Proceedings of 1993 15th International Conference on Software Engineering
DOI: 10.1109/icse.1993.346057
|View full text |Cite
|
Sign up to set email alerts
|

Rule-based approach to computing module cohesion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(55 citation statements)
references
References 6 publications
0
55
0
Order By: Relevance
“…However, many authors continued to develop new application areas for static slicing, such as reverse engineering [Canfora et al 1994b;Simpson et al 1993], program comprehension [De Lucia et al 1996, testing [Binkley 1998;Gupta et al 1992;Harman and Danicic 1995;Hierons et al 2002Hierons et al , 1999, and software metrics [Bieman and Ott 1994;Lakhotia 1993;Ott and Thuss 1993]. Following Weiser's initial work, many authors also developed techniques for slicing, but not until comparatively recently have sufficiently mature program slicing tools been able to handle large programs written using the entirety (rather than merely a subset) of a popular programming language.…”
Section: Implications Of the Findingsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, many authors continued to develop new application areas for static slicing, such as reverse engineering [Canfora et al 1994b;Simpson et al 1993], program comprehension [De Lucia et al 1996, testing [Binkley 1998;Gupta et al 1992;Harman and Danicic 1995;Hierons et al 2002Hierons et al , 1999, and software metrics [Bieman and Ott 1994;Lakhotia 1993;Ott and Thuss 1993]. Following Weiser's initial work, many authors also developed techniques for slicing, but not until comparatively recently have sufficiently mature program slicing tools been able to handle large programs written using the entirety (rather than merely a subset) of a popular programming language.…”
Section: Implications Of the Findingsmentioning
confidence: 99%
“…Slicing has been applied to reverse engineering [Canfora et al 1994b;Simpson et al 1993], program comprehension , software maintenance [Canfora et al 1994a;Gallagher 1992;Gallagher and Lyle 1991], debugging [Agrawal et al 1993;Kamkar 1993;Lyle and Weiser 1987;Weiser and Lyle 1985], testing [Binkley 1997[Binkley , 1998Gupta et al 1992;Harman and Danicic 1995;Hierons et al 1999Hierons et al , 2002, component reuse [Beck and Eichmann 1993;Cimitile et al 1995a], program integration Horwitz et al 1989], and software metrics [Bieman and Ott 1994;Lakhotia 1993;Ott and Thuss 1993]. There are several surveys of slicing techniques, applications and variations [Binkley and Gallagher 1996;Binkley and Harman 2004;De Lucia et al 2001;Tip 1995].…”
Section: Introductionmentioning
confidence: 99%
“…In this case, the model part of the viewpoint definition is less important. Examples of such viewpoints are the activity-based viewpoint which identifies the architectural elements according to their level of interaction with their environment, and the cohesion-based viewpoint [17] [14] which identifies a set of related architectural elements according the strength of their dependencies. The framework can easily integrate other viewpoints.…”
Section: Architectural Viewpointsmentioning
confidence: 99%
“…We then discuss how flow sensitivity can be introduced to make a contextsensitive, flow-sensitive algorithm. VDGAA starts by building a variable dependence graph, where nodes represent variables and edges represent dependence between them [9]. Since a variable is represented by a single node in the graph, all definitions and uses of a variable are represented by the edges coming in and out the node.…”
Section: Introductionmentioning
confidence: 99%