Sciweavers

18 search results - page 2 / 4
» iwpc 2008
Sort
View
IWPC
2008
IEEE
13 years 11 months ago
Scenario-Based Comparison of Clone Detection Techniques
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available c...
Chanchal Kumar Roy, James R. Cordy
IWPC
2008
IEEE
13 years 11 months ago
The Reuse of Grammars with Embedded Semantic Actions
Reusing syntax specifications without embedded arbitrary semantic actions is straightforward because the semantic analysis phases of new applications can feed off trees or other ...
Terence Parr
IWPC
2008
IEEE
13 years 11 months ago
Mendel: A Model, Metrics, and Rules to Understand Class Hierarchies
Inheritance is an important mechanism when developing object-oriented programs with class-based programming languages: it enables subtyping, polymorphism, and code reuse. Inherita...
Simon Denier, Yann-Gaël Guéhéne...
IWPC
2008
IEEE
13 years 11 months ago
Re-Engineering a Reverse Engineering Portal to a Distributed SOA
REportal is an existing web-based reverse engineering portal web site that provides access to a suite of reverse engineering and program comprehension tools via a web This abstrac...
William M. Mongan, Maxim Shevertalov, Spiros Manco...
IWPC
2008
IEEE
13 years 11 months ago
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints
Libraries are the most widespreaded form of software reuse. In order to properly use a library API, its clients should fulfill a series of (many times implicit) assumptions made ...
Martin Feilkas, Daniel Ratiu