• Aucun résultat trouvé

[PDF] Top 20 Restructuring source code identifiers

Has 2920 "Restructuring source code identifiers" found on our website. Below are the top 20 most common "Restructuring source code identifiers".

Restructuring source code identifiers

Restructuring source code identifiers

... static code search [ 20 ...form source code identifiers and ...of source code entities ...the source code in to different ...of source code ... Voir le document complet

54

Heuristic Splitting of Source Code Identifiers

Heuristic Splitting of Source Code Identifiers

... from identifiers to ...2000), identifiers are one of the most important sources of information about system ...function identifiers by means of a segmentation technique, a regular language, and a ... Voir le document complet

82

Defining linguistic antipatterns towards the improvement of source code quality

Defining linguistic antipatterns towards the improvement of source code quality

... Chapter 7. Related work 42 Deienb¨ ock and Pizka [ 2 ] performed an experiment with graduate and undergraduate students over one year and three months respectively. Students were initially asked to develop a clone ... Voir le document complet

66

Recovering business rules from legacy source code for system modernization

Recovering business rules from legacy source code for system modernization

... One way to achieve this is through variables names. For each variable, we try different strategies to translate their technical names. At first, if the variable is directly linked to a data field (usually a field of the ... Voir le document complet

16

Automatic derivation of concepts based on the analysis of identifiers

Automatic derivation of concepts based on the analysis of identifiers

... Solution 2. Unlike Samurai which is a contextual approach that maps identi- fers to concepts by mining the frequency of potential substrings from source code, DECOS relies on the use of dictionaries. It ... Voir le document complet

88

Analysing Source Code Structure and Mining Software Repositories to Create Requirements Traceability Links

Analysing Source Code Structure and Mining Software Repositories to Create Requirements Traceability Links

... small source code to perform the eye-tracking experiment and in some development environ- ment, ...developers’ source code preferences could be ...general source code ... Voir le document complet

152

Extracting Models from Source Code in Software Modernization

Extracting Models from Source Code in Software Modernization

... ... end_rule Fig. 21 Transformation rules dealing with statements. ates an instance of the IdentifierReference metaclass and its purpose is to locate the referred element through the source code. The ... Voir le document complet

23

A Generic Platform for Name Resolution in Source Code Analysis

A Generic Platform for Name Resolution in Source Code Analysis

... the source code and resolving the names (identifiers) it ...the source code. Name resolution maps all the identifiers found in the code to the software entities they refer ... Voir le document complet

19

An empirical study on the relation between identifiers and fault proneness

An empirical study on the relation between identifiers and fault proneness

... the source code of a working software system, with certain coupling values between classes and certain entropy and context coverage values for its ...this source code to a simple obfuscator ... Voir le document complet

18

Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants

Tailored Source Code Transformations to Synthesize Computationally Diverse Program Variants

... as code injection, buffer overflow or heap over- flow [30, ...injected code should be ...program’s source code, looking for computation ... Voir le document complet

12

Software Heritage: Why and How to Preserve Software Source Code

Software Heritage: Why and How to Preserve Software Source Code

... oblivion. Source code ...software source code “in context”, with as much information about its broader ecosystem: project websites, issues filed in bug tracking systems, mailing lists, wikis, ... Voir le document complet

11

Source-Code Level Regression Test Selection: the Model-Driven Way

Source-Code Level Regression Test Selection: the Model-Driven Way

... Computing the long-running impact analysis offline allows us to rapidly apply the RTS when the user needs it, minimising the waiting time, and hence improving the productivity. Indeed, experiments on four different ... Voir le document complet

21

Analyse de la similarité du code source pour la réutilisation automatique de tests unitaires à l'aide du CBR

Analyse de la similarité du code source pour la réutilisation automatique de tests unitaires à l'aide du CBR

... Il y a plusieurs raisons pour lesquelles certains développeurs n’écrivent pas de tests unitaires. Cela peut être parce qu’eux-mêmes ou leur employeur considèrent que ça coûte cher ou que ça ne vaut pas la peine. En fait, ... Voir le document complet

93

Mapping features to source code in dynamically configured avionics software

Mapping features to source code in dynamically configured avionics software

... to source code using information retrieval (IR) [10, ...of source code to documentation ...the source code to link them to ... Voir le document complet

29

Software Provenance Tracking at the Scale of Public Source Code

Software Provenance Tracking at the Scale of Public Source Code

... its more general formulation and at a scale that is as close as possible to the current state of the world of public source code, which led us to focus on the corpus made available by Software Heritage. By ... Voir le document complet

38

Automated restructuring of an electronic newspaper

Automated restructuring of an electronic newspaper

... difficult problem to get feedback to the structuring system from a newspaper printed on paper by any other mechanism than an explicit message from the user because ink o[r] ... Voir le document complet

34

Concurrency Effects Over Variable-size Identifiers in Distributed Collaborative Editing

Concurrency Effects Over Variable-size Identifiers in Distributed Collaborative Editing

... Reasons: both setups use boundary+ and boundary– al- location strategies. However, each collaborator in the rand setup makes independent choices of allocation strategies when required. Thus, if a collaborator chooses a ... Voir le document complet

8

2016 — Inférence de l'évolution architecturale à partir du code source : une approche basée sur la détection des tactiques architecturales

2016 — Inférence de l'évolution architecturale à partir du code source : une approche basée sur la détection des tactiques architecturales

... Le processus d’analyse de l’évolution est composé de trois étapes qui sont numérotées de 1 à 3 dans la Figure 2.1. La première étape s’appuie sur un outil de différentiation (i.e. MADMatch (Kpodjedo et al., 2013)) pour ... Voir le document complet

81

Restructuring of colloidal cakes during dewatering

Restructuring of colloidal cakes during dewatering

... these restructuring processes follow a general course made of three stages: (1) at all scales voids are compressed, with large voids compressed more extensively than smaller ones; the local order remains ... Voir le document complet

44

Assessing Product Line Derivation Operators Applied to Java Source Code: An Empirical Study

Assessing Product Line Derivation Operators Applied to Java Source Code: An Empirical Study

... elements, source code instructions, components) by adding, removing or substitut- ing them according to a given ...implement source code transformations, based on the deriva- tion operators of ... Voir le document complet

11

Show all 2920 documents...