Sciweavers

289 search results - page 33 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
173
Voted
VL
2010
IEEE
218views Visual Languages» more  VL 2010»
15 years 5 days ago
Using Association Metrics to Help Users Navigate API Documentation
-- In the past decade there has been spectacular growth in the number and size of third-party libraries, frameworks, toolkits and other Application Programming Interfaces (APIs) av...
Daniel S. Eisenberg, Jeffrey Stylos, Andrew Faulri...
IJSEKE
2006
138views more  IJSEKE 2006»
15 years 1 months ago
Towards Automatic Establishment of Model Dependencies Using Formal Concept Analysis
tion and alteration of software models at different levels of abstraction. These modifications are usually performed independently, but the objects to which they are applied to, ar...
Igor Ivkovic, Kostas Kontogiannis
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
15 years 3 months ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak
IWPSE
2005
IEEE
15 years 7 months ago
Supporting Web Application Evolution by Dynamic Analysis
The evolution of Web Applications needs to be supported by the availability of proper analysis and design documents. UML use case diagrams are certainly useful to identify feature...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...
PLDI
2006
ACM
15 years 7 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober