Proceedings of the Fourth European Conference on Software Maintenance and Reengineering
DOI: 10.1109/csmr.2000.827321
|View full text |Cite
|
Sign up to set email alerts
|

Architectural design recovery using data mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 24 publications
0
20
0
1
Order By: Relevance
“…They consider source code fragments that contain many attributes involved in such rules as a collection of structurally related fragments. Sartipi et al use both association rule mining and clustering to identify structurally related fragments in the architecture recovery process [24]. These three approaches differ in both intent and form.…”
Section: Other Data Mining Approaches For Software Engineering Tasksmentioning
confidence: 99%
“…They consider source code fragments that contain many attributes involved in such rules as a collection of structurally related fragments. Sartipi et al use both association rule mining and clustering to identify structurally related fragments in the architecture recovery process [24]. These three approaches differ in both intent and form.…”
Section: Other Data Mining Approaches For Software Engineering Tasksmentioning
confidence: 99%
“…The techniques using formal concept analysis differ in the definition of the so called formal context that defines the objects, attributes, and relation used as input to concept analysis and also in the use of the resulting lattice. Data mining techniques (de Oca and Carver 1998;Sartipi et al 2000a;Sartipi 2001) and spectral analysis (Shokoufandeh et al 2002) are also used.…”
Section: Automated Clusteringmentioning
confidence: 99%
“…Recovering modules and subsystems from existing software systems has proven useful in a number of ways and many methods to automatically or semiautomatically detect components have been published in the literature [2,3,[5][6][7]10,8,9,14,12,13,16,18,19,24,23,22,20,[25][26][27][28][29][32][33][34][35][37][38][39][40][42][43][44][45][46][47]49,[56][57][58][59][60]64,65,67,63,61,48,54,55,…”
Section: Introductionmentioning
confidence: 99%