Sciweavers

181 search results - page 14 / 37
» Reverse Engineering Method Stereotypes
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
14 years 1 months ago
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones
This paper presents a hybrid approach to detect source-code clones that combines evolutionary algorithms and clustering. A case-study is conducted on a small C++ code base. The pr...
Andrew Sutton, Huzefa H. Kagdi, Jonathan I. Maleti...
IWPC
1996
IEEE
13 years 11 months ago
Extracting Business Rules from Source Code
This paper reviews the state of the art on application knowledge acquisiton from existing software systems and defines the role of business rules. It then goes on to present a met...
Harry M. Sneed, Katalin Erdös
ICSM
1999
IEEE
13 years 12 months ago
Hot Spot Recovery in Object-Oriented Software with Inheritance and Composition Template Methods
The success of an object-oriented software development project highly depends on how well the designers can capture the Hot Spots of the application domain, that is, those aspects...
Reinhard Schauer, Sébastien Robitaille, Fra...
WCRE
2008
IEEE
14 years 1 months ago
PREREQIR: Recovering Pre-Requirements via Cluster Analysis
High-level software artifacts, such as requirements, domain-specific requirements, and so on, are an important source of information that is often neglected during the reverse- an...
Jane Huffman Hayes, Giuliano Antoniol, Yann-Ga&eum...