2011},
      pages     = {156--166},
    }
  • BIB DOI

    J. Harder, N. Göde. Efficiently Handling Clone Data: RCF and Cyclone. International Workshop on Software Clones, ACM, 2011; 81–82.

    @inproceedings{Harder:IWSC:11,
      author    = {Jan Harder and Nils G\"{o}de},
      publisher = {ACM},
      doi       = {http://dx.doi.org/10.1145/1985404.1985427},
      title     = {Efficiently Handling Clone Data: {RCF} and {Cyclone}},
      booktitle = {International Workshop on Software Clones},
      year      = {2011},
      pages     = {81--82},
    }
  • BIB

    T. Mende, R. Koschke, J. Peleska. On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 259–268.

    @inproceedings{Mende:CSMR:11,
      author    = {Thilo Mende and Rainer Koschke and Jan Peleska},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2011},
      pages     = {259--268},
      title     = {On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study},
    }
  • BIB DOI

    N. Göde, J. Harder. Clone Stability. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 64–74.

    @inproceedings{Goede:CSMR:11,
      author    = {Nils G\"{o}de and Jan Harder},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/CSMR.2011.11},
      title     = {Clone Stability},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2011},
      pages     = {64--74},
    }
  • BIB DOI

    N. Göde, J. Harder. Oops!... I Changed It Again. International Workshop on Software Clones, ACM, 2011; 14–20.

    @inproceedings{Goede:2011:IWSC,
      author    = {Nils G\"{o}de and Jan Harder},
      publisher = {ACM},
      doi       = {http://dx.doi.org/10.1145/1985404.1985408},
      title     = {Oops!... {I} Changed It Again},
      booktitle = {International Workshop on Software Clones},
      year      = {2011},
      pages     = {14--20},
    }
  • BIB DOI

    M. Kuhlmann, K. Sohr, M. Gogolla. Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, IEEE Computer Society, 2011; 108–117. Washington, DC, USA.

    @inproceedings{Kuhlmann:2011:CTA:2061041.2061931,
      author    = {Mirco Kuhlmann and Karsten Sohr and Martin Gogolla},
      numpages  = {10},
      publisher = {IEEE Computer Society},
      doi       = {10.1109/SSIRI.2011.18},
      isbn      = {978-0-7695-4453-3},
      title     = {Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL},
      url       = {http://dx.doi.org/10.1109/SSIRI.2011.18},
      series    = {SSIRI '11},
      booktitle = {Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement},
      acmid     = {2061931},
      year      = {2011},
      keywords  = {RBAC, Security, Reliability, Modeling, UML/OCL, Analysis},
      pages     = {108--117},
      address   = {Washington, DC, USA},
    }
  • BIB DOI

    K. Sohr, T. Mustafa, A. Nowak. Software Security Aspects of Java-based Mobile Phones. Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, 2011; 1494–1501. New York, NY, USA.

    @inproceedings{Sohr:2011:SSA:1982185.1982506,
      author    = {Karsten Sohr and Tanveer Mustafa and Adrian Nowak},
      numpages  = {8},
      publisher = {ACM},
      doi       = {10.1145/1982185.1982506},
      isbn      = {978-1-4503-0113-8},
      title     = {Software Security Aspects of Java-based Mobile Phones},
      url       = {http://doi.acm.org/10.1145/1982185.1982506},
      series    = {SAC '11},
      booktitle = {Proceedings of the 2011 ACM Symposium on Applied Computing},
      acmid     = {1982506},
      location  = {TaiChung, Taiwan},
      year      = {2011},
      keywords  = {Java security, mobile phone, static security analysis},
      pages     = {1494--1501},
      address   = {New York, NY, USA},
    }
  • BIB

    K. Sohr, B. Berger. Idea: Towards Architecture-Centric Security Analysis of Software. F. Massacci, D. Wallach, N. Zannone, editors, International Symposium on Engineering Secure Software and Systems, volume 5965 of Lecture Notes in Computer Science, Springer Verlag, 2010; 70–78.

    @inproceedings{Sohr:ESSOS:2010,
      author    = {Karsten Sohr and Bernhard Berger},
      editor    = {Fabio Massacci and Dan Wallach and Nicola Zannone},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-11746-6},
      title     = {Idea: Towards Architecture-Centric Security Analysis of Software},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems},
      volume    = {5965},
      year      = {2010},
      pages     = {70--78},
    }
  • BIB DOI

    T. Mende. Replication of Defect Prediction Studies: Problems, Pitfalls and Recommendations. Proceedings of the International Conference on Predictive Models in Software Engineering, ACM Press, 2010; 1–10.

    @inproceedings{Mende:Promise:10,
      author    = {Thilo Mende},
      publisher = {ACM Press},
      doi       = {http://doi.acm.org/10.1145/1868328.1868336},
      isbn      = {978-1-4503-0404-7},
      title     = {Replication of Defect Prediction Studies: Problems, Pitfalls and Recommendations},
      booktitle = {Proceedings of the International Conference on Predictive Models in Software Engineering},
      year      = {2010},
      pages     = {1--10},
    }
  • BIB DOI

    J. Harder, N. Göde. Quo Vadis, Clone Management? International Workshop on Software Clones, ACM, 2010; 85–86.

    @inproceedings{Harder:IWSC:10,
      author    = {Jan Harder and Nils G\"{o}de},
      publisher = {ACM},
      doi       = {http://dx.doi.org/10.1145/1808901.1808917},
      title     = {Quo Vadis, Clone Management?},
      booktitle = {International Workshop on Software Clones},
      year      = {2010},
      pages     = {85--86},
    }
  • BIB

    E. Juergens, N. Göde. Achieving Accurate Clone Detection Results. International Workshop on Software Clones, ACM, 2010; 1–8.

    @inproceedings{Juergens:IWSC:10,
      author    = {Elmar Juergens and Nils G\"{o}de},
      publisher = {ACM},
      booktitle = {International Workshop on Software Clones},
      year      = {2010},
      pages     = {1--8},
      title     = {Achieving Accurate Clone Detection Results},
    }
  • BIB

    N. Göde. Clone Removal: Fact or Fiction? International Workshop on Software Clones, ACM Press, 2010; 33–40.

    @inproceedings{Goede:IWSC:10,
      author    = {Nils G\"{o}de},
      publisher = {ACM Press},
      booktitle = {International Workshop on Software Clones},
      year      = {2010},
      pages     = {33--40},
      title     = {Clone Removal: Fact or Fiction?},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 1–10.

    @inproceedings{Koschke:CSMR:10,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {1--10},
      title     = {Incremental Reflexion Analysis},
    }
  • BIB

    T. Mende, R. Koschke. Effort-Aware Defect Prediction Models. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 109–118.

    @inproceedings{Mende:CSMR:10,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {109--118},
      title     = {Effort-Aware Defect Prediction Models},
    }
  • BIB

    M. Codescu, B. Langenstein, C. Maeder, T. Mossakowski. The VSE Refinement Method in Hets. K. Breitman, A. Cavalcanti, editors, Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, ICFEM 2009, December 9-12, Rio de Janeiro, Brazil, volume 5885 of Lecture Notes in Computer Science, Springer Verlag, 2009; 660–678.

    @inproceedings{Codescu:Hets:09,
      author    = {Mihai Codescu and Bruno Langenstein and Christian Maeder and Till Mossakowski},
      editor    = {Karin Breitman and Ana Cavalcanti},
      publisher = {Springer Verlag},
      title     = {{The VSE Refinement Method in Hets}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, {ICFEM} 2009, December 9-12, Rio de Janeiro, Brazil},
      volume    = {5885},
      year      = {2009},
      pages     = {660--678},
    }
  • BIB

    R. Koschke, R. Tiarks. Haben wir Programmverstehen schon ganz verstanden? Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings, 2009; 15–26.

    @inproceedings{Koschke:L2S2:09,
      author    = {Rainer Koschke and Rebecca Tiarks},
      booktitle = {Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings},
      year      = {2009},
      pages     = {15--26},
      title     = {{Haben wir Programmverstehen schon ganz verstanden?}},
    }
  • BIB

    N. Göde. Evolution of Type-1 Clones. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 77–86.

    @inproceedings{Goede:SCAM:2009,
      author    = {Nils G\"{o}de},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2009},
      pages     = {77--86},
      title     = {Evolution of Type-1 Clones},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 67-76.

    @inproceedings{Tiarks:SCAM:09,
      author    = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2009},
      pages     = {67-76},
      title     = {An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools},
    }
  • BIB DOI

    T. Mende, R. Koschke. Revisiting the Evaluation of Defect Prediction Models. PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, ACM, 2009; 1–10. New York, NY, USA.

    @inproceedings{Mende:Promise:09,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {ACM},
      doi       = {http://doi.acm.org/10.1145/1540438.1540448},
      isbn      = {978-1-60558-634-2},
      title     = {Revisiting the Evaluation of Defect Prediction Models},
      booktitle = {PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering},
      address   = {New York, NY, USA},
      location  = {Vancouver, British Columbia, Canada},
      year      = {2009},
      pages     = {1--10},
    }
  • BIB PDF

    J. Harder, N. Göde. Modeling Clone Evolution. International Workshop on Software Clones, 2009; 17–21.

    @inproceedings{Harder:IWSC:09,
      author    = {Jan Harder and Nils G\"{o}de},
      booktitle = {International Workshop on Software Clones},
      year      = {2009},
      pages     = {17--21},
      title     = {Modeling Clone Evolution},
    }
  • BIB

    R. Koschke, S. Jarzabek, J. Inoue. Third International Workshop on Software Clones (IWSC). European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 269–270.

    @inproceedings{Koschke:CSMR:09,
      author    = {Rainer Koschke and Stanislaw Jarzabek and James Inoue},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {269--270},
      title     = {Third International Workshop on Software Clones (IWSC)},
    }
  • BIB

    T. Mende, R. Koschke, M. Leszak. Evaluating Defect Prediction Models for a Large Evolving Software System. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 247–250.

    @inproceedings{Mende:CSMR:09,
      author    = {Thilo Mende and Rainer Koschke and Marek Leszak},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {247--250},
      title     = {Evaluating Defect Prediction Models for a Large Evolving Software System},
    }
  • BIB

    N. Göde, R. Koschke. Incremental Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 219–228. Best Paper Award von 70 eingereichten Beiträgen.

    @inproceedings{Goede:CSMR:09,
      author    = {Nils G{\"o}de and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Clone Detection},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 70 eingereichten Beitr{\"a}gen},
      year      = {2009},
      pages     = {219--228},
    }
  • BIB

    J. Quante. Do Dynamic Object Process Graphs Support Program Understanding? - A Controlled Experiment. International Conference on Program Comprehension, ACM Press, 2008; 73–82.

    @inproceedings{Quante:ICPC:08,
      author    = {Jochen Quante},
      publisher = {ACM Press},
      booktitle = {International Conference on Program Comprehension},
      year      = {2008},
      pages     = {73--82},
      title     = {Do Dynamic Object Process Graphs Support Program Understanding? - A Controlled Experiment},
    }
  • BIB

    B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung. Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik, GI Lecture Notes for Informatics, 2008.

    @inproceedings{Berger:WASE:08,
      author    = {Bernhard Berger and Rainer Koschke},
      publisher = {GI Lecture Notes for Informatics},
      booktitle = {Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft f{\"u}r Informatik},
      year      = {2008},
      title     = {{Reduzierung der Programmgr{\"o}{\ss}e durch Klonerkennung}},
    }
  • BIB

    R. Koschke. Frontiers in Software Clone Management. Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance, IEEE Computer Society Press, 2008; 119–128.

    @inproceedings{Koschke:ICSM:08,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance},
      year      = {2008},
      pages     = {119--128},
      title     = {Frontiers in Software Clone Management},
    }
  • BIB

    R. Koschke. Zehn Jahre WSR, zwölf Jahre Bauhaus. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 51–66.

    @inproceedings{Koschke:WSR:08,
      author    = {Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Zehn Jahre WSR, zw{\"o}lf Jahre Bauhaus}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {51--66},
    }
  • BIB PDF

    J. Harder, R. Koschke. Empirische Grundlagen für das Klonmanagement. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 127–133.

    @inproceedings{Harder:WSR:08,
      author    = {Jan Harder and Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Empirische Grundlagen f{\"u}r das Klonmanagement}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {127--133},
    }
  • BIB

    T. Mende, F. Beckwermert. Clone Detection in a Product Line Context. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 176–180.

    @inproceedings{Mende:WSR:08,
      author    = {Thilo Mende and Felix Beckwermert},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {Clone Detection in a Product Line Context},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {176--180},
    }
  • BIB

    J. Quante. Using Library Dependencies for Clustering. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 171–175.

    @inproceedings{Quante:WSR:08,
      author    = {Jochen Quante},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {Using Library Dependencies for Clustering},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {171--175},
    }
  • BIB

    T. Mende, F. Beckwermert, R. Koschke, G. Meier. Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2008; 163–172.

    @inproceedings{Mende:CSMR:08,
      author    = {Thilo Mende and Felix Beckwermert and Rainer Koschke and Gerald Meier},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2008},
      pages     = {163--172},
      title     = {Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection},
    }
  • BIB

    K. Hölscher, R. Klempien-Hinrichs, P. Knirsch. Undecidable Control Conditions in Graph Transformation Units. A. Moreira, L. Ribeiro, editors, Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2006), Natal, Brazil, 2006, volume 195 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2008; 95–111.

    @inproceedings{Hoelscher:SBMF:2008,
      author    = {Karsten H{\"o}lscher and Renate Klempien-Hinrichs and Peter Knirsch},
      editor    = {A. Moreira and L. Ribeiro},
      publisher = {Elsevier Science},
      title     = {Undecidable Control Conditions in Graph Transformation Units},
      series    = {Electronic Notes in Theoretical Computer Science},
      booktitle = {Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2006), Natal, Brazil, 2006},
      volume    = {195},
      year      = {2008},
      pages     = {95--111},
    }
  • BIB

    K. Hölscher, P. Knirsch, M. Luderer. Autonomous Units for Communication-based Dynamic Scheduling. H. -. Haasis, H. -. Kreowski, B. Scholz-Reiter, editors, Dynamics in Logistics, Proceedings of the 1st Intl.\ Conference LDIC 2007, Springer, 2008; 331–339. Berlin, Heidelberg.

    @inproceedings{Hoelscher:LDIC:2008,
      author    = {Karsten H{\"o}lscher and Peter Knirsch and Melanie Luderer},
      editor    = {H.-D. Haasis and H.-J. Kreowski and B. Scholz-Reiter},
      publisher = {Springer},
      title     = {Autonomous Units for Communication-based Dynamic Scheduling},
      booktitle = {Dynamics in Logistics, Proceedings of the 1st Intl.\ Conference LDIC 2007},
      year      = {2008},
      address   = {Berlin, Heidelberg},
      pages     = {331--339},
    }
  • BIB DOI

    K. Sohr, T. Mustafa, X. Bao, G. Ahn. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. Proceedings of the 2008 Annual Computer Security Applications Conference, IEEE Computer Society, 2008; 257–266. Washington, DC, USA.

    @inproceedings{Sohr:2008:ERA:1468162.1468214,
      author    = {Karsten Sohr and Tanveer Mustafa and Xinyu Bao and Gail-Joon Ahn},
      numpages  = {10},
      publisher = {IEEE Computer Society},
      doi       = {10.1109/ACSAC.2008.35},
      isbn      = {978-0-7695-3447-3},
      title     = {Enforcing Role-Based Access Control Policies in Web Services with UML and OCL},
      url       = {http://dx.doi.org/10.1109/ACSAC.2008.35},
      series    = {ACSAC '08},
      booktitle = {Proceedings of the 2008 Annual Computer Security Applications Conference},
      acmid     = {1468214},
      year      = {2008},
      pages     = {257--266},
      address   = {Washington, DC, USA},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Protocol Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 219–228.

    @inproceedings{Quante:WCRE:07,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Protocol Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      year      = {2007},
      pages     = {219--228},
    }
  • BIB

    P. Frenzel, R. Koschke, A. Breu, K. Angstmann. Extending the Reflection Method for Consolidating Software Variants into Product Lines. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 160–169. Best Paper Award von 87 eingereichten Beiträgen.

    @inproceedings{Frenzel:WCRE:07,
      author    = {Pierre Frenzel and Rainer Koschke and Andreas Breu and Karsten Angstmann},
      publisher = {IEEE Computer Society Press},
      title     = {Extending the Reflection Method for Consolidating Software Variants into Product Lines},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      note      = {Best Paper Award von 87 eingereichten Beitr{\"a}gen},
      year      = {2007},
      pages     = {160--169},
    }
  • BIB

    T. Mossakowski, C. Maeder, K. Lüttich. Hets: The Heterogeneous Tool Set. O. Grumberg, M. Huth, editors, Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, March 24 - April 1, Braga, Portugal, volume 4424 of Lecture Notes in Computer Science, Springer Verlag, 2007; 519–522.

    @inproceedings{Mossakowski:Hets:07,
      author    = {Till Mossakowski and Christian Maeder and Klaus L{\"{u}}ttich},
      editor    = {Orna Grumberg and Michael Huth},
      publisher = {Springer Verlag},
      title     = {{Hets: The Heterogeneous Tool Set}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, {TACAS} 2007, March 24 - April 1, Braga, Portugal},
      volume    = {4424},
      year      = {2007},
      pages     = {519--522},
    }
  • BIB

    R. Koschke. Survey of Research on Software Clones. R. Koschke, E. Merlo, A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, 2007. Dagstuhl, Germany.

    @inproceedings{Koschke:Dagstuhl:07,
      author    = {Rainer Koschke},
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Survey of Research on Software Clones},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2007-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      booktitle = {Duplication, Redundancy, and Similarity in Software},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB

    J. Quante. Online Construction of Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2007; 113–122.

    @inproceedings{Quante:CSMR:07,
      author    = {Jochen Quante},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2007},
      pages     = {113--122},
      title     = {Online Construction of Dynamic Object Process Graphs},
    }
  • BIB DOI

    R. Koschke, R. Falke, P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2006; 253–262.

    @inproceedings{Koschke:WCRE:06,
      author    = {Rainer Koschke and Raimar Falke and Pierre Frenzel},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/WCRE.2006.18},
      isbn      = {0-7695-2719-1},
      title     = {Clone Detection Using Abstract Syntax Suffix Trees},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2006},
      pages     = {253--262},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2006; 81–90. Best Paper Award von 65 eingereichten Beiträgen.

    @inproceedings{Quante:CSMR:06,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Object Process Graphs},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 65 eingereichten Beitr{\"a}gen},
      year      = {2006},
      pages     = {81--90},
    }
  • BIB

    H. \"Kreowski, K. Hölscher, P. Knirsch. Semantics of Visual Models in a Rule-based Setting. R. Heckel, editor, Proceedings of the School of SegraVis Research Training Network on Foundations of Visual Modelling Techniques (FoVMT 2004), Dagstuhl, Germany, 2004, volume 148 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2006; 75–88.

    @inproceedings{Kreowski:FoVMT:2006,
      author    = {Hans-J{\"o}rg Kreowski and Karsten H{\"o}lscher and Peter Knirsch},
      editor    = {R. Heckel},
      publisher = {Elsevier Science},
      title     = {Semantics of Visual Models in a Rule-based Setting},
      series    = {Electronic Notes in Theoretical Computer Science},
      booktitle = {Proceedings of the School of {SegraVis} Research Training Network on Foundations of Visual Modelling Techniques (FoVMT 2004), Dagstuhl, Germany, 2004},
      volume    = {148},
      year      = {2006},
      pages     = {75--88},
    }
  • BIB

    K. Hölscher, H. \"Kreowski, S. Kuske. Autonomous Units and their Semantics — the Sequential Case. A. Corradini, H. Ehrig, U. Montanari, L. Ribeiro, G. Rozenberg, editors, Graph Transformations, Proceedings of the 3rd Intl.\ Conference on Graph Transformations (ICGT 2006), volume 4178 of Lecture Notes in Computer Science, Springer, 2006; 245–259. Berlin, Heidelberg.

    @inproceedings{Hoelscher:ICGT:2006,
      author    = {Karsten H{\"o}lscher and Hans-J{\"o}rg Kreowski and Sabine Kuske},
      editor    = {A. Corradini and H. Ehrig and U. Montanari and L. Ribeiro and G. Rozenberg},
      publisher = {Springer},
      title     = {Autonomous Units and their Semantics --- the Sequential Case},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Graph Transformations, Proceedings of the 3rd Intl.\ Conference on Graph Transformations (ICGT 2006)},
      address   = {Berlin, Heidelberg},
      volume    = {4178},
      year      = {2006},
      pages     = {245--259},
    }
  • BIB

    K. Hölscher, P. Knirsch, H. \"Kreowski. Modelling Transport Networks by Means of Autonomous Units. H. -. Haasis, H. Kopfer, J. Schönberger, editors, Operations Research Proceedings 2005, Springer, 2006; 399–404. Berlin, Heidelberg.

    @inproceedings{Hoelscher:OperationsResearch:2006,
      author    = {Karsten H{\"o}lscher and Peter Knirsch and Hans-J{\"o}rg Kreowski},
      editor    = {H.-D. Haasis and H. Kopfer and J. Sch{\"o}nberger},
      publisher = {Springer},
      title     = {Modelling Transport Networks by Means of Autonomous Units},
      booktitle = {Operations Research Proceedings 2005},
      address   = {Berlin, Heidelberg},
      year      = {2006},
      pages     = {399--404},
    }
  • BIB DOI

    A. Schaad, V. Lotz, K. Sohr. A Model-checking Approach to Analysing Organisational Controls in a Loan Origination Process. Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, ACM, 2006; 139–149. New York, NY, USA.

    @inproceedings{Schaad:2006:MAA:1133058.1133079,
      author    = {Andreas Schaad and Volkmar Lotz and Karsten Sohr},
      numpages  = {11},
      publisher = {ACM},
      doi       = {10.1145/1133058.1133079},
      isbn      = {1-59593-353-0},
      title     = {A Model-checking Approach to Analysing Organisational Controls in a Loan Origination Process},
      url       = {http://doi.acm.org/10.1145/1133058.1133079},
      series    = {SACMAT '06},
      booktitle = {Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies},
      acmid     = {1133079},
      location  = {Lake Tahoe, California, USA},
      year      = {2006},
      keywords  = {delegation, model-checking, organisational control, revocation, separation},
      pages     = {139--149},
      address   = {New York, NY, USA},
    }
  • BIB

    R. Koschke. What architects should know about reverse engineering and reengineering. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, November 2005; 4–10. Invited Paper.

    @inproceedings{Koschke:WICSA:05,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {What architects should know about reverse engineering and reengineering},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      month     = {November},
      note      = {Invited Paper},
      year      = {2005},
      pages     = {4--10},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Equipping the Reflexion Method with Automated Clustering. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2005; 89–98.

    @inproceedings{Christl:WCRE:05,
      author    = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      publisher = {IEEE Computer Society Press},
      title     = {Equipping the Reflexion Method with Automated Clustering},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2005},
      pages     = {89--98},
    }
  • BIB

    R. Falke, R. Klein, R. Koschke, J. Quante. The Dominance Tree in Visualizing Software Dependencies. Workshop on Visualizing Software for Understanding and Analysis, IEEE Computer Society Press, September 2005; 1–6.

    @inproceedings{Falke:VISSOFT:05,
      author    = {Raimar Falke and Raimund Klein and Rainer Koschke and Jochen Quante},
      publisher = {IEEE Computer Society Press},
      title     = {The Dominance Tree in Visualizing Software Dependencies},
      booktitle = {Workshop on Visualizing Software for Understanding and Analysis},
      issn      = {0-7803-9540-9},
      month     = {September},
      year      = {2005},
      pages     = {1--6},
    }
  • BIB

    R. Koschke, J. Quante. On Dynamic Feature Location. International Conference on Automated Software Engineering, ACMPress, 2005; 86–95. Annahmequote unter 10 Prozent.

    @inproceedings{Koschke:ASE:05,
      author    = {Rainer Koschke and Jochen Quante},
      publisher = {ACMPress},
      title     = {On Dynamic Feature Location},
      booktitle = {International Conference on Automated Software Engineering},
      note      = {Annahmequote unter 10 Prozent},
      year      = {2005},
      pages     = {86--95},
    }
  • BIB

    C. Ermel, K. Hölscher, S. Kuske, P. Ziemann. Animated Simulation of Integrated UML Behavioral Models Based on Graph Transformation. Proceedings of the Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2005), Dallas, TX, USA, 21-24 September 2005, IEEE Computer Society, 2005; 125–133.

    @inproceedings{Ermel:VLHCC:2005,
      author    = {Claudia Ermel and Karsten H{\"o}lscher and Sabine Kuske and Paul Ziemann},
      publisher = {IEEE Computer Society},
      booktitle = {Proceedings of the Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2005), Dallas, TX, USA, 21-24 September 2005},
      year      = {2005},
      pages     = {125--133},
      title     = {Animated Simulation of Integrated {UML} Behavioral Models Based on Graph Transformation},
    }
  • BIB

    P. Ziemann, K. Hölscher, M. Gogolla. Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations. A. Mota, A. Moura, editors, Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2004), Recife, Brazil, 2005, volume 130 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 263–280.

    @inproceedings{Ziemann:SBMF:2005,
      author    = {Paul Ziemann and Karsten H{\"o}lscher and Martin Gogolla},
      editor    = {A. Mota and A. Moura},
      publisher = {Elsevier Science},
      title     = {Coherently Explaining {UML} Statechart and Collaboration Diagrams by Graph Transformations},
      series    = {Electronic Notes in Theoretical Computer Science},
      booktitle = {Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2004), Recife, Brazil, 2005},
      volume    = {130},
      year      = {2005},
      pages     = {263--280},
    }
  • BIB

    P. Ziemann, K. Hölscher, M. Gogolla. From UML Models to Graph Transformation Systems. M. Minas, editor, Proceedings of the Workshop on Visual Languages and Formal Methods (VLFM 2004), Rome, Italy, 2004, volume 127(4) of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 17–33.

    @inproceedings{Ziemann:VLFM:2005,
      author    = {Paul Ziemann and Karsten H{\"o}lscher and Martin Gogolla},
      editor    = {M. Minas},
      publisher = {Elsevier Science},
      title     = {From {UML} Models to Graph Transformation Systems},
      series    = {Electronic Notes in Theoretical Computer Science},
      booktitle = {Proceedings of the Workshop on Visual Languages and Formal Methods (VLFM 2004), Rome, Italy, 2004},
      volume    = {127(4)},
      year      = {2005},
      pages     = {17--33},
    }
  • BIB DOI

    K. Sohr, G. Ahn, M. Gogolla, L. Migge. Specification and Validation of Authorisation Constraints Using UML and OCL. Proceedings of the 10th European Conference on Research in Computer Security, Springer-Verlag, 2005; 64–79. Berlin, Heidelberg.

    @inproceedings{Sohr:2005:SVA:2156732.2156737,
      author    = {Karsten Sohr and Gail-Joon Ahn and Martin Gogolla and Lars Migge},
      numpages  = {16},
      publisher = {Springer-Verlag},
      doi       = {10.1007/11555827_5},
      isbn      = {3-540-28963-1, 978-3-540-28963-0},
      title     = {Specification and Validation of Authorisation Constraints Using UML and OCL},
      url       = {http://dx.doi.org/10.1007/11555827_5},
      series    = {ESORICS'05},
      booktitle = {Proceedings of the 10th European Conference on Research in Computer Security},
      acmid     = {2156737},
      location  = {Milan, Italy},
      year      = {2005},
      pages     = {64--79},
      address   = {Berlin, Heidelberg},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Symphony: View-Driven Software Architecture Reconstruction. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, June 2004; 122–132.

    @inproceedings{Deursen:WICSA:04,
      author    = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      publisher = {IEEE Computer Society Press},
      title     = {Symphony: View-Driven Software Architecture Reconstruction},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      abstract  = {Authentic descriptions of a software architecture are required as a reliable foundation for any but trivial changes to a system. Far too often, architecture descriptions of existing systems are out of sync with the implementation. If they are, they must be reconstructed. There are many existing techniques for reconstructing individual architecture views, but no information about how to select views for reconstruction, or about process aspects of architecture reconstruction in general. In this paper we describe view-driven process for reconstructing software architecture that fills this gap. To describe Symphony, we present and compare different case studies, thus serving a secondary goal of sharing real-life reconstruction experience. The Symphony process incorporates the state of the practice, where reconstruction is problem-driven and uses a rich set of architecture views. Symphony provides a common framework for reporting reconstruction experiences and for comparing reconstruction approaches. Finally, it is a vehicle for exposing and demarcating research problems in software architecture reconstruction.},
      month     = {June},
      year      = {2004},
      pages     = {122--132},
    }
  • BIB

    B. \"Cordes, K. Hölscher, H. \"Kreowski. UML Interaction Diagrams: Correct Translation of Sequence Diagrams into Collaboration Diagrams. J. Pfaltz, M. Nagl, B. Böhlen, editors, Applications of Graph Transformations with Industrial Relevance, Second International Workshop, AGTIVE 2003, Charlottesville, VA, USA, September 27 - October 1, 2003, Revised Selected and Invited Papers, volume 3062 of Lecture Notes in Computer Science, Springer, 2004; 275–291. Berlin, Heidelberg.

    @inproceedings{Cordes:AGTIVE:2004,
      author    = {Bj{\"o}rn Cordes and Karsten H{\"o}lscher and Hans-J{\"o}rg Kreowski},
      editor    = {J. Pfaltz and M. Nagl and B. B{\"o}hlen},
      publisher = {Springer},
      title     = {{UML} Interaction Diagrams: Correct Translation of Sequence Diagrams into Collaboration Diagrams},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Applications of Graph Transformations with Industrial Relevance, Second International Workshop, AGTIVE 2003, Charlottesville, VA, USA, September 27 - October 1, 2003, Revised Selected and Invited Papers},
      year      = {2004},
      volume    = {3062},
      address   = {Berlin, Heidelberg},
      pages     = {275--291},
    }
  • BIB

    R. Koschke, D. Simon. Hierarchical Reflexion Models. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2003; 36–45.

    @inproceedings{Koschke:WCRE:03,
      author    = {Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Hierarchical Reflexion Models},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {The reflexion model originally proposed by Murphy and Notkin allows one to structurally validate a descriptive or prescriptive architecture model against a source model. First, the entities in the source model are mapped onto the architectural model, then discrepancies between the architecture model and source model are computed automatically. The original reflexion model allows an analyst to specify only non-hierarchical models, which is insufficient for larger systems that are decomposed into hierarchical subsystems. This paper extends the original reflexion model to hierarchical architecture models, describes a method to apply this technique, and reports on case studies conducted on two large-scale and complex applications (namely, the C compiler sdcc for 8-bit microprocessors and the GNU C compiler gcc).},
      month     = {November},
      year      = {2003},
      pages     = {36--45},
    }
  • BIB

    A. Lakhotia, A. Walenstein, R. Koschke. Second international workshop on detection of software clones. Working Conference on Reverse Engineering, 2003; 368–368.

    @inproceedings{Lakhotia:wcre:03,
      author    = {A. Lakhotia and A. Walenstein and R. Koschke},
      annote    = {a working session on clones},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2003},
      pages     = {368--368},
      title     = {Second international workshop on detection of software clones},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Incremental Location of Combined Features for Large-Scale Programs. International Conference on Software Maintenance, IEEE Computer Society Press, October 2002; 273–282.

    @inproceedings{Eisenbarth:ICSM:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Location of Combined Features for Large-Scale Programs},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {The need for changing a program frequently confronts maintainers with the reality that no valid architectural description is at hand. To solve that problem, we presented at ICSM 2001 a language-independent and easy to use technique for opportunistic and demand driven location of features in source code based on static and dynamic analysis and concept analysis. In order to further validate the technique, we recently performed an industrial case study on a 1.2 million LOC production system. The experiences we made during that case study showed twoproblems of our approach: the growing complexity of concept lattices for large systems with many features and the need for handling compositions of features. This paper extends our technique to solve these problems. We show how this method allows incremental exploration of features while preserving the "mental map" the maintainer has gained through the analysis. The second improvement is a detailed look at composing features into more complex scenarios. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features.},
      month     = {October},
      year      = {2002},
      pages     = {273--282},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Trace Extraction. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2002.

    @inproceedings{Eisenbarth:WCRE:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2002},
      abstract  = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general.},
      title     = {Static Trace Extraction},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Aiding Program Comprehension by Static and Dynamic Feature Analysis. International Conference on Software Maintenance, IEEE Computer Society Press, November 2001; 602–611. Best Paper Award von 161 eingereichten Beiträgen.

    @inproceedings{Eisenbarth:ICSM:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Aiding Program Comprehension by Static and Dynamic Feature Analysis},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {Understanding a system's implementation without prior knowledge is a hard task for reengineers in general. However, some degree of automatic aid is possible. In this paper, we present a technique building a mapping between the system's externally visible behavior and the relevant parts of the source code. Our technique combines dynamic and static analyses to rapidly focus on the system's parts urgently required for a goal-directed process of program understanding.},
      month     = {November},
      note      = {Best Paper Award von 161 eingereichten Beitr{\"a}gen},
      year      = {2001},
      pages     = {602--611},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Feature-Driven Program Understanding Using Concept Analysis of Execution Traces. International Workshop on Program Comprehension, IEEE Computer Society Press, May 2001; 300-309.

    @inproceedings{Eisenbarth:IWPC:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Feature-Driven Program Understanding Using Concept Analysis of Execution Traces},
      booktitle = {International Workshop on Program Comprehension},
      abstract  = {The first task of a programmer who wants to understand how a certain feature is implemented is to localize the implementation of the feature in the code. If the implementations of a set of related features are to be understood, a programmer is interested in their commonalities and variabilities. For large and badly documented programs, localizing features in code and identifying commonalities and variabilities of components and features can be difficult and time-consuming. It is useful to derive this information automatically. The feature-component correspondence describes which components are needed to implement a set of features and what are the respective commonalities and variabilities of features and components. This paper describes a new technique to derive the feature-component correspondence utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language-independent, and can yield results quickly.},
      month     = {May},
      year      = {2001},
      pages     = {300-309},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Derivation of Feature Component Maps by means of Concept Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, March 2001; 176–180.

    @inproceedings{Eisenbarth:CSMR:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Derivation of Feature Component Maps by means of Concept Analysis},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      abstract  = {Feature component maps describe which components are needed to implement a particular feature and are used early in processes to develop a product line based on existing assets. This paper describes a new technique to derive the feature component map and additional dependencies utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language independent, and can yield results quickly and very early in the process.},
      month     = {March},
      year      = {2001},
      pages     = {176--180},
    }
  • BIB

    M. Fabiunke, J. Filipek, C. Maeder. XMI Based UML Model Composition in KobrA. GI Jahrestagung (2), 2001; 845–849.

    @inproceedings{Fabiunke:GI:01,
      author    = {Marko Fabiunke and Joanna Filipek and Christian Maeder},
      booktitle = {{GI} Jahrestagung {(2)}},
      year      = {2001},
      pages     = {845--849},
      title     = {{XMI Based UML Model Composition in KobrA}},
    }
  • BIB

    G. Canfora, J. \"Czeranski, R. Koschke. Revisiting the Delta IC Approach to Component Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2000; 140–149.

    @inproceedings{Canfora:WCRE:00,
      author    = {Gerardo Canfora and J{\"o}rg Czeranski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Revisiting the Delta IC Approach to Component Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2000},
      pages     = {140--149},
    }
  • BIB

    R. Koschke. Vorlesungen zum Thema Software-Reengineering. 2.~Workshop Software-Reengineering, Universität Koblenz-Landau, May 2000; 3–7. Bad Honnef, Germany. Fachberichte Informatik, Nr. 8/2000.

    @inproceedings{koschke:vorlesungen-zum-thema-software-reengineering,
      author    = {Rainer Koschke},
      publisher = {Universit{\"a}t Koblenz-Landau},
      title     = {{Vorlesungen zum Thema Software-Reengineering}},
      booktitle = {2.~Workshop Software-Reengineering},
      address   = {Bad Honnef, Germany},
      month     = {May},
      note      = {Fachberichte Informatik, Nr. 8/2000},
      year      = {2000},
      pages     = {3--7},
    }
  • BIB

    R. Koschke, T. Eisenbarth. A Framework for Experimental Evaluation of Clustering Techniques. International Workshop on Program Comprehension, IEEE Computer Society Press, 2000.

    @inproceedings{Koschke:IWPC:00,
      author    = {Rainer Koschke and Thomas Eisenbarth},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Workshop on Program Comprehension},
      year      = {2000},
      abstract  = {Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comparable evaluations of automatic clustering techniques, a common reference corpus of freely available systems is needed for which the actual components are known. The reference corpus is used to measure recall and precision of automatic techniques. For this measurement, a standard scheme for comparing the components recovered by a clustering technique to components in the reference corpus is required. This paper describes both the process of setting up reference corpora and ways of measuring recall and precision of automatic clustering techniques. For methods with human intervention, controlled experiments should be conducted. This paper additionally proposes a controlled experiment as a standard for evaluating manual and semi-automatic component recovery methods that can be conducted cost-effectively.},
      title     = {A Framework for Experimental Evaluation of Clustering Techniques},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse. Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1), 2000; 63–68.

    @inproceedings{Eisenbarth:DSPL:00,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      booktitle = {Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1)},
      year      = {2000},
      pages     = {63--68},
      title     = {{Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse}},
    }
  • BIB

    R. Koschke, J. F. Girard, M. Würthner. Intermediate Representations for Reverse Engineering. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1998; 241–250.

    @inproceedings{Koschke:98,
      author    = {Rainer Koschke and Jean-Francois Girard and Martin W{\"u}rthner},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {1998},
      pages     = {241--250},
      title     = {Intermediate Representations for Reverse Engineering},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. International Conference on Automated Software Engineering, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ASE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Automated Software Engineering},
      year      = {1997},
      title     = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }
  • BIB

    J. F. Girard, R. Koschke. Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding. International Conference on Software Maintenance, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ICSM:97,
      author    = {Jean-Francois Girard and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {1997},
      abstract  = {This paper presents a method to view a system as a hierarchy of modules according to information hiding concepts and to identify architectural component candidates in this hierarchy. The result of the method eases the understanding of a system's underlying software architecture. A prototype tool implementing this method was applied to three systems written in C (each over 30 Kloc). For one of these systems, an author of the system created an architectural description. The components generated by our method correspond to those of this architectural description in almost all cases. For the other two systems, most of the components resulting from the method correspond to meaningful system abstractions.},
      title     = {Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1997; 66–75.

    @inproceedings{Girard:WCRE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      title     = {Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {In the context of the authors' research on architectural features recovery, abstract data type (ADT) and abstract state encapsulation (ASE, also called abstract object) have been identified as two of the smallest components which are useful to build a significant architectural overview of the system. The authors have named these the atomic components of an architecture. This paper compares five published techniques which extract ADT and ASE from source code. A prototype tool implementing each techniques has been developed and applied to three medium size systems written in C (each over 30 Kloc). The results from each approach are compared with the atomic components identified by hand by a group of software engineers. These people did not know the automatic techniques which were going to be applied to the systems.},
      year      = {1997},
      pages     = {66--75},
    }
  • BIB

    K. Didrich, W. Grieskamp, C. Maeder, P. Pepper. Programming in the Large: The Algebraic-Functional Language Opal 2$\alpha$. C. Clack, K. Hammond, A. Davie, editors, Implementation of Functional Languages, 9th International Workshop, IFL 1997, September 10-12, St. Andrews, Scotland, volume 1467 of Lecture Notes in Computer Science, Springer Verlag, 1997; 322–337.

    @inproceedings{Didrich:Opal:97,
      author    = {Klaus Didrich and Wolfgang Grieskamp and Christian Maeder and Peter Pepper},
      editor    = {Chris Clack and Kevin Hammond and Antony Davie},
      publisher = {Springer Verlag},
      title     = {{Programming in the Large: The Algebraic-Functional Language Opal 2$\alpha$}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Implementation of Functional Languages, 9th International Workshop, {IFL} 1997, September 10-12, St. Andrews, Scotland},
      volume    = {1467},
      year      = {1997},
      pages     = {322--337},
    }
  • BIB

    K. Didrich, C. Gerke, W. Grieskamp, C. Maeder, P. Pepper. Towards Integrating Algebraic Specification and Functional Programming: the Opal System (Extended Abstract). M. Wirsing, M. Nivat, editors, Algebraic Methodology and Software Technology, 5th International Conference, AMAST 1996, July 1-5, Munich, Germany, volume 1101 of Lecture Notes in Computer Science, Springer Verlag, 1996; 559–562.

    @inproceedings{Didrich:Opal:96,
      author    = {Klaus Didrich and Carola Gerke and Wolfgang Grieskamp and Christian Maeder and Peter Pepper},
      editor    = {Martin Wirsing and Maurice Nivat},
      publisher = {Springer Verlag},
      title     = {{Towards Integrating Algebraic Specification and Functional Programming: the Opal System (Extended Abstract)}},
      series    = {Lecture Notes in Computer Science},
      booktitle = {Algebraic Methodology and Software Technology, 5th International Conference, {AMAST} 1996, July 1-5, Munich, Germany},
      volume    = {1101},
      year      = {1996},
      pages     = {559--562},
    }

Further Publications

  • BIB

    J. Harder, S. Bazrafshan, R. Tiarks. Wie kommen Entwickler mit Klonen zurecht? Softwaretechnik Trends 2013; 33(2):2 Seiten.

    @article{Harder:WSR:13,
      author   = {Jan Harder and Saman Bazrafshan and Rebecca Tiarks},
      title    = {Wie kommen Entwickler mit Klonen zurecht?},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      volume   = {33},
      year     = {2013},
      pages    = {2 Seiten},
    }
  • BIB

    K. Schmid, R. Koschke, C. Kröher, D. Lüdemann. Towards Identifying Evolution Smells in Software Product Lines. 5. Workshop Design For Future — Langlebige Softwaresysteme, CEUR Workshop Proceedings, 2013.

    @inproceedings{Schmid:DFF:13,
      author    = {Klaus Schmid and Rainer Koschke and Christian Kr{\"o}her and Dierk L{\"u}demann},
      publisher = {CEUR Workshop Proceedings},
      booktitle = {5. Workshop Design For Future --- Langlebige Softwaresysteme},
      year      = {2013},
      title     = {Towards Identifying Evolution Smells in Software Product Lines},
    }
  • BIB

    S. Bazrafshan. Late propagation of Type-3 Clones. Softwaretechnik-Trends 2012; 32(2):2 Seiten.

    @article{Bazrafshan:WSR:12,
      author   = {Saman Bazrafshan},
      title    = {Late propagation of Type-3 Clones},
      journal  = {Softwaretechnik-Trends},
      number   = {2},
      volume   = {32},
      year     = {2012},
      pages    = {2 Seiten},
    }
  • BIB PDF

    J. Harder. Code Clone Authorship—A First Look. Softwaretechnik Trends 2012; 32(2):25–26.

    @article{Harder:WSR:12,
      author   = {Jan Harder},
      title    = {Code Clone Authorship---A First Look},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      volume   = {32},
      year     = {2012},
      pages    = {25--26},
    }
  • BIB

    R. Tiarks. What Programmers Really Do: An Observational Study. Softwaretechnik Trends May 2011; 31(2).

    @article{Tiarks:WSR:2011,
      author   = {Rebecca Tiarks},
      title    = {What Programmers Really Do: An Observational Study},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      month    = {May},
      volume   = {31},
      year     = {2011},
    }
  • BIB

    B. Berger, M. Bunke. Software Security Comprehension. Softwaretechnik Trends may 2011; 31(2):30–31.

    @article{Berger:WSR:2011,
      author   = {Bernhard Berger and Michaela Bunke},
      title    = {Software Security Comprehension},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      month    = {may},
      volume   = {31},
      year     = {2011},
      pages    = {30--31},
    }
  • BIB PDF

    J. Harder, N. Göde, M. Rausch. Stability of COBOL Clones. Softwaretechnik Trends 2011; 31(2):24–25.

    @article{Harder:WSR:11,
      author   = {Jan Harder and Nils G\"{o}de and Marcus Rausch},
      title    = {Stability of {COBOL} Clones},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      volume   = {31},
      year     = {2011},
      pages    = {24--25},
    }
  • BIB

    N. Göde. Not All That Glitters Is Gold. Softwaretechnik Trends 2011; 31(2):22–23.

    @article{Goede:2011:WSR,
      author   = {Nils G\"{o}de},
      title    = {Not All That Glitters Is Gold},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      volume   = {31},
      year     = {2011},
      pages    = {22--23},
    }
  • BIB

    N. Göde, M. Rausch. Clone Evolution Revisited. Softwaretechnik Trends May 2010; 30(2):60–61. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).

    @article{Goede:WSR:10,
      author   = {Nils G\"{o}de and Marcus Rausch},
      note     = {Beitr{\"a}ge des 12. Workshops 'Software Reengineering' (WSR 2010)},
      title    = {Clone Evolution Revisited},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {30},
      year     = {2010},
      pages    = {60--61},
    }
  • BIB

    T. Mende, R. Koschke. Evaluation von Modellen zur Fehlervorhersage: Probleme und Lösungsmöglichkeiten. Softwaretechnik Trends May 2010; 30(2):74–75. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).

    @article{Mende:WSR:10,
      author   = {Thilo Mende and Rainer Koschke},
      note     = {Beitr{\"a}ge des 12. Workshops 'Software Reengineering' (WSR 2010)},
      title    = {{Evaluation von Modellen zur Fehlervorhersage: Probleme und L{\"o}sungsm{\"o}glichkeiten}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {30},
      year     = {2010},
      pages    = {74--75},
    }
  • BIB

    N. Göde. Mapping Code Clones Using Incremental Clone Detection. Softwaretechnik Trends 2009; 29(2):28–29.

    @article{Goede:WSR:09,
      author   = {Nils G\"{o}de},
      title    = {Mapping Code Clones Using Incremental Clone Detection},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      volume   = {29},
      year     = {2009},
      pages    = {28--29},
    }
  • BIB

    R. Koschke. Wie schütze ich meine Organisation vor Software-Erosion? M. Hafner, editor, Embedded Software Engineering Kongress, Elektronikpraxis und Mircoconsult, 2008; 285–290.

    @inproceedings{Koschke:ESE:Erosion:08,
      author    = {Rainer Koschke},
      editor    = {Martina Hafner},
      publisher = {Elektronikpraxis und Mircoconsult},
      title     = {{Wie sch{\"u}tze ich meine Organisation vor Software-Erosion?}},
      booktitle = {Embedded Software Engineering Kongress},
      abstract  = {Dieser Artikel beschreibt, welche Hebel angesetzt werden k{\"o}nnen, um daf{\"u}r zu sorgen, dass Dokumentation aktuell und n{\"u}tzlich bleibt und die Komplexit{\"a}t der Programme begrenzt wird. Dazu wird ein ganzheitliches Vorgehen vorgestellt, das die Organisation, den Entwicklungsprozess, die Menschen und die Software selbst im Blick hat.},
      year      = {2008},
      pages     = {285--290},
    }
  • BIB

    R. Koschke. Architektur- und Code-Management von Software-Varianten. M. Hafner, editor, Embedded Software Engineering Kongress, Elektronikpraxis und Mircoconsult, 2008; 213–217.

    @inproceedings{Koschke:ESE:PL:08,
      author    = {Rainer Koschke},
      editor    = {Martina Hafner},
      publisher = {Elektronikpraxis und Mircoconsult},
      title     = {{Architektur- und Code-Management von Software-Varianten}},
      booktitle = {Embedded Software Engineering Kongress},
      abstract  = {Bei Software-Herstellern im Bereich eingebetteter Systeme, deren Produkte gro{\ss}e Gemeinsamkeiten, aber auch Spezifika aufweisen, entstehen h{\"a}ufig Software-Varianten durch ungeplante Wiederverwendung. Der Code eines Produkts wird f{\"u}r ein anderes Produkt kopiert und an die besonderen Anforderungen des neuen Einsatzes angepasst. Die resultierenden Varianten erfahren eine eigene Weiterentwicklung. Bei einer gro{\ss}en Zahl von Varianten erh{\"o}hen sich dabei die Wartungskosten, weil notwendige {\"A}nderungen im gemeinsamen Code (z.B. zur Fehlerbehebung) in allen Varianten individuell analysiert, nachgezogen, dokumentiert und getestet werden m{\"u}ssen. Die Wartung und Weiterentwicklung einer gro{\ss}en Anzahl von Varianten ist auf Dauer kaum mehr beherrschbar. Dieser Artikel beschreibt Techniken, um Software-Varianten, die durch ungeplante Wiederverwendung entstanden sind, sich aber am Markt bew{\"a}hrt haben, zu konsolidieren und in eine Produktlinienplattform zu integrieren, um so Wartungs- und Weiterentwicklungskosten einzusparen. Die Techniken stammen aus der Forschung und wurden in industriellen Fallstudien bei der Robert-Bosch GmbH erprobt.},
      year      = {2008},
      pages     = {213--217},
    }
  • BIB PDF

    J. Harder. Rückgewinnung von Syntax und Semantik zur Analyse von Visual Basic 6 Programmen. Softwaretechnik Trends May 2007; 27(2). Beiträge des 9. Workshops 'Software Reengineering' (WSR 2007).

    @article{Harder:WSR:07,
      author   = {Jan Harder},
      note     = {Beitr{\"a}ge des 9. Workshops 'Software Reengineering' (WSR 2007)},
      title    = {{R\"{u}ckgewinnung von Syntax und Semantik zur Analyse von Visual Basic 6 Programmen}},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      month    = {May},
      volume   = {27},
      year     = {2007},
    }
  • BIB

    R. Koschke. Konsolidierung von Software-Varianten in Software-Produktlinien. Softwaretechnik Trends May 2006; 26(2). Beiträge des 8. Workshops 'Software Reengineering' (WSR 2006).

    @article{Koschke:WSR:06,
      author   = {Rainer Koschke},
      note     = {Beitr{\"a}ge des 8. Workshops 'Software Reengineering' (WSR 2006)},
      title    = {{Konsolidierung von Software-Varianten in Software-Produktlinien}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {26},
      year     = {2006},
    }
  • BIB

    R. Koschke, Y. Zhang. Component Recovery, Protocol Recovery and Validation in Bauhaus. J. \"Ebert, B. Kullbach, F. Lehner, editors, Workshop on Software Reengineering, volume 1/2002 of Fachberichte Informatik, May 2001; 73-76. Institut für Informatik, Rheinau 1, D-56075 Koblenz, University of Koblenz-Landau.

    @inproceedings{Koschke:2001,
      author       = {Rainer Koschke and Yan Zhang},
      editor       = {J{\"u}rgen Ebert and Bernt Kullbach and Franz Lehner},
      title        = {Component Recovery, Protocol Recovery and Validation in Bauhaus},
      series       = {Fachberichte Informatik},
      booktitle    = {Workshop on Software Reengineering},
      address      = {Institut f{\"u}r Informatik, Rheinau 1, D-56075 Koblenz},
      month        = {May},
      volume       = {1/2002},
      year         = {2001},
      organization = {University of Koblenz-Landau},
      annote       = {http://www.uni-koblenz.de/fb4},
      pages        = {73-76},
    }





Arbeitsgruppe

Forschung

Lehre

Publikationen

Service

Kontakt

 

---------
BEDIENUNG
---------


SEITENINHALT DRUCKEN

LESEZEICHEN SETZEN

ENGLISH VERSION  






  SEITENANFANG
Hier geht es zur Homepage des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Universität Bremen