Proceedings. 19th International Conference on Automated Software Engineering, 2004.
DOI: 10.1109/ase.2004.1342754
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
75
0
5

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 83 publications
(82 citation statements)
references
References 3 publications
2
75
0
5
Order By: Relevance
“…This is not much different from results in the previous dynamic aspect mining approach [4]. However, both approaches give interesting insights into some of the crosscutting behaviour of the analysed program.…”
Section: Discussion Conclusion and Future Workmentioning
confidence: 48%
See 2 more Smart Citations
“…This is not much different from results in the previous dynamic aspect mining approach [4]. However, both approaches give interesting insights into some of the crosscutting behaviour of the analysed program.…”
Section: Discussion Conclusion and Future Workmentioning
confidence: 48%
“…The dynamic aspect mining approach previously developed [4] is based on the analysis of program traces, which mirror a system's behaviour in certain program runs. Within these program traces, recurring execution patterns which describe certain behavioural aspects of the software system are identified.…”
Section: Aspect Mining Based On Execution Relationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bruntink et al [5] propose the use of clone detection for the identification of crosscutting concerns, comparing the performance of different clone detection techniques, namely AST-based and token-based. Aspect mining using dynamic analysis has been proposed by Breu and Krinke [3]: the idea is to detect particular patterns occurring in an execution trace. An approach for aspect mining using formal concept analysis on execution traces was proposed by Tonella et al [25].…”
Section: Related Workmentioning
confidence: 99%
“…Ceccato et al [6] provide a comparison of three different aspect mining techniques: identifier analysis, fan-in analysis and analysis of execution traces. Breu and Krinke propose an approach based on analyzing event traces for concern identification [3].…”
Section: Tool Supportmentioning
confidence: 99%