Clustering methodologies for software engineering

M Shtern, V Tzerpos - Advances in Software Engineering, 2012 - Wiley Online Library
The size and complexity of industrial strength software systems are constantly increasing.
This means that the task of managing a large software project is becoming even more …

Many-objective software remodularization using NSGA-III

W Mkaouer, M Kessentini, A Shaout… - ACM Transactions on …, 2015 - dl.acm.org
Software systems nowadays are complex and difficult to maintain due to continuous
changes and bad design choices. To handle the complexity of systems, software products …

Challenges in visual data analysis

DA Keim, F Mansmann… - … Visualisation (IV'06), 2006 - ieeexplore.ieee.org
In today's applications data is produced at unprecedented rates. While the capacity to collect
and store new data grows rapidly, the ability to analyze these data volumes increases at …

Mono2micro: a practical and effective tool for decomposing monolithic java applications to microservices

AK Kalia, J **ao, R Krishna, S Sinha… - Proceedings of the 29th …, 2021 - dl.acm.org
In migrating production workloads to cloud, enterprises often face the daunting task of
evolving monolithic applications toward a microservice architecture. At IBM, we developed a …

Software architecture reconstruction: A process-oriented taxonomy

S Ducasse, D Pollet - IEEE Transactions on Software …, 2009 - ieeexplore.ieee.org
To maintain and understand large applications, it is important to know their architecture. The
first problem is that unlike classes and packages, architecture is not explicitly represented in …

Hierarchical clustering for software architecture recovery

O Maqbool, H Babri - IEEE Transactions on Software …, 2007 - ieeexplore.ieee.org
Gaining an architectural level understanding of a software system is important for many
reasons. When the description of a system's architecture does not exist, attempts must be …

Fast, scalable detection of" piggybacked" mobile applications

W Zhou, Y Zhou, M Grace, X Jiang, S Zou - Proceedings of the third ACM …, 2013 - dl.acm.org
Mobile applications (or apps) are rapidly growing in number and variety. These apps
provide useful features, but also bring certain privacy and security risks. For example …

Identification of high-level concept clones in source code

A Marcus, JI Maletic - Proceedings 16th annual international …, 2001 - ieeexplore.ieee.org
Source code duplication occurs frequently within large software systems. Pieces of source
code, functions, and data types are often duplicated in part or in whole, for a variety of …

Information-theoretic software clustering

P Andritsos, V Tzerpos - IEEE Transactions on Software …, 2005 - ieeexplore.ieee.org
The majority of the algorithms in the software clustering literature utilize structural
information to decompose large software systems. Approaches using other attributes, such …

Supporting program comprehension using semantic and structural information

JI Maletic, A Marcus - … of the 23rd International Conference on …, 2001 - ieeexplore.ieee.org
Focuses on investigating the combined use of semantic and structural information of
programs to support the comprehension tasks involved in the maintenance and …