Clock-si: Snapshot isolation for partitioned data stores using loosely synchronized clocks

J Du, S Elnikety, W Zwaenepoel - 2013 IEEE 32nd International …, 2013 - ieeexplore.ieee.org
Clock-SI is a fully distributed protocol that implements snapshot isolation (SI) for partitioned
data stores. It derives snapshot and commit timestamps from loosely synchronized clocks …

The state of empirical evaluation in static feature location

A Razzaq, A Wasala, C Exton, J Buckley - ACM Transactions on …, 2018 - dl.acm.org
Feature location (FL) is the task of finding the source code that implements a specific, user-
observable functionality in a software system. It plays a key role in many software …

Metrics for measuring the quality of modularization of large-scale object-oriented software

S Sarkar, AC Kak, GM Rama - IEEE Transactions on Software …, 2008 - ieeexplore.ieee.org
The metrics formulated to date for characterizing the modularization quality of object-
oriented software have considered module and class to be synonymous concepts. But a …

[PDF][PDF] Object oriented software metrics and quality assessment: Current state of the art

A Shaik, K Reddy, A Damodaram - International Journal of …, 2012 - researchgate.net
Necessity for a Productive software has been culminating and Object-Oriented Design
technique is providing solution to this as it is the most powerful mechanism for developing …

Automated identification of tasks in development sessions

ID Coman, A Sillitti - 2008 16th IEEE international conference …, 2008 - ieeexplore.ieee.org
Task switching occurs frequently during the work of software developers. While there are
already several approaches aiming at assisting developers in recovering their contexts of …

[HTML][HTML] Extraction of domain concepts from the source code

SL Abebe, P Tonella - Science of Computer Programming, 2015 - Elsevier
Program understanding involves mapping domain concepts to the code elements that
implement them. Such mapping is often implicit and undocumented. However, identifier …

Towards the extraction of domain concepts from the identifiers

SL Abebe, P Tonella - 2011 18th Working Conference on …, 2011 - ieeexplore.ieee.org
Program identifiers represent an invaluable source of information for developers who are not
familiar with the code to be evolved. Domain concepts and inter-concept relationships can …

[图书][B] An empirical assessment of the crosscutting concern problem

M Eaddy - 2008 - search.proquest.com
Modularity is essential for creating evolvable software. Traditional programming languages
limit the level of modularity that can be achieved because they provide only one way to …

Understanding design concept identification

I Chiu, FA Salustri - Design Computing and Cognition'12, 2014 - Springer
In the design literature, the term design concept is often used de facto, or with only a brief
definition provided. Despite the cursory definition for concept, the design process rests …

Reverse engineering & design recovery: An evaluation of design recovery techniques

J Sadiq, T Waheed - International Conference on Computer …, 2011 - ieeexplore.ieee.org
Software maintenance and reuse has become an important business goal in recent years.
Reverse engineering provides a way to achieve this goal by extracting useful information …