Sciweavers

81 search results - page 4 / 17
» Using Automatic Clustering to Produce High-Level System Orga...
Sort
View
CSMR
2000
IEEE
14 years 25 days ago
Architectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 2 months ago
Quantitative Measures for Evaluating Knowledge Network Node Clusters: Preliminary Results
One viewpoint of a knowledge network is a knowledge map that clusters similar knowledge sources into knowledge domains. What is needed is an automatic mapping tool that 1) takes t...
Mark Pendergast, Richard Orwig
KBSE
1997
IEEE
14 years 18 days ago
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In o...
Houari A. Sahraoui, Walcélio L. Melo, Hakim...
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 2 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...