Code Anomalies Flock Together: Exploring Code Anomaly Agglomerations for Locating Design Problems
暂无分享,去创建一个
Alessandro F. Garcia | Bruno Barbieri Pontes Cafeo | Willian Nalepa Oizumi | Leonardo da Silva Sousa | Yixue Zhao | W. Oizumi | Yixue Zhao | B. Cafeo | L. Sousa
[1] Girish Suryanarayana,et al. Refactoring for Software Design Smells: Managing Technical Debt , 2014 .
[2] Victor A. Bloomfield,et al. Using R for Numerical Analysis in Science and Engineering , 2014 .
[3] Alan MacCormack,et al. Exploring the Structure of Complex Software Designs: An Empirical Study of Open Source and Proprietary Code , 2006, Manag. Sci..
[4] Alberto Bacchelli,et al. On the Impact of Design Flaws on Software Defects , 2010, 2010 10th International Conference on Quality Software.
[5] Alessandro F. Garcia,et al. Supporting the identification of architecturally-relevant code anomalies , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).
[6] Yuanfang Cai,et al. A Case Study in Locating the Architectural Roots of Technical Debt , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[7] A. Yamashita,et al. Exploring the impact of inter-smell relations on software maintainability: An empirical study , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[8] Audris Mockus,et al. Quantifying the Effect of Code Smells on Maintenance Effort , 2013, IEEE Transactions on Software Engineering.
[9] Aiko Fallas Yamashita,et al. Do code smells reflect important maintainability aspects? , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).
[10] Nenad Medvidovic,et al. Are automatically-detected code anomalies relevant to architectural modularity?: an exploratory analysis of evolving systems , 2012, AOSD.
[11] Elmar Jürgens,et al. Do code clones matter? , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[12] Stéphane Ducasse,et al. Object-Oriented Metrics in Practice , 2005 .
[13] Yuanfang Cai,et al. Titan: a toolset that connects software architecture with quality analysis , 2014, SIGSOFT FSE.
[14] Yuanfang Cai,et al. Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells , 2015, 2015 12th Working IEEE/IFIP Conference on Software Architecture.
[15] Nenad Medvidovic,et al. A comparative analysis of software architecture recovery techniques , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[16] Michael W. Godfrey,et al. Secrets from the Monster: Extracting Mozilla’s Software Architecture , 2000 .
[17] Alessandro F. Garcia,et al. On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms , 2012, 2012 16th European Conference on Software Maintenance and Reengineering.
[18] Stéphane Ducasse,et al. Using concept analysis to detect co-change patterns , 2007, IWPSE '07.
[19] Yann-Gaël Guéhéneuc,et al. DECOR: A Method for the Specification and Detection of Code and Design Smells , 2010, IEEE Transactions on Software Engineering.
[20] Girish Suryanarayana,et al. Chapter 1 – Technical Debt , 2015 .
[21] Michel Wermelinger,et al. Assessing the effect of clones on changeability , 2008, 2008 IEEE International Conference on Software Maintenance.
[22] Foutse Khomh,et al. An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension , 2011, 2011 15th European Conference on Software Maintenance and Reengineering.
[23] Raed Shatnawi,et al. An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution , 2007, J. Syst. Softw..
[24] Robert C. Martin. Agile Software Development, Principles, Patterns, and Practices , 2002 .
[25] Nenad Medvidovic,et al. A software architecture-based framework for highly distributed and data intensive scientific applications , 2006, ICSE.
[26] Jan Bosch,et al. Design erosion: problems and causes , 2002, J. Syst. Softw..
[27] J. Cornfield,et al. A method of estimating comparative rates from clinical data; applications to cancer of the lung, breast, and cervix. , 1951, Journal of the National Cancer Institute.
[28] Miryung Kim,et al. An empirical study of code clone genealogies , 2005, ESEC/FSE-13.
[29] Trevor J. Young,et al. Using AspectJ to build a software product line for mobile devices , 2005 .
[30] Foutse Khomh,et al. An Exploratory Study of the Impact of Code Smells on Software Change-proneness , 2009, 2009 16th Working Conference on Reverse Engineering.
[31] Girish Suryanarayana,et al. Towards a Principle-based Classification of Structural Design Smells , 2013, J. Object Technol..
[32] M. Fowler. Improving the Design of Existing Code , 2000 .
[33] Daniela Cruzes,et al. Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems , 2010, 2010 IEEE International Conference on Software Maintenance.
[34] Foutse Khomh,et al. An exploratory study of the impact of antipatterns on class change- and fault-proneness , 2011, Empirical Software Engineering.
[35] Sérgio Soares,et al. Implementing distribution and persistence aspects with aspectJ , 2002, OOPSLA '02.
[36] R. Fisher. On the Interpretation of χ2 from Contingency Tables, and the Calculation of P , 2018, Journal of the Royal Statistical Society Series A (Statistics in Society).
[37] Yuanfang Cai,et al. Measuring architecture quality by structure plus history analysis , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[38] References , 1971 .
[39] Mauricio A. Saca. Refactoring improving the design of existing code , 2017, 2017 IEEE 37th Central America and Panama Convention (CONCAPAN XXXVII).
[40] Stephen R. Schach,et al. Maintainability of the Linux kernel , 2002, IEE Proc. Softw..
[41] Alexander L. Wolf,et al. Acm Sigsoft Software Engineering Notes Vol 17 No 4 Foundations for the Study of Software Architecture , 2022 .
[42] Nenad Medvidovic,et al. Identifying Architectural Bad Smells , 2009, 2009 13th European Conference on Software Maintenance and Reengineering.
[43] R. Fisher. On the Interpretation of χ 2 from Contingency Tables , and the Calculation of P Author , 2022 .
[44] Yuanfang Cai,et al. Detecting software modularity violations , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[45] Michael W. Godfrey,et al. “Cloning considered harmful” considered harmful: patterns of cloning in software , 2008, Empirical Software Engineering.