2009
DOI: 10.1007/978-3-642-03013-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Program Metamorphosis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…For instance, previous work [25,32] has discussed swapping two names, e.g., transforming field declarations String s1; String s2; to String s2; String s1;, changing uses of s1 and s2 appropriately. One cannot apply the RENAME refactoring to first change s1 to s2 or viceversa, since a name conflict arises.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, previous work [25,32] has discussed swapping two names, e.g., transforming field declarations String s1; String s2; to String s2; String s1;, changing uses of s1 and s2 appropriately. One cannot apply the RENAME refactoring to first change s1 to s2 or viceversa, since a name conflict arises.…”
Section: Overviewmentioning
confidence: 99%
“…The first five examples are transformations presented in Fowler [6] that are not implemented in Eclipse, but can be accomplished via a sequence of the refactorings we have implemented. We also include two examples of name swapping refactorings that have appeared in the literature [25,32], each of which requires a non-obvious introduction of a temporary name in the refactoring sequence. Finally, the INTRO-DUCE PARAMETER example, found online, can be achieved via a complex sequence of six of our implemented refactorings.…”
Section: Refactoring Sequencesmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, program metamorphosis [Reichenbach et al 2009], a generalization of traditional refactoring, materializes such concerns as persistent warnings that users can review during the refactoring process. This is analogous to a static bug report issued by FindBugs in that developers may now raise objections, such as "this method is private and not supposed to ever be called via reflection.…”
Section: Applicability To Refactoringmentioning
confidence: 99%
“…Later work considered various features of sequential programs such as class hierarchies [12,28,29], generics [5,6,14,31], design patterns [13], and access modifiers [27]. Other research has focused on refactoring support to adapt programs to evolving libraries [3], combining refactorings with other programs transformations [22], empirical studies [18,19], and domain-specific languages for specifying refactorings [30].…”
Section: Related Workmentioning
confidence: 99%