Sciweavers

172 search results - page 29 / 35
» Extracting Source Code from E-Mails
Sort
View
USENIX
2003
14 years 11 months ago
Controlling Your PLACE in the File System with Gray-box Techniques
We present the design and implementation of PLACE, a gray-box library for controlling file layout on top of FFSlike file systems. PLACE exploits its knowledge of FFS layout poli...
James A. Nugent, Andrea C. Arpaci-Dusseau, Remzi H...
76
Voted
CASCON
1997
93views Education» more  CASCON 1997»
14 years 11 months ago
Repairing software style using graph grammars
Often, software architects impose a particular style on the software systems they design. For large software systems, they would like to ensure that the design continues to confor...
Hoda Fahmy, Richard C. Holt, Spiros Mancoridis
HIPC
2009
Springer
14 years 7 months ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...
ICSM
2005
IEEE
15 years 3 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
67
Voted
TSE
2008
113views more  TSE 2008»
14 years 9 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang