On the relationship between similar requirements and similar software: A case study in the railway domain
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …
requirements can be used as proxies to retrieve similar software. When a stakeholder …
JavaDL: automatically incrementalizing Java bug pattern detection
A Dura, C Reichenbach, E Söderberg - Proceedings of the ACM on …, 2021 - dl.acm.org
Static checker frameworks support software developers by automatically discovering bugs
that fit general-purpose bug patterns. These frameworks ship with hundreds of detectors for …
that fit general-purpose bug patterns. These frameworks ship with hundreds of detectors for …
Reside: Reusable service identification from software families
The clone-and-own approach becomes a common practice to quickly develop Software
Product Variants (SPVs) that meet variability in user requirements. However, managing the …
Product Variants (SPVs) that meet variability in user requirements. However, managing the …
Understanding source code variability in cloned android families: an empirical study on 75 families
A Shatnawi, T Ziadi… - 2019 26th Asia-Pacific …, 2019 - ieeexplore.ieee.org
Software developers rely on the clone-and-own approach to rapidly develop software
product variants (PVs) that meet variability in market needs. To improve the comprehension …
product variants (PVs) that meet variability in market needs. To improve the comprehension …
[PDF][PDF] Copy and Paste Behavior: A Systematic Mapping Study.
Both novice and experienced developers rely more and more in external sources of code to
include into their programs by copying and pasting code snippets. This behavior differs from …
include into their programs by copying and pasting code snippets. This behavior differs from …
[PDF][PDF] State-of-the-Art Report on Type III Clone Refactoring Techniques
M Chochlov - 2019 - lero.ie
Clone refactoring is a source code transformation activity that can be used to remove code
duplicates while preserving original behaviour/-functionality. For example, refactoring of …
duplicates while preserving original behaviour/-functionality. For example, refactoring of …