Home  Sitemap  Kontakt 





 


TZI

---------------
 
 
Home

Publications of R. Koschke

Books

  • BIB

    R. Koschke, Y. Higo, N. Göde, editors. Proceedings of the International Workshop on Software Clones, volume 63, 2014. Electronic Communications of the EASST.

    @proceedings{Koschke:IWSC:14,
      editor    = {Rainer Koschke and Yoshiki Higo and Nils G{\"o}de},
      volume    = {63},
      publisher = {Electronic Communications of the EASST},
      issn      = {1863-2122},
      year      = {2014},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    R. Koschke, E. Jürgens, J. \"Rilling, editors. Proceedings of the International Workshop on Software Clones, 2013. ACM Press.

    @proceedings{Koschke:IWSC:13,
      editor    = {Rainer Koschke and Elmar J{\"u}rgens and J{\"u}rgen Rilling},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2013},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, J. Krinke, C. Roy, editors. Proceedings of the International Workshop on Software Clones, 2012. ACM Press.

    @proceedings{Inoue:IWSC:12,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke and Jens Krinke and Chanchal Roy},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2012},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071), volume 2, Dagstuhl, Germany, 2012. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.

    @proceedings{Koschke:Dagstuhl:12,
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {{Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)}},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      year      = {2012},
      urn       = {urn:nbn:de:0030-drops-34775},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2011. ACM Press.

    @proceedings{Inoue:IWSC:11,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2010. ACM Press.

    @proceedings{Inoue:IWSC:10,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2010},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2009. ACM Press.

    @proceedings{Inoue:IWSC:09,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    R. Koschke, O. Herzog, K. Rödiger, M. Ronthaler, editors. INFORMATIK 2007 — Informatik trifft Logistik: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V., volume P-109 (Band 1) und P-110 (Band 2) of Lecture Notes in Informatics (LNI), Bonn, September 2007.

    @proceedings{Koschke:GI:07,
      editor       = {Rainer Koschke and Otthein Herzog and Karl-Heinz R{\"o}diger and Marc Ronthaler},
      title        = {{INFORMATIK 2007 --- Informatik trifft Logistik: Beitr{\"a}ge der 37. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V.}},
      series       = {Lecture Notes in Informatics (LNI)},
      address      = {Bonn},
      month        = {September},
      volume       = {P-109 (Band 1) und P-110 (Band 2)},
      year         = {2007},
      organization = {Gesellschaft f{\"u}r Informatik e.V.},
    }
  • BIB

    R. Koschke, E. Merlo, A. Walenstein, editors. Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.

    @proceedings{Koschke:Dagstuhl-Proc:07,
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Duplication, Redundancy, and Similarity in Software},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2009-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB

    R. Koschke. Atomic Architectural Component Recovery for Program Understanding and Evolution. Institute of Software Technology, University of Stuttgart, Germany, 1999.

    @phdthesis{Koschke:Thesis:99,
      author = {Rainer Koschke},
      school = {Institute of Software Technology, University of Stuttgart, Germany},
      year   = {1999},
      title  = {Atomic Architectural Component Recovery for Program Understanding and Evolution},
    }

Bookchapters

  • BIB

    R. Koschke. Software Engineering: International Summer Schools, Architecture Reconstruction, 140–173. Springer Verlag, 2009. edited by Andrea De Lucia and Filomena Ferrucci.

    @inbook{Koschke:ISSSE:09,
      author    = {Rainer Koschke},
      chapter   = {Architecture Reconstruction},
      publisher = {Springer Verlag},
      isbn      = {3-540-95887-8},
      title     = {Software Engineering: International Summer Schools},
      note      = {edited by Andrea De Lucia and Filomena Ferrucci},
      year      = {2009},
      pages     = {140--173},
    }
  • BIB

    R. Koschke. Software Evolution, Identifying and Removing Software Clones, 15–39. Springer Verlag, 2008. Editors: Serge Demeyer and Tom Mens.

    @inbook{Koschke:Buch:08,
      author    = {Rainer Koschke},
      chapter   = {Identifying and Removing Software Clones},
      publisher = {Springer Verlag},
      title     = {Software Evolution},
      booktitle = {Software Evolution},
      note      = {Editors: Serge Demeyer and Tom Mens},
      year      = {2008},
      pages     = {15--39},
    }
  • BIB

    R. Koschke, E. Plödereder. F. Lehner, editor. Ansätze des Programmverstehens, 159–176. Deutscher Universitätsverlag/Gabler Vieweg Westdeutscher Verlag, 1996.

    @inbook{Koschke:Buch:96,
      author    = {Rainer Koschke and Erhard Pl{\"o}dereder},
      editor    = {Franz Lehner},
      publisher = {Deutscher Universit{\"a}tsverlag/Gabler Vieweg Westdeutscher Verlag},
      booktitle = {{Softwarewartung und Reengineering - Erfahrungen und Entwicklungen}},
      year      = {1996},
      pages     = {159--176},
      title     = {{Ans{\"a}tze des Programmverstehens}},
    }

Journal Articles

  • BIB DOI

    W. Maalej, R. Tiarks, T. Roehm, R. Koschke. On the Comprehension of Program Comprehension. ACM Transactions on Software Engineering and Methodology September 2014; 23(4):31:1–31:37.

    @article{Maalej:TOSEM:14,
      author     = {Walid Maalej and Rebecca Tiarks and Tobias Roehm and Rainer Koschke},
      numpages   = {37},
      publisher  = {ACM Press},
      issue_date = {August 2014},
      doi        = {10.1145/2622669},
      acmid      = {2622669},
      title      = {On the Comprehension of Program Comprehension},
      url        = {http://doi.acm.org/10.1145/2622669},
      journal    = {ACM Transactions on Software Engineering and Methodology},
      issn       = {1049-331X},
      number     = {4},
      month      = {September},
      volume     = {23},
      year       = {2014},
      keywords   = {Empirical software engineering, context-aware software engineering, information needs, knowledge sharing, program comprehension},
      articleno  = {31},
      pages      = {31:1--31:37},
    }
  • BIB DOI

    R. Koschke. Large-scale inter-system clone detection using suffix trees and hashing. Journal of Software: Evolution and Process August 2014; 26(8):747–769.

    @article{Koschke:JSEP:14,
      author  = {Rainer Koschke},
      doi     = {DOI: 10.1002/smr.1592},
      title   = {Large-scale inter-system clone detection using suffix trees and hashing},
      journal = {Journal of Software: Evolution and Process},
      number  = {8},
      month   = {August},
      volume  = {26},
      year    = {2014},
      pages   = {747--769},
    }
  • BIB

    O. Riemann, R. Koschke. Robust Parsing of Cloned Token Sequences. Electronic Communications of the EASST 2014; 63:20 pages. Proceedings of the International Workshop on Software Clones 2014.

    @article{Riemann:IWSC:14,
      author  = {Ole Riemann and Rainer Koschke},
      note    = {Proceedings of the International Workshop on Software Clones 2014},
      title   = {Robust Parsing of Cloned Token Sequences},
      journal = {Electronic Communications of the EASST},
      issn    = {1863-2122},
      volume  = {63},
      year    = {2014},
      pages   = {20 pages},
    }
  • BIB DOI

    N. Göde, R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process February 2013; 25(2):165–192.

    @article{Goede:JSME:13,
      author  = {Nils G\"{o}de and Rainer Koschke},
      doi     = {10.1002/smr.520},
      title   = {Studying clone evolution using incremental clone detection},
      journal = {Journal of Software: Evolution and Process},
      issn    = {2047-7473},
      number  = {2},
      month   = {February},
      volume  = {25},
      year    = {2013},
      pages   = {165--192},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. Journal of Software: Evolution and Process 2013; 25(6):601–638. Special Issue of CSMR'2010.

    @article{Koschke:JSME:13,
      author  = {Rainer Koschke},
      note    = {Special Issue of CSMR'2010},
      title   = {Incremental Reflexion Analysis},
      journal = {Journal of Software: Evolution and Process},
      number  = {6},
      volume  = {25},
      year    = {2013},
      pages   = {601--638},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements. International Journal On Advances in Security July 2012; 5(1&2):46–67.

    @article{Bunke:IJOAS:2012,
      author    = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher = {XPS (Xpert Publishing Services)},
      title     = {Organizing Security Patterns Related to Security and Pattern Recognition Requirements},
      journal   = {International Journal On Advances in Security},
      issn      = {1942-2636},
      number    = {1\&2},
      month     = {July},
      volume    = {5},
      year      = {2012},
      pages     = {46--67},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An extended assessment of type-3 clones as detected by state-of-the-art tools. Software Quality Journal 2011; 19(2):295–331.

    @article{Tiarks:SQJ:11,
      author  = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      title   = {An extended assessment of type-3 clones as detected by state-of-the-art tools},
      journal = {Software Quality Journal},
      number  = {2},
      volume  = {19},
      year    = {2011},
      pages   = {295--331},
    }
  • BIB

    R. Koschke, P. Frenzel, A. Breu, K. Angstmann. Extending the reflexion method for consolidating software variants into product lines. Software Quality Journal December 2009; 17(4):331–366.

    @article{Koschke:SQJ:09,
      author  = {Rainer Koschke and Pierre Frenzel and Andreas Breu and Karsten Angstmann},
      title   = {Extending the reflexion method for consolidating software variants into product lines},
      journal = {Software Quality Journal},
      number  = {4},
      month   = {December},
      volume  = {17},
      year    = {2009},
      pages   = {331--366},
    }
  • BIB

    T. Mende, R. Koschke, F. Beckwermert. An Evaluation of Code Similarity Identification for the Grow-and-Prune Model. Journal on Software Maintenance and Evolution March–April 2009; 21(2):143 – 169.

    @article{Mende:JSME:09,
      author  = {Thilo Mende and Rainer Koschke and Felix Beckwermert},
      title   = {An Evaluation of Code Similarity Identification for the Grow-and-Prune Model},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {21},
      year    = {2009},
      pages   = {143 -- 169},
    }
  • BIB DOI

    C. Roy, J. Cordy, R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Journal of Science of Computer Programming 2009; 74(7):470-495. Special Issue on Program Comprehension (ICPC 2008), unter den fünf am häufigsten zitierten Artikeln von Science of Computer Programming seit 2007.

    @article{Roy:JSCP:09,
      author   = {Chanchal Roy and James Cordy and Rainer Koschke},
      note     = {{Special Issue on Program Comprehension (ICPC 2008)}, unter den f{\"u}nf am h{\"a}ufigsten zitierten Artikeln von Science of Computer Programming seit 2007},
      doi      = {doi:10.1016/j.scico.2009.02.007},
      title    = {Comparison and evaluation of code clone detection techniques and tools: A qualitative approach},
      journal  = {Journal of Science of Computer Programming},
      number   = {7},
      pages    = {470-495},
      volume   = {74},
      year     = {2009},
      abstract = {Over the last decade many techniques and tools for software clone detection have been proposed. In this paper, we provide a qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools, and organize the large amount of information into a coherent conceptual framework. We begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools. We then classify, compare and evaluate the techniques and tools in two different dimensions. First, we classify and compare approaches based on a number of facets, each of which has a set of (possibly overlapping) attributes. Second, we qualitatively evaluate the classified techniques and tools with respect to a taxonomy of editing scenarios designed to model the creation of Type-1, Type-2, Type-3 and Type-4 clones. Finally, we provide examples of how one might use the results of this study to choose the most appropriate clone detection tool or technique in the context of a particular set of goals and constraints. The primary contributions of this paper are: (1) a schema for classifying clone detection techniques and tools and a classification of current clone detectors based on this schema, and (2) a taxonomy of editing scenarios that produce different clone types and a qualitative evaluation of current clone detectors based on this taxonomy.},
      mongth   = {May},
    }
  • BIB

    B. Cornelissen, A. Zaidman, A. Deursen, L. Moonen, R. Koschke. A Systematic Survey of Program Comprehension through Dynamic Analysis. IEEE Computer Society Transactions on Software Engineering 2009; 35(5):684–702.

    @article{Cornelissen:TSE:09,
      author  = {Bas Cornelissen and Andy Zaidman and Arie Deursen and Leon Moonen and Rainer Koschke},
      title   = {A Systematic Survey of Program Comprehension through Dynamic Analysis},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {5},
      volume  = {35},
      year    = {2009},
      pages   = {684--702},
    }
  • BIB

    J. Buckley, A. LeGear, C. Exton, R. Cadogan, T. Johnston, B. Looby, R. Koschke. Encapsulating targeted component abstractions using software Reflexion Modelling. Journal on Software Maintenance and Evolution March–April 2008; 20(2):107–134.

    @article{Buckley:JSME:08,
      author  = {Jim Buckley and Andrew LeGear and Chris Exton and Ross Cadogan and Trevor Johnston and Bill Looby and Rainer Koschke},
      title   = {Encapsulating targeted component abstractions using software Reflexion Modelling},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {20},
      year    = {2008},
      pages   = {107--134},
    }
  • BIB DOI

    R. Falke, R. Koschke, P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering 2008; 13(6):601–643.

    @article{falke:emse:08,
      author  = {Raimar Falke and Rainer Koschke and Pierre Frenzel},
      doi     = {10.1007/s10664-008-9073-9},
      title   = {Empirical Evaluation of Clone Detection Using Syntax Suffix Trees},
      journal = {Empirical Software Engineering},
      issn    = {1382-3256},
      number  = {6},
      volume  = {13},
      year    = {2008},
      pages   = {601--643},
    }
  • BIB DOI

    J. Quante, R. Koschke. Dynamic Object Process Graphs. Journal of Systems and Software 2008; 81:481–501.

    @article{Quante:JSS:08,
      author  = {Jochen Quante and Rainer Koschke},
      doi     = {10.1016/j.jss.2007.06.005},
      title   = {Dynamic Object Process Graphs},
      journal = {Journal of Systems and Software},
      volume  = {81},
      year    = {2008},
      annote  = {Special Issue for IEEE Conference on Software Maintenance and Reengineering (CSMR) 2006},
      issue   = {4},
      pages   = {481--501},
    }
  • BIB

    S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE Computer Society Transactions on Software Engineering September 2007; 33(9):577–591.

    @article{Bellon:TSE:07,
      author  = {Stefan Bellon and Rainer Koschke and Giulio Antoniol and Jens Krinke and Ettore Merlo},
      title   = {Comparison and Evaluation of Clone Detection Tools},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {9},
      month   = {September},
      volume  = {33},
      year    = {2007},
      pages   = {577--591},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Automated Clustering to Support the Reflexion Method. Journal of Systems and Software 2007; 49(3):255–274. Special Issue on WCRE 2005.

    @article{Christl:IST:07,
      author  = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      volume  = {49},
      title   = {Automated Clustering to Support the Reflexion Method},
      journal = {Journal of Systems and Software},
      number  = {3},
      note    = {Special Issue on WCRE 2005},
      year    = {2007},
      pages   = {255--274},
    }
  • BIB

    R. Koschke, G. Canfora, J. \"Czeranski. Revisiting the Delta-IC Approach. Journal of Science of Computer Programming 2006; 60(2):171–188.

    @article{Koschke:JSCP:06,
      author  = {Rainer Koschke and Gerardo Canfora and J{\"o}rg Czeranski},
      title   = {Revisiting the Delta-IC Approach},
      journal = {Journal of Science of Computer Programming},
      number  = {2},
      volume  = {60},
      year    = {2006},
      pages   = {171--188},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Object Trace Extraction for Programs with Pointers. Journal of Systems and Software September 2005; 77(3):263–284.

    @article{Eisenbarth:JSS:05,
      author   = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      title    = {Static Object Trace Extraction for Programs with Pointers},
      journal  = {Journal of Systems and Software},
      number   = {3},
      abstract = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general. In addition, this article describes four case studies we conducted to explore the efficiency of our algorithm, the size of the resulting static traces, and the influence of the underlying points-to analysis on this size.},
      month    = {September},
      volume   = {77},
      year     = {2005},
      pages    = {263--284},
    }
  • BIB DOI

    R. Koschke. Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten. Informatik – Forschung und Entwicklung, Springer Verlag April 2005; 19(3).

    @article{Koschke:InFE:05,
      author  = {Rainer Koschke},
      doi     = {10.1007/s00450-005-0180-1},
      title   = {{Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten}},
      journal = {{Informatik -- Forschung und Entwicklung, Springer Verlag}},
      number  = {3},
      month   = {April},
      volume  = {19},
      year    = {2005},
    }
  • BIB

    A. Walenstein, A. Lakhotia, R. Koschke. Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes March 2004; 29(2):1–5.

    @article{Walenstein:SEN:04,
      author  = {Andrew Walenstein and Arun Lakhotia and Rainer Koschke},
      title   = {Second International Workshop on Detection of Software Clones: workshop report},
      journal = {ACM SIGSOFT Software Engineering Notes},
      number  = {2},
      month   = {March},
      volume  = {29},
      year    = {2004},
      pages   = {1--5},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Viewpoints in Software Architecture Reconstruction. Softwaretechnik Trends 2004; 24(2).

    @article{Deursen:ST:04,
      author  = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {Viewpoints in Software Architecture Reconstruction},
    }
  • BIB

    R. Koschke, D. Simon. Symphony Fallstudie: Hierarchische Reflexion Modelle. Softwaretechnik Trends 2004; 24(2).

    @article{Koschke:ST:04,
      author  = {Rainer Koschke and Daniel Simon},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {{Symphony Fallstudie: Hierarchische Reflexion Modelle}},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Locating Features in Source Code. IEEE Computer Society Transactions on Software Engineering March 2003; 29(3):210–224.

    @article{Eisenbarth:TSE:03,
      author   = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      title    = {Locating Features in Source Code},
      journal  = {IEEE Computer Society Transactions on Software Engineering},
      number   = {3},
      abstract = {Understanding the implementation of a certain feature of a system requires identification of the computational units of the system that contribute to this feature. In many cases, the mapping of features to the source code is poorly documented. In this paper, we present a semiautomatic technique that reconstructs the mapping for features that are triggered by the user and exhibit an observable behavior. The mapping is in general not injective; that is, a computational unit may contribute to several features. Our technique allows for the distinction between general and specific computational units with respect to a given set of features. For a set of features, it also identifies jointly and distinctly required computational units. The presented technique combines dynamic and static analyses to rapidly focus on the system's parts that relate to a specific set of features. Dynamic information is gathered based on a set of scenarios invoking the features. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features. Furthermore, we show how our method allows incremental exploration of features while preserving the "mental map" the analyst has gained through the analysis.},
      month    = {March},
      volume   = {29},
      year     = {2003},
      annote   = {Special issue on ICSM 2001},
      pages    = {210--224},
    }
  • BIB

    R. Koschke. Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey. Journal on Software Maintenance and Evolution March 2003; 15:87–109.

    @article{Koschke:JSME:03,
      author  = {Rainer Koschke},
      title   = {Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey},
      journal = {Journal on Software Maintenance and Evolution},
      month   = {March},
      volume  = {15},
      year    = {2003},
      pages   = {87--109},
    }
  • BIB

    J. F. Girard, R. Koschke. A Comparison of Abstract Data Type and Objects Recovery Techniques. Journal Science of Computer Programming, Elsevier Science March 2000; 6(2–3):149-181.

    @article{Girard:JSCP:00,
      author  = {Jean-Francois Girard and Rainer Koschke},
      title   = {A Comparison of Abstract Data Type and Objects Recovery Techniques},
      journal = {Journal Science of Computer Programming, Elsevier Science},
      number  = {2--3},
      month   = {March},
      volume  = {6},
      year    = {2000},
      pages   = {149-181},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. Journal on Automated Software Engineering, Kluwer Academic Publishers 1999; 6(4).

    @article{Girard:JASE:99,
      author  = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      volume  = {6},
      journal = {Journal on Automated Software Engineering, Kluwer Academic Publishers},
      year    = {1999},
      number  = {4},
      title   = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }

Conference and Workshop Articles

  • BIB

    B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors, International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6–8, 2016. Proceedings, Springer Verlag, 2016; 56–71.

    @inproceedings{Berger:ESSOS:16,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Juan Caballero and Eric Bodden and Elias Athanasopoulos},
      publisher = {Springer Verlag},
      isbn      = {978-3-319-30806-7},
      title     = {Automatically Extracting Threats from Extended Data Flow Diagrams},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6--8, 2016. Proceedings},
      year      = {2016},
      pages     = {56--71},
    }
  • BIB

    R. Koschke, S. Bazrafshan. Software-Clone Rates in Open-Source Programs Written in C or C++. International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER), volume 3, IEEE Computer Society Press, 2016; 1–7.

    @inproceedings{Koschke:IWSC:16,
      author    = {Rainer Koschke and Saman Bazrafshan},
      publisher = {IEEE Computer Society Press},
      title     = {Software-Clone Rates in Open-Source Programs Written in C or C++},
      booktitle = {International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER)},
      volume    = {3},
      year      = {2016},
      pages     = {1--7},
    }
  • BIB

    R. Drechsler, G. R. Fey, R. Koschke, W. Nebel. Vision for the Design of Long-term Autonomous Systems. International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), 2015. Invited Talk.

    @inproceedings{Drechsler:ReCoSoC:15,
      author    = {Rolf Drechsler and Görschwin Fey and Rainer Koschke and Wolfgang Nebel},
      note      = {Invited Talk},
      booktitle = {International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)},
      year      = {2015},
      title     = {Vision for the Design of Long-term Autonomous Systems},
    }
  • BIB

    H. Basit, M. Hammad, R. Koschke. What Do We Need to Know about Clones? Deriving Information Needs from User Goals. International Workshop on Software Clones, IEEE Computer Society Press, 2015; 51–57.

    @inproceedings{Basit:IWSC:15,
      author    = {Hamid Basit and Muhammad Hammad and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Workshop on Software Clones},
      year      = {2015},
      pages     = {51--57},
      title     = {What Do We Need to Know about Clones? Deriving Information Needs from User Goals},
    }
  • BIB

    D. Lüdemann, R. Koschke. From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2015; 211–220.

    @inproceedings{Luedemann:SCAM:15,
      author    = {Dierk L{\"u}demann and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2015},
      pages     = {211--220},
      title     = {From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow},
    }
  • BIB

    H. Basit, M. Hammad, R. Koschke. A Survey on Goal-Oriented Visualization of Clone Data. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, 2015; 46–55.

    @inproceedings{Basit:VISSOFT:15,
      author    = {Hamid Basit and Muhammad Hammad and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE Working Conference on Software Visualization},
      year      = {2015},
      pages     = {46--55},
      title     = {A Survey on Goal-Oriented Visualization of Clone Data},
    }
  • BIB

    S. Bazrafshan, R. Koschke. Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2014; 1–10.

    @inproceedings{Bazrafshan:SCAM:14,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2014},
      pages     = {1--10},
      title     = {Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs},
    }
  • BIB

    C. Roy, M. Zibran, R. Koschke. The Vision of Software Clone Management: Past, Present and the Future. IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, IEEE Computer Society Press, 2014; 18–33. Invited Keynote Paper.

    @inproceedings{Roy:CSMRWCRE:14,
      author    = {Chanchal Roy and Minhaz Zibran and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {The Vision of Software Clone Management: Past, Present and the Future},
      booktitle = {IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week},
      note      = {Invited Keynote Paper},
      year      = {2014},
      pages     = {18--33},
    }
  • BIB

    S. Bazrafshan, R. Koschke. An Empirical Study of Clone Removals. International Conference on Software Maintenance, IEEE Computer Society Press, 2013; 50-59.

    @inproceedings{Bazrafshan:ICSM:2013,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {2013},
      pages     = {50-59},
      title     = {An Empirical Study of Clone Removals},
    }
  • BIB DOI

    B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors, European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2013; 285–294.

    @inproceedings{berger:csmr:13,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Anthony Cleve and Fillipo Ricca and Maura Cerioli},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/CSMR.2013.37},
      isbn      = {978-0-7695-4948-4},
      title     = {Extracting and Analyzing the Implemented Security Architecture of Business Applications},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      issn      = {1534-5351},
      year      = {2013},
      keywords  = {reverse engineering;software security;static analysis;threat modeling},
      pages     = {285--294},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors, Dagstuhl Reports, volume 2, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2012; 21–57. Dagstuhl, Germany.

    @inproceedings{koschke_et_al:DR:2012:3477,
      author    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      urn       = {urn:nbn:de:0030-drops-34775},
      year      = {2012},
      pages     = {21--57},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    A. Hemel, R. Koschke. Reverse Engineering Variability in Source Code Using Clone Detection – A Case Study for Linux Variants of Consumer Electronic Devices. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2012; 357–366.

    @inproceedings{Hemel:WCRE:12,
      author    = {Armijn Hemel and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2012},
      pages     = {357--366},
      title     = {Reverse Engineering Variability in Source Code Using Clone Detection -- A Case Study for Linux Variants of Consumer Electronic Devices},
    }
  • BIB

    B. Katzmarski, R. Koschke. Program complexity metrics and programmer opinions. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 17–26.

    @inproceedings{Katzmarski:ICPC:12,
      author    = {Bernhard Katzmarski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Program complexity metrics and programmer opinions},
      ee        = {http://dx.doi.org/10.1109/ICPC.2012.6240486},
      booktitle = {International Conference on Program Comprehension},
      year      = {2012},
      pages     = {17--26},
    }
  • BIB

    R. Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2012; 309–318.

    @inproceedings{Koschke:CSMR:12,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2012},
      pages     = {309--318},
      title     = {Large-Scale Inter-System Clone Detection Using Suffix Trees},
    }
  • BIB

    T. Roehm, R. Tiarks, R. Koschke, W. Maalej. How Do Professional Developers Comprehend Software? International Conference on Software Engineering, ACM Press, 2012; 255–265. Distinguished Paper Award.

    @inproceedings{Roehm:ICSE:12,
      author    = {Tobias Roehm and Rebecca Tiarks and Rainer Koschke and Walid Maalej},
      publisher = {ACM Press},
      title     = {How Do Professional Developers Comprehend Software?},
      booktitle = {International Conference on Software Engineering},
      note      = {Distinguished Paper Award},
      year      = {2012},
      pages     = {255--265},
    }
  • BIB

    N. Göde, R. Koschke. Frequency and Risks of Changes to Clones. International Conference on Software Engineering, ACM Press, 2011; 311–320.

    @inproceedings{Goede:ICSE:11,
      author    = {Nils G\"{o}de and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      pages     = {311--320},
      title     = {Frequency and Risks of Changes to Clones},
    }
  • BIB

    B. Scholz, R. Koschke. Object-Based Dynamic Protocol Recovery for Multi-Threading Programs. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 251–260.

    @inproceedings{Scholz:WCRE:11,
      author    = {Bernhard Scholz and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {251--260},
      title     = {Object-Based Dynamic Protocol Recovery for Multi-Threading Programs},
    }
  • BIB

    S. Bazrafshan, R. Koschke, N. Göde. Approximate Code Search in Program Histories. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 109–118.

    @inproceedings{Bazrafshan:WCRE:11,
      author    = {Saman Bazrafshan and Rainer Koschke and Nils G\"{o}de},
      publisher = {IEEE Computer Society Press},
      isbn      = {978-0-7695-4582-0},
      title     = {Approximate Code Search in Program Histories},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {109--118},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns. International Conferences on Pervasive Patterns and Applications (PATTERNS), XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.

    @inproceedings{Bunke:PATTERNS:11,
      author       = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher    = {XPS (Xpert Publishing Services)},
      isbn         = {978-1-61208-158-8},
      title        = {Application-Domain Classification for Security Patterns},
      booktitle    = {International Conferences on Pervasive Patterns and Applications (PATTERNS)},
      year         = {2011},
      organization = {IARIA Conferences},
      pages        = {138--143},
    }
  • BIB

    T. Mende, R. Koschke, J. Peleska. On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 259–268.

    @inproceedings{Mende:CSMR:11,
      author    = {Thilo Mende and Rainer Koschke and Jan Peleska},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2011},
      pages     = {259--268},
      title     = {On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 1–10.

    @inproceedings{Koschke:CSMR:10,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {1--10},
      title     = {Incremental Reflexion Analysis},
    }
  • BIB

    T. Mende, R. Koschke. Effort-Aware Defect Prediction Models. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 109–118.

    @inproceedings{Mende:CSMR:10,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {109--118},
      title     = {Effort-Aware Defect Prediction Models},
    }
  • BIB

    R. Koschke, R. Tiarks. Haben wir Programmverstehen schon ganz verstanden? Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings, 2009; 15–26.

    @inproceedings{Koschke:L2S2:09,
      author    = {Rainer Koschke and Rebecca Tiarks},
      booktitle = {Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings},
      year      = {2009},
      pages     = {15--26},
      title     = {{Haben wir Programmverstehen schon ganz verstanden?}},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 67-76.

    @inproceedings{Tiarks:SCAM:09,
      author    = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2009},
      pages     = {67-76},
      title     = {An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools},
    }
  • BIB DOI

    T. Mende, R. Koschke. Revisiting the Evaluation of Defect Prediction Models. PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, ACM, 2009; 1–10. New York, NY, USA.

    @inproceedings{Mende:Promise:09,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {ACM},
      doi       = {http://doi.acm.org/10.1145/1540438.1540448},
      isbn      = {978-1-60558-634-2},
      title     = {Revisiting the Evaluation of Defect Prediction Models},
      booktitle = {PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering},
      address   = {New York, NY, USA},
      location  = {Vancouver, British Columbia, Canada},
      year      = {2009},
      pages     = {1--10},
    }
  • BIB

    R. Koschke, S. Jarzabek, J. Inoue. Third International Workshop on Software Clones (IWSC). European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 269–270.

    @inproceedings{Koschke:CSMR:09,
      author    = {Rainer Koschke and Stanislaw Jarzabek and James Inoue},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {269--270},
      title     = {Third International Workshop on Software Clones (IWSC)},
    }
  • BIB

    T. Mende, R. Koschke, M. Leszak. Evaluating Defect Prediction Models for a Large Evolving Software System. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 247–250.

    @inproceedings{Mende:CSMR:09,
      author    = {Thilo Mende and Rainer Koschke and Marek Leszak},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {247--250},
      title     = {Evaluating Defect Prediction Models for a Large Evolving Software System},
    }
  • BIB

    N. Göde, R. Koschke. Incremental Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 219–228. Best Paper Award von 70 eingereichten Beiträgen.

    @inproceedings{Goede:CSMR:09,
      author    = {Nils G{\"o}de and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Clone Detection},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 70 eingereichten Beitr{\"a}gen},
      year      = {2009},
      pages     = {219--228},
    }
  • BIB

    B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung. Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik, GI Lecture Notes for Informatics, 2008.

    @inproceedings{Berger:WASE:08,
      author    = {Bernhard Berger and Rainer Koschke},
      publisher = {GI Lecture Notes for Informatics},
      booktitle = {Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft f{\"u}r Informatik},
      year      = {2008},
      title     = {{Reduzierung der Programmgr{\"o}{\ss}e durch Klonerkennung}},
    }
  • BIB

    R. Koschke. Frontiers in Software Clone Management. Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance, IEEE Computer Society Press, 2008; 119–128.

    @inproceedings{Koschke:ICSM:08,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance},
      year      = {2008},
      pages     = {119--128},
      title     = {Frontiers in Software Clone Management},
    }
  • BIB

    R. Koschke. Zehn Jahre WSR, zwölf Jahre Bauhaus. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 51–66.

    @inproceedings{Koschke:WSR:08,
      author    = {Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Zehn Jahre WSR, zw{\"o}lf Jahre Bauhaus}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {51--66},
    }
  • BIB PDF

    J. Harder, R. Koschke. Empirische Grundlagen für das Klonmanagement. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 127–133.

    @inproceedings{Harder:WSR:08,
      author    = {Jan Harder and Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Empirische Grundlagen f{\"u}r das Klonmanagement}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {127--133},
    }
  • BIB

    T. Mende, F. Beckwermert, R. Koschke, G. Meier. Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2008; 163–172.

    @inproceedings{Mende:CSMR:08,
      author    = {Thilo Mende and Felix Beckwermert and Rainer Koschke and Gerald Meier},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2008},
      pages     = {163--172},
      title     = {Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Protocol Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 219–228.

    @inproceedings{Quante:WCRE:07,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Protocol Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      year      = {2007},
      pages     = {219--228},
    }
  • BIB

    P. Frenzel, R. Koschke, A. Breu, K. Angstmann. Extending the Reflection Method for Consolidating Software Variants into Product Lines. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 160–169. Best Paper Award von 87 eingereichten Beiträgen.

    @inproceedings{Frenzel:WCRE:07,
      author    = {Pierre Frenzel and Rainer Koschke and Andreas Breu and Karsten Angstmann},
      publisher = {IEEE Computer Society Press},
      title     = {Extending the Reflection Method for Consolidating Software Variants into Product Lines},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      note      = {Best Paper Award von 87 eingereichten Beitr{\"a}gen},
      year      = {2007},
      pages     = {160--169},
    }
  • BIB

    R. Koschke. Survey of Research on Software Clones. R. Koschke, E. Merlo, A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, 2007. Dagstuhl, Germany.

    @inproceedings{Koschke:Dagstuhl:07,
      author    = {Rainer Koschke},
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Survey of Research on Software Clones},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2007-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      booktitle = {Duplication, Redundancy, and Similarity in Software},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB DOI

    R. Koschke, R. Falke, P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2006; 253–262.

    @inproceedings{Koschke:WCRE:06,
      author    = {Rainer Koschke and Raimar Falke and Pierre Frenzel},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/WCRE.2006.18},
      isbn      = {0-7695-2719-1},
      title     = {Clone Detection Using Abstract Syntax Suffix Trees},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2006},
      pages     = {253--262},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2006; 81–90. Best Paper Award von 65 eingereichten Beiträgen.

    @inproceedings{Quante:CSMR:06,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Object Process Graphs},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 65 eingereichten Beitr{\"a}gen},
      year      = {2006},
      pages     = {81--90},
    }
  • BIB

    R. Koschke. What architects should know about reverse engineering and reengineering. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, November 2005; 4–10. Invited Paper.

    @inproceedings{Koschke:WICSA:05,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {What architects should know about reverse engineering and reengineering},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      month     = {November},
      note      = {Invited Paper},
      year      = {2005},
      pages     = {4--10},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Equipping the Reflexion Method with Automated Clustering. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2005; 89–98.

    @inproceedings{Christl:WCRE:05,
      author    = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      publisher = {IEEE Computer Society Press},
      title     = {Equipping the Reflexion Method with Automated Clustering},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2005},
      pages     = {89--98},
    }
  • BIB

    R. Falke, R. Klein, R. Koschke, J. Quante. The Dominance Tree in Visualizing Software Dependencies. Workshop on Visualizing Software for Understanding and Analysis, IEEE Computer Society Press, September 2005; 1–6.

    @inproceedings{Falke:VISSOFT:05,
      author    = {Raimar Falke and Raimund Klein and Rainer Koschke and Jochen Quante},
      publisher = {IEEE Computer Society Press},
      title     = {The Dominance Tree in Visualizing Software Dependencies},
      booktitle = {Workshop on Visualizing Software for Understanding and Analysis},
      issn      = {0-7803-9540-9},
      month     = {September},
      year      = {2005},
      pages     = {1--6},
    }
  • BIB

    R. Koschke, J. Quante. On Dynamic Feature Location. International Conference on Automated Software Engineering, ACMPress, 2005; 86–95. Annahmequote unter 10 Prozent.

    @inproceedings{Koschke:ASE:05,
      author    = {Rainer Koschke and Jochen Quante},
      publisher = {ACMPress},
      title     = {On Dynamic Feature Location},
      booktitle = {International Conference on Automated Software Engineering},
      note      = {Annahmequote unter 10 Prozent},
      year      = {2005},
      pages     = {86--95},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Symphony: View-Driven Software Architecture Reconstruction. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, June 2004; 122–132.

    @inproceedings{Deursen:WICSA:04,
      author    = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      publisher = {IEEE Computer Society Press},
      title     = {Symphony: View-Driven Software Architecture Reconstruction},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      abstract  = {Authentic descriptions of a software architecture are required as a reliable foundation for any but trivial changes to a system. Far too often, architecture descriptions of existing systems are out of sync with the implementation. If they are, they must be reconstructed. There are many existing techniques for reconstructing individual architecture views, but no information about how to select views for reconstruction, or about process aspects of architecture reconstruction in general. In this paper we describe view-driven process for reconstructing software architecture that fills this gap. To describe Symphony, we present and compare different case studies, thus serving a secondary goal of sharing real-life reconstruction experience. The Symphony process incorporates the state of the practice, where reconstruction is problem-driven and uses a rich set of architecture views. Symphony provides a common framework for reporting reconstruction experiences and for comparing reconstruction approaches. Finally, it is a vehicle for exposing and demarcating research problems in software architecture reconstruction.},
      month     = {June},
      year      = {2004},
      pages     = {122--132},
    }
  • BIB

    R. Koschke, D. Simon. Hierarchical Reflexion Models. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2003; 36–45.

    @inproceedings{Koschke:WCRE:03,
      author    = {Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Hierarchical Reflexion Models},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {The reflexion model originally proposed by Murphy and Notkin allows one to structurally validate a descriptive or prescriptive architecture model against a source model. First, the entities in the source model are mapped onto the architectural model, then discrepancies between the architecture model and source model are computed automatically. The original reflexion model allows an analyst to specify only non-hierarchical models, which is insufficient for larger systems that are decomposed into hierarchical subsystems. This paper extends the original reflexion model to hierarchical architecture models, describes a method to apply this technique, and reports on case studies conducted on two large-scale and complex applications (namely, the C compiler sdcc for 8-bit microprocessors and the GNU C compiler gcc).},
      month     = {November},
      year      = {2003},
      pages     = {36--45},
    }
  • BIB

    A. Lakhotia, A. Walenstein, R. Koschke. Second international workshop on detection of software clones. Working Conference on Reverse Engineering, 2003; 368–368.

    @inproceedings{Lakhotia:wcre:03,
      author    = {A. Lakhotia and A. Walenstein and R. Koschke},
      annote    = {a working session on clones},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2003},
      pages     = {368--368},
      title     = {Second international workshop on detection of software clones},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Incremental Location of Combined Features for Large-Scale Programs. International Conference on Software Maintenance, IEEE Computer Society Press, October 2002; 273–282.

    @inproceedings{Eisenbarth:ICSM:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Location of Combined Features for Large-Scale Programs},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {The need for changing a program frequently confronts maintainers with the reality that no valid architectural description is at hand. To solve that problem, we presented at ICSM 2001 a language-independent and easy to use technique for opportunistic and demand driven location of features in source code based on static and dynamic analysis and concept analysis. In order to further validate the technique, we recently performed an industrial case study on a 1.2 million LOC production system. The experiences we made during that case study showed twoproblems of our approach: the growing complexity of concept lattices for large systems with many features and the need for handling compositions of features. This paper extends our technique to solve these problems. We show how this method allows incremental exploration of features while preserving the "mental map" the maintainer has gained through the analysis. The second improvement is a detailed look at composing features into more complex scenarios. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features.},
      month     = {October},
      year      = {2002},
      pages     = {273--282},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Trace Extraction. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2002.

    @inproceedings{Eisenbarth:WCRE:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2002},
      abstract  = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general.},
      title     = {Static Trace Extraction},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Aiding Program Comprehension by Static and Dynamic Feature Analysis. International Conference on Software Maintenance, IEEE Computer Society Press, November 2001; 602–611. Best Paper Award von 161 eingereichten Beiträgen.

    @inproceedings{Eisenbarth:ICSM:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Aiding Program Comprehension by Static and Dynamic Feature Analysis},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {Understanding a system's implementation without prior knowledge is a hard task for reengineers in general. However, some degree of automatic aid is possible. In this paper, we present a technique building a mapping between the system's externally visible behavior and the relevant parts of the source code. Our technique combines dynamic and static analyses to rapidly focus on the system's parts urgently required for a goal-directed process of program understanding.},
      month     = {November},
      note      = {Best Paper Award von 161 eingereichten Beitr{\"a}gen},
      year      = {2001},
      pages     = {602--611},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Feature-Driven Program Understanding Using Concept Analysis of Execution Traces. International Workshop on Program Comprehension, IEEE Computer Society Press, May 2001; 300-309.

    @inproceedings{Eisenbarth:IWPC:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Feature-Driven Program Understanding Using Concept Analysis of Execution Traces},
      booktitle = {International Workshop on Program Comprehension},
      abstract  = {The first task of a programmer who wants to understand how a certain feature is implemented is to localize the implementation of the feature in the code. If the implementations of a set of related features are to be understood, a programmer is interested in their commonalities and variabilities. For large and badly documented programs, localizing features in code and identifying commonalities and variabilities of components and features can be difficult and time-consuming. It is useful to derive this information automatically. The feature-component correspondence describes which components are needed to implement a set of features and what are the respective commonalities and variabilities of features and components. This paper describes a new technique to derive the feature-component correspondence utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language-independent, and can yield results quickly.},
      month     = {May},
      year      = {2001},
      pages     = {300-309},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Derivation of Feature Component Maps by means of Concept Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, March 2001; 176–180.

    @inproceedings{Eisenbarth:CSMR:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Derivation of Feature Component Maps by means of Concept Analysis},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      abstract  = {Feature component maps describe which components are needed to implement a particular feature and are used early in processes to develop a product line based on existing assets. This paper describes a new technique to derive the feature component map and additional dependencies utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language independent, and can yield results quickly and very early in the process.},
      month     = {March},
      year      = {2001},
      pages     = {176--180},
    }
  • BIB

    G. Canfora, J. \"Czeranski, R. Koschke. Revisiting the Delta IC Approach to Component Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2000; 140–149.

    @inproceedings{Canfora:WCRE:00,
      author    = {Gerardo Canfora and J{\"o}rg Czeranski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Revisiting the Delta IC Approach to Component Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2000},
      pages     = {140--149},
    }
  • BIB

    R. Koschke. Vorlesungen zum Thema Software-Reengineering. 2.~Workshop Software-Reengineering, Universität Koblenz-Landau, May 2000; 3–7. Bad Honnef, Germany. Fachberichte Informatik, Nr. 8/2000.

    @inproceedings{koschke:vorlesungen-zum-thema-software-reengineering,
      author    = {Rainer Koschke},
      publisher = {Universit{\"a}t Koblenz-Landau},
      title     = {{Vorlesungen zum Thema Software-Reengineering}},
      booktitle = {2.~Workshop Software-Reengineering},
      address   = {Bad Honnef, Germany},
      month     = {May},
      note      = {Fachberichte Informatik, Nr. 8/2000},
      year      = {2000},
      pages     = {3--7},
    }
  • BIB

    R. Koschke, T. Eisenbarth. A Framework for Experimental Evaluation of Clustering Techniques. International Workshop on Program Comprehension, IEEE Computer Society Press, 2000.

    @inproceedings{Koschke:IWPC:00,
      author    = {Rainer Koschke and Thomas Eisenbarth},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Workshop on Program Comprehension},
      year      = {2000},
      abstract  = {Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comparable evaluations of automatic clustering techniques, a common reference corpus of freely available systems is needed for which the actual components are known. The reference corpus is used to measure recall and precision of automatic techniques. For this measurement, a standard scheme for comparing the components recovered by a clustering technique to components in the reference corpus is required. This paper describes both the process of setting up reference corpora and ways of measuring recall and precision of automatic clustering techniques. For methods with human intervention, controlled experiments should be conducted. This paper additionally proposes a controlled experiment as a standard for evaluating manual and semi-automatic component recovery methods that can be conducted cost-effectively.},
      title     = {A Framework for Experimental Evaluation of Clustering Techniques},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse. Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1), 2000; 63–68.

    @inproceedings{Eisenbarth:DSPL:00,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      booktitle = {Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1)},
      year      = {2000},
      pages     = {63--68},
      title     = {{Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse}},
    }
  • BIB

    R. Koschke, J. F. Girard, M. Würthner. Intermediate Representations for Reverse Engineering. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1998; 241–250.

    @inproceedings{Koschke:98,
      author    = {Rainer Koschke and Jean-Francois Girard and Martin W{\"u}rthner},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {1998},
      pages     = {241--250},
      title     = {Intermediate Representations for Reverse Engineering},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. International Conference on Automated Software Engineering, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ASE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Automated Software Engineering},
      year      = {1997},
      title     = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }
  • BIB

    J. F. Girard, R. Koschke. Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding. International Conference on Software Maintenance, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ICSM:97,
      author    = {Jean-Francois Girard and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {1997},
      abstract  = {This paper presents a method to view a system as a hierarchy of modules according to information hiding concepts and to identify architectural component candidates in this hierarchy. The result of the method eases the understanding of a system's underlying software architecture. A prototype tool implementing this method was applied to three systems written in C (each over 30 Kloc). For one of these systems, an author of the system created an architectural description. The components generated by our method correspond to those of this architectural description in almost all cases. For the other two systems, most of the components resulting from the method correspond to meaningful system abstractions.},
      title     = {Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1997; 66–75.

    @inproceedings{Girard:WCRE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      title     = {Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {In the context of the authors' research on architectural features recovery, abstract data type (ADT) and abstract state encapsulation (ASE, also called abstract object) have been identified as two of the smallest components which are useful to build a significant architectural overview of the system. The authors have named these the atomic components of an architecture. This paper compares five published techniques which extract ADT and ASE from source code. A prototype tool implementing each techniques has been developed and applied to three medium size systems written in C (each over 30 Kloc). The results from each approach are compared with the atomic components identified by hand by a group of software engineers. These people did not know the automatic techniques which were going to be applied to the systems.},
      year      = {1997},
      pages     = {66--75},
    }

Further Publications

  • BIB

    K. Schmid, R. Koschke, C. Kröher, D. Lüdemann. Towards Identifying Evolution Smells in Software Product Lines. 5. Workshop Design For Future — Langlebige Softwaresysteme, CEUR Workshop Proceedings, 2013.

    @inproceedings{Schmid:DFF:13,
      author    = {Klaus Schmid and Rainer Koschke and Christian Kr{\"o}her and Dierk L{\"u}demann},
      publisher = {CEUR Workshop Proceedings},
      booktitle = {5. Workshop Design For Future --- Langlebige Softwaresysteme},
      year      = {2013},
      title     = {Towards Identifying Evolution Smells in Software Product Lines},
    }
  • BIB

    T. Mende, R. Koschke. Evaluation von Modellen zur Fehlervorhersage: Probleme und Lösungsmöglichkeiten. Softwaretechnik Trends May 2010; 30(2):74–75. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).

    @article{Mende:WSR:10,
      author   = {Thilo Mende and Rainer Koschke},
      note     = {Beitr{\"a}ge des 12. Workshops 'Software Reengineering' (WSR 2010)},
      title    = {{Evaluation von Modellen zur Fehlervorhersage: Probleme und L{\"o}sungsm{\"o}glichkeiten}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {30},
      year     = {2010},
      pages    = {74--75},
    }
  • BIB

    R. Koschke. Wie schütze ich meine Organisation vor Software-Erosion? M. Hafner, editor, Embedded Software Engineering Kongress, Elektronikpraxis und Mircoconsult, 2008; 285–290.

    @inproceedings{Koschke:ESE:Erosion:08,
      author    = {Rainer Koschke},
      editor    = {Martina Hafner},
      publisher = {Elektronikpraxis und Mircoconsult},
      title     = {{Wie sch{\"u}tze ich meine Organisation vor Software-Erosion?}},
      booktitle = {Embedded Software Engineering Kongress},
      abstract  = {Dieser Artikel beschreibt, welche Hebel angesetzt werden k{\"o}nnen, um daf{\"u}r zu sorgen, dass Dokumentation aktuell und n{\"u}tzlich bleibt und die Komplexit{\"a}t der Programme begrenzt wird. Dazu wird ein ganzheitliches Vorgehen vorgestellt, das die Organisation, den Entwicklungsprozess, die Menschen und die Software selbst im Blick hat.},
      year      = {2008},
      pages     = {285--290},
    }
  • BIB

    R. Koschke. Architektur- und Code-Management von Software-Varianten. M. Hafner, editor, Embedded Software Engineering Kongress, Elektronikpraxis und Mircoconsult, 2008; 213–217.

    @inproceedings{Koschke:ESE:PL:08,
      author    = {Rainer Koschke},
      editor    = {Martina Hafner},
      publisher = {Elektronikpraxis und Mircoconsult},
      title     = {{Architektur- und Code-Management von Software-Varianten}},
      booktitle = {Embedded Software Engineering Kongress},
      abstract  = {Bei Software-Herstellern im Bereich eingebetteter Systeme, deren Produkte gro{\ss}e Gemeinsamkeiten, aber auch Spezifika aufweisen, entstehen h{\"a}ufig Software-Varianten durch ungeplante Wiederverwendung. Der Code eines Produkts wird f{\"u}r ein anderes Produkt kopiert und an die besonderen Anforderungen des neuen Einsatzes angepasst. Die resultierenden Varianten erfahren eine eigene Weiterentwicklung. Bei einer gro{\ss}en Zahl von Varianten erh{\"o}hen sich dabei die Wartungskosten, weil notwendige {\"A}nderungen im gemeinsamen Code (z.B. zur Fehlerbehebung) in allen Varianten individuell analysiert, nachgezogen, dokumentiert und getestet werden m{\"u}ssen. Die Wartung und Weiterentwicklung einer gro{\ss}en Anzahl von Varianten ist auf Dauer kaum mehr beherrschbar. Dieser Artikel beschreibt Techniken, um Software-Varianten, die durch ungeplante Wiederverwendung entstanden sind, sich aber am Markt bew{\"a}hrt haben, zu konsolidieren und in eine Produktlinienplattform zu integrieren, um so Wartungs- und Weiterentwicklungskosten einzusparen. Die Techniken stammen aus der Forschung und wurden in industriellen Fallstudien bei der Robert-Bosch GmbH erprobt.},
      year      = {2008},
      pages     = {213--217},
    }
  • BIB

    R. Koschke. Konsolidierung von Software-Varianten in Software-Produktlinien. Softwaretechnik Trends May 2006; 26(2). Beiträge des 8. Workshops 'Software Reengineering' (WSR 2006).

    @article{Koschke:WSR:06,
      author   = {Rainer Koschke},
      note     = {Beitr{\"a}ge des 8. Workshops 'Software Reengineering' (WSR 2006)},
      title    = {{Konsolidierung von Software-Varianten in Software-Produktlinien}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {26},
      year     = {2006},
    }
  • BIB

    R. Koschke, Y. Zhang. Component Recovery, Protocol Recovery and Validation in Bauhaus. J. \"Ebert, B. Kullbach, F. Lehner, editors, Workshop on Software Reengineering, volume 1/2002 of Fachberichte Informatik, May 2001; 73-76. Institut für Informatik, Rheinau 1, D-56075 Koblenz, University of Koblenz-Landau.

    @inproceedings{Koschke:2001,
      author       = {Rainer Koschke and Yan Zhang},
      editor       = {J{\"u}rgen Ebert and Bernt Kullbach and Franz Lehner},
      title        = {Component Recovery, Protocol Recovery and Validation in Bauhaus},
      series       = {Fachberichte Informatik},
      booktitle    = {Workshop on Software Reengineering},
      address      = {Institut f{\"u}r Informatik, Rheinau 1, D-56075 Koblenz},
      month        = {May},
      volume       = {1/2002},
      year         = {2001},
      organization = {University of Koblenz-Landau},
      annote       = {http://www.uni-koblenz.de/fb4},
      pages        = {73-76},
    }





Arbeitsgruppe

Forschung

Lehre

Publikationen

Service

Kontakt

 

---------
BEDIENUNG
---------


SEITENINHALT DRUCKEN

LESEZEICHEN SETZEN

ENGLISH VERSION  






  SEITENANFANG
Hier geht es zur Homepage des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Universität Bremen