The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
1994, volume: 37, number: 5

  1. John Perry Barlow
    Dad's Invisible Guard-All Shield. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:15-17 [Journal]
  2. Roger C. Schank
    Tractor Factories and Research in Software Design. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:19-21 [Journal]
  3. Richard C. Waters, Elliot J. Chikofsky
    Reverse Engineeing - Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:22-25 [Journal]
  4. Peter Aiken, Alice H. Muntz, Russ Richards
    DoD Legacy Systems: Reverse Engineering Data Requirements. [Citation Graph (6, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:26-41 [Journal]
  5. William J. Premerlani, Michael R. Blaha
    An Approach for Reverse Engineering of Relational Databases. [Citation Graph (15, 5)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:42-49 [Journal]
  6. Jim Q. Ning, Andre Engberts, Wojtek Kozaczynski
    Automated Support for Legacy Code Understanding. [Citation Graph (4, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:50-57 [Journal]
  7. Lawrence Markosian, Philip Newcomb, Russell Brand, Scott Burson, Ted Kitzmiller
    Using an Enabling Technology to Reengineer Legacy Systems. [Citation Graph (3, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:58-70 [Journal]
  8. Ted J. Biggerstaff, Bharat G. Mitbander, Dallas E. Webster
    Program Understanding and the Concept Assigment Problem. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:72-82 [Journal]
  9. Alex Quilici
    A Memory-Based Approach to Recognizing Programing Plans. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:84-93 [Journal]
  10. Karl J. Lieberherr, Ignacio Silva-Lepe, Cun Xiao
    Adaptive Object-Oriented Programming Using Graph-Based Customization. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:94-101 [Journal]
  11. Iris Vessey, Sue A. Conger
    Requirements Specification: Learning Object, Process, and Data Methodologies. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:102-113 [Journal]
  12. Peter G. Neumann
    Alternative Passwords. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:5, pp:146- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002