MHS2003. Proceedings of 2003 International Symposium on Micromechatronics and Human Science (IEEE Cat. No.03TH8717)
DOI: 10.1109/wpc.2003.1199187
|View full text |Cite
|
Sign up to set email alerts
|

Effective, automatic procedure extraction

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(34 citation statements)
references
References 25 publications
0
29
0
Order By: Relevance
“…As another example, Komondoor and Horwitz developed a semanticspreserving procedure extraction algorithm that runs on PDGbased clones [22,23]. Finally, CCShaper [17] filters the output of CCFinder to find good candidates for the extract method and pull up method refactoring patterns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As another example, Komondoor and Horwitz developed a semanticspreserving procedure extraction algorithm that runs on PDGbased clones [22,23]. Finally, CCShaper [17] filters the output of CCFinder to find good candidates for the extract method and pull up method refactoring patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Many efforts have focused on automatically identifying code clones [6,10,13,18,19,22,24,26,30] and on using the output of clone detection as a basis for refactoring [8,17,23]. Some methodologists have educated programmers about how to avoid or remove code clones.…”
Section: Introductionmentioning
confidence: 99%
“…Previous works include a wide range of techniques from code compression [10][11][12][13] to procedure abstraction [14][15][16] and dead code elimination [17].…”
Section: Related Workmentioning
confidence: 99%
“…Komondoor and Horvitz propose procedure extraction at the source code level [14,15]. Zmily and Kozyrakis propose BLISS which successfully targets reducing text space, energy use and execution time [20].…”
Section: Related Workmentioning
confidence: 99%
“…Program slicing has been applied to several stages of the reverse engineering process, such as program restructuring [4,9,10,28,31] program comprehension [14,18,28,29,30] regression testing [5] and program integration [26]. In all these applications, the important aspect of slicing is the way in which it allows the reverse engineer to extract a semantically meaningful sub-computation, based on a slicing criterion which captures the aspect of the overall computation.…”
Section: Introductionmentioning
confidence: 99%