<?xml version="1.0" encoding="utf-8"?>


    <rss version="2.0"
         xmlns:content="http://purl.org/rss/1.0/modules/content/"
         xmlns:atom="http://www.w3.org/2005/Atom"
         xmlns:media="http://search.yahoo.com/mrss/">
        <channel>
            
                
                    <ttl>60</ttl>
                    <title>University of Bremen - Publications</title>
                    <link>https://www.uni-bremen.de/en/st/publications</link>
                    <description>[Translate to English:] Publikationsliste der Arbeitsgruppe Softwaretechnik</description>
                    <language>en</language>
                    <copyright>University of Bremen</copyright>
                    <pubDate>Sun, 19 Apr 2026 00:37:53 +0200</pubDate>
                    <lastBuildDate>Sun, 19 Apr 2026 00:37:53 +0200</lastBuildDate>
                    <atom:link href="https://www.uni-bremen.de/en/st/publications/rss.xml" rel="self" type="application/rss+xml"/>
                    <generator>University of Bremen</generator>
                
                
                    
                        <item>
                            <guid isPermaLink="false">content-299308</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>Books</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299308</link>
                            
                            <description>&amp;lt;ul&amp;gt; 	&amp;lt;li&amp;gt;D. Lüdemann. Kontrollfussanalyse und formale Begriffsanalyse von C-Code aus Software-Produktlinien mit Variabilitätsmanagement durch den Präprozessor. PhD Dissertation, University of Bremen, Germany, 2018.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder. Software Clones – Guilty Until Proven Innocent? PhD Dissertation, University of Bremen, Germany, 2018.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan. Empirical Research towards a Relevance Assessment of Software Clones. PhD Dissertation, University of Bremen, Germany, 2017.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;P. Frenzel. Erweiterung der Reflexionsmethode zur Zusammenfassung von Produktarchitekturen zu einer Produktlinienarchitektur. Dissertation, Universität Bremen, AG Softwaretechnik, Fachbereich Mathematik und Informatik, January 2014.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Falke. Erkennung von Falsch-Positiven Softwareklonen mittels Lernverfahren. PhD Dissertation, University of Bremen, Germany, 2014.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, Y. Higo, N. Göde, editors. Proceedings of the International Workshop on Software Clones, volume 63, 2014. Electronic Communications of the EASST.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, E. Jürgens, J. Rilling, editors. Proceedings of the International Workshop on Software Clones, 2013. ACM Press.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Inoue, J. Cordy, R. Koschke, J. Krinke, C. Roy, editors. Proceedings of the International Workshop on Software Clones, 2012. ACM Press.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071), volume 2, Dagstuhl, Germany, 2012. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.4230/DagRep.2.2.21&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Inoue, J. Cordy, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2011. ACM Press.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende. On the Evaluation of Defect Prediction Models. PhD Dissertation, University of Bremen, Germany, 2011.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde. Clone Evolution. PhD dissertation, University of Bremen, Bremen, Germany, 2011.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2010. ACM Press.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante. Dynamic Object Process Graphs. PhD dissertation, University of Bremen, Bremen, Germany, 2009.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Inoue, J. Cordy, S. Jarzabek, R. Koschke, editors. Proceedings of the International Workshop on Software Clones, 2009. ACM Press.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher. Autonomous units as a rule based concept for the modeling of autonomous and cooperating processes. PhD Dissertation, University of Bremen, Germany, 2008.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, O. Herzog, K. Rödiger, M. Ronthaler, editors. INFORMATIK 2007 — Informatik trifft Logistik: Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V., volume P-109 (Band 1) und P-110 (Band 2) of Lecture Notes in Informatics (LNI), Bonn, September 2007.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, E. Merlo, A. Walenstein, editors. Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Dagstuhl.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Maeder. Zur Kontextanalyse einer algebraischen Programmiersprache. TU Berlin, June 2001.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Atomic Architectural Component Recovery for Program Understanding and Evolution. Institute of Software Technology, University of Stuttgart, Germany, 1999.&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
                    
                        <item>
                            <guid isPermaLink="false">content-299309</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>Book chapter</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299309</link>
                            
                            <description>&amp;lt;ul&amp;gt; 	&amp;lt;li&amp;gt;W. Said, J. Quante, R. Koschke. Interactive Measures for Mining Understandable State Machines from Embedded Software: Experiments and Case Studies, Selected papers from MODELSWARD 2018., 24 pages. Springer, 2018. Extended MODELSWARD 2018 paper; accepted for publication..&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. &amp;lt;em&amp;gt;Software Engineering: International Summer Schools&amp;lt;/em&amp;gt;, Architecture Reconstruction, 140–173. Springer Verlag, 2009. edited by Andrea De Lucia and Filomena Ferrucci.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. &amp;lt;em&amp;gt;Software Evolution&amp;lt;/em&amp;gt;, Identifying and Removing Software Clones, 15–39. Springer Verlag, 2008. Editors: Serge Demeyer and Tom Mens.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, E. Plödereder. F. Lehner, editor. Ansätze des Programmverstehens, 159–176. Deutscher Universitätsverlag/Gabler Vieweg Westdeutscher Verlag, 1996.&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
                    
                        <item>
                            <guid isPermaLink="false">content-299310</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>Magazine articles</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299310</link>
                            
                            <description>&amp;lt;ul&amp;gt; 	&amp;lt;li&amp;gt;T. Mustafa, K. Sohr. Understanding the Implemented Access Control Policy of Android System Services with Slicing and Extended Static Checking.&amp;lt;em&amp;gt; Int. J. Inf. Secur.&amp;lt;/em&amp;gt; August 2015; 14(4):347–366. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1007/s10207-014-0260-y&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;W. Maalej, R. Tiarks, T. Roehm, R. Koschke. On the Comprehension of Program Comprehension.&amp;lt;em&amp;gt; ACM Transactions on Software Engineering and Methodology&amp;lt;/em&amp;gt; September 2014; 23(4):31:1–31:37. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/2622669&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Large-scale inter-system clone detection using suffix trees and hashing.&amp;lt;em&amp;gt; Journal of Software: Evolution and Process&amp;lt;/em&amp;gt; August 2014; 26(8):747–769. &amp;lt;a href=&amp;quot;http://dx.doi.org/DOI: 10.1002/smr.1592&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;O. Riemann, R. Koschke. Robust Parsing of Cloned Token Sequences.&amp;lt;em&amp;gt; Electronic Communications of the EASST&amp;lt;/em&amp;gt; 2014; 63:20 pages. Proceedings of the International Workshop on Software Clones 2014.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, N. Göde. Cloned code: stable code.&amp;lt;em&amp;gt; Journal of Software: Evolution and Process&amp;lt;/em&amp;gt; October 2013; 25(10):1063–1088. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1002/smr.1551&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, R. Koschke. Studying clone evolution using incremental clone detection.&amp;lt;em&amp;gt; Journal of Software: Evolution and Process&amp;lt;/em&amp;gt; February 2013; 25(2):165–192. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1002/smr.520&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Incremental Reflexion Analysis.&amp;lt;em&amp;gt; Journal of Software: Evolution and Process&amp;lt;/em&amp;gt; 2013; 25(6):601–638. Special Issue of CSMR&amp;#039;2010.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, M. Kuhlmann, M. Gogolla, H. Hu, G. Ahn. Comprehensive Two-level Analysis of Role-based Delegation and Revocation Policies with UML and OCL.&amp;lt;em&amp;gt; Inf. Softw. Technol.&amp;lt;/em&amp;gt; December 2012; 54(12):1396–1417. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1016/j.infsof.2012.06.008&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements.&amp;lt;em&amp;gt; International Journal On Advances in Security&amp;lt;/em&amp;gt; July 2012; 5(1&amp;amp;amp;2):46–67.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Santiago, C. Maeder. Linguistic Variables of Type-N - a Mathematical Model.&amp;lt;em&amp;gt; Tendencias em Matematica Aplicada e Computacional (TEMA)&amp;lt;/em&amp;gt; April 2011; 12(1):21–30.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Tiarks, R. Koschke, R. Falke. An extended assessment of type-3 clones as detected by state-of-the-art tools.&amp;lt;em&amp;gt; Software Quality Journal&amp;lt;/em&amp;gt; 2011; 19(2):295–331.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, P. Frenzel, A. Breu, K. Angstmann. Extending the reflexion method for consolidating software variants into product lines.&amp;lt;em&amp;gt; Software Quality Journal&amp;lt;/em&amp;gt; December 2009; 17(4):331–366.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke, F. Beckwermert. An Evaluation of Code Similarity Identification for the Grow-and-Prune Model.&amp;lt;em&amp;gt; Journal on Software Maintenance and Evolution&amp;lt;/em&amp;gt; March–April 2009; 21(2):143 – 169.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, H. Kreowski, S. Kuske. Autonomous Units to Model Interacting Sequential and Parallel Processes.&amp;lt;em&amp;gt; Fundamenta Informaticae&amp;lt;/em&amp;gt; 2009; 92:233–257.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Roy, J. Cordy, R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach.&amp;lt;em&amp;gt; Journal of Science of Computer Programming&amp;lt;/em&amp;gt; 2009; 74(7):470-495. Special Issue on Program Comprehension (ICPC 2008), unter den fünf am häufigsten zitierten Artikeln von Science of Computer Programming seit 2007. &amp;lt;a href=&amp;quot;http://dx.doi.org/doi:10.1016/j.scico.2009.02.007&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Cornelissen, A. Zaidman, A. Deursen, L. Moonen, R. Koschke. A Systematic Survey of Program Comprehension through Dynamic Analysis.&amp;lt;em&amp;gt; IEEE Computer Society Transactions on Software Engineering&amp;lt;/em&amp;gt; 2009; 35(5):684–702.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, M. Drouineaud, G. Ahn, M. Gogolla. Analyzing and Managing Role-Based Access Control Policies.&amp;lt;em&amp;gt; IEEE Trans. on Knowl. and Data Eng.&amp;lt;/em&amp;gt; July 2008; 20(7):924–939. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/TKDE.2008.28&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Buckley, A. LeGear, C. Exton, R. Cadogan, T. Johnston, B. Looby, R. Koschke. Encapsulating targeted component abstractions using software Reflexion Modelling.&amp;lt;em&amp;gt; Journal on Software Maintenance and Evolution&amp;lt;/em&amp;gt; March–April 2008; 20(2):107–134.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Falke, R. Koschke, P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees.&amp;lt;em&amp;gt; Empirical Software Engineering&amp;lt;/em&amp;gt; 2008; 13(6):601–643. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1007/s10664-008-9073-9&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante, R. Koschke. Dynamic Object Process Graphs.&amp;lt;em&amp;gt; Journal of Systems and Software&amp;lt;/em&amp;gt; 2008; 81:481–501. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1016/j.jss.2007.06.005&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bellon, R. Koschke, G. Antoniol, J. Krinke, E. Merlo. Comparison and Evaluation of Clone Detection Tools.&amp;lt;em&amp;gt; IEEE Computer Society Transactions on Software Engineering&amp;lt;/em&amp;gt; September 2007; 33(9):577–591.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Christl, R. Koschke, M. Storey. Automated Clustering to Support the Reflexion Method.&amp;lt;em&amp;gt; Journal of Systems and Software&amp;lt;/em&amp;gt; 2007; 49(3):255–274. Special Issue on WCRE 2005.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, G. Canfora, J. Czeranski. Revisiting the Delta-IC Approach.&amp;lt;em&amp;gt; Journal of Science of Computer Programming&amp;lt;/em&amp;gt; 2006; 60(2):171–188.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, P. Ziemann, M. Gogolla. On Translating UML Models into Graph Transformation Systems.&amp;lt;em&amp;gt; Journal of Visual Languages and Computing&amp;lt;/em&amp;gt; 2006; 17(1):78–105.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, G. Vogel. Static Object Trace Extraction for Programs with Pointers.&amp;lt;em&amp;gt; Journal of Systems and Software&amp;lt;/em&amp;gt; September 2005; 77(3):263–284.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, G. Ahn, L. Migge. Articulating and Enforcing Authorisation Policies with UML and OCL.&amp;lt;em&amp;gt; SIGSOFT Softw. Eng. Notes&amp;lt;/em&amp;gt; May 2005; 30(4):1–7. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1082983.1083215&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Rekonstruktion von Software-Architekturen: Blickwinkel, Sichten, Ansichten und Aussichten.&amp;lt;em&amp;gt; Informatik – Forschung und Entwicklung, Springer Verlag&amp;lt;/em&amp;gt; April 2005; 19(3). &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1007/s00450-005-0180-1&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Walenstein, A. Lakhotia, R. Koschke. Second International Workshop on Detection of Software Clones: workshop report.&amp;lt;em&amp;gt; ACM SIGSOFT Software Engineering Notes&amp;lt;/em&amp;gt; March 2004; 29(2):1–5.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Viewpoints in Software Architecture Reconstruction.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2004; 24(2).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, D. Simon. Symphony Fallstudie: Hierarchische Reflexion Modelle.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2004; 24(2).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Locating Features in Source Code.&amp;lt;em&amp;gt; IEEE Computer Society Transactions on Software Engineering&amp;lt;/em&amp;gt; March 2003; 29(3):210–224.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Software Visualization in Software Maintenance, Reverse Engineering, and Reengineering: A Research Survey.&amp;lt;em&amp;gt; Journal on Software Maintenance and Evolution&amp;lt;/em&amp;gt; March 2003; 15:87–109.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. F. Girard, R. Koschke. A Comparison of Abstract Data Type and Objects Recovery Techniques.&amp;lt;em&amp;gt; Journal Science of Computer Programming, Elsevier Science&amp;lt;/em&amp;gt; March 2000; 6(2–3):149-181.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations.&amp;lt;em&amp;gt; Journal on Automated Software Engineering, Kluwer Academic Publishers&amp;lt;/em&amp;gt; 1999; 6(4).&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
                    
                        <item>
                            <guid isPermaLink="false">content-299311</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>Conference- and workshoparticles</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299311</link>
                            
                            <description>&amp;lt;ul&amp;gt; 	&amp;lt;li&amp;gt;W. Said, J. Quante, R. Koschke. On State Machine Mining from Embedded Control Software.&amp;lt;em&amp;gt; International Conference on Software Maintenance and Evolution&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;W. Said, J. Quante, R. Koschke. Reflexion Models for State Machine Extraction and Verification.&amp;lt;em&amp;gt; International Conference on Software Maintenance and Evolution&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, U. Schmidt, B. Berger. Built-in Clone Detection in Meta Languages.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2018; 6 pages. Accepted for publication.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. O. Rüdel, J. Ganser, R. Koschke. Spatial Orientation in VR-based Software Cities.&amp;lt;em&amp;gt; IEEE Working Conference on Software Visualization&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2018; 11 pages. Accepted for publication.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Industrial Experience on Code Clean-Up Using Architectural Conformance Checking.&amp;lt;em&amp;gt; Workshop on Software Architecture Erosion and Architectural Consistency&amp;lt;/em&amp;gt;, ACM Press, September 2018; 7 pages. Accepted for publication.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;V. Käfer, S. Wagner, R. Koschke. Are There Functionally Similar Code Clones in Practice?&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, IEEE Computer Society Press, March 2018; 2–8.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, M. Weinig. Generated Code in Studies on Clone Rates.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, IEEE Computer Society Press, March 2018; 16–22.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;W. Said, J. Quante, R. Koschke. Towards Interactive Mining of Understandable State Machine Models from Embedded Software.&amp;lt;em&amp;gt; Proceedings of the International Conference on Model-Driven Engineering and Software Development&amp;lt;/em&amp;gt;, SciTePress, January 2018; 117–128. INSTICC. Best Student Paper Award. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.5220/0006593501170128&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, J. Harder, S. Bazrafshan. Erosion von Software: Was kann uns die Wissenschaft heute dazu sagen?&amp;lt;em&amp;gt; Proceedings of the Embedded Software Engineering&amp;lt;/em&amp;gt;, 2018. number of pages: 14.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors,&amp;lt;em&amp;gt; International Symposium on Engineering Secure Software and Systems&amp;lt;/em&amp;gt;, Springer Verlag, April 2016; 56–71.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, S. Bazrafshan. Software-Clone Rates in Open-Source Programs Written in C or C++.&amp;lt;em&amp;gt; International Workshop on Software Clones; published in Proceedings of Software Analysis, Evolution, and Reengineering (SANER)&amp;lt;/em&amp;gt;, volume 3, IEEE Computer Society Press, March 2016; 1–7.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;D. Lüdemann, R. Koschke. From Preprocessor-Constrained Parse Graphs to Preprocessor-Constrained Control Flow.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2015; 211–220.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;H. Basit, M. Hammad, R. Koschke. A Survey on Goal-Oriented Visualization of Clone Data.&amp;lt;em&amp;gt; IEEE Working Conference on Software Visualization&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2015; 46–55.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;L. Hamann, K. Sohr, M. Gogolla. Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. F. Piessens, J. Caballero, N. Bielova, editors,&amp;lt;em&amp;gt; Proceedings of the 7th International Symposium on Engineering Secure Software and Systems&amp;lt;/em&amp;gt;, Springer International Publishing, 2015; 211–226. Cham. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1007/978-3-319-15618-7_16&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Bunke. On the Description of Software Security Patterns.&amp;lt;em&amp;gt; Proceedings of the 19th European Conference on Pattern Languages of Programs&amp;lt;/em&amp;gt;, ACM, 2014; 34:1–34:10. New York, NY, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/2721956.2721990&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan, R. Koschke. Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2014; 1–10.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Roy, M. Zibran, R. Koschke. The Vision of Software Clone Management: Past, Present and the Future.&amp;lt;em&amp;gt; IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2014; 18–33. Invited Keynote Paper.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bartsch, B. Berger, E. Bodden, A. Brucker, J. Heider, M. Kus, S. Maseberg, K. Sohr, M. Volkamer. Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. V. Stefan, E. Weippl, editors,&amp;lt;em&amp;gt; Sicherheit 2014 Sicherheit, Schutz und Zuverlässigkeit&amp;lt;/em&amp;gt;, volume 228 of LNI, GI, 2014; 283–291.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bartsch, B. Berger, M. Bunke, K. Sohr. The Transitivity-of-Trust Problem in Android Application Interaction.&amp;lt;em&amp;gt; Eighth International Conference on Availability, Reliability and Security (ARES), 2013&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2013; 291–296.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan, R. Koschke. An Empirical Study of Clone Removals.&amp;lt;em&amp;gt; International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2013; 50-59.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;D. Chatterji, J. Carver, N. Kraft, J. Harder. Effects of Cloned Code on Software Maintainability: A Replicated Developer Study.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, 2013; 112–121.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder. How Multiple Developers Affect Clone Evolution.&amp;lt;em&amp;gt; International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society, 2013; 30-39.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan. No Clones, No Trouble?&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, IEEE Computer Society, 2013; 37–38. Position Paper.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder. The Limits of Clone Model Standardization.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, IEEE Computer Society, 2013; 10–11. Position Paper.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors,&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2013; 285–294. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/CSMR.2013.37&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Codescu, T. Mossakowski, C. Maeder. Checking conservativity with Hets. R. Heckel, S. Milius, editors,&amp;lt;em&amp;gt; Algebra and Coalgebra in Computer Science, 5th International Conference, CALCO 2013, September 3-6, Warsaw, Poland&amp;lt;/em&amp;gt;, volume 8089 of Lecture Notes in Computer Science, Springer Verlag, 2013; 315–321.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Rubio-Medrano, G. Ahn, K. Sohr. Verifying Access Control Properties with Design by Contract: Framework and Lessons Learned.&amp;lt;em&amp;gt; Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference&amp;lt;/em&amp;gt;, IEEE Computer Society, 2013; 21–26. Washington, DC, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/COMPSAC.2013.7&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, I. Baxter, M. Conradt, J. Cordy. Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). R. Koschke, I. Baxter, M. Conradt, J. Cordy, editors,&amp;lt;em&amp;gt; Dagstuhl Reports&amp;lt;/em&amp;gt;, volume 2, Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2012; 21–57. Dagstuhl, Germany. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.4230/DagRep.2.2.21&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan. Evolution of Near-Miss Clones.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2012; 74–83.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Hemel, R. Koschke. Reverse Engineering Variability in Source Code Using Clone Detection – A Case Study for Linux Variants of Consumer Electronic Devices.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2012; 357–366.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, K. Sohr. An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. D. Gritzalis, S. Furnell, M. Theoharidou, editors,&amp;lt;em&amp;gt; Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings&amp;lt;/em&amp;gt;, volume 376 of IFIP Advances in Information and Communication Technology, Springer Verlag, 2012; 25–36.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Katzmarski, R. Koschke. Program complexity metrics and programmer opinions.&amp;lt;em&amp;gt; International Conference on Program Comprehension&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2012; 17–26.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, R. Tiarks. A Controlled Experiment on Software Clones.&amp;lt;em&amp;gt; International Conference on Program Comprehension&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2012; 219–228. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/ICPC.2012.6240491&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Kapser, J. Harder, I. Baxter. A Common Conceptual Model for Clone Detection Results.&amp;lt;em&amp;gt; 6th International Workshop on Software Clones&amp;lt;/em&amp;gt;, IEEE Computer Society, 2012. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/IWSC.2012.6227870&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Large-Scale Inter-System Clone Detection Using Suffix Trees.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2012; 309–318.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Roehm, R. Tiarks, R. Koschke, W. Maalej. How Do Professional Developers Comprehend Software?&amp;lt;em&amp;gt; International Conference on Software Engineering&amp;lt;/em&amp;gt;, ACM Press, 2012; 255–265. Distinguished Paper Award.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Autexier, D. Dietrich, D. Hutter, C. Lüth, C. Maeder. SmartTies - Management of Safety-Critical Developments. T. Margaria, B. Steffen, editors,&amp;lt;em&amp;gt; Leveraging Applications of Formal Methods, Verification and Validation. 5th International Symposium, ISoLA 2012, October 15-18, Heraclion, Greece&amp;lt;/em&amp;gt;, volume 7609 of Lecture Notes in Computer Science, Springer Verlag, 2012; 238–252.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, R. Koschke. Frequency and Risks of Changes to Clones.&amp;lt;em&amp;gt; International Conference on Software Engineering&amp;lt;/em&amp;gt;, ACM Press, 2011; 311–320.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Codescu, T. Mossakowski, A. \&amp;#039;Riesco, C. Maeder. Integrating Maude into Hets. M. Johnson, D. Pavlovic, editors,&amp;lt;em&amp;gt; Algebraic Methodology and Software Technologyy. 13th International Conference, AMAST 2010, June 23-25, Lac-Beauport, Canada&amp;lt;/em&amp;gt;, volume 6486 of Lecture Notes in Computer Science, Springer Verlag, 2011; 60–75.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Scholz, R. Koschke. Object-Based Dynamic Protocol Recovery for Multi-Threading Programs.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2011; 251–260.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan, R. Koschke, N. Göde. Approximate Code Search in Program Histories.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2011; 109–118.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, M. Bunke, K. Sohr. An Android Security Case Study with Bauhaus.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2011; 179–183.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns.&amp;lt;em&amp;gt; International Conferences on Pervasive Patterns and Applications (PATTERNS)&amp;lt;/em&amp;gt;, XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Bunke, K. Sohr. An Architecture-Centric Approach to Detecting Security Patterns in Software.&amp;lt;em&amp;gt; International Symposium on Engineering Secure Software and Systems&amp;lt;/em&amp;gt;, volume 6542 of Lecture Notes in Computer Science, Springer Verlag, 2011; 156–166.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, N. Göde. Efficiently Handling Clone Data: RCF and Cyclone.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, ACM, 2011; 81–82. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1985404.1985427&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke, J. Peleska. On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2011; 259–268.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, J. Harder. Clone Stability.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2011; 64–74. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/CSMR.2011.11&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, J. Harder. Oops!... I Changed It Again.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, ACM, 2011; 14–20. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1985404.1985408&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Kuhlmann, K. Sohr, M. Gogolla. Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL.&amp;lt;em&amp;gt; Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement&amp;lt;/em&amp;gt;, IEEE Computer Society, 2011; 108–117. Washington, DC, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/SSIRI.2011.18&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, T. Mustafa, A. Nowak. Software Security Aspects of Java-based Mobile Phones.&amp;lt;em&amp;gt; Proceedings of the 2011 ACM Symposium on Applied Computing&amp;lt;/em&amp;gt;, ACM, 2011; 1494–1501. New York, NY, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1982185.1982506&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, B. Berger. Idea: Towards Architecture-Centric Security Analysis of Software. F. Massacci, D. Wallach, N. Zannone, editors,&amp;lt;em&amp;gt; International Symposium on Engineering Secure Software and Systems&amp;lt;/em&amp;gt;, volume 5965 of Lecture Notes in Computer Science, Springer Verlag, 2010; 70–78.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende. Replication of Defect Prediction Studies: Problems, Pitfalls and Recommendations.&amp;lt;em&amp;gt; Proceedings of the International Conference on Predictive Models in Software Engineering&amp;lt;/em&amp;gt;, ACM Press, 2010; 1–10. &amp;lt;a href=&amp;quot;http://doi.acm.org/10.1145/1868328.1868336&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, N. Göde. Quo Vadis, Clone Management?&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, ACM, 2010; 85–86. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1808901.1808917&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;E. Juergens, N. Göde. Achieving Accurate Clone Detection Results.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, ACM, 2010; 1–8.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde. Clone Removal: Fact or Fiction?&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, ACM Press, 2010; 33–40.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Incremental Reflexion Analysis.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2010; 1–10.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke. Effort-Aware Defect Prediction Models.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2010; 109–118.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Codescu, B. Langenstein, C. Maeder, T. Mossakowski. The VSE Refinement Method in Hets. K. Breitman, A. Cavalcanti, editors,&amp;lt;em&amp;gt; Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, ICFEM 2009, December 9-12, Rio de Janeiro, Brazil&amp;lt;/em&amp;gt;, volume 5885 of Lecture Notes in Computer Science, Springer Verlag, 2009; 660–678.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, R. Tiarks. Haben wir Programmverstehen schon ganz verstanden?&amp;lt;em&amp;gt; Workshop des GI-Arbeitskreises Langlebige Softwaresysteme (L2S2), CEUR Workshop Proceedings&amp;lt;/em&amp;gt;, 2009; 15–26.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde. Evolution of Type-1 Clones.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2009; 77–86.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Tiarks, R. Koschke, R. Falke. An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools.&amp;lt;em&amp;gt; Conference on Source Code Analysis and Manipulation&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2009; 67-76.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke. Revisiting the Evaluation of Defect Prediction Models.&amp;lt;em&amp;gt; PROMISE &amp;#039;09: Proceedings of the 5th International Conference on Predictor Models in Software Engineering&amp;lt;/em&amp;gt;, ACM, 2009; 1–10. New York, NY, USA. &amp;lt;a href=&amp;quot;http://doi.acm.org/10.1145/1540438.1540448&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, N. Göde. Modeling Clone Evolution.&amp;lt;em&amp;gt; International Workshop on Software Clones&amp;lt;/em&amp;gt;, 2009; 17–21.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, S. Jarzabek, J. Inoue. Third International Workshop on Software Clones (IWSC).&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2009; 269–270.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke, M. Leszak. Evaluating Defect Prediction Models for a Large Evolving Software System.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2009; 247–250.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, R. Koschke. Incremental Clone Detection.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2009; 219–228. Best Paper Award von 70 eingereichten Beiträgen.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante. Do Dynamic Object Process Graphs Support Program Understanding? - A Controlled Experiment.&amp;lt;em&amp;gt; International Conference on Program Comprehension&amp;lt;/em&amp;gt;, ACM Press, 2008; 73–82.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung.&amp;lt;em&amp;gt; Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik&amp;lt;/em&amp;gt;, GI Lecture Notes for Informatics, 2008.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Frontiers in Software Clone Management.&amp;lt;em&amp;gt; Frontiers in Software Maintenance, Proceedings of the International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2008; 119–128.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Zehn Jahre WSR, zwölf Jahre Bauhaus. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors,&amp;lt;em&amp;gt; Workshop Software Reengineering&amp;lt;/em&amp;gt;, GI Lecture Notes for Informatics, 2008; 51–66.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, R. Koschke. Empirische Grundlagen für das Klonmanagement. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors,&amp;lt;em&amp;gt; Workshop Software Reengineering&amp;lt;/em&amp;gt;, GI Lecture Notes for Informatics, 2008; 127–133.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, F. Beckwermert. Clone Detection in a Product Line Context. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors,&amp;lt;em&amp;gt; Workshop Software Reengineering&amp;lt;/em&amp;gt;, GI Lecture Notes for Informatics, 2008; 176–180.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante. Using Library Dependencies for Clustering. R. Gimnich, U. Kaiser, J. Quante, A. Winter, editors,&amp;lt;em&amp;gt; Workshop Software Reengineering&amp;lt;/em&amp;gt;, GI Lecture Notes for Informatics, 2008; 171–175.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, F. Beckwermert, R. Koschke, G. Meier. Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2008; 163–172.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, R. Klempien-Hinrichs, P. Knirsch. Undecidable Control Conditions in Graph Transformation Units. A. Moreira, L. Ribeiro, editors,&amp;lt;em&amp;gt; Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2006), Natal, Brazil, 2006&amp;lt;/em&amp;gt;, volume 195 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2008; 95–111.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, P. Knirsch, M. Luderer. Autonomous Units for Communication-based Dynamic Scheduling. H. -. Haasis, H. -. Kreowski, B. Scholz-Reiter, editors,&amp;lt;em&amp;gt; Dynamics in Logistics, Proceedings of the 1st Intl.\ Conference LDIC 2007&amp;lt;/em&amp;gt;, Springer, 2008; 331–339. Berlin, Heidelberg.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, T. Mustafa, X. Bao, G. Ahn. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL.&amp;lt;em&amp;gt; Proceedings of the 2008 Annual Computer Security Applications Conference&amp;lt;/em&amp;gt;, IEEE Computer Society, 2008; 257–266. Washington, DC, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/ACSAC.2008.35&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante, R. Koschke. Dynamic Protocol Recovery.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, October 2007; 219–228.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;P. Frenzel, R. Koschke, A. Breu, K. Angstmann. Extending the Reflection Method for Consolidating Software Variants into Product Lines.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, October 2007; 160–169. Best Paper Award von 87 eingereichten Beiträgen.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mossakowski, C. Maeder, K. Lüttich. Hets: The Heterogeneous Tool Set. O. Grumberg, M. Huth, editors,&amp;lt;em&amp;gt; Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, March 24 - April 1, Braga, Portugal&amp;lt;/em&amp;gt;, volume 4424 of Lecture Notes in Computer Science, Springer Verlag, 2007; 519–522.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Survey of Research on Software Clones. R. Koschke, E. Merlo, A. Walenstein, editors,&amp;lt;em&amp;gt; Duplication, Redundancy, and Similarity in Software&amp;lt;/em&amp;gt;, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, 2007. Dagstuhl, Germany.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante. Online Construction of Dynamic Object Process Graphs.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2007; 113–122.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, R. Falke, P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2006; 253–262. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1109/WCRE.2006.18&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Quante, R. Koschke. Dynamic Object Process Graphs.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2006; 81–90. Best Paper Award von 65 eingereichten Beiträgen.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;H. Kreowski, K. Hölscher, P. Knirsch. Semantics of Visual Models in a Rule-based Setting. R. Heckel, editor,&amp;lt;em&amp;gt; Proceedings of the School of SegraVis Research Training Network on Foundations of Visual Modelling Techniques (FoVMT 2004), Dagstuhl, Germany, 2004&amp;lt;/em&amp;gt;, volume 148 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2006; 75–88.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, H. Kreowski, S. Kuske. Autonomous Units and their Semantics — the Sequential Case. A. Corradini, H. Ehrig, U. Montanari, L. Ribeiro, G. Rozenberg, editors,&amp;lt;em&amp;gt; Graph Transformations, Proceedings of the 3rd Intl.\ Conference on Graph Transformations (ICGT 2006)&amp;lt;/em&amp;gt;, volume 4178 of Lecture Notes in Computer Science, Springer, 2006; 245–259. Berlin, Heidelberg.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Hölscher, P. Knirsch, H. Kreowski. Modelling Transport Networks by Means of Autonomous Units. H. -. Haasis, H. Kopfer, J. Schönberger, editors,&amp;lt;em&amp;gt; Operations Research Proceedings 2005&amp;lt;/em&amp;gt;, Springer, 2006; 399–404. Berlin, Heidelberg.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Schaad, V. Lotz, K. Sohr. A Model-checking Approach to Analysing Organisational Controls in a Loan Origination Process.&amp;lt;em&amp;gt; Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies&amp;lt;/em&amp;gt;, ACM, 2006; 139–149. New York, NY, USA. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1145/1133058.1133079&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. What architects should know about reverse engineering and reengineering.&amp;lt;em&amp;gt; IEEE/IFIP Working Conference on Software Architecture&amp;lt;/em&amp;gt;, IEEE Computer Society Press, November 2005; 4–10. Invited Paper.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Christl, R. Koschke, M. Storey. Equipping the Reflexion Method with Automated Clustering.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, November 2005; 89–98.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Falke, R. Klein, R. Koschke, J. Quante. The Dominance Tree in Visualizing Software Dependencies.&amp;lt;em&amp;gt; Workshop on Visualizing Software for Understanding and Analysis&amp;lt;/em&amp;gt;, IEEE Computer Society Press, September 2005; 1–6.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, J. Quante. On Dynamic Feature Location.&amp;lt;em&amp;gt; International Conference on Automated Software Engineering&amp;lt;/em&amp;gt;, ACMPress, 2005; 86–95. Annahmequote unter 10 Prozent.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;C. Ermel, K. Hölscher, S. Kuske, P. Ziemann. Animated Simulation of Integrated UML Behavioral Models Based on Graph Transformation.&amp;lt;em&amp;gt; Proceedings of the Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2005), Dallas, TX, USA, 21-24 September 2005&amp;lt;/em&amp;gt;, IEEE Computer Society, 2005; 125–133.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;P. Ziemann, K. Hölscher, M. Gogolla. Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations. A. Mota, A. Moura, editors,&amp;lt;em&amp;gt; Proceedings of the Brazilian Symposium on Formal Methods (SBMF 2004), Recife, Brazil, 2005&amp;lt;/em&amp;gt;, volume 130 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 263–280.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;P. Ziemann, K. Hölscher, M. Gogolla. From UML Models to Graph Transformation Systems. M. Minas, editor,&amp;lt;em&amp;gt; Proceedings of the Workshop on Visual Languages and Formal Methods (VLFM 2004), Rome, Italy, 2004&amp;lt;/em&amp;gt;, volume 127(4) of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2005; 17–33.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Sohr, G. Ahn, M. Gogolla, L. Migge. Specification and Validation of Authorisation Constraints Using UML and OCL.&amp;lt;em&amp;gt; Proceedings of the 10th European Conference on Research in Computer Security&amp;lt;/em&amp;gt;, Springer-Verlag, 2005; 64–79. Berlin, Heidelberg. &amp;lt;a href=&amp;quot;http://dx.doi.org/10.1007/11555827_5&amp;quot;&amp;gt;DOI&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Deursen, C. Hofmeister, R. Koschke, L. Moonen, C. Riva. Symphony: View-Driven Software Architecture Reconstruction.&amp;lt;em&amp;gt; IEEE/IFIP Working Conference on Software Architecture&amp;lt;/em&amp;gt;, IEEE Computer Society Press, June 2004; 122–132.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Cordes, K. Hölscher, H. Kreowski. UML Interaction Diagrams: Correct Translation of Sequence Diagrams into Collaboration Diagrams. J. Pfaltz, M. Nagl, B. Böhlen, editors,&amp;lt;em&amp;gt; Applications of Graph Transformations with Industrial Relevance, Second International Workshop, AGTIVE 2003, Charlottesville, VA, USA, September 27 - October 1, 2003, Revised Selected and Invited Papers&amp;lt;/em&amp;gt;, volume 3062 of Lecture Notes in Computer Science, Springer, 2004; 275–291. Berlin, Heidelberg.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, D. Simon. Hierarchical Reflexion Models.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, November 2003; 36–45.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;A. Lakhotia, A. Walenstein, R. Koschke. Second international workshop on detection of software clones.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, 2003; 368–368.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Incremental Location of Combined Features for Large-Scale Programs.&amp;lt;em&amp;gt; International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society Press, October 2002; 273–282.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, G. Vogel. Static Trace Extraction.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2002.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Aiding Program Comprehension by Static and Dynamic Feature Analysis.&amp;lt;em&amp;gt; International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society Press, November 2001; 602–611. Best Paper Award von 161 eingereichten Beiträgen.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Feature-Driven Program Understanding Using Concept Analysis of Execution Traces.&amp;lt;em&amp;gt; International Workshop on Program Comprehension&amp;lt;/em&amp;gt;, IEEE Computer Society Press, May 2001; 300-309.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Derivation of Feature Component Maps by means of Concept Analysis.&amp;lt;em&amp;gt; European Conference on Software Maintenance and Reengineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, March 2001; 176–180.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;M. Fabiunke, J. Filipek, C. Maeder. XMI Based UML Model Composition in KobrA.&amp;lt;em&amp;gt; GI Jahrestagung (2)&amp;lt;/em&amp;gt;, 2001; 845–849.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;G. Canfora, J. Czeranski, R. Koschke. Revisiting the Delta IC Approach to Component Recovery.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, November 2000; 140–149.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Vorlesungen zum Thema Software-Reengineering.&amp;lt;em&amp;gt; 2.~Workshop Software-Reengineering&amp;lt;/em&amp;gt;, Universität Koblenz-Landau, May 2000; 3–7. Bad Honnef, Germany. Fachberichte Informatik, Nr. 8/2000.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, T. Eisenbarth. A Framework for Experimental Evaluation of Clustering Techniques.&amp;lt;em&amp;gt; International Workshop on Program Comprehension&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 2000.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Eisenbarth, R. Koschke, D. Simon. Herleitung der Feature-Komponenten-Korrespondenz mittels Begriffsanalyse.&amp;lt;em&amp;gt; Proceedings of 1. Deutscher Software-Produktlinien Workshop (DSPL-1)&amp;lt;/em&amp;gt;, 2000; 63–68.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, J. F. Girard, M. Würthner. Intermediate Representations for Reverse Engineering.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 1998; 241–250.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. F. Girard, R. Koschke, G. Schied. A Metric-based Approach to Detect Abstract Data Types and State Encapsulations.&amp;lt;em&amp;gt; International Conference on Automated Software Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 1997.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. F. Girard, R. Koschke. Finding Components in a Hierarchy of Modules: a Step towards Architectural Understanding.&amp;lt;em&amp;gt; International Conference on Software Maintenance&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 1997.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. F. Girard, R. Koschke, G. Schied. Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding.&amp;lt;em&amp;gt; Working Conference on Reverse Engineering&amp;lt;/em&amp;gt;, IEEE Computer Society Press, 1997; 66–75.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Didrich, W. Grieskamp, C. Maeder, P. Pepper. Programming in the Large: The Algebraic-Functional Language Opal 2$\alpha$. C. Clack, K. Hammond, A. Davie, editors,&amp;lt;em&amp;gt; Implementation of Functional Languages, 9th International Workshop, IFL 1997, September 10-12, St. Andrews, Scotland&amp;lt;/em&amp;gt;, volume 1467 of Lecture Notes in Computer Science, Springer Verlag, 1997; 322–337.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Didrich, C. Gerke, W. Grieskamp, C. Maeder, P. Pepper. Towards Integrating Algebraic Specification and Functional Programming: the Opal System (Extended Abstract). M. Wirsing, M. Nivat, editors,&amp;lt;em&amp;gt; Algebraic Methodology and Software Technology, 5th International Conference, AMAST 1996, July 1-5, Munich, Germany&amp;lt;/em&amp;gt;, volume 1101 of Lecture Notes in Computer Science, Springer Verlag, 1996; 559–562.&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
                    
                        <item>
                            <guid isPermaLink="false">content-299312</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>Further Publications</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299312</link>
                            
                            <description>&amp;lt;ul&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, S. Bazrafshan, R. Tiarks. Wie kommen Entwickler mit Klonen zurecht?&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2013; 33(2):2 Seiten.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;K. Schmid, R. Koschke, C. Kröher, D. Lüdemann. Towards Identifying Evolution Smells in Software Product Lines.&amp;lt;em&amp;gt; 5. Workshop Design For Future — Langlebige Softwaresysteme&amp;lt;/em&amp;gt;, CEUR Workshop Proceedings, 2013.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;S. Bazrafshan. Late propagation of Type-3 Clones.&amp;lt;em&amp;gt; Softwaretechnik-Trends&amp;lt;/em&amp;gt; 2012; 32(2):2 Seiten.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder. Code Clone Authorship—A First Look.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2012; 32(2):25–26.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Tiarks. What Programmers Really Do: An Observational Study.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; May 2011; 31(2).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;B. Berger, M. Bunke. Software Security Comprehension.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; may 2011; 31(2):30–31.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder, N. Göde, M. Rausch. Stability of COBOL Clones.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2011; 31(2):24–25.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde. Not All That Glitters Is Gold.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2011; 31(2):22–23.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde, M. Rausch. Clone Evolution Revisited.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; May 2010; 30(2):60–61. Beiträge des 12. Workshops &amp;#039;Software Reengineering&amp;#039; (WSR 2010).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;T. Mende, R. Koschke. Evaluation von Modellen zur Fehlervorhersage: Probleme und Lösungsmöglichkeiten.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; May 2010; 30(2):74–75. Beiträge des 12. Workshops &amp;#039;Software Reengineering&amp;#039; (WSR 2010).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;N. Göde. Mapping Code Clones Using Incremental Clone Detection.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; 2009; 29(2):28–29.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Harder. Rückgewinnung von Syntax und Semantik zur Analyse von Visual Basic 6 Programmen.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; May 2007; 27(2). Beiträge des 9. Workshops &amp;#039;Software Reengineering&amp;#039; (WSR 2007).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke. Konsolidierung von Software-Varianten in Software-Produktlinien.&amp;lt;em&amp;gt; Softwaretechnik Trends&amp;lt;/em&amp;gt; May 2006; 26(2). Beiträge des 8. Workshops &amp;#039;Software Reengineering&amp;#039; (WSR 2006).&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;R. Koschke, Y. Zhang. Component Recovery, Protocol Recovery and Validation in Bauhaus. J. Ebert, B. Kullbach, F. Lehner, editors,&amp;lt;em&amp;gt; Workshop on Software Reengineering&amp;lt;/em&amp;gt;, volume 1/2002 of Fachberichte Informatik, May 2001; 73-76. Institut für Informatik, Rheinau 1, D-56075 Koblenz, University of Koblenz-Landau.&amp;lt;/li&amp;gt; 	&amp;lt;li&amp;gt;J. Czeranski, T. Eisenbarth, H. Kienle, R. Koschke, D. Simon. Wiedergewinnung von Architekturinformationen: Ausblicke.&amp;lt;em&amp;gt; Workshop on Software Reengineering&amp;lt;/em&amp;gt;, number Nr. 8/2000 in Fachberichte Informatik, May 1999. Universit\&amp;quot;at Koblenz-Landau.&amp;lt;/li&amp;gt; &amp;lt;/ul&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
                    
                        <item>
                            <guid isPermaLink="false">content-299307</guid>
                            <pubDate>Wed, 04 Mar 2026 23:43:54 +0100</pubDate>
                            <title>BibTeX Download</title>
                            <link>https://www.uni-bremen.de/en/st/publications#c299307</link>
                            
                            <description>&amp;lt;p&amp;gt;Download all publications of the working group Software Engineering as &amp;lt;a class=&amp;quot;download&amp;quot; href=&amp;quot;t3://file?uid=60024&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;BibTeX-File&amp;lt;/a&amp;gt;.&amp;lt;/p&amp;gt;</description>
                            
                            <category>Content</category>
                            
                            
                        </item>
                    
                
            
        </channel>
    </rss>

