Sciweavers

852 search results - page 13 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
92
Voted
SAS
2001
Springer
15 years 4 months ago
Using Slicing to Identify Duplication in Source Code
Programs often have a lot of duplicated code, which makes both understanding and maintenance more difficult. This problem can be alleviated by detecting duplicated code, extracting...
Raghavan Komondoor, Susan Horwitz
88
Voted
ER
2003
Springer
150views Database» more  ER 2003»
15 years 4 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...
111
Voted
APSEC
1999
IEEE
15 years 4 months ago
An Approach for Measuring Software Evolution Using Source Code Features
One of the characteristics of large software systems is that they evolve over time. Evolution patterns include modifications related to the implementation, interfaces and the over...
Ladan Tahvildari, Richard Gregory, Kostas Kontogia...
86
Voted
AOSD
2003
ACM
15 years 4 months ago
Back to the future: a retroactive study of aspect evolution in operating system code
The FreeBSD operating system more than doubled in size between version 2 and version 4. Many changes to primary modularity are easy to spot at a high-level. For example, new devic...
Yvonne Coady, Gregor Kiczales
MSR
2009
ACM
15 years 6 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...