Conferences in DBLP
Carlo Ghezzi Software Engineering Issues for Network Computing. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:2- [Conf ] René L. Krikhaar Reverse Architecting Approach for Complex Systems. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:4-11 [Conf ] Anneliese von Mayrhauser , A. Marie Vans Hypothesis-Driven Understanding Processes During Corrective Maintenance of Large Scale Software. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:12-20 [Conf ] Salwa K. Abd-El-Hafiz Effects of Decomposition Techniques on Knowledge-Based Program Understanding. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:21-0 [Conf ] Frank Niessink , Hans van Vliet Predicting Maintenance Effort with Function Points. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:32-39 [Conf ] E. Burch , Hsiang-Jui Kungs Modeling software maintenance requests: a case study. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:40-47 [Conf ] Hongji Yang , Paul Luker , William C. Chu Measuring Abstractness for Reverse Engineering in a Re-engineering Tool. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:48-0 [Conf ] Jean-Francois Girard , Rainer Koschke Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:58-65 [Conf ] A. Gupta Program Understanding Using Program Slivers -- An Experience Report. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:66-71 [Conf ] Giuliano Antoniol , Roberto Fiutem , G. Lutteri , Paolo Tonella , S. Zanfei , Ettore Merlo Program Understanding and Maintenance with the CANTO Environment. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:72-0 [Conf ] Vaclav Rajlich A Model for Change Propagation Based on Graph Rewriting. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:84-91 [Conf ] Giuseppe Visaggio Structural information as a quality metric in software systems organization. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:92-99 [Conf ] Hadar Ziv , Debra J. Richardson Constructing Bayesian-network models of software testing and maintenance uncertainties. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:100-0 [Conf ] G. Aditya Kiran , S. Haripriya , Pankaj Jalote Effect of Object Orientation on Maintainability of Software. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:114-121 [Conf ] Giuseppe A. Di Lucca , Anna Rita Fasolino , Patrizia Guerra , Silvia Petruzzelli Migrating Legacy Systems towards Object-Oriented Platforms. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:122-129 [Conf ] Lionel C. Briand , Christian Bunse , John W. Daly , Christiane Differding An Experimental Comparison of the Maintainability of Object-Oriented and Structured Design Documents. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:130-0 [Conf ] Zhonglin He , Geoff Staples , Margaret Ross , Ian Court Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:142-149 [Conf ] Gregory D. Abowd , Ashok K. Goel , Dean F. Jerding , W. Michael McCracken , Melody M. Moore , J. William Murdock , Colin Potts , Spencer Rugaber , Linda M. Wills MORALE. Mission ORiented Architectural Legacy Evolution. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:150-159 [Conf ] Harald Gall , Mehdi Jazayeri , René Klösch , Georg Trausmuth Software Evolution Observations Based on Product Release History. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:160-0 [Conf ] Michael Siff , Thomas W. Reps Identifying modules via concept analysis. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:170-179 [Conf ] Eirik Tryggeseth , Øystein Nytrø Dynamic Traceability Links Supported by a System Architecture Description. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:180-187 [Conf ] Cristina Cifuentes , Antoine Fraboulet Intraprocedural Static Slicing of Binary Executables. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:188-0 [Conf ] Sarah J. Reed DLA'S YEAR 2000 REMEDIATION PROGRAM: Managing Organization-Wide Conversion and Compliance. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:198-205 [Conf ] Eugene C. Lynd Living with the 2-digit Year Year 2000 Maintenance Using a Procedural Solution. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:206-0 [Conf ] Khaled El Emam , Dirk Höltje , Nazim H. Madhavji Causal Analysis of the Requirements Change Process for a Large System. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:214-221 [Conf ] Maria Tortorella , Giuseppe Visaggio CREP - Characterizing Reverse Engineering Process Component Methodology. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:222-231 [Conf ] Norman F. Schneidewind Measuring and evaluating maintenance process using reliability, risk, and test metrics. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:232-0 [Conf ] Kazuhiko Iio , Tsuneo Furuyama , Yoshio Arai Experimental Analysis of the Cognitive Processes of Program Maintainers during Software Maintenance. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:242-249 [Conf ] Ira D. Baxter , Christopher Pidgeon Software Change Through Design Maintenance. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:250-259 [Conf ] Paulo S. C. Alencar , Donald D. Cowan , Torsten Nelson , Carlos José Pereira de Lucena Viewpoints as an evolutionary approach to software system maintenance. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:260-0 [Conf ] T. Troy Pearse , Paul W. Oman Experiences Developing and Maintaining Software in a Multi-Platform Environment. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:270-277 [Conf ] Jun Han Designing for Increased Software Maintainability. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:278-286 [Conf ] E. J. Younger , Keith H. Bennett , Z. Luo A Formal Transformation and Refinement Method for Concurrent Programs. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:287-0 [Conf ] Victor R. Basili Analysis for Reuse and Maintenance: A Program for Experimentation. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:296-0 [Conf ] Scott R. Tilley The Impact of Distributed Object Technology on Reengineering - Panel Session Introduction. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:300- [Conf ] Hausi A. Müller , Kenny Wong , Margaret-Anne D. Storey Wrapping coarse-grained objects using standard infrastructure technology. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:301- [Conf ] Kurt C. Wallnau Repairing coordination mismatches among legacy components. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:302- [Conf ] Harry M. Sneed The rationale for software wrapping. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:303- [Conf ] Michael R. Olsem Enabling technology for migrating legacy systems to client-server systems. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:304- [Conf ] Mohd A. Bashar , Ganesh Krishnan , Markus G. Kuhn , Eugene H. Spafford , Samuel S. Wagstaff Jr. Low-threat security patches and tools. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:306-313 [Conf ] Bruno Laguë , Daniel Proulx , Jean Mayrand , Ettore Merlo , John P. Hudepohl Assessing the Benefits of Incorporating Function Clone Detection in a Development Process. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:314-321 [Conf ] Elizabeth Burd , Malcolm Munro Investigating the Maintenance Implications of the Replication of Code. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:322-0 [Conf ]