2008
DOI: 10.1007/978-3-540-87891-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic Reuse: Lessons from Scrapheap Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0
2

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 6 publications
0
11
0
2
Order By: Relevance
“…For example, during maintenance tasks, some programmers follow a "systemic" strategy aimed at understanding how different parts of the code interact [30,38]. In contrast, an "opportunistic" strategy aims to find only the section of code that is needed for a particular change [9,32,14,35]. In either strategy, studies suggest that programmers form a mental model of the software [36], specifically including the relationships between different sections of source code [41,34,50,51].…”
Section: Studies Of Program Comprehensionmentioning
confidence: 99%
“…For example, during maintenance tasks, some programmers follow a "systemic" strategy aimed at understanding how different parts of the code interact [30,38]. In contrast, an "opportunistic" strategy aims to find only the section of code that is needed for a particular change [9,32,14,35]. In either strategy, studies suggest that programmers form a mental model of the software [36], specifically including the relationships between different sections of source code [41,34,50,51].…”
Section: Studies Of Program Comprehensionmentioning
confidence: 99%
“…In this development context, systems are built in an opportunistic manner [6], considering at the same time the environment and the strategy of the organization, the components available in the marketplace (e.g., OTS marketplace, FOSS community), their capacity for being integrated into a single system and interoperate in a transparent manner, and the resources required by their adoption and integration.…”
Section: Introductionmentioning
confidence: 99%
“…This paper proposes the DHARMA method to identify the architecture of a component-based system. The generic components that form this architecture may be later substituted in an opportunistic manner (in the sense of [6]) by components of different nature and origins forming a hybrid system. Specifically, DHARMA is based on the use of the i* framework [9], exploiting its ability to represent actors, dependencies and intentions.…”
Section: Introductionmentioning
confidence: 99%
“…These studies consistently show that programmers follow either a "systemic" strategy for understanding source code, or an "opportunistic" one (Ko and Myers 2005;Littman et al 1987;Brandt et al 2010;Kotonya et al 2008;Davison et al 2000;Lakhotia 1993;Holmes and Walker 2013;Ko et al 2006). The difference between these two strategies is that in a systemic strategy, programmers try to understand how the components of a program interact, while in an opportunistic strategy, programmers only seek to understand how to modify a small section of code.…”
Section: Program Comprehensionmentioning
confidence: 88%