2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) 2017
DOI: 10.1109/msr.2017.6
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Program Dependencies in Java EE Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Thus, we need to examine the different technologies and figure out how that invocation works. In [19] [20], we examined, among other things, invocation patterns for JSP, and identified half a dozen ways that a JSP page can be invoked 9 , including:…”
Section: Characterizing and Codifying Invocation Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we need to examine the different technologies and figure out how that invocation works. In [19] [20], we examined, among other things, invocation patterns for JSP, and identified half a dozen ways that a JSP page can be invoked 9 , including:…”
Section: Characterizing and Codifying Invocation Patternsmentioning
confidence: 99%
“…Similar analyses need to be made for other JEE technologies, including Java Server Faces (see [19] and [20]). For the purpose of this project,we will not perform an exhaustive analysis of all the technologies.…”
Section: Characterizing and Codifying Invocation Patternsmentioning
confidence: 99%
“…Recently developed software systems contains implicit dependencies resulted form the use of late dynamic-binding, Java-reflection and container-services offered by the frameworks. These implicit dependencies are difficult to be detected using static analysis techniques [27]. All of these existing component identification approaches that are designed to identify components from OO software applications are not be directly applied to OO APIs.…”
Section: Related Workmentioning
confidence: 99%
“…With regards to dependency modeling approaches, Shatnawi et al aim at identifying dependency call graphs of legacy Java EE applications to ease their migration to loosely coupled architectures [39]. Kula et al also study JVM-based projects to support migration to more recent versions of a given open source library [28].…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, manifold dependencies are not only specified in source code but also in configuration files. To face this challenge, both approaches parse dependencies from these sources and extract information in their own models: the Knowledge Discovery Meta-model (KDM) [34,39] and the Software Universe Graph (SUG) [28]. Jezek et al statically extract dependencies and potential smells from the source code and bytecode of applications [20].…”
Section: Related Workmentioning
confidence: 99%