Information Technology Reference
In-Depth Information
34. Maqbool, O., Babri, H.: Hierarchical clustering for software architecture recovery.
IEEE Transactions on Software Engineering 33(11), 759-780 (2007)
35. Menchetti, S., Costa, F., Frasconi, P.: Weighted decomposition kernels. In: Pro-
ceedings of the 22nd International Conference on Machine Learning, ICML 2005,
pp. 585-592. ACM, New York (2005),
http://doi.acm.org/10.1145/1102351.1102425
36. Mitchell, B.S., Mancoridis, S.: On the automatic modularization of software sys-
tems using the bunch tool. IEEE Transactions on Software Engineering 32, 193-208
(2006), http://portal.acm.org/citation.cfm?id=1128600.1128815
37. Moschitti, A., Basili, R., Pighin, D.: Tree Kernels for Semantic Role Labeling. In:
Computational Linguistics, pp. 193-224. MIT Press, Cambridge (2008)
38. Risi, M., Scanniello, G., Tortora, G.: Using fold-in and fold-out in the architecture
recovery of software systems. Formal Asp. Comput. 24(3), 307-330 (2012)
39. Roy, C.K., Cordy, J.R.: Nicad: Accurate detection of near-miss intentional clones
using flexible pretty-printing and code normalization. In: ICPC, pp. 172-181 (2008)
40. Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of code clone de-
tection techniques and tools: A qualitative approach. Sci. Comput. Program. 74(7),
470-495 (2009)
41. Scanniello, G., D'Amico, A., D'Amico, C., D'Amico, T.: Architectural layer re-
covery for software system understanding and evolution. Software Practice and
Experience 40, 897-916 (2010), http://dx.doi.org/10.1002/spe.v40:10
42. Scanniello, G., D'Amico, A., D'Amico, C., D'Amico, T.: Using the kleinberg algo-
rithm and vector space model for software system clustering. In: Proceedings of
the IEEE 18th International Conference on Program Comprehension, ICPC 2010,
pp. 180-189. IEEE Computer Society, Washington, DC (2010),
http://dx.doi.org/10.1109/ICPC.2010.17
43. Tzerpos, V., Holt, R.C.: On the stability of software clustering algorithms. In:
Proceedings of the 8th International Workshop on Program Comprehension, pp.
211-218 (2000)
44. Vert, J.P.: A Tree Kernel to analyse phylogenetic profiles. Bioinformatics 18(suppl.
1), S276-S284 (2002)
45. Wahler, V., Seipel, D., von Gudenberg, J.W., Fischer, G.: Clone detection in source
code by frequent itemset techniques. In: SCAM 2004: Proceedings of the Fourth
IEEE International Workshop on Source Code Analysis and Manipulation, pp.
128-135. IEEE Computer Society, Washington, DC (2004)
46. Wiggerts, T.A.: Using clustering algorithms in legacy systems remodularization.
In: Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE
1997), pp. 33-43. IEEE Computer Society, Washington, DC (1997),
http://portal.acm.org/citation.cfm?id=832304.836999
47. Wu, J., Hassan, A.E., Holt, R.C.: Comparison of clustering algotithms in the con-
text of software evolution. In: Proceedings of the 21st IEEE International Confer-
ence on Software Maintenance, pp. 525-535. IEEE Computer Society (2005)
48. Yang, W.: Identifying syntactic differences between two programs. Software - Prac-
tice and Experience 21(7), 739-755 (1991)
 
 
Search WWH ::




Custom Search