Publikationen

Bücher

  • D. Lüdemann. Kontrollfussanalyse und formale Begriffsanalyse von C-Code aus Software-Produktlinien mit Variabilitätsmanagement durch den Präprozessor. PhD Dissertation, University of Bremen, Germany, 2018.
  • J. Harder. Software Clones – Guilty Until Proven Innocent? PhD Dissertation, University of Bremen, Germany, 2018.
  • S. Bazrafshan. Empirical Research towards a Relevance Assessment of Software Clones. PhD Dissertation, University of Bremen, Germany, 2017.
  • P. Frenzel. Erweiterung der Reflexionsmethode zur Zusammenfassung von Produktarchitekturen zu einer Produktlinienarchitektur. Dissertation, Universität Bremen, AG Softwaretechnik, Fachbereich Mathematik und Informatik, January 2014.
  • R. Falke. Erkennung von Falsch-Positiven Softwareklonen mittels Lernverfahren. PhD Dissertation, University of Bremen, Germany, 2014.
  • R. Koschke, Y. Higo, N. Göde, editors. Proceedings of the International Workshop on Software Clones, volume 63, 2014. Electronic Communications of the EASST.
  • R. Koschke, E. Jürgens, J. Rilling, editors. Proceedings of the International Workshop on Software Clones, 2013. ACM Press.
  • K. Inoue, J. Cordy, R. Koschke, J. Krinke, C. Roy, editors. Proceedings of the International Workshop on Software Clones, 2012. ACM Press.
  • R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071), volume 2, Dagstuhl, Germany, 2012. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. DOI
  • K. Inoue, J. Cordy, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2011. ACM Press.
  • T. Mende. On the Evaluation of Defect Prediction Models. PhD Dissertation, University of Bremen, Germany, 2011.
  • N. Göde. Clone Evolution. PhD dissertation, University of Bremen, Bremen, Germany, 2011.
  • K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2010. ACM Press.
  • J. Quante. Dynamic Object Process Graphs. PhD dissertation, University of Bremen, Bremen, Germany, 2009.
  • K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2009. ACM Press.
  • K. Hölscher. Autonomous units as a rule based concept for the modeling of autonomous and cooperating processes. PhD Dissertation, University of Bremen, Germany, 2008.
  • R. Koschke, O. Herzog, K. Rödiger, M. Ronthaler, editors. INFORMATIK 2007 — Informatik trifft Logistik: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V., volume P-109 (Band 1) und P-110 (Band 2) of Lecture Notes in Informatics (LNI), Bonn, September 2007.
  • R. Koschke, E. Merlo, A. Walenstein, editors. Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.
  • C. Maeder. Zur Kontextanalyse einer algebraischen Programmiersprache. TU Berlin, June 2001.
  • R. Koschke. Atomic Architectural Component Recovery for Program Understanding and Evolution. Institute of Software Technology, University of Stuttgart, Germany, 1999.

Buchkapitel

  • W. Said, J. Quante, R. Koschke. Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies, Selected papers from MODELSWARD 2018., 24 pages. Springer, 2018. Extended MODELSWARD 2018 paper; accepted for publication..
  • R. Koschke. Software Engineering: International Summer Schools, Architecture Reconstruction, 140–173. Springer Verlag, 2009. edited by Andrea De Lucia and Filomena Ferrucci.
  • R. Koschke. Software Evolution, Identifying and Removing Software Clones, 15–39. Springer Verlag, 2008. Editors: Serge Demeyer and Tom Mens.
  • R. Koschke, E. Plödereder. F. Lehner, editor. Ansätze des Programmverstehens, 159–176. Deutscher Universitätsverlag/Gabler Vieweg Westdeutscher Verlag, 1996.

Zeitschriftenbeiträge

  • T. Mustafa, K. Sohr. Understanding the Implemented Access Control Policy of Android System Services with Slicing and Extended Static Checking. Int. J. Inf. Secur. August 2015; 14(4):347–366. DOI
  • W. Maalej, R. Tiarks, T. Roehm, R. Koschke. On the Comprehension of Program Comprehension. ACM Transactions on Software Engineering and Methodology September 2014; 23(4):31:1–31:37. DOI
  • R. Koschke. Large-scale inter-system clone detection using suffix trees and hashing. Journal of Software: Evolution and Process August 2014; 26(8):747–769. DOI
  • O. Riemann, R. Koschke. Robust Parsing of Cloned Token Sequences. Electronic Communications of the EASST 2014; 63:20 pages. Proceedings of the International Workshop on Software Clones 2014.
  • J. Harder, N. Göde. Cloned code: stable code. Journal of Software: Evolution and Process October 2013; 25(10):1063–1088. DOI
  • N. Göde, R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process February 2013; 25(2):165–192. DOI
  • R. Koschke. Incremental Reflexion Analysis. Journal of Software: Evolution and Process 2013; 25(6):601–638. Special Issue of CSMR'2010.
  • K. Sohr, M. Kuhlmann, M. Gogolla, H. Hu, G. Ahn. Comprehensive Two-level Analysis of Role-based Delegation and Revocation Policies with UML and OCL. Inf. Softw. Technol. December 2012; 54(12):1396–1417. DOI
  • M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements. International Journal On Advances in Security July 2012; 5(1&2):46–67.
  • R. Santiago, C. Maeder. Linguistic Variables of Type-N - a Mathematical Model. Tendencias em Matematica Aplicada e Computacional (TEMA) April 2011; 12(1):21–30.
  • R. Tiarks, R. Koschke, R. Falke. An extended assessment of type-3 clones as detected by state-of-the-art tools. Software Quality Journal 2011; 19(2):295–331.
  • R. Koschke, P. Frenzel, A. Breu, K. Angstmann. Extending the reflexion method for consolidating software variants into product lines. Software Quality Journal December 2009; 17(4):331–366.
  • T. Mende, R. Koschke, F. Beckwermert. An Evaluation of Code Similarity Identification for the Grow-and-Prune Model. Journal on Software Maintenance and Evolution March–April 2009; 21(2):143 – 169.
  • K. Hölscher, H. Kreowski, S. Kuske. Autonomous Units to Model Interacting Sequential and Parallel Processes. Fundamenta Informaticae 2009; 92:233–257.
  • C. Roy, J. Cordy, R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Journal of Science of Computer Programming 2009; 74(7):470-495. Special Issue on Program Comprehension (ICPC 2008), unter den fünf am häufigsten zitierten Artikeln von Science of Computer Programming seit 2007. DOI
  • B. Cornelissen, A. Zaidman, A. Deursen, L. Moonen, R. Koschke. A Systematic Survey of Program Comprehension through Dynamic Analysis. IEEE Computer Society Transactions on Software Engineering 2009; 35(5):684–702.
  • K. Sohr, M. Drouineaud, G. Ahn, M. Gogolla. Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. on Knowl. and Data Eng. July 2008; 20(7):924–939. DOI
  • J. Buckley, A. LeGear, C. Exton, R. Cadogan, T. Johnston, B. Looby, R. Koschke. Encapsulating targeted component abstractions using software Reflexion Modelling. Journal on Software Maintenance and Evolution March–April 2008; 20(2):107–134.
  • R. Falke, R. Koschke, P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering 2008; 13(6):601–643. DOI
  • J. Quante, R. Koschke. Dynamic Object Process Graphs. Journal of Systems and Software 2008; 81:481–501. DOI
  • S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE Computer Society Transactions on Software Engineering September 2007; 33(9):577–591.
  • A. Christl, R. Koschke, M. Storey. Automated Clustering to Support the Reflexion Method. Journal of Systems and Software 2007; 49(3):255–274. Special Issue on WCRE 2005.
  • R. Koschke, G. Canfora, J. Czeranski. Revisiting the Delta-IC Approach. Journal of Science of Computer Programming 2006; 60(2):171–188.
  • K. Hölscher, P. Ziemann, M. Gogolla. On Translating UML Models into Graph Transformation Systems. Journal of Visual Languages and Computing 2006; 17(1):78–105.
  • T. Eisenbarth, R. Koschke, G. Vogel. Static Object Trace Extraction for Programs with Pointers. Journal of Systems and Software September 2005; 77(3):263–284.
  • K. Sohr, G. Ahn, L. Migge. Articulating and Enforcing Authorisation Policies with UML and OCL. SIGSOFT Softw. Eng. Notes May 2005; 30(4):1–7. DOI
  • R. Koschke. Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten. Informatik – Forschung und Entwicklung, Springer Verlag April 2005; 19(3). DOI
  • A. Walenstein, A. Lakhotia, R. Koschke. Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes March 2004; 29(2):1–5.
  • A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Viewpoints in Software Architecture Reconstruction. Softwaretechnik Trends 2004; 24(2).
  • R. Koschke, D. Simon. Symphony Fallstudie: Hierarchische Reflexion Modelle. Softwaretechnik Trends 2004; 24(2).
  • T. Eisenbarth, R. Koschke, D. Simon. Locating Features in Source Code. IEEE Computer Society Transactions on Software Engineering March 2003; 29(3):210–224.
  • R. Koschke. Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey. Journal on Software Maintenance and Evolution March 2003; 15:87–109.
  • J. F. Girard, R. Koschke. A Comparison of Abstract Data Type and Objects Recovery Techniques. Journal Science of Computer Programming, Elsevier Science March 2000; 6(2–3):149-181.
  • J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. Journal on Automated Software Engineering, Kluwer Academic Publishers 1999; 6(4).

Konferenz- und Workshopbeiträge

  • W. Said, J. Quante, R. Koschke. On State Machine Mining from Embedded Control Software. International Conference on Software Maintenance and Evolution, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.
  • W. Said, J. Quante, R. Koschke. Reflexion Models for State Machine Extraction and Verification. International Conference on Software Maintenance and Evolution, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.
  • R. Koschke, U. Schmidt, B. Berger. Built-in Clone Detection in Meta Languages. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, September 2018; 6 pages. Accepted for publication.
  • M. O. Rüdel, J. Ganser, R. Koschke. Spatial Orientation in VR-based Software Cities. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.
  • R. Koschke. Industrial Experience on Code Clean-Up Using Architectural Conformance Checking. Workshop on Software Architecture Erosion and Architectural Consistency, ACM Press, September 2018; 7 pages. Accepted for publication.
  • V. Käfer, S. Wagner, R. Koschke. Are There Functionally Similar Code Clones in Practice? International Workshop on Software Clones, IEEE Computer Society Press, March 2018; 2–8.
  • R. Koschke, M. Weinig. Generated Code in Studies on Clone Rates. International Workshop on Software Clones, IEEE Computer Society Press, March 2018; 16–22.
  • W. Said, J. Quante, R. Koschke. Towards Interactive Mining of Understandable State Machine Models from Embedded Software. Proceedings of the International Conference on Model-Driven Engineering and Software Development, SciTePress, January 2018; 117–128. INSTICC. Best Student Paper Award. DOI
  • R. Koschke, J. Harder, S. Bazrafshan. Erosion von Software: Was kann uns die Wissenschaft heute dazu sagen? Proceedings of the Embedded Software Engineering, 2018. number of pages: 14.
  • B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors, International Symposium on Engineering Secure Software and Systems, Springer Verlag, April 2016; 56–71.
  • R. Koschke, S. Bazrafshan. Software-Clone Rates in Open-Source Programs Written in C or C++. International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER), volume 3, IEEE Computer Society Press, March 2016; 1–7.
  • D. Lüdemann, R. Koschke. From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, September 2015; 211–220.
  • H. Basit, M. Hammad, R. Koschke. A Survey on Goal-Oriented Visualization of Clone Data. IEEE Working Conference on Software Visualization, IEEE Computer Society Press, September 2015; 46–55.
  • L. Hamann, K. Sohr, M. Gogolla. Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. F. Piessens, J. Caballero, N. Bielova, editors, Proceedings of the 7th International Symposium on Engineering Secure Software and Systems, Springer International Publishing, 2015; 211–226. Cham. DOI
  • M. Bunke. On the Description of Software Security Patterns. Proceedings of the 19th European Conference on Pattern Languages of Programs, ACM, 2014; 34:1–34:10. New York, NY, USA. DOI
  • S. Bazrafshan, R. Koschke. Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2014; 1–10.
  • C. Roy, M. Zibran, R. Koschke. The Vision of Software Clone Management: Past, Present and the Future. IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, IEEE Computer Society Press, 2014; 18–33. Invited Keynote Paper.
  • S. Bartsch, B. Berger, E. Bodden, A. Brucker, J. Heider, M. Kus, S. Maseberg, K. Sohr, M. Volkamer. Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. V. Stefan, E. Weippl, editors, Sicherheit 2014 Sicherheit, Schutz und Zuverlässigkeit, volume 228 of LNI, GI, 2014; 283–291.
  • S. Bartsch, B. Berger, M. Bunke, K. Sohr. The Transitivity-of-Trust Problem in Android Application Interaction. Eighth International Conference on Availability, Reliability and Security (ARES), 2013, IEEE Computer Society Press, 2013; 291–296.
  • S. Bazrafshan, R. Koschke. An Empirical Study of Clone Removals. International Conference on Software Maintenance, IEEE Computer Society Press, 2013; 50-59.
  • D. Chatterji, J. Carver, N. Kraft, J. Harder. Effects of Cloned Code on Software Maintainability: A Replicated Developer Study. Working Conference on Reverse Engineering, 2013; 112–121.
  • J. Harder. How Multiple Developers Affect Clone Evolution. International Conference on Software Maintenance, IEEE Computer Society, 2013; 30-39.
  • S. Bazrafshan. No Clones, No Trouble? International Workshop on Software Clones, IEEE Computer Society, 2013; 37–38. Position Paper.
  • J. Harder. The Limits of Clone Model Standardization. International Workshop on Software Clones, IEEE Computer Society, 2013; 10–11. Position Paper.
  • B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors, European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2013; 285–294. DOI
  • M. Codescu, T. Mossakowski, C. Maeder. Checking conservativity with Hets. R. Heckel, S. Milius, editors, Algebra and Coalgebra in Computer Science, 5th International Conference, CALCO 2013, September 3-6, Warsaw, Poland, volume 8089 of Lecture Notes in Computer Science, Springer Verlag, 2013; 315–321.
  • C. Rubio-Medrano, G. Ahn, K. Sohr. Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned. Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference, IEEE Computer Society, 2013; 21–26. Washington, DC, USA. DOI
  • R. Koschke, I. Baxter, M. Conradt, J. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors, Dagstuhl Reports, volume 2, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2012; 21–57. Dagstuhl, Germany. DOI
  • S. Bazrafshan. Evolution of Near-Miss Clones. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2012; 74–83.
  • A. Hemel, R. Koschke. Reverse Engineering Variability in Source Code Using Clone Detection – A Case Study for Linux Variants of Consumer Electronic Devices. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2012; 357–366.
  • B. Berger, K. Sohr. An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. D. Gritzalis, S. Furnell, M. Theoharidou, editors, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, volume 376 of IFIP Advances in Information and Communication Technology, Springer Verlag, 2012; 25–36.
  • B. Katzmarski, R. Koschke. Program complexity metrics and programmer opinions. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 17–26.
  • J. Harder, R. Tiarks. A Controlled Experiment on Software Clones. International Conference on Program Comprehension, IEEE Computer Society Press, 2012; 219–228. DOI
  • C. Kapser, J. Harder, I. Baxter. A Common Conceptual Model for Clone Detection Results. 6th International Workshop on Software Clones, IEEE Computer Society, 2012. DOI
  • R. Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2012; 309–318.
  • T. Roehm, R. Tiarks, R. Koschke, W. Maalej. How Do Professional Developers Comprehend Software? International Conference on Software Engineering, ACM Press, 2012; 255–265. Distinguished Paper Award.
  • S. Autexier, D. Dietrich, D. Hutter, C. Lüth, C. Maeder. SmartTies - Management of Safety-Critical Developments. T. Margaria, B. Steffen, editors, Leveraging Applications of Formal Methods, Verification and Validation. 5th International Symposium, ISoLA 2012, October 15-18, Heraclion, Greece, volume 7609 of Lecture Notes in Computer Science, Springer Verlag, 2012; 238–252.
  • N. Göde, R. Koschke. Frequency and Risks of Changes to Clones. International Conference on Software Engineering, ACM Press, 2011; 311–320.
  • M. Codescu, T. Mossakowski, A. \'Riesco, C. Maeder. Integrating Maude into Hets. M. Johnson, D. Pavlovic, editors, Algebraic Methodology and Software Technologyy. 13th International Conference, AMAST 2010, June 23-25, Lac-Beauport, Canada, volume 6486 of Lecture Notes in Computer Science, Springer Verlag, 2011; 60–75.
  • B. Scholz, R. Koschke. Object-Based Dynamic Protocol Recovery for Multi-Threading Programs. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 251–260.
  • S. Bazrafshan, R. Koschke, N. Göde. Approximate Code Search in Program Histories. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 109–118.
  • B. Berger, M. Bunke, K. Sohr. An Android Security Case Study with Bauhaus. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 179–183.
  • M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns. International Conferences on Pervasive Patterns and Applications (PATTERNS), XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.
  • M. Bunke, K. Sohr. An Architecture-Centric Approach to Detecting Security Patterns in Software. International Symposium on Engineering Secure Software and Systems, volume 6542 of Lecture Notes in Computer Science, Springer Verlag, 2011; 156–166.
  • J. Harder, N. Göde. Efficiently Handling Clone Data: RCF and Cyclone. International Workshop on Software Clones, ACM, 2011; 81–82. DOI
  • T. Mende, R. Koschke, J. Peleska. On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 259–268.
  • N. Göde, J. Harder. Clone Stability. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2011; 64–74. DOI
  • N. Göde, J. Harder. Oops!... I Changed It Again. International Workshop on Software Clones, ACM, 2011; 14–20. DOI
  • M. Kuhlmann, K. Sohr, M. Gogolla. Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, IEEE Computer Society, 2011; 108–117. Washington, DC, USA. DOI
  • K. Sohr, T. Mustafa, A. Nowak. Software Security Aspects of Java-based Mobile Phones. Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, 2011; 1494–1501. New York, NY, USA. DOI
  • K. Sohr, B. Berger. Idea: Towards Architecture-Centric Security Analysis of Software. F. Massacci, D. Wallach, N. Zannone, editors, International Symposium on Engineering Secure Software and Systems, volume 5965 of Lecture Notes in Computer Science, Springer Verlag, 2010; 70–78.
  • T. Mende. Replication of Defect Prediction Studies: Problems, Pitfalls and Recommendations. Proceedings of the International Conference on Predictive Models in Software Engineering, ACM Press, 2010; 1–10. DOI
  • J. Harder, N. Göde. Quo Vadis, Clone Management? International Workshop on Software Clones, ACM, 2010; 85–86. DOI
  • E. Juergens, N. Göde. Achieving Accurate Clone Detection Results. International Workshop on Software Clones, ACM, 2010; 1–8.
  • N. Göde. Clone Removal: Fact or Fiction? International Workshop on Software Clones, ACM Press, 2010; 33–40.
  • R. Koschke. Incremental Reflexion Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 1–10.
  • T. Mende, R. Koschke. Effort-Aware Defect Prediction Models. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2010; 109–118.
  • M. Codescu, B. Langenstein, C. Maeder, T. Mossakowski. The VSE Refinement Method in Hets. K. Breitman, A. Cavalcanti, editors, Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, ICFEM 2009, December 9-12, Rio de Janeiro, Brazil, volume 5885 of Lecture Notes in Computer Science, Springer Verlag, 2009; 660–678.
  • R. Koschke, R. Tiarks. Haben wir Programmverstehen schon ganz verstanden? Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings, 2009; 15–26.
  • N. Göde. Evolution of Type-1 Clones. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 77–86.
  • R. Tiarks, R. Koschke, R. Falke. An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools. Conference on Source Code Analysis and Manipulation, IEEE Computer Society Press, 2009; 67-76.
  • T. Mende, R. Koschke. Revisiting the Evaluation of Defect Prediction Models. PROMISE '09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, ACM, 2009; 1–10. New York, NY, USA. DOI
  • J. Harder, N. Göde. Modeling Clone Evolution. International Workshop on Software Clones, 2009; 17–21.
  • R. Koschke, S. Jarzabek, J. Inoue. Third International Workshop on Software Clones (IWSC). European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 269–270.
  • T. Mende, R. Koschke, M. Leszak. Evaluating Defect Prediction Models for a Large Evolving Software System. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 247–250.
  • N. Göde, R. Koschke. Incremental Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2009; 219–228. Best Paper Award von 70 eingereichten Beiträgen.
  • J. Quante. Do Dynamic Object Process Graphs Support Program Understanding? - A Controlled Experiment. International Conference on Program Comprehension, ACM Press, 2008; 73–82.
  • B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung. Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik, GI Lecture Notes for Informatics, 2008.
  • R. Koschke. Frontiers in Software Clone Management. Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance, IEEE Computer Society Press, 2008; 119–128.
  • R. Koschke. Zehn Jahre WSR, zwölf Jahre Bauhaus. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 51–66.
  • J. Harder, R. Koschke. Empirische Grundlagen für das Klonmanagement. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 127–133.
  • T. Mende, F. Beckwermert. Clone Detection in a Product Line Context. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 176–180.
  • J. Quante. Using Library Dependencies for Clustering. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors, Workshop Software Reengineering, GI Lecture Notes for Informatics, 2008; 171–175.
  • T. Mende, F. Beckwermert, R. Koschke, G. Meier. Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2008; 163–172.
  • K. Hölscher, R. Klempien-Hinrichs, P. Knirsch. Undecidable Control Conditions in Graph Transformation Units. A. Moreira, L. Ribeiro, editors, Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2006), Natal, Brazil, 2006, volume 195 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2008; 95–111.
  • K. Hölscher, P. Knirsch, M. Luderer. Autonomous Units for Communication-based Dynamic Scheduling. H. -. Haasis, H. -. Kreowski, B. Scholz-Reiter, editors, Dynamics in Logistics, Proceedings of the 1st Intl.\ Conference LDIC 2007, Springer, 2008; 331–339. Berlin, Heidelberg.
  • K. Sohr, T. Mustafa, X. Bao, G. Ahn. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. Proceedings of the 2008 Annual Computer Security Applications Conference, IEEE Computer Society, 2008; 257–266. Washington, DC, USA. DOI
  • J. Quante, R. Koschke. Dynamic Protocol Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 219–228.
  • P. Frenzel, R. Koschke, A. Breu, K. Angstmann. Extending the Reflection Method for Consolidating Software Variants into Product Lines. Working Conference on Reverse Engineering, IEEE Computer Society Press, October 2007; 160–169. Best Paper Award von 87 eingereichten Beiträgen.
  • T. Mossakowski, C. Maeder, K. Lüttich. Hets: The Heterogeneous Tool Set. O. Grumberg, M. Huth, editors, Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, March 24 - April 1, Braga, Portugal, volume 4424 of Lecture Notes in Computer Science, Springer Verlag, 2007; 519–522.
  • R. Koschke. Survey of Research on Software Clones. R. Koschke, E. Merlo, A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, 2007. Dagstuhl, Germany.
  • J. Quante. Online Construction of Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2007; 113–122.
  • R. Koschke, R. Falke, P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2006; 253–262. DOI
  • J. Quante, R. Koschke. Dynamic Object Process Graphs. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2006; 81–90. Best Paper Award von 65 eingereichten Beiträgen.
  • H. Kreowski, K. Hölscher, P. Knirsch. Semantics of Visual Models in a Rule-based Setting. R. Heckel, editor, Proceedings of the School of SegraVis Research Training Network on Foundations of Visual Modelling Techniques (FoVMT 2004), Dagstuhl, Germany, 2004, volume 148 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2006; 75–88.
  • K. Hölscher, H. Kreowski, S. Kuske. Autonomous Units and their Semantics — the Sequential Case. A. Corradini, H. Ehrig, U. Montanari, L. Ribeiro, G. Rozenberg, editors, Graph Transformations, Proceedings of the 3rd Intl.\ Conference on Graph Transformations (ICGT 2006), volume 4178 of Lecture Notes in Computer Science, Springer, 2006; 245–259. Berlin, Heidelberg.
  • K. Hölscher, P. Knirsch, H. Kreowski. Modelling Transport Networks by Means of Autonomous Units. H. -. Haasis, H. Kopfer, J. Schönberger, editors, Operations Research Proceedings 2005, Springer, 2006; 399–404. Berlin, Heidelberg.
  • A. Schaad, V. Lotz, K. Sohr. A Model-checking Approach to Analysing Organisational Controls in a Loan Origination Process. Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, ACM, 2006; 139–149. New York, NY, USA. DOI
  • R. Koschke. What architects should know about reverse engineering and reengineering. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, November 2005; 4–10. Invited Paper.
  • A. Christl, R. Koschke, M. Storey. Equipping the Reflexion Method with Automated Clustering. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2005; 89–98.
  • R. Falke, R. Klein, R. Koschke, J. Quante. The Dominance Tree in Visualizing Software Dependencies. Workshop on Visualizing Software for Understanding and Analysis, IEEE Computer Society Press, September 2005; 1–6.
  • R. Koschke, J. Quante. On Dynamic Feature Location. International Conference on Automated Software Engineering, ACMPress, 2005; 86–95. Annahmequote unter 10 Prozent.
  • C. Ermel, K. Hölscher, S. Kuske, P. Ziemann. Animated Simulation of Integrated UML Behavioral Models Based on Graph Transformation. Proceedings of the Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2005), Dallas, TX, USA, 21-24 September 2005, IEEE Computer Society, 2005; 125–133.
  • P. Ziemann, K. Hölscher, M. Gogolla. Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations. A. Mota, A. Moura, editors, Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2004), Recife, Brazil, 2005, volume 130 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 263–280.
  • P. Ziemann, K. Hölscher, M. Gogolla. From UML Models to Graph Transformation Systems. M. Minas, editor, Proceedings of the Workshop on Visual Languages and Formal Methods (VLFM 2004), Rome, Italy, 2004, volume 127(4) of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 17–33.
  • K. Sohr, G. Ahn, M. Gogolla, L. Migge. Specification and Validation of Authorisation Constraints Using UML and OCL. Proceedings of the 10th European Conference on Research in Computer Security, Springer-Verlag, 2005; 64–79. Berlin, Heidelberg. DOI
  • A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Symphony: View-Driven Software Architecture Reconstruction. IEEE/IFIP Working Conference on Software Architecture, IEEE Computer Society Press, June 2004; 122–132.
  • B. Cordes, K. Hölscher, H. Kreowski. UML Interaction Diagrams: Correct Translation of Sequence Diagrams into Collaboration Diagrams. J. Pfaltz, M. Nagl, B. Böhlen, editors, Applications of Graph Transformations with Industrial Relevance, Second International Workshop, AGTIVE 2003, Charlottesville, VA, USA, September 27 - October 1, 2003, Revised Selected and Invited Papers, volume 3062 of Lecture Notes in Computer Science, Springer, 2004; 275–291. Berlin, Heidelberg.
  • R. Koschke, D. Simon. Hierarchical Reflexion Models. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2003; 36–45.
  • A. Lakhotia, A. Walenstein, R. Koschke. Second international workshop on detection of software clones. Working Conference on Reverse Engineering, 2003; 368–368.
  • T. Eisenbarth, R. Koschke, D. Simon. Incremental Location of Combined Features for Large-Scale Programs. International Conference on Software Maintenance, IEEE Computer Society Press, October 2002; 273–282.
  • T. Eisenbarth, R. Koschke, G. Vogel. Static Trace Extraction. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2002.
  • T. Eisenbarth, R. Koschke, D. Simon. Aiding Program Comprehension by Static and Dynamic Feature Analysis. International Conference on Software Maintenance, IEEE Computer Society Press, November 2001; 602–611. Best Paper Award von 161 eingereichten Beiträgen.
  • T. Eisenbarth, R. Koschke, D. Simon. Feature-Driven Program Understanding Using Concept Analysis of Execution Traces. International Workshop on Program Comprehension, IEEE Computer Society Press, May 2001; 300-309.
  • T. Eisenbarth, R. Koschke, D. Simon. Derivation of Feature Component Maps by means of Concept Analysis. European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, March 2001; 176–180.
  • M. Fabiunke, J. Filipek, C. Maeder. XMI Based UML Model Composition in KobrA. GI Jahrestagung (2), 2001; 845–849.
  • G. Canfora, J. Czeranski, R. Koschke. Revisiting the Delta IC Approach to Component Recovery. Working Conference on Reverse Engineering, IEEE Computer Society Press, November 2000; 140–149.
  • R. Koschke. Vorlesungen zum Thema Software-Reengineering. 2.~Workshop Software-Reengineering, Universität Koblenz-Landau, May 2000; 3–7. Bad Honnef, Germany. Fachberichte Informatik, Nr. 8/2000.
  • R. Koschke, T. Eisenbarth. A Framework for Experimental Evaluation of Clustering Techniques. International Workshop on Program Comprehension, IEEE Computer Society Press, 2000.
  • T. Eisenbarth, R. Koschke, D. Simon. Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse. Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1), 2000; 63–68.
  • R. Koschke, J. F. Girard, M. Würthner. Intermediate Representations for Reverse Engineering. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1998; 241–250.
  • J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations. International Conference on Automated Software Engineering, IEEE Computer Society Press, 1997.
  • J. F. Girard, R. Koschke. Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding. International Conference on Software Maintenance, IEEE Computer Society Press, 1997.
  • J. F. Girard, R. Koschke, G. Schied. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding. Working Conference on Reverse Engineering, IEEE Computer Society Press, 1997; 66–75.
  • K. Didrich, W. Grieskamp, C. Maeder, P. Pepper. Programming in the Large: The Algebraic-Functional Language Opal 2$\alpha$. C. Clack, K. Hammond, A. Davie, editors, Implementation of Functional Languages, 9th International Workshop, IFL 1997, September 10-12, St. Andrews, Scotland, volume 1467 of Lecture Notes in Computer Science, Springer Verlag, 1997; 322–337.
  • K. Didrich, C. Gerke, W. Grieskamp, C. Maeder, P. Pepper. Towards Integrating Algebraic Specification and Functional Programming: the Opal System (Extended Abstract). M. Wirsing, M. Nivat, editors, Algebraic Methodology and Software Technology, 5th International Conference, AMAST 1996, July 1-5, Munich, Germany, volume 1101 of Lecture Notes in Computer Science, Springer Verlag, 1996; 559–562.

Weitere Veröffentlichungen

  • J. Harder, S. Bazrafshan, R. Tiarks. Wie kommen Entwickler mit Klonen zurecht? Softwaretechnik Trends 2013; 33(2):2 Seiten.
  • K. Schmid, R. Koschke, C. Kröher, D. Lüdemann. Towards Identifying Evolution Smells in Software Product Lines. 5. Workshop Design For Future — Langlebige Softwaresysteme, CEUR Workshop Proceedings, 2013.
  • S. Bazrafshan. Late propagation of Type-3 Clones. Softwaretechnik-Trends 2012; 32(2):2 Seiten.
  • J. Harder. Code Clone Authorship—A First Look. Softwaretechnik Trends 2012; 32(2):25–26.
  • R. Tiarks. What Programmers Really Do: An Observational Study. Softwaretechnik Trends May 2011; 31(2).
  • B. Berger, M. Bunke. Software Security Comprehension. Softwaretechnik Trends may 2011; 31(2):30–31.
  • J. Harder, N. Göde, M. Rausch. Stability of COBOL Clones. Softwaretechnik Trends 2011; 31(2):24–25.
  • N. Göde. Not All That Glitters Is Gold. Softwaretechnik Trends 2011; 31(2):22–23.
  • N. Göde, M. Rausch. Clone Evolution Revisited. Softwaretechnik Trends May 2010; 30(2):60–61. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).
  • T. Mende, R. Koschke. Evaluation von Modellen zur Fehlervorhersage: Probleme und Lösungsmöglichkeiten. Softwaretechnik Trends May 2010; 30(2):74–75. Beiträge des 12. Workshops 'Software Reengineering' (WSR 2010).
  • N. Göde. Mapping Code Clones Using Incremental Clone Detection. Softwaretechnik Trends 2009; 29(2):28–29.
  • J. Harder. Rückgewinnung von Syntax und Semantik zur Analyse von Visual Basic 6 Programmen. Softwaretechnik Trends May 2007; 27(2). Beiträge des 9. Workshops 'Software Reengineering' (WSR 2007).
  • R. Koschke. Konsolidierung von Software-Varianten in Software-Produktlinien. Softwaretechnik Trends May 2006; 26(2). Beiträge des 8. Workshops 'Software Reengineering' (WSR 2006).
  • R. Koschke, Y. Zhang. Component Recovery, Protocol Recovery and Validation in Bauhaus. J. Ebert, B. Kullbach, F. Lehner, editors, Workshop on Software Reengineering, volume 1/2002 of Fachberichte Informatik, May 2001; 73-76. Institut für Informatik, Rheinau 1, D-56075 Koblenz, University of Koblenz-Landau.
  • J. Czeranski, T. Eisenbarth, H. Kienle, R. Koschke, D. Simon. Wiedergewinnung von Architekturinformationen: Ausblicke. Workshop on Software Reengineering, number Nr. 8/2000 in Fachberichte Informatik, May 1999. Universit\"at Koblenz-Landau.
BibTeX Logo

BibTeX Download

Laden sie alle Veröffentlichungen der Arbeitsgruppe Softwaretechnik als BibTeX-Datei herunter.