On the relationship between similar requirements and similar software: A case study in the railway domain

M Abbas, A Ferrari, A Shatnawi, E Enoiu… - Requirements …, 2023 - Springer
Recommender systems for requirements are typically built on the assumption that similar
requirements can be used as proxies to retrieve similar software. When a stakeholder …

JavaDL: automatically incrementalizing Java bug pattern detection

A Dura, C Reichenbach, E Söderberg - Proceedings of the ACM on …, 2021 - dl.acm.org
Static checker frameworks support software developers by automatically discovering bugs
that fit general-purpose bug patterns. These frameworks ship with hundreds of detectors for …

Reside: Reusable service identification from software families

A Shatnawi, A Seriai, H Sahraoui, T Ziadi… - Journal of Systems and …, 2020 - Elsevier
The clone-and-own approach becomes a common practice to quickly develop Software
Product Variants (SPVs) that meet variability in user requirements. However, managing the …

Understanding source code variability in cloned android families: an empirical study on 75 families

A Shatnawi, T Ziadi… - 2019 26th Asia-Pacific …, 2019 - ieeexplore.ieee.org
Software developers rely on the clone-and-own approach to rapidly develop software
product variants (PVs) that meet variability in market needs. To improve the comprehension …

[PDF][PDF] Copy and Paste Behavior: A Systematic Mapping Study.

L Guan, JW Castro, X Ferré, ST Acuña - SEKE, 2020 - ksiresearch.org
Both novice and experienced developers rely more and more in external sources of code to
include into their programs by copying and pasting code snippets. This behavior differs from …

[PDF][PDF] State-of-the-Art Report on Type III Clone Refactoring Techniques

M Chochlov - 2019 - lero.ie
Clone refactoring is a source code transformation activity that can be used to remove code
duplicates while preserving original behaviour/-functionality. For example, refactoring of …