13th International Workshop on Program Comprehension (IWPC'05)
DOI: 10.1109/wpc.2005.2
|View full text |Cite
|
Sign up to set email alerts
|

A Qualitative Comparison of Three Aspect Mining Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
59
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(60 citation statements)
references
References 10 publications
1
59
0
Order By: Relevance
“…Let S = {s 1 , s 2 , ..., s 17 } be a software system with 17 elements, and let C 1 = {s 2 , s 3 , s 17 } and C 2 = {s 1 , s 4 , s 8 } be the crosscutting concerns that exist in the system S (CCC = {C 1 , C 2 }). C 1 First we have to determine the set M C 1 .…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Let S = {s 1 , s 2 , ..., s 17 } be a software system with 17 elements, and let C 1 = {s 2 , s 3 , s 17 } and C 2 = {s 1 , s 4 , s 8 } be the crosscutting concerns that exist in the system S (CCC = {C 1 , C 2 }). C 1 First we have to determine the set M C 1 .…”
Section: Examplementioning
confidence: 99%
“…There are very few comparisons made between the aspect mining techniques proposed so far [4,10,16,17], and even less comparisons based on the obtained results [4,17]. One important cause is the lack of measures for evaluating the results obtained and the quality of the results (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…The result of such a technique is typically an enumeration of joinpoints where the concern is located. Ceccato et al [6] provide a comparison of three different aspect mining techniques: identifier analysis, fan-in analysis and analysis of execution traces. Breu and Krinke propose an approach based on analyzing event traces for concern identification [3].…”
Section: Tool Supportmentioning
confidence: 99%
“…As a consequence, several works have been developed in two areas that are critical when migrating to this new technology: aspect mining [6,19,34] and aspect-oriented refactoring [21,16,24,25]. The purpose of aspect mining techniques is to identify crosscutting concerns in legacy, non-aspect-oriented code.…”
Section: Introductionmentioning
confidence: 99%