Sciweavers

118 search results - page 10 / 24
» Graph Technology in Reverse Engineering: The TGraph Approach
Sort
View
WCRE
2003
IEEE
14 years 27 days ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
AIRWEB
2007
Springer
14 years 1 months ago
Transductive Link Spam Detection
Web spam can significantly deteriorate the quality of search engines. Early web spamming techniques mainly manipulate page content. Since linkage information is widely used in we...
Dengyong Zhou, Chris Burges, Tao Tao
IWPC
1997
IEEE
13 years 12 months ago
Identifying objects in legacy systems
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed aga...
Aniello Cimitile, Andrea De Lucia, Giuseppe A. Di ...
CIKM
2007
Springer
14 years 1 months ago
Ontology module extraction for ontology reuse: an ontology engineering perspective
Problems resulting from the management of shared, distributed knowledge has led to ontologies being employed as a solution, in order to effectively integrate information across a...
Paul Doran, Valentina A. M. Tamma, Luigi Iannone
ICSE
2008
IEEE-ACM
14 years 8 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su