• Aucun résultat trouvé

[PDF] Top 20 Extracting Models from Source Code in Software Modernization

Has 10000 "Extracting Models from Source Code in Software Modernization" found on our website. Below are the top 20 most common "Extracting Models from Source Code in Software Modernization".

Extracting Models from Source Code in Software Modernization

Extracting Models from Source Code in Software Modernization

... is in charge of extracting a syntax tree from the source code and the lat- ter traverses this syntax tree in order to generate the target ...both in [1] and [4] dedicated ... Voir le document complet

23

Recovering business rules from legacy source code for system modernization

Recovering business rules from legacy source code for system modernization

... product from Evolveware called S2T helps to automate the redocumentation process [14, 15] of legacy ...the source code using a knowledge engine that is “trained” for data discovery and knowledge ... Voir le document complet

16

Analysing Source Code Structure and Mining Software Repositories to Create Requirements Traceability Links

Analysing Source Code Structure and Mining Software Repositories to Create Requirements Traceability Links

... trusts in e-commerce: first a customer’s initial trust (Koufaris and Hampton-Sosa (2004)) when she interacts with a Website for the first time and, second, the Website reputation trust (Artza and Gil (2007)) that ... Voir le document complet

152

A methodology to recover feature models from object-oriented source code

A methodology to recover feature models from object-oriented source code

... feature models from different artifacts but not from source code for a set of software product variants except ...model from O.O. source code for a set of ... Voir le document complet

2

JavaCompExt: Extracting Architectural Elements from Java Source Code

JavaCompExt: Extracting Architectural Elements from Java Source Code

... Abstract Software architecture erosion is a general problem in legacy ...maintainers in- troduce changes that violate the intended architecture and ...component models and lan- guages are ... Voir le document complet

11

Extracting linked data from statistic spreadsheets

Extracting linked data from statistic spreadsheets

... spreadsheets in order to facilitate their understanding by human users, such as the media and general ...page from where the file enclosing D can be ... Voir le document complet

7

Extracting Linked Data from statistic spreadsheets

Extracting Linked Data from statistic spreadsheets

... spreadsheets in order to facilitate their understanding by human users, such as the media and general ...page from where the file enclosing D can be ... Voir le document complet

10

L’archivage du code source sur les plateformes de développement

L’archivage du code source sur les plateformes de développement

... le code source : chaque développeur dispose des ses propres méthodes de travail et utilise le langage de programmation qu’il souhaite pour développer son ...le code qui, selon la préférence du ... Voir le document complet

107

Extracting an Etymological Database from Wiktionary

Extracting an Etymological Database from Wiktionary

... them). In almost all cases, additional merges would have been relevant, but our algorithm was not able to perform these ...Conversely, in order to evaluate the precision of our merging algorithm and that of ... Voir le document complet

14

Free and open source software

Free and open source software

... Open Source Software 4 who called themselves hackers in the 1970s “placed the desire to tinker, learn, and create technical beauty above all other goals” (Coleman, 2012, ...(2000), in his ... Voir le document complet

36

Ambiguities in gravitational lens models: the density field from the source position transformation

Ambiguities in gravitational lens models: the density field from the source position transformation

... mass in the inner region of galaxies or galaxy clusters. In particular, the mass within one Einstein radius can be determined with an accuracy of the order of a few percent or better, depending on the image ... Voir le document complet

13

Extracting Domain Ontologies from Reference Books

Extracting Domain Ontologies from Reference Books

... them in lifelong learning, we have solicited experts from both academia and ...Working from a common pre-defined base, in the majority of cases, consensus can be achieved much ... Voir le document complet

3

Towards Profiling Runtime Architecture Code Contributors in Software Projects

Towards Profiling Runtime Architecture Code Contributors in Software Projects

... Internal validity. As our metrics is based on specific code ownership, measures could be biased by code contribution importance. This validity threat is ad- dressed by RQ2. RQ2 shows that there is no ... Voir le document complet

9

Heuristic Splitting of Source Code Identifiers

Heuristic Splitting of Source Code Identifiers

... constructed from previously found ones following a divide and conquers ...problems. In DP, first of all we need to find a state for which an optimal solution is found and with the help of which we can find ... Voir le document complet

82

Source Code and License Statement Co-Evolution

Source Code and License Statement Co-Evolution

... Background In this section, we define and clarify some concepts that we will use in our ...Open Source Software OSS development has some typical characteristics, such as the widespread reuse ... Voir le document complet

78

Armies in the process of political modernization

Armies in the process of political modernization

... There are first those patterns of development in which the military stand out because in a disrupted society they represent the only effectively organised eleo*nt [r] ... Voir le document complet

37

On Introducing Built-In Test for Software Components in AADL Models

On Introducing Built-In Test for Software Components in AADL Models

... AADL software architectures. We chose the built-in characteristic to fit with AADL purposes of integration, reuse and validation during the design ...the software parts of an AADL ...generic ... Voir le document complet

5

A Generic Platform for Name Resolution in Source Code Analysis

A Generic Platform for Name Resolution in Source Code Analysis

... import in Java, it specifies that a source file may use the definitions of another package 9 ...directly in the grammar and we created a FASTAdaProcedure- Call as a sub-concept of a ...mentioned ... Voir le document complet

19

Le code source informatique comme artefact dans les reconfigurations d'Internet

Le code source informatique comme artefact dans les reconfigurations d'Internet

... Nous abordons la question de la beauté du code, qui nous intriguait au début de l'étude, mais qui s'est avérée peu significative dans les discours des acteurs, mai[r] ... Voir le document complet

321

Formulation interactive des requêtes pour l’analyse et la compréhension du code source

Formulation interactive des requêtes pour l’analyse et la compréhension du code source

... 1.2 Problématique De nos jours, vu la complexité des programmes et le coût consacré à la maintenance, il devient crucial d’avoir des outils d’exploration et d’interrogation du code source des systèmes ... Voir le document complet

75

Show all 10000 documents...