Clock-si: Snapshot isolation for partitioned data stores using loosely synchronized clocks
J Du, S Elnikety, W Zwaenepoel - 2013 IEEE 32nd International …, 2013 - ieeexplore.ieee.org
Clock-SI is a fully distributed protocol that implements snapshot isolation (SI) for partitioned
data stores. It derives snapshot and commit timestamps from loosely synchronized clocks …
data stores. It derives snapshot and commit timestamps from loosely synchronized clocks …
The state of empirical evaluation in static feature location
Feature location (FL) is the task of finding the source code that implements a specific, user-
observable functionality in a software system. It plays a key role in many software …
observable functionality in a software system. It plays a key role in many software …
Metrics for measuring the quality of modularization of large-scale object-oriented software
The metrics formulated to date for characterizing the modularization quality of object-
oriented software have considered module and class to be synonymous concepts. But a …
oriented software have considered module and class to be synonymous concepts. But a …
[PDF][PDF] Object oriented software metrics and quality assessment: Current state of the art
A Shaik, K Reddy, A Damodaram - International Journal of …, 2012 - researchgate.net
Necessity for a Productive software has been culminating and Object-Oriented Design
technique is providing solution to this as it is the most powerful mechanism for developing …
technique is providing solution to this as it is the most powerful mechanism for developing …
Automated identification of tasks in development sessions
ID Coman, A Sillitti - 2008 16th IEEE international conference …, 2008 - ieeexplore.ieee.org
Task switching occurs frequently during the work of software developers. While there are
already several approaches aiming at assisting developers in recovering their contexts of …
already several approaches aiming at assisting developers in recovering their contexts of …
[HTML][HTML] Extraction of domain concepts from the source code
Program understanding involves mapping domain concepts to the code elements that
implement them. Such mapping is often implicit and undocumented. However, identifier …
implement them. Such mapping is often implicit and undocumented. However, identifier …
Towards the extraction of domain concepts from the identifiers
Program identifiers represent an invaluable source of information for developers who are not
familiar with the code to be evolved. Domain concepts and inter-concept relationships can …
familiar with the code to be evolved. Domain concepts and inter-concept relationships can …
[图书][B] An empirical assessment of the crosscutting concern problem
M Eaddy - 2008 - search.proquest.com
Modularity is essential for creating evolvable software. Traditional programming languages
limit the level of modularity that can be achieved because they provide only one way to …
limit the level of modularity that can be achieved because they provide only one way to …
Understanding design concept identification
I Chiu, FA Salustri - Design Computing and Cognition'12, 2014 - Springer
In the design literature, the term design concept is often used de facto, or with only a brief
definition provided. Despite the cursory definition for concept, the design process rests …
definition provided. Despite the cursory definition for concept, the design process rests …
Reverse engineering & design recovery: An evaluation of design recovery techniques
J Sadiq, T Waheed - International Conference on Computer …, 2011 - ieeexplore.ieee.org
Software maintenance and reuse has become an important business goal in recent years.
Reverse engineering provides a way to achieve this goal by extracting useful information …
Reverse engineering provides a way to achieve this goal by extracting useful information …