Many articles and tools have been proposed over the years for mining design patterns from source code. These tools differ in several aspects, thus their fair comparison is hard. B...
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Software Engineers frequently need to locate and understand the code that implements a specific user feature of a large system. This paper reports on a study by Motorola Inc. and ...
Michael Jiang, Michael Groble, Sharon Simmons, Den...
This paper presents a novel application of a semantic annotation system, named Cerno, to analyze research publications in electronic format. Specifically, we address the problem of...
This paper presents a tool for web usage mining. The aim is centered on providing a tool that facilitates the mining process rather than implement elaborated algorithms and techniq...
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Role-based collaboration (RBC) is proposed to support people’s collaboration with more usable human-computer interfaces. To approach the objectives of RBC, new practical tools a...
Network Simulators are important tools in network research. As the selected topology often influences the outcome of the simulation, realistic topologies are required to produce re...
The field of program comprehension is characterized by both the continuing development of new tools and techniques and the adaptation of existing techniques to address program co...
Massimiliano Di Penta, R. E. Kurt Stirewalt, Eilee...
Compute clusters are consuming more power at higher densities than ever before. This results in increased thermal dissipation, the need for powerful cooling systems, and ultimatel...
Kirk W. Cameron, Hari K. Pyla, Srinidhi Varadaraja...