Sciweavers

694 search results - page 63 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
KBSE
2002
IEEE
15 years 8 months ago
On CASE Tool Usage at Nokia
We present the results of a research work targeted to understanding CASE tools usage in Nokia. By means of a survey questionnaire, we collected data aimed to identify what feature...
Alessandro Maccari, Claudio Riva, Francesco Maccar...
WCRE
2002
IEEE
15 years 8 months ago
Exposing Data-Level Parallelism in Sequential Image Processing Algorithms
As new computer architectures are developed to exploit large-scale data-level parallelism, techniques are needed to retarget legacy sequential code to these platforms. Sequential ...
Lewis B. Baumstark Jr., Linda M. Wills
135
Voted
WCRE
2006
IEEE
15 years 9 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck
ICSM
2009
IEEE
15 years 10 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
132
Voted
IWPC
2003
IEEE
15 years 8 months ago
Understanding Change-Proneness in OO Software through Visualization
During software evolution, adaptive, and corrective maintenance are common reasons for changes. Often such changes cluster around key components. It is therefore important to anal...
James M. Bieman, Anneliese Amschler Andrews, Helen...