Home  Sitemap  Kontakt 





 


TZI

---------------
 
 
Home

Publications of R. Koschke

Books

  • BIB

    R. Koschke, Y. Higo, N. Göde, editors. Proceedings of the International Workshop on Software Clones, volume 63, 2014. Electronic Communications of the EASST.

    @proceedings{Koschke:IWSC:14,
      editor    = {Rainer Koschke and Yoshiki Higo and Nils G{\"o}de},
      volume    = {63},
      publisher = {Electronic Communications of the EASST},
      issn      = {1863-2122},
      year      = {2014},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    R. Koschke, E. Jürgens, J. \"Rilling, editors. Proceedings of the International Workshop on Software Clones, 2013. ACM Press.

    @proceedings{Koschke:IWSC:13,
      editor    = {Rainer Koschke and Elmar J{\"u}rgens and J{\"u}rgen Rilling},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2013},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, J. Krinke, C. Roy, editors. Proceedings of the International Workshop on Software Clones, 2012. ACM Press.

    @proceedings{Inoue:IWSC:12,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke and Jens Krinke and Chanchal Roy},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2012},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071), volume 2, Dagstuhl, Germany, 2012. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.

    @proceedings{Koschke:Dagstuhl:12,
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {{Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)}},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      year      = {2012},
      urn       = {urn:nbn:de:0030-drops-34775},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    K. Inoue, J. Cordy, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2011. ACM Press.

    @proceedings{Inoue:IWSC:11,
      editor    = {Katsuro Inoue and James Cordy and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2010. ACM Press.

    @proceedings{Inoue:IWSC:10,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2010},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2009. ACM Press.

    @proceedings{Inoue:IWSC:09,
      editor    = {Katsuro Inoue and James Cordy and Stanislaw Jarzabek and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      title     = {Proceedings of the International Workshop on Software Clones},
    }
  • BIB

    R. Koschke, O. Herzog, K. Rödiger, M. Ronthaler, editors. INFORMATIK 2007 — Informatik trifft Logistik: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V., volume P-109 (Band 1) und P-110 (Band 2) of Lecture Notes in Informatics (LNI), Bonn, September 2007.

    @proceedings{Koschke:GI:07,
      editor       = {Rainer Koschke and Otthein Herzog and Karl-Heinz R{\"o}diger and Marc Ronthaler},
      title        = {{INFORMATIK 2007 --- Informatik trifft Logistik: Beitr{\"a}ge der 37. Jahrestagung der Gesellschaft f{\"u}r Informatik e.V.}},
      series       = {Lecture Notes in Informatics (LNI)},
      address      = {Bonn},
      month        = {September},
      volume       = {P-109 (Band 1) und P-110 (Band 2)},
      year         = {2007},
      organization = {Gesellschaft f{\"u}r Informatik e.V.},
    }
  • BIB

    R. Koschke, E. Merlo, A. Walenstein, editors. Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.

    @proceedings{Koschke:Dagstuhl-Proc:07,
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Duplication, Redundancy, and Similarity in Software},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2009-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB

    R. Koschke. Atomic Architectural Component Recovery for Program Understanding and Evolution. Institute of Software Technology, University of Stuttgart, Germany, 1999.

    @phdthesis{Koschke:Thesis:99,
      author = {Rainer Koschke},
      school = {Institute of Software Technology, University of Stuttgart, Germany},
      year   = {1999},
      title  = {Atomic Architectural Component Recovery for Program Understanding and Evolution},
    }

Bookchapters

  • BIB

    R. Koschke, S. Bellon. Code Clone Analysis—Researches, Tools, and Practices, IWSC(D): From Research to Practice: A Personal Historical Retelling,. Springer, 2021. Accepted.

    @inbook{Koschke:Book:21,
      author    = {Rainer Koschke and Stefan Bellon},
      chapter   = {IWSC(D): From Research to Practice: A Personal Historical Retelling},
      publisher = {Springer},
      title     = {Code Clone Analysis---Researches, Tools, and Practices},
      note      = {Accepted},
      year      = {2021},
      numpages  = {12},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies, Selected papers from MODELSWARD 2018., 211–235. Springer, 2018. Extended selected MODELSWARD 2018 paper..

    @inbook{Said:CCIS:18,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      chapter   = {},
      publisher = {Springer},
      title     = {Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies},
      series    = {Communications in Computer and Information (CCIS)},
      note      = {Extended selected MODELSWARD 2018 paper.},
      year      = {2018},
      type      = {Selected papers from MODELSWARD 2018.},
      pages     = {211--235},
    }
  • BIB

    R. Koschke. Software Engineering: International Summer Schools, Architecture Reconstruction, 140–173. Springer Verlag, 2009. edited by Andrea De Lucia and Filomena Ferrucci.

    @inbook{Koschke:ISSSE:09,
      author    = {Rainer Koschke},
      chapter   = {Architecture Reconstruction},
      publisher = {Springer Verlag},
      isbn      = {3-540-95887-8},
      title     = {Software Engineering: International Summer Schools},
      note      = {edited by Andrea De Lucia and Filomena Ferrucci},
      year      = {2009},
      pages     = {140--173},
    }
  • BIB

    R. Koschke. Software Evolution, Identifying and Removing Software Clones, 15–39. Springer Verlag, 2008. Editors: Serge Demeyer and Tom Mens.

    @inbook{Koschke:Buch:08,
      author    = {Rainer Koschke},
      chapter   = {Identifying and Removing Software Clones},
      publisher = {Springer Verlag},
      title     = {Software Evolution},
      booktitle = {Software Evolution},
      note      = {Editors: Serge Demeyer and Tom Mens},
      year      = {2008},
      pages     = {15--39},
    }
  • BIB

    R. Koschke, E. Plödereder. F. Lehner, editor. Ansätze des Programmverstehens, 159–176. Deutscher Universitätsverlag/Gabler Vieweg Westdeutscher Verlag, 1996.

    @inbook{Koschke:Buch:96,
      author    = {Rainer Koschke and Erhard Pl{\"o}dereder},
      editor    = {Franz Lehner},
      publisher = {Deutscher Universit{\"a}tsverlag/Gabler Vieweg Westdeutscher Verlag},
      booktitle = {{Softwarewartung und Reengineering - Erfahrungen und Entwicklungen}},
      year      = {1996},
      pages     = {159--176},
      title     = {{Ans{\"a}tze des Programmverstehens}},
    }

Journal Articles

  • BIB DOI

    A. Razzaq, A. Ventresque, R. Koschke, A. Lucia, J. Buckley. The Effect of Feature Characteristics on the Performance of Feature Location Techniques. IEEE Computer Society Transactions on Software Engineering 2021. Accepted.

    @article{Koschke:TSE:21,
      author  = {Abdul Razzaq and Anthony Ventresque and Rainer Koschke and Andrea Lucia and Jim Buckley},
      note    = {Accepted},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      year    = {2021},
      doi     = {10.1109/TSE.2021.3049735},
      title   = {The Effect of Feature Characteristics on the Performance of Feature Location Techniques},
    }
  • BIB DOI

    W. Said, J. Quante, R. Koschke. Mining understandable state machine models from embedded code. Empirical Software Engineering 2020; 25(6):4759–4804.

    @article{Said:EMSE:20,
      author  = {Wasim Said and Jochen Quante and Rainer Koschke},
      doi     = {10.1007/s10664-020-09865-0},
      title   = {Mining understandable state machine models from embedded code},
      url     = {https://doi.org/10.1007/s10664-020-09865-0},
      journal = {Empirical Software Engineering},
      number  = {6},
      volume  = {25},
      year    = {2020},
      pages   = {4759--4804},
    }
  • BIB DOI

    M. Hammad, H. Basit, S. Jarzabek, R. Koschke. A systematic mapping study of clone visualization. Computer Science Review 2020; 37:100266.

    @article{Hammad:CSR:20,
      author   = {Muhammad Hammad and Hamid Basit and Stan Jarzabek and Rainer Koschke},
      numpages = {55},
      doi      = {https://doi.org/10.1016/j.cosrev.2020.100266},
      title    = {A systematic mapping study of clone visualization},
      url      = {http://www.sciencedirect.com/science/article/pii/S1574013719302679},
      journal  = {Computer Science Review},
      issn     = {1574-0137},
      abstract = {Knowing code clones (similar code fragments) is helpful in software maintenance and re-engineering. As clone detectors return huge numbers of clones, visualization techniques have been proposed to make cloning information more comprehensible and useful for programmers. We present a mapping study of clone visualization techniques, classifying visualizations in respect to the user goals to be achieved by means of clone visualizations and relevant clone-related information needs. Our mapping study will aid tool users in selecting clone visualization tools suitable for the task at hand, tool vendors in improving capabilities of their tools, and researchers in identifying open problems in clone visualization research.},
      volume   = {37},
      year     = {2020},
      keywords = {Clone, Visualization techniques, Feature analysis, User goals, Information needs, Human–computer interaction},
      pages    = {100266},
    }
  • BIB DOI

    W. Maalej, R. Tiarks, T. Roehm, R. Koschke. On the Comprehension of Program Comprehension. ACM Transactions on Software Engineering and Methodology September 2014; 23(4):31:1–31:37.

    @article{Maalej:TOSEM:14,
      author     = {Walid Maalej and Rebecca Tiarks and Tobias Roehm and Rainer Koschke},
      numpages   = {37},
      publisher  = {ACM Press},
      issue_date = {August 2014},
      doi        = {10.1145/2622669},
      acmid      = {2622669},
      title      = {On the Comprehension of Program Comprehension},
      url        = {http://doi.acm.org/10.1145/2622669},
      journal    = {ACM Transactions on Software Engineering and Methodology},
      issn       = {1049-331X},
      number     = {4},
      month      = {September},
      volume     = {23},
      year       = {2014},
      keywords   = {Empirical software engineering, context-aware software engineering, information needs, knowledge sharing, program comprehension},
      articleno  = {31},
      pages      = {31:1--31:37},
    }
  • BIB DOI

    R. Koschke. Large-scale inter-system clone detection using suffix trees and hashing. Journal of Software: Evolution and Process August 2014; 26(8):747–769.

    @article{Koschke:JSEP:14,
      author  = {Rainer Koschke},
      doi     = {DOI: 10.1002/smr.1592},
      title   = {Large-scale inter-system clone detection using suffix trees and hashing},
      journal = {Journal of Software: Evolution and Process},
      number  = {8},
      month   = {August},
      volume  = {26},
      year    = {2014},
      pages   = {747--769},
    }
  • BIB

    O. Riemann, R. Koschke. Robust Parsing of Cloned Token Sequences. Electronic Communications of the EASST 2014; 63:20 pages. Proceedings of the International Workshop on Software Clones 2014.

    @article{Riemann:IWSC:14,
      author  = {Ole Riemann and Rainer Koschke},
      note    = {Proceedings of the International Workshop on Software Clones 2014},
      title   = {Robust Parsing of Cloned Token Sequences},
      journal = {Electronic Communications of the EASST},
      issn    = {1863-2122},
      volume  = {63},
      year    = {2014},
      pages   = {20 pages},
    }
  • BIB DOI

    N. Göde, R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process February 2013; 25(2):165–192.

    @article{Goede:JSME:13,
      author  = {Nils G\"{o}de and Rainer Koschke},
      doi     = {10.1002/smr.520},
      title   = {Studying clone evolution using incremental clone detection},
      journal = {Journal of Software: Evolution and Process},
      issn    = {2047-7473},
      number  = {2},
      month   = {February},
      volume  = {25},
      year    = {2013},
      pages   = {165--192},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. Journal of Software: Evolution and Process 2013; 25(6):601–638. Special Issue of CSMR'2010.

    @article{Koschke:JSME:13,
      author  = {Rainer Koschke},
      note    = {Special Issue of CSMR'2010},
      title   = {Incremental Reflexion Analysis},
      journal = {Journal of Software: Evolution and Process},
      number  = {6},
      volume  = {25},
      year    = {2013},
      pages   = {601--638},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements. International Journal On Advances in Security July 2012; 5(1&2):46–67.

    @article{Bunke:IJOAS:2012,
      author    = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher = {XPS (Xpert Publishing Services)},
      title     = {Organizing Security Patterns Related to Security and Pattern Recognition Requirements},
      journal   = {International Journal On Advances in Security},
      issn      = {1942-2636},
      number    = {1\&2},
      month     = {July},
      volume    = {5},
      year      = {2012},
      pages     = {46--67},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An extended assessment of type-3 clones as detected by state-of-the-art tools. Software Quality Journal 2011; 19(2):295–331.

    @article{Tiarks:SQJ:11,
      author  = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      title   = {An extended assessment of type-3 clones as detected by state-of-the-art tools},
      journal = {Software Quality Journal},
      number  = {2},
      volume  = {19},
      year    = {2011},
      pages   = {295--331},
    }
  • BIB

    R. Koschke, P. Frenzel, A. Breu, K. Angstmann. Extending the reflexion method for consolidating software variants into product lines. Software Quality Journal December 2009; 17(4):331–366.

    @article{Koschke:SQJ:09,
      author  = {Rainer Koschke and Pierre Frenzel and Andreas Breu and Karsten Angstmann},
      title   = {Extending the reflexion method for consolidating software variants into product lines},
      journal = {Software Quality Journal},
      number  = {4},
      month   = {December},
      volume  = {17},
      year    = {2009},
      pages   = {331--366},
    }
  • BIB

    T. Mende, R. Koschke, F. Beckwermert. An Evaluation of Code Similarity Identification for the Grow-and-Prune Model. Journal on Software Maintenance and Evolution March–April 2009; 21(2):143 – 169.

    @article{Mende:JSME:09,
      author  = {Thilo Mende and Rainer Koschke and Felix Beckwermert},
      title   = {An Evaluation of Code Similarity Identification for the Grow-and-Prune Model},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {21},
      year    = {2009},
      pages   = {143 -- 169},
    }
  • BIB DOI

    C. Roy, J. Cordy, R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Journal of Science of Computer Programming 2009; 74(7):470-495. Special Issue on Program Comprehension (ICPC 2008), unter den fünf am häufigsten zitierten Artikeln von Science of Computer Programming seit 2007.

    @article{Roy:JSCP:09,
      author   = {Chanchal Roy and James Cordy and Rainer Koschke},
      note     = {{Special Issue on Program Comprehension (ICPC 2008)}, unter den f{\"u}nf am h{\"a}ufigsten zitierten Artikeln von Science of Computer Programming seit 2007},
      doi      = {doi:10.1016/j.scico.2009.02.007},
      title    = {Comparison and evaluation of code clone detection techniques and tools: A qualitative approach},
      journal  = {Journal of Science of Computer Programming},
      number   = {7},
      pages    = {470-495},
      volume   = {74},
      year     = {2009},
      abstract = {Over the last decade many techniques and tools for software clone detection have been proposed. In this paper, we provide a qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools, and organize the large amount of information into a coherent conceptual framework. We begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools. We then classify, compare and evaluate the techniques and tools in two different dimensions. First, we classify and compare approaches based on a number of facets, each of which has a set of (possibly overlapping) attributes. Second, we qualitatively evaluate the classified techniques and tools with respect to a taxonomy of editing scenarios designed to model the creation of Type-1, Type-2, Type-3 and Type-4 clones. Finally, we provide examples of how one might use the results of this study to choose the most appropriate clone detection tool or technique in the context of a particular set of goals and constraints. The primary contributions of this paper are: (1) a schema for classifying clone detection techniques and tools and a classification of current clone detectors based on this schema, and (2) a taxonomy of editing scenarios that produce different clone types and a qualitative evaluation of current clone detectors based on this taxonomy.},
      mongth   = {May},
    }
  • BIB

    B. Cornelissen, A. Zaidman, A. Deursen, L. Moonen, R. Koschke. A Systematic Survey of Program Comprehension through Dynamic Analysis. IEEE Computer Society Transactions on Software Engineering 2009; 35(5):684–702.

    @article{Cornelissen:TSE:09,
      author  = {Bas Cornelissen and Andy Zaidman and Arie Deursen and Leon Moonen and Rainer Koschke},
      title   = {A Systematic Survey of Program Comprehension through Dynamic Analysis},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {5},
      volume  = {35},
      year    = {2009},
      pages   = {684--702},
    }
  • BIB

    J. Buckley, A. LeGear, C. Exton, R. Cadogan, T. Johnston, B. Looby, R. Koschke. Encapsulating targeted component abstractions using software Reflexion Modelling. Journal on Software Maintenance and Evolution March–April 2008; 20(2):107–134.

    @article{Buckley:JSME:08,
      author  = {Jim Buckley and Andrew LeGear and Chris Exton and Ross Cadogan and Trevor Johnston and Bill Looby and Rainer Koschke},
      title   = {Encapsulating targeted component abstractions using software Reflexion Modelling},
      journal = {Journal on Software Maintenance and Evolution},
      number  = {2},
      month   = {March--April},
      volume  = {20},
      year    = {2008},
      pages   = {107--134},
    }
  • BIB DOI

    R. Falke, R. Koschke, P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering 2008; 13(6):601–643.

    @article{falke:emse:08,
      author  = {Raimar Falke and Rainer Koschke and Pierre Frenzel},
      doi     = {10.1007/s10664-008-9073-9},
      title   = {Empirical Evaluation of Clone Detection Using Syntax Suffix Trees},
      journal = {Empirical Software Engineering},
      issn    = {1382-3256},
      number  = {6},
      volume  = {13},
      year    = {2008},
      pages   = {601--643},
    }
  • BIB DOI

    J. Quante, R. Koschke. Dynamic Object Process Graphs. Journal of Systems and Software 2008; 81:481–501.

    @article{Quante:JSS:08,
      author  = {Jochen Quante and Rainer Koschke},
      doi     = {10.1016/j.jss.2007.06.005},
      title   = {Dynamic Object Process Graphs},
      journal = {Journal of Systems and Software},
      volume  = {81},
      year    = {2008},
      annote  = {Special Issue for IEEE Conference on Software Maintenance and Reengineering (CSMR) 2006},
      issue   = {4},
      pages   = {481--501},
    }
  • BIB

    S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE Computer Society Transactions on Software Engineering September 2007; 33(9):577–591.

    @article{Bellon:TSE:07,
      author  = {Stefan Bellon and Rainer Koschke and Giulio Antoniol and Jens Krinke and Ettore Merlo},
      title   = {Comparison and Evaluation of Clone Detection Tools},
      journal = {IEEE Computer Society Transactions on Software Engineering},
      number  = {9},
      month   = {September},
      volume  = {33},
      year    = {2007},
      pages   = {577--591},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Automated Clustering to Support the Reflexion Method. Journal of Systems and Software 2007; 49(3):255–274. Special Issue on WCRE 2005.

    @article{Christl:IST:07,
      author  = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      volume  = {49},
      title   = {Automated Clustering to Support the Reflexion Method},
      journal = {Journal of Systems and Software},
      number  = {3},
      note    = {Special Issue on WCRE 2005},
      year    = {2007},
      pages   = {255--274},
    }
  • BIB

    R. Koschke, G. Canfora, J. \"Czeranski. Revisiting the Delta-IC Approach. Journal of Science of Computer Programming 2006; 60(2):171–188.

    @article{Koschke:JSCP:06,
      author  = {Rainer Koschke and Gerardo Canfora and J{\"o}rg Czeranski},
      title   = {Revisiting the Delta-IC Approach},
      journal = {Journal of Science of Computer Programming},
      number  = {2},
      volume  = {60},
      year    = {2006},
      pages   = {171--188},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Object Trace Extraction for Programs with Pointers. Journal of Systems and Software September 2005; 77(3):263–284.

    @article{Eisenbarth:JSS:05,
      author   = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      title    = {Static Object Trace Extraction for Programs with Pointers},
      journal  = {Journal of Systems and Software},
      number   = {3},
      abstract = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general. In addition, this article describes four case studies we conducted to explore the efficiency of our algorithm, the size of the resulting static traces, and the influence of the underlying points-to analysis on this size.},
      month    = {September},
      volume   = {77},
      year     = {2005},
      pages    = {263--284},
    }
  • BIB DOI

    R. Koschke. Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten. Informatik – Forschung und Entwicklung, Springer Verlag April 2005; 19(3).

    @article{Koschke:InFE:05,
      author  = {Rainer Koschke},
      doi     = {10.1007/s00450-005-0180-1},
      title   = {{Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten}},
      journal = {{Informatik -- Forschung und Entwicklung, Springer Verlag}},
      number  = {3},
      month   = {April},
      volume  = {19},
      year    = {2005},
    }
  • BIB

    A. Walenstein, A. Lakhotia, R. Koschke. Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes March 2004; 29(2):1–5.

    @article{Walenstein:SEN:04,
      author  = {Andrew Walenstein and Arun Lakhotia and Rainer Koschke},
      title   = {Second International Workshop on Detection of Software Clones: workshop report},
      journal = {ACM SIGSOFT Software Engineering Notes},
      number  = {2},
      month   = {March},
      volume  = {29},
      year    = {2004},
      pages   = {1--5},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Viewpoints in Software Architecture Reconstruction. Softwaretechnik Trends 2004; 24(2).

    @article{Deursen:ST:04,
      author  = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {Viewpoints in Software Architecture Reconstruction},
    }
  • BIB

    R. Koschke, D. Simon. Symphony Fallstudie: Hierarchische Reflexion Modelle. Softwaretechnik Trends 2004; 24(2).

    @article{Koschke:ST:04,
      author  = {Rainer Koschke and Daniel Simon},
      volume  = {24},
      journal = {Softwaretechnik Trends},
      year    = {2004},
      number  = {2},
      title   = {{Symphony Fallstudie: Hierarchische Reflexion Modelle}},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Locating Features in Source Code. IEEE Computer Society Transactions on Software Engineering March 2003; 29(3):210–224.

    @article{Eisenbarth:TSE:03,
      author   = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      title    = {Locating Features in Source Code},
      journal  = {IEEE Computer Society Transactions on Software Engineering},
      number   = {3},
      abstract = {Understanding the implementation of a certain feature of a system requires identification of the computational units of the system that contribute to this feature. In many cases, the mapping of features to the source code is poorly documented. In this paper, we present a semiautomatic technique that reconstructs the mapping for features that are triggered by the user and exhibit an observable behavior. The mapping is in general not injective; that is, a computational unit may contribute to several features. Our technique allows for the distinction between general and specific computational units with respect to a given set of features. For a set of features, it also identifies jointly and distinctly required computational units. The presented technique combines dynamic and static analyses to rapidly focus on the system's parts that relate to a specific set of features. Dynamic information is gathered based on a set of scenarios invoking the features. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features. Furthermore, we show how our method allows incremental exploration of features while preserving the "mental map" the analyst has gained through the analysis.},
      month    = {March},
      volume   = {29},
      year     = {2003},
      annote   = {Special issue on ICSM 2001},
      pages    = {210--224},
    }
  • BIB

    R. Koschke. Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey. Journal on Software Maintenance and Evolution March 2003; 15:87–109.

    @article{Koschke:JSME:03,
      author  = {Rainer Koschke},
      title   = {Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey},
      journal = {Journal on Software Maintenance and Evolution},
      month   = {March},
      volume  = {15},
      year    = {2003},
      pages   = {87--109},
    }
  • BIB

    J. F. Girard, R. Koschke. A Comparison of Abstract Data Type and Objects Recovery Techniques. Journal Science of Computer Programming, Elsevier Science March 2000; 6(2–3):149-181.

    @article{Girard:JSCP:00,
      author  = {Jean-Francois Girard and Rainer Koschke},
      title   = {A Comparison of Abstract Data Type and Objects Recovery Techniques},
      journal = {Journal Science of Computer Programming, Elsevier Science},
      number  = {2--3},
      month   = {March},
      volume  = {6},
      year    = {2000},
      pages   = {149-181},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. Journal on Automated Software Engineering, Kluwer Academic Publishers 1999; 6(4).

    @article{Girard:JASE:99,
      author  = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      volume  = {6},
      journal = {Journal on Automated Software Engineering, Kluwer Academic Publishers},
      year    = {1999},
      number  = {4},
      title   = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }

Conference and Workshop Articles

  • BIB

    M. Schröer, R. Koschke. Recording, Visualising and Understanding Developer Programming Behaviour. IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE Computer Society Press, 2021. Accepted.

    @inproceedings{Schroeer:SANER:21,
      author    = {Martin Schr{\"o}er and Rainer Koschke},
      note      = {Accepted},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering},
      year      = {2021},
      title     = {Recording, Visualising and Understanding Developer Programming Behaviour},
    }
  • BIB

    M. Steinbeck, R. Koschke. TinySpline: A Small, yet Powerful Library for Interpolating, Transforming, and Querying NURBS, B-Splines, and B\'ézier Curves. IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE Computer Society Press, 2021. Accepted.

    @inproceedings{Steinbeck:SANER:21:TinySpline,
      author    = {Marcel Steinbeck and Rainer Koschke},
      note      = {Accepted},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering},
      year      = {2021},
      title     = {TinySpline: A Small, yet Powerful Library for Interpolating, Transforming, and Querying NURBS, B-Splines, and B\'{e}́zier Curves},
    }
  • BIB

    M. Steinbeck, R. Koschke. Javadoc Violations and Their Evolution in Open-Source Software. IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE Computer Society Press, 2021. Accepted.

    @inproceedings{Steinbeck:SANER:21:Javadoc,
      author    = {Marcel Steinbeck and Rainer Koschke},
      note      = {Accepted},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering},
      year      = {2021},
      title     = {Javadoc Violations and Their Evolution in Open-Source Software},
    }
  • BIB DOI

    B. Berger, R. Nguempnang, K. Sohr, R. Koschke. Static Extraction of Enforced Authorization Policies SeeAuthz. IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE Computer Society Press, 2020; 187–197.

    @inproceedings{berger:SCAM:20,
      author    = {Bernhard Berger and Rodrigue Nguempnang and Karsten Sohr and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      doi       = {https://doi.org/10.1109/SCAM51674.2020.00026},
      title     = {Static Extraction of Enforced Authorization Policies SeeAuthz},
      booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering},
      year      = {2020},
      pages     = {187--197},
    }
  • BIB

    R. Koschke, M. Steinbeck. Clustering Paths With Dynamic Time Warping. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, 2020; 12 pages.

    @inproceedings{Koschke:VISSOFT:20,
      author    = {Rainer Koschke and Marcel Steinbeck},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE Working Conference on Software Visualization},
      year      = {2020},
      pages     = {12 pages},
      title     = {Clustering Paths With Dynamic Time Warping},
    }
  • BIB

    M. Steinbeck, R. Koschke, M. O. Rüdel. How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments. SANER, 2020; 332-343.

    @inproceedings{Steinbeck:SANER:20:EvoStreets,
      author    = {Marcel Steinbeck and Rainer Koschke and Marc-Oliver R{\"u}del},
      title     = {How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments},
      booktitle = {SANER},
      number    = {},
      volume    = {},
      year      = {2020},
      pages     = {332-343},
    }
  • BIB DOI

    B. Berger, K. Sohr, R. Koschke. The Architectural Security Tool Suite - ARCHSEC. Conference on Source Code Analysis and Manipulation, September 2019; 250–255.

    @inproceedings{Berger:SCAM:19,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      doi       = {10.1109/SCAM.2019.00035},
      title     = {The Architectural Security Tool Suite - {ARCHSEC}},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      issn      = {1942-5430},
      month     = {September},
      year      = {2019},
      pages     = {250--255},
    }
  • BIB DOI

    M. Steinbeck, R. Koschke, M. O. Rüdel. Movement Patterns and Trajectories in Three-Dimensional Software Visualization. Conference on Source Code Analysis and Manipulation, September 2019; 163–174.

    @inproceedings{Steinbeck:SCAM:19,
      author    = {Marcel Steinbeck and Rainer Koschke and Marc-Oliver R{\"u}del},
      doi       = {10.1109/SCAM.2019.00027},
      title     = {Movement Patterns and Trajectories in Three-Dimensional Software Visualization},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      issn      = {1942-5430},
      month     = {September},
      year      = {2019},
      keywords  = {Software Visualization;2.5D Environment;Virtual Reality Environment;Movement patterns;Trajectories},
      pages     = {163--174},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. Towards understandable guards of extracted state machines from embedded software. IEEE International Conference on Software Analysis, Evolution and Reengineering, IEEE Computer Society Press, 2019; 264–274.

    @inproceedings{Said:SANER:19,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {IEEE International Conference on Software Analysis, Evolution and Reengineering},
      year      = {2019},
      pages     = {264--274},
      title     = {Towards understandable guards of extracted state machines from embedded software},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. Do extracted state machine models help to understand embedded software? International Conference on Program Comprehension, IEEE Computer Society Press, 2019; 191–196.

    @inproceedings{Said:ICPC:19,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Program Comprehension},
      year      = {2019},
      pages     = {191--196},
      title     = {Do extracted state machine models help to understand embedded software?},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies. S. Hammoudi, L. \'Pires, B. Selic, editors, Model-Driven Engineering and Software Development, Springer International Publishing, 2019; 211–235. Cham.

    @inproceedings{Said:MODELS:19,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      editor    = {Slimane Hammoudi and Lu{\'i}s Pires and Bran Selic},
      publisher = {Springer International Publishing},
      isbn      = {978-3-030-11030-7},
      title     = {Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies},
      booktitle = {Model-Driven Engineering and Software Development},
      address   = {Cham},
      abstract  = {State machines are a commonly used formalism for specifying the behavior of a software component, which could also be helpful for program comprehension. Therefore, it is desirable to extract state machine models from code and also from legacy models. The main drawback of fully-automatic state machine mining approaches is that the mined models are too detailed and not understandable. In our previous work [1], we presented different measures for the interaction with the state machine extraction process, such as selecting a subset of state variables, reducing the state variable range and providing additional user constraints. These measures aimed to reduce the complexity of the mined state machines to an understandable degree. In this article, which is an extended version of [1], we evaluate the approach through a case study with twelve professional developers from the automotive supplier company Bosch. The study shows that adding our interactive measures to the model mining process leads to understandable state machines, which can be very helpful in a rich set of use cases in addition to program comprehension, such as debugging, validation and verification. Furthermore, we conduct an experiment to evaluate the required computation time of the interactive measures against the fully-automatic mining. The experiment shows that the interactive approach can drastically reduce the computation time.},
      year      = {2019},
      pages     = {211--235},
    }
  • BIB

    M. Steinbeck, R. Koschke, M. O. Rüdel. Comparing the EvoStreets Visualization Technique in Two- and Three-Dimensional Environments A Controlled Experiment. International Conference on Program Comprehension, IEEE Computer Society Press, 2019; 231–242.

    @inproceedings{Steinbeck:ICPC:19,
      author    = {Marcel Steinbeck and Rainer Koschke and Marc-Oliver R{\"u}del},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Program Comprehension},
      year      = {2019},
      pages     = {231--242},
      title     = {Comparing the EvoStreets Visualization Technique in Two- and Three-Dimensional Environments A Controlled Experiment},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. On State Machine Mining from Embedded Control Software. International Conference on Software Maintenance and Evolution, IEEE Computer Society Press, September 2018; 138–148.

    @inproceedings{Said:ICSME:18a,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {On State Machine Mining from Embedded Control Software},
      booktitle = {International Conference on Software Maintenance and Evolution},
      month     = {September},
      year      = {2018},
      pages     = {138--148},
    }
  • BIB

    W. Said, J. Quante, R. Koschke. Reflexion Models for State Machine Extraction and Verification. International Conference on Software Maintenance and Evolution, IEEE Computer Society Press, September 2018; 149–159.

    @inproceedings{Said:ICSME:18b,
      author    = {Wasim Said and Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Reflexion Models for State Machine Extraction and Verification},
      booktitle = {International Conference on Software Maintenance and Evolution},
      month     = {September},
      year      = {2018},
      pages     = {149--159},
    }
  • BIB

    R. Koschke, U. \"Schmidt, B. Berger. Built-in Clone Detection in Meta Languages. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, September 2018; 165–170.

    @inproceedings{Koschke:SCAM:18,
      author    = {Rainer Koschke and Urs-Bj{\"o}rn Schmidt and Bernhard Berger},
      publisher = {IEEE Computer Society Press},
      title     = {Built-in Clone Detection in Meta Languages},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      month     = {September},
      year      = {2018},
      pages     = {165--170},
    }
  • BIB

    M. O. Rüdel, J. Ganser, R. Koschke. Spatial Orientation in VR-based Software Cities. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, September 2018; 21–31.

    @inproceedings{Ruedel:VISSOFT:18,
      author    = {Marc-Oliver R{\"u}del and Johannes Ganser and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Spatial Orientation in VR-based Software Cities},
      booktitle = {IEEE Working Conference on Software Visualization},
      month     = {September},
      year      = {2018},
      pages     = {21--31},
    }
  • BIB DOI

    R. Koschke. Industrial Experience on Code Clean-Up Using Architectural Conformance Checking. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, ECSA, Workshop on Software Architecture Erosion and Architectural Consistency, ACM Press, September 2018; 48:1–48:7.

    @inproceedings{Koschke:SAEroCon:18,
      author    = {Rainer Koschke},
      publisher = {ACM Press},
      doi       = {10.1145/3241403.3241453},
      title     = {Industrial Experience on Code Clean-Up Using Architectural Conformance Checking},
      booktitle = {Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, {ECSA}, Workshop on Software Architecture Erosion and Architectural Consistency},
      month     = {September},
      year      = {2018},
      pages     = {48:1--48:7},
    }
  • BIB

    V. Käfer, S. Wagner, R. Koschke. Are There Functionally Similar Code Clones in Practice? International Workshop on Software Clones, IEEE Computer Society Press, March 2018; 2–8.

    @inproceedings{Kaefer:IWSC:18,
      author    = {Verena K{\"a}fer and Stefan Wagner and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Are There Functionally Similar Code Clones in Practice?},
      booktitle = {International Workshop on Software Clones},
      month     = {March},
      year      = {2018},
      pages     = {2--8},
    }
  • BIB

    R. Koschke, M. Weinig. Generated Code in Studies on Clone Rates. International Workshop on Software Clones, IEEE Computer Society Press, March 2018; 16–22.

    @inproceedings{Koschke:IWSC:18,
      author    = {Rainer Koschke and Moritz Weinig},
      publisher = {IEEE Computer Society Press},
      title     = {Generated Code in Studies on Clone Rates},
      booktitle = {International Workshop on Software Clones},
      month     = {March},
      year      = {2018},
      pages     = {16--22},
    }
  • BIB DOI

    W. Said, J. Quante, R. Koschke. Towards Interactive Mining of Understandable State Machine Models from Embedded Software. Proceedings of the International Conference on Model-Driven Engineering and Software Development, SciTePress, January 2018; 117–128. INSTICC. Best Student Paper Award.

    @inproceedings{Said:MODELSWARD:18,
      author       = {Wasim Said and Jochen Quante and Rainer Koschke},
      publisher    = {SciTePress},
      doi          = {10.5220/0006593501170128},
      isbn         = {978-989-758-283-7},
      title        = {Towards Interactive Mining of Understandable State Machine Models from Embedded Software},
      booktitle    = {Proceedings of the International Conference on Model-Driven Engineering and Software Development},
      month        = {January},
      note         = {Best Student Paper Award},
      year         = {2018},
      organization = {INSTICC},
      pages        = {117--128},
    }
  • BIB

    B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors, International Symposium on Engineering Secure Software and Systems, Springer Verlag, April 2016; 56–71.

    @inproceedings{Berger:ESSOS:16,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Juan Caballero and Eric Bodden and Elias Athanasopoulos},
      publisher = {Springer Verlag},
      isbn      = {978-3-319-30806-7},
      title     = {Automatically Extracting Threats from Extended Data Flow Diagrams},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems},
      month     = {April},
      year      = {2016},
      pages     = {56--71},
    }
  • BIB

    R. Koschke, S. Bazrafshan. Software-Clone Rates in Open-Source Programs Written in C or C++. International Workshop on Software Clones; published in Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering, volume 3, IEEE Computer Society Press, March 2016; 1–7.

    @inproceedings{Koschke:IWSC:16,
      author    = {Rainer Koschke and Saman Bazrafshan},
      publisher = {IEEE Computer Society Press},
      title     = {Software-Clone Rates in Open-Source Programs Written in C or C++},
      booktitle = {International Workshop on Software Clones; published in Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering},
      month     = {March},
      volume    = {3},
      year      = {2016},
      pages     = {1--7},
    }
  • BIB

    D. Lüdemann, R. Koschke. From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, September 2015; 211–220.

    @inproceedings{Luedemann:SCAM:15,
      author    = {Dierk L{\"u}demann and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      month     = {September},
      year      = {2015},
      pages     = {211--220},
    }
  • BIB

    H. Basit, M. Hammad, R. Koschke. A Survey on Goal-Oriented Visualization of Clone Data. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, September 2015; 46–55.

    @inproceedings{Basit:VISSOFT:15,
      author    = {Hamid Basit and Muhammad Hammad and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {A Survey on Goal-Oriented Visualization of Clone Data},
      booktitle = {IEEE Working Conference on Software Visualization},
      month     = {September},
      year      = {2015},
      pages     = {46--55},
    }
  • BIB

    H. Basit, M. Hammad, S. Jarzabek, R. Koschke. What do we need to know about clones? Deriving information needs from user goals. International Workshop on Software Clones, IEEE Computer Society Press, March 2015; 51–57.

    @inproceedings{Basit:IWSC:15,
      author    = {Hamid Basit and Muhammad Hammad and Stan Jarzabek and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {What do we need to know about clones? Deriving information needs from user goals},
      booktitle = {International Workshop on Software Clones},
      month     = {March},
      year      = {2015},
      pages     = {51--57},
    }
  • BIB

    S. Bazrafshan, R. Koschke. Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2014; 1–10.

    @inproceedings{Bazrafshan:SCAM:14,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2014},
      pages     = {1--10},
      title     = {Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs},
    }
  • BIB

    C. Roy, M. Zibran, R. Koschke. The Vision of Software Clone Management: Past, Present and the Future. IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, IEEE Computer Society Press, 2014; 18–33. Invited Keynote Paper.

    @inproceedings{Roy:CSMRWCRE:14,
      author    = {Chanchal Roy and Minhaz Zibran and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {The Vision of Software Clone Management: Past, Present and the Future},
      booktitle = {IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week},
      note      = {Invited Keynote Paper},
      year      = {2014},
      pages     = {18--33},
    }
  • BIB

    S. Bazrafshan, R. Koschke. An Empirical Study of Clone Removals. International Conference on Software Maintenance, IEEE Computer Society Press, 2013; 50-59.

    @inproceedings{Bazrafshan:ICSM:2013,
      author    = {Saman Bazrafshan and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {2013},
      pages     = {50-59},
      title     = {An Empirical Study of Clone Removals},
    }
  • BIB DOI

    B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors, European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2013; 285–294.

    @inproceedings{berger:csmr:13,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Anthony Cleve and Fillipo Ricca and Maura Cerioli},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/CSMR.2013.37},
      isbn      = {978-0-7695-4948-4},
      title     = {Extracting and Analyzing the Implemented Security Architecture of Business Applications},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      issn      = {1534-5351},
      year      = {2013},
      keywords  = {reverse engineering;software security;static analysis;threat modeling},
      pages     = {285--294},
    }
  • BIB DOI

    R. Koschke, I. Baxter, M. Conradt, J. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors, Dagstuhl Reports, volume 2, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2012; 21–57. Dagstuhl, Germany.

    @inproceedings{koschke_et_al:DR:2012:3477,
      author    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      editor    = {Rainer Koschke and Ira Baxter and Michael Conradt and James Cordy},
      publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
      doi       = {http://dx.doi.org/10.4230/DagRep.2.2.21},
      title     = {Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071)},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2012/3477},
      booktitle = {Dagstuhl Reports},
      issn      = {2192-5283},
      number    = {2},
      volume    = {2},
      urn       = {urn:nbn:de:0030-drops-34775},
      year      = {2012},
      pages     = {21--57},
      address   = {Dagstuhl, Germany},
    }
  • BIB

    A. Hemel, R. Koschke. Reverse Engineering Variability in Source Code Using Clone Detection – A Case Study for Linux Variants of Consumer Electronic Devices. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2012; 357–366.

    @inproceedings{Hemel:WCRE:12,
      author    = {Armijn Hemel and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2012},
      pages     = {357--366},
      title     = {Reverse Engineering Variability in Source Code Using Clone Detection -- A Case Study for Linux Variants of Consumer Electronic Devices},
    }
  • BIB

    B. Katzmarski, R. Koschke. Program complexity metrics and programmer opinions. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 17–26.

    @inproceedings{Katzmarski:ICPC:12,
      author    = {Bernhard Katzmarski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Program complexity metrics and programmer opinions},
      ee        = {http://dx.doi.org/10.1109/ICPC.2012.6240486},
      booktitle = {International Conference on Program Comprehension},
      year      = {2012},
      pages     = {17--26},
    }
  • BIB

    R. Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2012; 309–318.

    @inproceedings{Koschke:CSMR:12,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2012},
      pages     = {309--318},
      title     = {Large-Scale Inter-System Clone Detection Using Suffix Trees},
    }
  • BIB

    T. Roehm, R. Tiarks, R. Koschke, W. Maalej. How Do Professional Developers Comprehend Software? International Conference on Software Engineering, ACM Press, 2012; 255–265. Distinguished Paper Award.

    @inproceedings{Roehm:ICSE:12,
      author    = {Tobias Roehm and Rebecca Tiarks and Rainer Koschke and Walid Maalej},
      publisher = {ACM Press},
      title     = {How Do Professional Developers Comprehend Software?},
      booktitle = {International Conference on Software Engineering},
      note      = {Distinguished Paper Award},
      year      = {2012},
      pages     = {255--265},
    }
  • BIB

    N. Göde, R. Koschke. Frequency and Risks of Changes to Clones. International Conference on Software Engineering, ACM Press, 2011; 311–320.

    @inproceedings{Goede:ICSE:11,
      author    = {Nils G\"{o}de and Rainer Koschke},
      publisher = {ACM Press},
      booktitle = {International Conference on Software Engineering},
      year      = {2011},
      pages     = {311--320},
      title     = {Frequency and Risks of Changes to Clones},
    }
  • BIB

    B. Scholz, R. Koschke. Object-Based Dynamic Protocol Recovery for Multi-Threading Programs. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 251–260.

    @inproceedings{Scholz:WCRE:11,
      author    = {Bernhard Scholz and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {251--260},
      title     = {Object-Based Dynamic Protocol Recovery for Multi-Threading Programs},
    }
  • BIB

    S. Bazrafshan, R. Koschke, N. Göde. Approximate Code Search in Program Histories. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 109–118.

    @inproceedings{Bazrafshan:WCRE:11,
      author    = {Saman Bazrafshan and Rainer Koschke and Nils G\"{o}de},
      publisher = {IEEE Computer Society Press},
      isbn      = {978-0-7695-4582-0},
      title     = {Approximate Code Search in Program Histories},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {109--118},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns. International Conferences on Pervasive Patterns and Applications (PATTERNS), XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.

    @inproceedings{Bunke:PATTERNS:11,
      author       = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher    = {XPS (Xpert Publishing Services)},
      isbn         = {978-1-61208-158-8},
      title        = {Application-Domain Classification for Security Patterns},
      booktitle    = {International Conferences on Pervasive Patterns and Applications (PATTERNS)},
      year         = {2011},
      organization = {IARIA Conferences},
      pages        = {138--143},
    }
  • BIB

    T. Mende, R. Koschke, J. Peleska. On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 259–268.

    @inproceedings{Mende:CSMR:11,
      author    = {Thilo Mende and Rainer Koschke and Jan Peleska},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2011},
      pages     = {259--268},
      title     = {On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study},
    }
  • BIB

    R. Koschke. Incremental Reflexion Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 1–10.

    @inproceedings{Koschke:CSMR:10,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {1--10},
      title     = {Incremental Reflexion Analysis},
    }
  • BIB

    T. Mende, R. Koschke. Effort-Aware Defect Prediction Models. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 109–118.

    @inproceedings{Mende:CSMR:10,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2010},
      pages     = {109--118},
      title     = {Effort-Aware Defect Prediction Models},
    }
  • BIB

    R. Koschke, R. Tiarks. Haben wir Programmverstehen schon ganz verstanden? Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings, 2009; 15–26.

    @inproceedings{Koschke:L2S2:09,
      author    = {Rainer Koschke and Rebecca Tiarks},
      booktitle = {Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings},
      year      = {2009},
      pages     = {15--26},
      title     = {{Haben wir Programmverstehen schon ganz verstanden?}},
    }
  • BIB

    R. Tiarks, R. Koschke, R. Falke. An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 67-76.

    @inproceedings{Tiarks:SCAM:09,
      author    = {Rebecca Tiarks and Rainer Koschke and Raimar Falke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Conference on Source Code Analysis and Manipulation},
      year      = {2009},
      pages     = {67-76},
      title     = {An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools},
    }
  • BIB DOI

    T. Mende, R. Koschke. Revisiting the Evaluation of Defect Prediction Models. PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, ACM, 2009; 1–10. New York, NY, USA.

    @inproceedings{Mende:Promise:09,
      author    = {Thilo Mende and Rainer Koschke},
      publisher = {ACM},
      doi       = {http://doi.acm.org/10.1145/1540438.1540448},
      isbn      = {978-1-60558-634-2},
      title     = {Revisiting the Evaluation of Defect Prediction Models},
      booktitle = {PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering},
      address   = {New York, NY, USA},
      location  = {Vancouver, British Columbia, Canada},
      year      = {2009},
      pages     = {1--10},
    }
  • BIB

    R. Koschke, S. Jarzabek, J. Inoue. Third International Workshop on Software Clones (IWSC). European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 269–270.

    @inproceedings{Koschke:CSMR:09,
      author    = {Rainer Koschke and Stanislaw Jarzabek and James Inoue},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {269--270},
      title     = {Third International Workshop on Software Clones (IWSC)},
    }
  • BIB

    T. Mende, R. Koschke, M. Leszak. Evaluating Defect Prediction Models for a Large Evolving Software System. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 247–250.

    @inproceedings{Mende:CSMR:09,
      author    = {Thilo Mende and Rainer Koschke and Marek Leszak},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2009},
      pages     = {247--250},
      title     = {Evaluating Defect Prediction Models for a Large Evolving Software System},
    }
  • BIB

    N. Göde, R. Koschke. Incremental Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 219–228. Best Paper Award von 70 eingereichten Beiträgen.

    @inproceedings{Goede:CSMR:09,
      author    = {Nils G{\"o}de and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Clone Detection},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 70 eingereichten Beitr{\"a}gen},
      year      = {2009},
      pages     = {219--228},
    }
  • BIB

    B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung. Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik, GI Lecture Notes for Informatics, 2008.

    @inproceedings{Berger:WASE:08,
      author    = {Bernhard Berger and Rainer Koschke},
      publisher = {GI Lecture Notes for Informatics},
      booktitle = {Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft f{\"u}r Informatik},
      year      = {2008},
      title     = {{Reduzierung der Programmgr{\"o}{\ss}e durch Klonerkennung}},
    }
  • BIB

    R. Koschke. Frontiers in Software Clone Management. Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance, IEEE Computer Society Press, 2008; 119–128.

    @inproceedings{Koschke:ICSM:08,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance},
      year      = {2008},
      pages     = {119--128},
      title     = {Frontiers in Software Clone Management},
    }
  • BIB

    R. Koschke. Zehn Jahre WSR, zwölf Jahre Bauhaus. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 51–66.

    @inproceedings{Koschke:WSR:08,
      author    = {Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Zehn Jahre WSR, zw{\"o}lf Jahre Bauhaus}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {51--66},
    }
  • BIB PDF

    J. Harder, R. Koschke. Empirische Grundlagen für das Klonmanagement. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 127–133.

    @inproceedings{Harder:WSR:08,
      author    = {Jan Harder and Rainer Koschke},
      editor    = {Rainer Gimnich and Uwe Kaiser and Jochen Quante and Andreas Winter},
      publisher = {GI Lecture Notes for Informatics},
      isbn      = {978-3-88579-220-8},
      title     = {{Empirische Grundlagen f{\"u}r das Klonmanagement}},
      booktitle = {Workshop Software Reengineering},
      year      = {2008},
      pages     = {127--133},
    }
  • BIB

    T. Mende, F. Beckwermert, R. Koschke, G. Meier. Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2008; 163–172.

    @inproceedings{Mende:CSMR:08,
      author    = {Thilo Mende and Felix Beckwermert and Rainer Koschke and Gerald Meier},
      publisher = {IEEE Computer Society Press},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      year      = {2008},
      pages     = {163--172},
      title     = {Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Protocol Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 219–228.

    @inproceedings{Quante:WCRE:07,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Protocol Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      year      = {2007},
      pages     = {219--228},
    }
  • BIB

    P. Frenzel, R. Koschke, A. Breu, K. Angstmann. Extending the Reflection Method for Consolidating Software Variants into Product Lines. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 160–169. Best Paper Award von 87 eingereichten Beiträgen.

    @inproceedings{Frenzel:WCRE:07,
      author    = {Pierre Frenzel and Rainer Koschke and Andreas Breu and Karsten Angstmann},
      publisher = {IEEE Computer Society Press},
      title     = {Extending the Reflection Method for Consolidating Software Variants into Product Lines},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {October},
      note      = {Best Paper Award von 87 eingereichten Beitr{\"a}gen},
      year      = {2007},
      pages     = {160--169},
    }
  • BIB

    R. Koschke. Survey of Research on Software Clones. R. Koschke, E. Merlo, A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, 2007. Dagstuhl, Germany.

    @inproceedings{Koschke:Dagstuhl:07,
      author    = {Rainer Koschke},
      editor    = {Rainer Koschke and Ettore Merlo and Andrew Walenstein},
      publisher = {Dagstuhl},
      issn      = {1862-4405},
      title     = {Survey of Research on Software Clones},
      url       = {http://drops.dagstuhl.de/opus/volltexte/2007/970 [date of citation: 2007-01-01]},
      series    = {Dagstuhl Seminar Proceedings},
      booktitle = {Duplication, Redundancy, and Similarity in Software},
      address   = {Dagstuhl, Germany},
      number    = {06301},
      year      = {2007},
    }
  • BIB DOI

    R. Koschke, R. Falke, P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2006; 253–262.

    @inproceedings{Koschke:WCRE:06,
      author    = {Rainer Koschke and Raimar Falke and Pierre Frenzel},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/WCRE.2006.18},
      isbn      = {0-7695-2719-1},
      title     = {Clone Detection Using Abstract Syntax Suffix Trees},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2006},
      pages     = {253--262},
    }
  • BIB

    J. Quante, R. Koschke. Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2006; 81–90. Best Paper Award von 65 eingereichten Beiträgen.

    @inproceedings{Quante:CSMR:06,
      author    = {Jochen Quante and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Dynamic Object Process Graphs},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      note      = {Best Paper Award von 65 eingereichten Beitr{\"a}gen},
      year      = {2006},
      pages     = {81--90},
    }
  • BIB

    R. Koschke. What architects should know about reverse engineering and reengineering. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, November 2005; 4–10. Invited Paper.

    @inproceedings{Koschke:WICSA:05,
      author    = {Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {What architects should know about reverse engineering and reengineering},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      month     = {November},
      note      = {Invited Paper},
      year      = {2005},
      pages     = {4--10},
    }
  • BIB

    A. Christl, R. Koschke, M. Storey. Equipping the Reflexion Method with Automated Clustering. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2005; 89–98.

    @inproceedings{Christl:WCRE:05,
      author    = {Andreas Christl and Rainer Koschke and Margaret-Anne Storey},
      publisher = {IEEE Computer Society Press},
      title     = {Equipping the Reflexion Method with Automated Clustering},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2005},
      pages     = {89--98},
    }
  • BIB

    R. Falke, R. Klein, R. Koschke, J. Quante. The Dominance Tree in Visualizing Software Dependencies. Workshop on Visualizing Software for Understanding and Analysis, IEEE Computer Society Press, September 2005; 1–6.

    @inproceedings{Falke:VISSOFT:05,
      author    = {Raimar Falke and Raimund Klein and Rainer Koschke and Jochen Quante},
      publisher = {IEEE Computer Society Press},
      title     = {The Dominance Tree in Visualizing Software Dependencies},
      booktitle = {Workshop on Visualizing Software for Understanding and Analysis},
      issn      = {0-7803-9540-9},
      month     = {September},
      year      = {2005},
      pages     = {1--6},
    }
  • BIB

    R. Koschke, J. Quante. On Dynamic Feature Location. International Conference on Automated Software Engineering, ACMPress, 2005; 86–95. Annahmequote unter 10 Prozent.

    @inproceedings{Koschke:ASE:05,
      author    = {Rainer Koschke and Jochen Quante},
      publisher = {ACMPress},
      title     = {On Dynamic Feature Location},
      booktitle = {International Conference on Automated Software Engineering},
      note      = {Annahmequote unter 10 Prozent},
      year      = {2005},
      pages     = {86--95},
    }
  • BIB

    A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Symphony: View-Driven Software Architecture Reconstruction. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, June 2004; 122–132.

    @inproceedings{Deursen:WICSA:04,
      author    = {Arie Deursen and Christine Hofmeister and Rainer Koschke and Leon Moonen and Claudio Riva},
      publisher = {IEEE Computer Society Press},
      title     = {Symphony: View-Driven Software Architecture Reconstruction},
      booktitle = {{IEEE/IFIP} Working Conference on Software Architecture},
      abstract  = {Authentic descriptions of a software architecture are required as a reliable foundation for any but trivial changes to a system. Far too often, architecture descriptions of existing systems are out of sync with the implementation. If they are, they must be reconstructed. There are many existing techniques for reconstructing individual architecture views, but no information about how to select views for reconstruction, or about process aspects of architecture reconstruction in general. In this paper we describe view-driven process for reconstructing software architecture that fills this gap. To describe Symphony, we present and compare different case studies, thus serving a secondary goal of sharing real-life reconstruction experience. The Symphony process incorporates the state of the practice, where reconstruction is problem-driven and uses a rich set of architecture views. Symphony provides a common framework for reporting reconstruction experiences and for comparing reconstruction approaches. Finally, it is a vehicle for exposing and demarcating research problems in software architecture reconstruction.},
      month     = {June},
      year      = {2004},
      pages     = {122--132},
    }
  • BIB

    R. Koschke, D. Simon. Hierarchical Reflexion Models. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2003; 36–45.

    @inproceedings{Koschke:WCRE:03,
      author    = {Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Hierarchical Reflexion Models},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {The reflexion model originally proposed by Murphy and Notkin allows one to structurally validate a descriptive or prescriptive architecture model against a source model. First, the entities in the source model are mapped onto the architectural model, then discrepancies between the architecture model and source model are computed automatically. The original reflexion model allows an analyst to specify only non-hierarchical models, which is insufficient for larger systems that are decomposed into hierarchical subsystems. This paper extends the original reflexion model to hierarchical architecture models, describes a method to apply this technique, and reports on case studies conducted on two large-scale and complex applications (namely, the C compiler sdcc for 8-bit microprocessors and the GNU C compiler gcc).},
      month     = {November},
      year      = {2003},
      pages     = {36--45},
    }
  • BIB

    A. Lakhotia, A. Walenstein, R. Koschke. Second international workshop on detection of software clones. Working Conference on Reverse Engineering, 2003; 368–368.

    @inproceedings{Lakhotia:wcre:03,
      author    = {A. Lakhotia and A. Walenstein and R. Koschke},
      annote    = {a working session on clones},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2003},
      pages     = {368--368},
      title     = {Second international workshop on detection of software clones},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Incremental Location of Combined Features for Large-Scale Programs. International Conference on Software Maintenance, IEEE Computer Society Press, October 2002; 273–282.

    @inproceedings{Eisenbarth:ICSM:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Incremental Location of Combined Features for Large-Scale Programs},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {The need for changing a program frequently confronts maintainers with the reality that no valid architectural description is at hand. To solve that problem, we presented at ICSM 2001 a language-independent and easy to use technique for opportunistic and demand driven location of features in source code based on static and dynamic analysis and concept analysis. In order to further validate the technique, we recently performed an industrial case study on a 1.2 million LOC production system. The experiences we made during that case study showed twoproblems of our approach: the growing complexity of concept lattices for large systems with many features and the need for handling compositions of features. This paper extends our technique to solve these problems. We show how this method allows incremental exploration of features while preserving the "mental map" the maintainer has gained through the analysis. The second improvement is a detailed look at composing features into more complex scenarios. Rather than assuming a one-to-one correspondence between features and scenarios as in earlier work, we can now handle scenarios that invoke many features.},
      month     = {October},
      year      = {2002},
      pages     = {273--282},
    }
  • BIB

    T. Eisenbarth, R. Koschke, G. Vogel. Static Trace Extraction. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2002.

    @inproceedings{Eisenbarth:WCRE:02,
      author    = {Thomas Eisenbarth and Rainer Koschke and Gunther Vogel},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2002},
      abstract  = {A trace is a record of the execution of a computer program, showing the sequence of operations executed. Dynamic traces are obtained by executing the program and depend upon the input. Static traces, on the other hand, describe potential sequences of operations extracted statically from the source code. Static traces offer the advantage that they do not depend upon input data. This paper describes a new automatic technique to extract static traces for individual stack and heap objects. The extracted static traces can be used in many ways, such as protocol recovery and validation in particular and program understanding in general.},
      title     = {Static Trace Extraction},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Aiding Program Comprehension by Static and Dynamic Feature Analysis. International Conference on Software Maintenance, IEEE Computer Society Press, November 2001; 602–611. Best Paper Award von 161 eingereichten Beiträgen.

    @inproceedings{Eisenbarth:ICSM:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Aiding Program Comprehension by Static and Dynamic Feature Analysis},
      booktitle = {International Conference on Software Maintenance},
      abstract  = {Understanding a system's implementation without prior knowledge is a hard task for reengineers in general. However, some degree of automatic aid is possible. In this paper, we present a technique building a mapping between the system's externally visible behavior and the relevant parts of the source code. Our technique combines dynamic and static analyses to rapidly focus on the system's parts urgently required for a goal-directed process of program understanding.},
      month     = {November},
      note      = {Best Paper Award von 161 eingereichten Beitr{\"a}gen},
      year      = {2001},
      pages     = {602--611},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Feature-Driven Program Understanding Using Concept Analysis of Execution Traces. International Workshop on Program Comprehension, IEEE Computer Society Press, May 2001; 300-309.

    @inproceedings{Eisenbarth:IWPC:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Feature-Driven Program Understanding Using Concept Analysis of Execution Traces},
      booktitle = {International Workshop on Program Comprehension},
      abstract  = {The first task of a programmer who wants to understand how a certain feature is implemented is to localize the implementation of the feature in the code. If the implementations of a set of related features are to be understood, a programmer is interested in their commonalities and variabilities. For large and badly documented programs, localizing features in code and identifying commonalities and variabilities of components and features can be difficult and time-consuming. It is useful to derive this information automatically. The feature-component correspondence describes which components are needed to implement a set of features and what are the respective commonalities and variabilities of features and components. This paper describes a new technique to derive the feature-component correspondence utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language-independent, and can yield results quickly.},
      month     = {May},
      year      = {2001},
      pages     = {300-309},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Derivation of Feature Component Maps by means of Concept Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, March 2001; 176–180.

    @inproceedings{Eisenbarth:CSMR:01,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      publisher = {IEEE Computer Society Press},
      title     = {Derivation of Feature Component Maps by means of Concept Analysis},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      abstract  = {Feature component maps describe which components are needed to implement a particular feature and are used early in processes to develop a product line based on existing assets. This paper describes a new technique to derive the feature component map and additional dependencies utilizing dynamic information and concept analysis. The method is simple to apply, cost-effective, largely language independent, and can yield results quickly and very early in the process.},
      month     = {March},
      year      = {2001},
      pages     = {176--180},
    }
  • BIB

    G. Canfora, J. \"Czeranski, R. Koschke. Revisiting the Delta IC Approach to Component Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2000; 140–149.

    @inproceedings{Canfora:WCRE:00,
      author    = {Gerardo Canfora and J{\"o}rg Czeranski and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      title     = {Revisiting the Delta IC Approach to Component Recovery},
      booktitle = {Working Conference on Reverse Engineering},
      month     = {November},
      year      = {2000},
      pages     = {140--149},
    }
  • BIB

    R. Koschke. Vorlesungen zum Thema Software-Reengineering. 2.~Workshop Software-Reengineering, Universität Koblenz-Landau, May 2000; 3–7. Bad Honnef, Germany. Fachberichte Informatik, Nr. 8/2000.

    @inproceedings{koschke:vorlesungen-zum-thema-software-reengineering,
      author    = {Rainer Koschke},
      publisher = {Universit{\"a}t Koblenz-Landau},
      title     = {{Vorlesungen zum Thema Software-Reengineering}},
      booktitle = {2.~Workshop Software-Reengineering},
      address   = {Bad Honnef, Germany},
      month     = {May},
      note      = {Fachberichte Informatik, Nr. 8/2000},
      year      = {2000},
      pages     = {3--7},
    }
  • BIB

    R. Koschke, T. Eisenbarth. A Framework for Experimental Evaluation of Clustering Techniques. International Workshop on Program Comprehension, IEEE Computer Society Press, 2000.

    @inproceedings{Koschke:IWPC:00,
      author    = {Rainer Koschke and Thomas Eisenbarth},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Workshop on Program Comprehension},
      year      = {2000},
      abstract  = {Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comparable evaluations of automatic clustering techniques, a common reference corpus of freely available systems is needed for which the actual components are known. The reference corpus is used to measure recall and precision of automatic techniques. For this measurement, a standard scheme for comparing the components recovered by a clustering technique to components in the reference corpus is required. This paper describes both the process of setting up reference corpora and ways of measuring recall and precision of automatic clustering techniques. For methods with human intervention, controlled experiments should be conducted. This paper additionally proposes a controlled experiment as a standard for evaluating manual and semi-automatic component recovery methods that can be conducted cost-effectively.},
      title     = {A Framework for Experimental Evaluation of Clustering Techniques},
    }
  • BIB

    T. Eisenbarth, R. Koschke, D. Simon. Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse. Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1), 2000; 63–68.

    @inproceedings{Eisenbarth:DSPL:00,
      author    = {Thomas Eisenbarth and Rainer Koschke and Daniel Simon},
      booktitle = {Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1)},
      year      = {2000},
      pages     = {63--68},
      title     = {{Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse}},
    }
  • BIB

    R. Koschke, J. F. Girard, M. Würthner. Intermediate Representations for Reverse Engineering. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1998; 241–250.

    @inproceedings{Koschke:98,
      author    = {Rainer Koschke and Jean-Francois Girard and Martin W{\"u}rthner},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {1998},
      pages     = {241--250},
      title     = {Intermediate Representations for Reverse Engineering},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. International Conference on Automated Software Engineering, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ASE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Automated Software Engineering},
      year      = {1997},
      title     = {A Metric-based Approach to Detect Abstract Data Types and State Encapsulations},
    }
  • BIB

    J. F. Girard, R. Koschke. Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding. International Conference on Software Maintenance, IEEE Computer Society Press, 1997.

    @inproceedings{Girard:ICSM:97,
      author    = {Jean-Francois Girard and Rainer Koschke},
      publisher = {IEEE Computer Society Press},
      booktitle = {International Conference on Software Maintenance},
      year      = {1997},
      abstract  = {This paper presents a method to view a system as a hierarchy of modules according to information hiding concepts and to identify architectural component candidates in this hierarchy. The result of the method eases the understanding of a system's underlying software architecture. A prototype tool implementing this method was applied to three systems written in C (each over 30 Kloc). For one of these systems, an author of the system created an architectural description. The components generated by our method correspond to those of this architectural description in almost all cases. For the other two systems, most of the components resulting from the method correspond to meaningful system abstractions.},
      title     = {Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding},
    }
  • BIB

    J. F. Girard, R. Koschke, G. Schied. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1997; 66–75.

    @inproceedings{Girard:WCRE:97,
      author    = {Jean-Francois Girard and Rainer Koschke and Georg Schied},
      publisher = {IEEE Computer Society Press},
      title     = {Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding},
      booktitle = {Working Conference on Reverse Engineering},
      abstract  = {In the context of the authors' research on architectural features recovery, abstract data type (ADT) and abstract state encapsulation (ASE, also called abstract object) have been identified as two of the smallest components which are useful to build a significant architectural overview of the system. The authors have named these the atomic components of an architecture. This paper compares five published techniques which extract ADT and ASE from source code. A prototype tool implementing each techniques has been developed and applied to three medium size systems written in C (each over 30 Kloc). The results from each approach are compared with the atomic components identified by hand by a group of software engineers. These people did not know the automatic techniques which were going to be applied to the systems.},
      year      = {1997},
      pages     = {66--75},
    }

Further Publications

  • BIB

    R. Koschke, J. Harder, S. Bazrafshan. Erosion von Software: Was kann uns die Wissenschaft heute dazu sagen? Embedded Software Engineering Kongress, 2018. number of pages: 14.

    @inproceedings{Koschke:ESE:18,
      author    = {Rainer Koschke and Jan Harder and Saman Bazrafshan},
      note      = {number of pages: 14},
      booktitle = {Embedded Software Engineering Kongress},
      year      = {2018},
      title     = {Erosion von Software: Was kann uns die Wissenschaft heute dazu sagen?},
    }
  • BIB

    K. Schmid, R. Koschke, C. Kröher, D. Lüdemann. Towards Identifying Evolution Smells in Software Product Lines. 5. Workshop Design For Future — Langlebige Softwaresysteme, CEUR Workshop Proceedings, 2013.

    @inproceedings{Schmid:DFF:13,
      author    = {Klaus Schmid and Rainer Koschke and Christian Kr{\"o}her and Dierk L{\"u}demann},
      publisher = {CEUR Workshop Proceedings},
      booktitle = {5. Workshop Design For Future --- Langlebige Softwaresysteme},
      year      = {2013},
      title     = {Towards Identifying Evolution Smells in Software Product Lines},
    }
  • BIB

    T. Mende, R. Koschke. Evaluation von Modellen zur Fehlervorhersage: Probleme und Lösungsmöglichkeiten. Softwaretechnik Trends May 2010; 30(2):74–75. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).

    @article{Mende:WSR:10,
      author   = {Thilo Mende and Rainer Koschke},
      note     = {Beitr{\"a}ge des 12. Workshops 'Software Reengineering' (WSR 2010)},
      title    = {{Evaluation von Modellen zur Fehlervorhersage: Probleme und L{\"o}sungsm{\"o}glichkeiten}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {30},
      year     = {2010},
      pages    = {74--75},
    }
  • BIB

    R. Koschke. Konsolidierung von Software-Varianten in Software-Produktlinien. Softwaretechnik Trends May 2006; 26(2). Beiträge des 8. Workshops 'Software Reengineering' (WSR 2006).

    @article{Koschke:WSR:06,
      author   = {Rainer Koschke},
      note     = {Beitr{\"a}ge des 8. Workshops 'Software Reengineering' (WSR 2006)},
      title    = {{Konsolidierung von Software-Varianten in Software-Produktlinien}},
      journal  = {Softwaretechnik Trends},
      issn     = {0720-8928},
      number   = {2},
      month    = {May},
      volume   = {26},
      year     = {2006},
    }
  • BIB

    R. Koschke, Y. Zhang. Component Recovery, Protocol Recovery and Validation in Bauhaus. J. \"Ebert, B. Kullbach, F. Lehner, editors, Workshop on Software Reengineering, volume 1/2002 of Fachberichte Informatik, May 2001; 73-76. Institut für Informatik, Rheinau 1, D-56075 Koblenz, University of Koblenz-Landau.

    @inproceedings{Koschke:2001,
      author       = {Rainer Koschke and Yan Zhang},
      editor       = {J{\"u}rgen Ebert and Bernt Kullbach and Franz Lehner},
      title        = {Component Recovery, Protocol Recovery and Validation in Bauhaus},
      series       = {Fachberichte Informatik},
      booktitle    = {Workshop on Software Reengineering},
      address      = {Institut f{\"u}r Informatik, Rheinau 1, D-56075 Koblenz},
      month        = {May},
      volume       = {1/2002},
      year         = {2001},
      organization = {University of Koblenz-Landau},
      annote       = {http://www.uni-koblenz.de/fb4},
      pages        = {73-76},
    }
  • BIB

    J. \"Czeranski, T. Eisenbarth, H. Kienle, R. Koschke, D. Simon. Wiedergewinnung von Architekturinformationen: Ausblicke. Workshop on Software Reengineering, number Nr. 8/2000 in Fachberichte Informatik, May 1999. Universit\"at Koblenz-Landau.

    @inproceedings{Czeranski:WSR:99,
      author    = {J{\"o}rn Czeranski and Thomas Eisenbarth and Holger Kienle and Rainer Koschke and Daniel Simon},
      title     = {Wiedergewinnung von Architekturinformationen: Ausblicke},
      series    = {Fachberichte Informatik},
      booktitle = {Workshop on Software Reengineering},
      address   = {Universit\"at Koblenz-Landau},
      number    = {Nr. 8/2000},
      month     = {May},
      year      = {1999},
    }





Arbeitsgruppe

Forschung

Lehre

Publikationen

Service

Kontakt

 

---------
BEDIENUNG
---------


SEITENINHALT DRUCKEN

LESEZEICHEN SETZEN

ENGLISH VERSION  






  SEITENANFANG
Hier geht es zur Homepage des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Universität Bremen