Sciweavers

123 search results - page 16 / 25
» Business Rule Extraction from Legacy Code
Sort
View
CSMR
2007
IEEE
14 years 2 months ago
An approach for mining services in database oriented applications
The diffusion of service oriented architectures is slowed down by the lack of enough services available for satisfying service integrator needs. Nevertheless, many features desire...
Concettina Del Grosso, Massimiliano Di Penta, Igna...
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Open Microscopy Environment
High-throughput scoring of image-based biological assays heavily depends on the extraction of quantitative numerical information from microscopy images. This paper describes how t...
Ilya G. Goldberg
WCRE
2010
IEEE
13 years 6 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
ADC
2006
Springer
125views Database» more  ADC 2006»
13 years 11 months ago
A reconstruction-based algorithm for classification rules hiding
Data sharing between two organizations is common in many application areas e.g. business planing or marketing. Useful global patterns can be discovered from the integrated dataset...
Juggapong Natwichai, Xue Li, Maria E. Orlowska
ICSE
2008
IEEE-ACM
14 years 8 months ago
Granularity in software product lines
Building software product lines (SPLs) with features is a challenging task. Many SPL implementations support features with coarse granularity ? e.g., the ability to add and wrap e...
Christian Kästner, Martin Kuhlemann, Sven Ape...