Reverse engineering is a difficult task even for humans. When trying to provide tools to assist in this task, one should try to take advantage of all possible sources of information. Informal sources, like naming conventions, are more abstract than the code, thus helping to bridge the gap between code and design. On the other hand, there is no certainty that they actually represent the current state of the system. Some researchers have used these informal sources of information, relying on an assumption that if types (or variables, or functions) have the same name then they represent the same thing. However none of these researchers have actually tried to establish to what extent this assumption is valid. This paper provides a framework to...
Developers spend most of their time comprehending source code, with some studies estimating this act...
Readers of programs have two main sources of domain information: identifier names and comments. When...
The understandability of source programs and other types of software documents is important for seve...
Various studies indicate that having concise and consistent identifiers improves the quality of the ...
and other research outputs Relating identifier naming flaws and code quality: An empirical stud
Computer software is, by its very nature highly complex and invisible yet subject to a near-continua...
Studies have demonstrated the importance of good identifier names to program comprehension. It is un...
The identifiers chosen by the programmers as entity names contain valuable information. They are oft...
A considerable part of the source code is identifier names-- unique lexical tokens that provide info...
Information on the identity of functions is typically removed when translating source code to execut...
Programmer-provided identifier names convey information about the semantics of a program. This infor...
Given the importance of identifier names and the value of naming conventions to program comprehensio...
Several techniques have been suggested for supporting reverse engineering and design recovery activi...
We developed a reverse engineering technique, named Variant Analysis, aimed for recovering and visua...
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer pr...
Developers spend most of their time comprehending source code, with some studies estimating this act...
Readers of programs have two main sources of domain information: identifier names and comments. When...
The understandability of source programs and other types of software documents is important for seve...
Various studies indicate that having concise and consistent identifiers improves the quality of the ...
and other research outputs Relating identifier naming flaws and code quality: An empirical stud
Computer software is, by its very nature highly complex and invisible yet subject to a near-continua...
Studies have demonstrated the importance of good identifier names to program comprehension. It is un...
The identifiers chosen by the programmers as entity names contain valuable information. They are oft...
A considerable part of the source code is identifier names-- unique lexical tokens that provide info...
Information on the identity of functions is typically removed when translating source code to execut...
Programmer-provided identifier names convey information about the semantics of a program. This infor...
Given the importance of identifier names and the value of naming conventions to program comprehensio...
Several techniques have been suggested for supporting reverse engineering and design recovery activi...
We developed a reverse engineering technique, named Variant Analysis, aimed for recovering and visua...
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer pr...
Developers spend most of their time comprehending source code, with some studies estimating this act...
Readers of programs have two main sources of domain information: identifier names and comments. When...
The understandability of source programs and other types of software documents is important for seve...