Proceedings of the 28th Annual ACM Symposium on Applied Computing 2013
DOI: 10.1145/2480362.2480567
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review on mining techniques for crosscutting concerns

Abstract: Background: The several maintenance tasks a system is submitted during its life usually cause its architecture deviates from the original conceivable design, ending up with scattered and tangled concerns across the software. The research area named concern mining attempts to identify such scattered and tangled concerns to support maintenance and reverse-engineering. Objectives: The aim of this paper is threefold: (i) identifying techniques employed in this research area, (ii) extending a taxonomy available on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…This result reinforces the need for improving knowledge and technology on conceptual cohesion measurement. Conceptual cohesion metrics can take advantage of evolving concern mining techniques [7]. So, in future, we suggest the implementation of conceptual cohesion metrics in software measurement tools integrated with automated concern mining techniques.…”
Section: Resultsmentioning
confidence: 99%
“…This result reinforces the need for improving knowledge and technology on conceptual cohesion measurement. Conceptual cohesion metrics can take advantage of evolving concern mining techniques [7]. So, in future, we suggest the implementation of conceptual cohesion metrics in software measurement tools integrated with automated concern mining techniques.…”
Section: Resultsmentioning
confidence: 99%
“…Some of them are focused in the code structure while others in the code behavior of a system, so it is recommended the use of combined techniques in order to achieve better results in terms of precision and recall [27]. They generally use techniques from data mining and data analysis like formal concept analysis and clustering and other ones such as program slicing, clone detection, pattern matching, natural language processing, dynamic analysis, and so on [8].…”
Section: Mining Of Crosscutting Concernsmentioning
confidence: 99%
“…Aspect mining (or concern mining) is another important research field very related to reverse engineering [6,7]. The main purpose is to identify source code elements that contribute to the implementation of crosscutting concerns (CCs) [8], such as persistence and cryptography. After the identification, the next step is the remodularization of the system using aspect-oriented programming [9].…”
Section: Introductionmentioning
confidence: 99%
“…It considers 93 studies from the last decade and it is shown that safety and timing requirements have been extensively analysed and verified, but there is a lack of work on key phases like requirements elicitation and management, while also the adoption of industrial standards is largely missing and so are methods to handle the currently critical concerns of privacy and trust requirements. Additionally, worth mentioning are some earlier studies, in particular in specific application domains [200][201][202][203][204], as well as on teaching FM [205].…”
mentioning
confidence: 99%