Sciweavers

113 search results - page 2 / 23
» An Example of Cloning Graph Transformation Rules for Program...
Sort
View
SIGSOFT
2007
ACM
14 years 6 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
ENTCS
2006
151views more  ENTCS 2006»
13 years 5 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump
GG
2004
Springer
13 years 10 months ago
Translating Java Code to Graph Transformation Systems
We propose a faithful encoding of Java programs (written in a suitable fragment of the language) to Graph Transformation Systems. Every program is translated to a set of rules incl...
Andrea Corradini, Fernando Luís Dotti, Luci...
FAC
2010
148views more  FAC 2010»
13 years 3 months ago
Automating the transformation-based analysis of visual languages
We present a novel approach for the automatic generation of model-to-model transformations given a description of the operational semantics of the source language in the form of gr...
Juan de Lara, Hans Vangheluwe
AGTIVE
2007
Springer
13 years 9 months ago
Shaped Generic Graph Transformation
Abstract. Since the systematic evolution of graph-like program models has become important in software engineering, graph transformation has gained much attention in this area. For...
Frank Drewes, Berthold Hoffmann, Dirk Janssens, Ma...