The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002)
DOI: 10.1109/icse.1999.841045
|View full text |Cite
|
Sign up to set email alerts
|

Linux as a case study: its extracted software architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
96
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(97 citation statements)
references
References 0 publications
1
96
0
Order By: Relevance
“…Recently, a series of studies has been undertaken by Holt et al to recover the architectures of several largescale, open-source applications (e.g., Linux, Apache) [4,15]. Their approach is similar to ours in that they also come up with a conceptual architecture and use it as the basis of understanding a system's implementation.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Recently, a series of studies has been undertaken by Holt et al to recover the architectures of several largescale, open-source applications (e.g., Linux, Apache) [4,15]. Their approach is similar to ours in that they also come up with a conceptual architecture and use it as the basis of understanding a system's implementation.…”
Section: Discussionmentioning
confidence: 99%
“…Poor Modularity -Numerous researchers, including a recent study by Bowman et al [4], have demonstrated that developer discipline is difficult to ensure in a large system built and maintained by many people over a long time; in such cases, the physical architecture of the system eventually reaches a high degree of connectivity among its components. We have not encountered cases of such severe architectural erosion in our studies classes, and so on.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Architectural recovery is one of the recognized counter-measures to this decay [12]. Several earlier works have been focused on the architectural recovery of proprietary [12], closed academic [1], COTS [4] and FLOSS [6,17,37] systems; in all of these studies, systems were selected in a specific state of evolution, and their internal structures analysed for discrepancies between the folder-structure and concrete architectures [37]. Repair actions have been formulated as frameworks [32], methodologies [20] or guidelines and concrete advice to developers [37].…”
Section: Background and Related Workmentioning
confidence: 99%