Sciweavers

WCRE
2007
IEEE
13 years 11 months ago
Recovering Data Models via Guarded Dependences
This paper presents an algorithm for reverse engineering semantically sound object-oriented data models from programs written in weakly-typed languages like Cobol. Our inference i...
Raghavan Komondoor, G. Ramalingam
WCRE
2007
IEEE
13 years 11 months ago
Lossless Comparison of Nested Software Decompositions
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Mark Shtern, Vassilios Tzerpos
WCRE
2007
IEEE
13 years 11 months ago
Documenting Typical Crosscutting Concerns
Our analysis of crosscutting concerns in real-life software systems (totaling over 500,000 LOC) and in reports from literature indicated a number of properties that allow for thei...
Marius Marin, Leon Moonen, Arie van Deursen
WCRE
2007
IEEE
13 years 11 months ago
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes
Comments are valuable especially for program understanding and maintenance, but do developers comment their code? To which extent do they add comments or adapt them when they evol...
Beat Fluri, Michael Würsch, Harald Gall
WCRE
2007
IEEE
13 years 11 months ago
Reverse Engineering Super-Repositories
Reverse engineering and software evolution research has been focused mostly on analyzing single software systems. However, rarely a project exists in isolation; instead, projects ...
Mircea Lungu, Michele Lanza, Tudor Gîrba, Re...
WCRE
2007
IEEE
13 years 11 months ago
Quality Assessment Based on Attribute Series of Software Evolution
Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value seri...
Jacek Ratzinger, Harald Gall, Martin Pinzger
WCRE
2007
IEEE
13 years 11 months ago
A Study of Consistent and Inconsistent Changes to Code Clones
Code Cloning is regarded as a threat to software maintenance, because it is generally assumed that a change to a code clone usually has to be applied to the other clones of the cl...
Jens Krinke
WCRE
2007
IEEE
13 years 11 months ago
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications
The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A spec...
Cristina Marinescu
WCRE
2007
IEEE
13 years 11 months ago
Clone Detection via Structural Abstraction
tection via Structural Abstraction William S. Evans Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z4, CANADA Christopher W. Fraser Microsoft Re...
William S. Evans, Christopher W. Fraser, Fei Ma