Sciweavers

IWSSD
2000
IEEE
14 years 10 days ago
Design Guidance through the Controlled Application of Constraints
We seek to facilitate development of high quality software designs and architectures by using rigorous process definitions to guide application of the complex structure of relati...
Aaron G. Cass, Leon J. Osterweil
IWSSD
2000
IEEE
14 years 10 days ago
Issues in Analyzing the Behavior of Event Dispatching Systems
A good architecture is a necessary condition to guarantee that the expected levels of performance, availability, fault tolerance, and scalability are achieved by the implemented s...
Giovanni Bricconi, Emma Tracanella, Elisabetta Di ...
IWPC
2000
IEEE
14 years 10 days ago
Architectural Repair of Open Source Software
As a software system evolves, its architecture will drift. System changes are often done without considering their effects on the system structure. These changes often introduce s...
John B. Tran, Michael W. Godfrey, Eric H. S. Lee, ...
IWPC
2000
IEEE
14 years 10 days ago
Requirements for an Elucidative Programming Environment
The main goal with this paper is to motivate and coin a variation of literate programming which we call elucidative programming. Elucidative programming is oriented towards progra...
Kurt Nørmark
IWPC
2000
IEEE
14 years 10 days ago
A Pattern Matching Framework for Software Architecture Recovery and Restructuring
This paper presents a framework for software architecture recovery and restructuring. The user specifies a high level abstraction view of the system using a structured pattern la...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...
IWPC
2000
IEEE
14 years 10 days ago
Types and Concept Analysis for Legacy Systems
We combine type inference and concept analysis in order to gain insight into legacy software systems. Type inference for COBOL yields the types for variables and program parameter...
Tobias Kuipers, Leon Moonen
IWPC
2000
IEEE
14 years 10 days ago
A Framework for Experimental Evaluation of Clustering Techniques
Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comp...
Rainer Koschke, Thomas Eisenbarth
IWPC
2000
IEEE
14 years 10 days ago
The Effect of Call Graph Construction Algorithms for Object-Oriented Programs on Automatic Clustering
Call graphs are commonly used as input for automatic clustering algorithms, the goal of which is to extract the high level structure of the program under study. Determining the ca...
Derek Rayside, Steve Reuss, Erik Hedges, Kostas Ko...
IWPC
2000
IEEE
14 years 10 days ago
Evaluating the Accessor Classification Approach to Detect Abstract Data Types
ng the Accessor Classification Approach to Detect Abstract Data Types icle presents an approach to identify abstract data types (ADTs) in source code. For each structured type de...
Jean-Francois Girard, Martin Würthner
IWPC
2000
IEEE
14 years 10 days ago
Case Study of Feature Location Using Dependence Graph
Software change requests are often formulated as requests to modify or to add a specific feature or concept. To implement these changes, the features or concepts must be located i...
Kunrong Chen, Vaclav Rajlich