2012 19th Working Conference on Reverse Engineering 2012
DOI: 10.1109/wcre.2012.35
|View full text |Cite
|
Sign up to set email alerts
|

On the Evolutionary Nature of Architectural Violations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
28
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 27 publications
(30 citation statements)
references
References 23 publications
1
28
0
1
Order By: Relevance
“…The last point is clearly the most limiting factor. We investigated a number of further systems, e.g., from (Macia et al 2012a;Brunet et al 2012), but discarded them from our study, because they were either too small in terms of system size or an application of the reflexion modeling approach did not uncover architectural inconsistencies. Apart from these requirements, the source code of the systems is also available, as required for performing reflexion modeling and for applying some of the metric suites we used.…”
Section: Case Selectionmentioning
confidence: 99%
See 3 more Smart Citations
“…The last point is clearly the most limiting factor. We investigated a number of further systems, e.g., from (Macia et al 2012a;Brunet et al 2012), but discarded them from our study, because they were either too small in terms of system size or an application of the reflexion modeling approach did not uncover architectural inconsistencies. Apart from these requirements, the source code of the systems is also available, as required for performing reflexion modeling and for applying some of the metric suites we used.…”
Section: Case Selectionmentioning
confidence: 99%
“…Its core search engine, which is the system in focus here, consists of more than 500 classes with more than 60,000 LOC. We modeled the architecture of Lucene using JITTAC based on an article by Brunet et al (Brunet et al 2012) which describes Lucene's architecture in terms of modules and allowed dependencies between modules as well as a mapping of modules to the source code of the system. One of the authors manually created a JITTAC model according to this description which was cross-checked for correctness and soundness by the two other authors.…”
Section: Case Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Studies suggest that they are effective but, by-in-large, these studies focus on identification of inconsistencies only (Lindvall et al 2002;Tesoriero et al 2004) or identification and removal of inconsistencies (Bang and Medvidovic 2015;Brunet et al 2012Brunet et al , 2015Buckley et al 2015;Rosik et al 2011). In order to assess if there was literature directly targeted at practitioners' needs in the AC area, we carried out a targeted literature review of the IEEE and ACM search engines with a query search logically equivalent to Bsoftware AND architecture AND (conformance OR consistency) AND (empirical OR practice OR study).…”
Section: Practitioner Studiesmentioning
confidence: 99%