Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of software refactoring
T Mens, T Tourwé - IEEE Transactions on software engineering, 2004 - ieeexplore.ieee.org
We provide an extensive overview of existing research in the field of software refactoring.
This research is compared and discussed based on a number of different criteria: the …
This research is compared and discussed based on a number of different criteria: the …
Locating features in source code
T Eisenbarth, R Koschke… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Understanding the implementation of a certain feature of a system requires identification of
the computational units of the system that contribute to this feature. In many cases, the …
the computational units of the system that contribute to this feature. In many cases, the …
Software architecture reconstruction: A process-oriented taxonomy
To maintain and understand large applications, it is important to know their architecture. The
first problem is that unlike classes and packages, architecture is not explicitly represented in …
first problem is that unlike classes and packages, architecture is not explicitly represented in …
Hierarchical clustering for software architecture recovery
Gaining an architectural level understanding of a software system is important for many
reasons. When the description of a system's architecture does not exist, attempts must be …
reasons. When the description of a system's architecture does not exist, attempts must be …
Fast, scalable detection of" piggybacked" mobile applications
Mobile applications (or apps) are rapidly growing in number and variety. These apps
provide useful features, but also bring certain privacy and security risks. For example …
provide useful features, but also bring certain privacy and security risks. For example …
Synthesizing near-optimal malware specifications from suspicious behaviors
Fueled by an emerging underground economy, malware authors are exploiting
vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …
vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …
Refactoring: Current research and future trends
In this paper we provide an detailed overview of existing research in the field of software
restructuring and refactoring, from a formal as well as a practical point of view. Next, we …
restructuring and refactoring, from a formal as well as a practical point of view. Next, we …
Representing concerns in source code
A software modification task often addresses several concerns. A concern is anything a
stakeholder may want to consider as a conceptual unit, including features, nonfunctional …
stakeholder may want to consider as a conceptual unit, including features, nonfunctional …
An empirical analysis of the impact of software development problem factors on software maintainability
JC Chen, SJ Huang - Journal of Systems and Software, 2009 - Elsevier
Many problem factors in the software development phase affect the maintainability of the
delivered software systems. Therefore, understanding software development problem …
delivered software systems. Therefore, understanding software development problem …
A survey of formal concept analysis support for software engineering activities
Abstract Formal Concept Analysis (FCA) has typically been applied in the field of software
engineering to support software maintenance and object-oriented class identification tasks …
engineering to support software maintenance and object-oriented class identification tasks …