1999
DOI: 10.1002/(sici)1096-908x(199905/06)11:3<201::aid-smr192>3.0.co;2-1
|View full text |Cite
|
Sign up to set email alerts
|

Recovering software architecture from the names of source files

Abstract: We discuss how to extract a useful set of subsystems from a set of source-code file names. This problem is challenging because, in many legacy systems, there are thousands of files with names that are very short and cryptic. At the same time the problem is important because software engineers often find it difficult to understand such systems. We propose a general algorithm to cluster files based on their names, and a set of alternative methods for implementing the algorithm. One of the key tasks is picking ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
48
0
1

Year Published

2003
2003
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 87 publications
(50 citation statements)
references
References 18 publications
1
48
0
1
Order By: Relevance
“…Table I summarises the case studies used in the experiment. The SLoC metric is taken as the current project size as reported by Ohloh, an open source project metrics tracker 2 . The "Component Used" column identifies which part of the system was used in cases where the product comprises multiple JAR files.…”
Section: Subject Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table I summarises the case studies used in the experiment. The SLoC metric is taken as the current project size as reported by Ohloh, an open source project metrics tracker 2 . The "Component Used" column identifies which part of the system was used in cases where the product comprises multiple JAR files.…”
Section: Subject Systemsmentioning
confidence: 99%
“…Both approaches ultimately use certain indicators in the system to assign elements into appropriate groups. Previous approaches have selected indicators to be file names [2], the connectivity of the files [3] or other features [4], [5], [6], [7], [8]. They are unsupervised in the sense that there is no (or at best very limited) means to externally guide the process to improve the final outcome.…”
Section: Introductionmentioning
confidence: 99%
“…Anquetil and Lethbridge on the other hand use file names for creating an abstraction of the architecture using clustering [25]. They also provide an overview of a range of issues to tackle when adopting cluster analysis, and illustrate the effects on several open source systems as well as a system comprising two million lines of code [26].…”
Section: Related Workmentioning
confidence: 99%
“…In [46] the authors show how source code analysis supports reduction of costs in IT transformation projects. Literature provides examples of its application in supporting recovery of software architecture [3] or migration of the IT-portfolio to a service oriented architecture (SOA) model [24]. There are also numerous instances of automated software modifications [47,59,58] aided with code analysis.…”
Section: Related Workmentioning
confidence: 99%
“…In this query we found programming constructs labeled by us earlier as AGGF, ORDER, WHRE 3 The country code check, which was carried out as first, was not restricting the dataset well enough and thus hampering the performance. All five cursors had their WHERE clauses rewritten by changing the order in which the predicates are checked.…”
Section: Modulementioning
confidence: 99%