Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Software Engineering (D.2) > Distribution, Maintenance, and Enhancement (D.2.7) > Restructuring, Reverse Engineering, And Reengineering (D.2.7...)  
 
Options:
 
  1-10 of 90 Reviews about "Restructuring, Reverse Engineering, And Reengineering (D.2.7...)": Date Reviewed
  Refactoring dynamic languages
Reia R., Menezes Leitão A.  ELS 2016 (Proceedings of the 9th European Lisp Symposium, Kraków, Poland,  May 9-10, 2016) 5-12, 2016. Type: Proceedings

Novice programmers might benefit from code refactoring, but refactoring tools are mostly available in development environments requiring more experience than most novices possess. This paper describes a project to augment a pedagogically appropria...

Jan 25 2017
  Refactoring for software design smells: managing technical debt
Suryanarayana G., Samarthyam G., Sharma T.,  Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 258 pp. Type: Book (978-0-128013-97-7)

While much has been published focused on code smells and implementation-oriented design patterns, there is a dearth of resources for software architects, designers, and developers working on software design at a macro level. This book begins to fi...

Aug 21 2015
  The NASA automated requirements measurement tool: a reconstruction
Carlson N., Laplante P.  Innovations in Systems and Software Engineering 10(2): 77-91, 2014. Type: Article

Reconstructions of systems often provide useful insights, and the work here is no exception. A description is first given of how the authors reconstructed NASA’s automated requirements measurement (ARM) tool. Then, as the authors discuss and...

Jul 8 2014
  Software protection for dynamically generated code
Ghosh S., Hiser J., Davidson J.  PPREW 2013 (Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, Rome, Italy,  Jan 26, 2013) 1-12, 2013. Type: Proceedings

A process-level virtual machine (PVM) is a layer of software interleaved with the application and the host environment; it executes the application. The application binary is either transformed (obfuscated) to a secret instruction-set architecture...

Apr 9 2014
  Identifying services from legacy batch applications
Komondoor R., Nandivada V., Sinha S., Field J.  ISEC 2012 (Proceedings of the 5th India Software Engineering Conference, Kanpur, India,  Feb 22-25, 2012) 13-22, 2012. Type: Proceedings

Modernization is the current buzzword in the information technology (IT) industry. Legacy IT applications are transformed, reengineered, and modernized to meet the needs of today’s world. Mobile devices are the hot products preferred by yout...

Dec 17 2012
  Remodularizing Java programs for improved locality of feature implementations in source code
Olszak A., Nørregaard Jørgensen B.  Science of Computer Programming 77(3): 131-151, 2012. Type: Article

Remodularization is about giving a new or additional modular structure to an application’s source code. This activity is particularly important when maintaining an application since remodularizing increases the overall quality of the applica...

May 10 2012
  Oops! . . . I changed it again
Göde N., Harder J.  IWSC 2011 (Proc. of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI,  May 23, 2011) 14-20, 2011. Type: Proceedings

Much effort has been expended in attempting to discover how errors are introduced into software, with the hope of being able to reduce the potentially serious faults occurring in applications. One area of interest is clones--fragments of code...

Apr 18 2012
  Extracting code clones for refactoring using combinations of clone metrics
Choi E., Yoshida N., Ishio T., Inoue K., Sano T.  IWSC 2011 (Proceedings of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI,  May 23, 2011) 7-13, 2011. Type: Proceedings

Many tools to detect code duplication are available. What remains lacking is an understanding of how best to use the results these tools provide. Anecdotal evidence suggests that high values for individual clone metrics are not always indicative o...

Feb 16 2012
  Instant code clone search
Lee M., Roh J., Hwang S., Kim S.  FSE 2010 (Proceedings of the 18th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Santa Fe, NM,  Nov 7-11, 2010) 167-176, 2010. Type: Proceedings

Code clone detection has many appealing applications, ranging from maintenance effort reduction to example identification based on similarities. However, traditional approaches to clone detection have a significant feedback loop; hours and even da...

Apr 14 2011
  A desiderata for refactoring-based software modularity improvement
Rama G.  ISEC 2010 (Proceedings of the 3rd India Software Engineering Conference, Mysore, India,  Feb 25-27, 2010) 93-102, 2010. Type: Proceedings

While problems with large, business-critical legacy systems written in older languages, such as Cobol, have been well publicized, less has been reported about similar applications written in more modern languages, such as Java, which have been und...

May 27 2010
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy