Sciweavers

135 search results - page 5 / 27
» Refactoring Tools and Complementary Techniques
Sort
View
PEPM
2009
ACM
13 years 12 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
ACSAC
2004
IEEE
13 years 11 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Clonetracker: tool support for code clone management
Code clones are generally considered to be an obstacle to software maintenance. Research has provided evidence that it may not always be practical, feasible, or cost-effective to ...
Ekwa Duala-Ekoko, Martin P. Robillard
IS
2012
12 years 2 months ago
On the refactoring of activity labels in business process models
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...
Henrik Leopold, Sergey Smirnov 0002, Jan Mendling
SIGDOC
2006
ACM
14 years 1 months ago
Handling objects: a scenario based approach
We report on the development of a tool which supports software programmers in programming to an interface by providing just in time (JIT) solutions. The development of the tool wa...
Thomas George Kannampallil, John M. Daughtry III