2010 14th European Conference on Software Maintenance and Reengineering 2010
DOI: 10.1109/csmr.2010.36
|View full text |Cite
|
Sign up to set email alerts
|

A Probabilistic Based Approach towards Software System Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
53
1
3

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(59 citation statements)
references
References 25 publications
2
53
1
3
Order By: Relevance
“…However, a lot of important information, such as design decisions and rationale, is embedded in the comments and identifiers in source code classes. Other remodularization approaches also exploit conceptual (or semantic) information in addition to structural information [Bavota et al 2010;Maletic and Marcus 2001;Kuhn et al 2007;Scanniello et al 2010;Corazza et al 2010;Corazza et al 2011]. Bavota et al [Bavota et al 2010] used graph theory to identify extract package refactoring operations.…”
Section: Related Workmentioning
confidence: 99%
“…However, a lot of important information, such as design decisions and rationale, is embedded in the comments and identifiers in source code classes. Other remodularization approaches also exploit conceptual (or semantic) information in addition to structural information [Bavota et al 2010;Maletic and Marcus 2001;Kuhn et al 2007;Scanniello et al 2010;Corazza et al 2010;Corazza et al 2011]. Bavota et al [Bavota et al 2010] used graph theory to identify extract package refactoring operations.…”
Section: Related Workmentioning
confidence: 99%
“…• Algorithm for Comprehension-Driven Clustering (ACDC) [47] [14], [15] and two of its variants, • Architecture Recovery using Concerns (ARC) [21]. The selected techniques have been previously published, they are automated, and they have been designed specifically for architecture recovery.…”
Section: Selected Recovery Techniquesmentioning
confidence: 99%
“…Recent work has focused on utilizing textual input [14], [15], [33], [21] obtained from source code and comments. The resulting techniques combine textual input with other commonly-used architecture recovery mechanisms, such as objective function maximization or hierarchical clustering.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Six techniques are selected for this purpose which are: ACDC [6], BUNCH [7], WCA [18], LIMBO [19], ZoneBased Recovery (ZBR) [31] and Architecture Recovery using Concerns (ARC) [32]. These techniques are evaluated in terms of accuracy, authoritativeness and in terms of the recovery criteria used.…”
Section: Related Workmentioning
confidence: 99%