2012
DOI: 10.1016/j.eswa.2011.09.084
|View full text |Cite
|
Sign up to set email alerts
|

Building an expert system to assist system refactorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…For instance, in Health Watcher the changes range from functionality increments and enhancements on error handling policies to the incorporation of design patterns as means to improve the system modularity. Our third application is the Subscribers DB [22], which is large software of a publishing house. The Subscribers DB system manages data related with the subscribers of its publications and it supports complex queries on several types of data.…”
Section: Target Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, in Health Watcher the changes range from functionality increments and enhancements on error handling policies to the incorporation of design patterns as means to improve the system modularity. Our third application is the Subscribers DB [22], which is large software of a publishing house. The Subscribers DB system manages data related with the subscribers of its publications and it supports complex queries on several types of data.…”
Section: Target Applicationsmentioning
confidence: 99%
“…When combining the scores, a deficit index is calculated for the entire system -considering different source code metrics, such as code complexity, module coupling and cohesion metrics. The second approach is realized by the JSpIRIT tool [22], which supports semi-automated refactoring of the most critical design problems in a software system. The tool suggests a ranked list of the most critical code anomalies -based on a combination of different criteria -and intends to reduce the time spent on code anomaly prioritization.…”
Section: Detection and Prioritization Of Critical Code Anomaliesmentioning
confidence: 99%
“…In addition, we remove works on transformations for a too specific problem (stylized edits) [Meng et al 2013]. For instance, works in concurrent transformations [Brown et al 2013, Wloka et al 2009, Schäfer et al 2011, removal of security issues [Joiner et al 2014, Ma et al 2016, refactoring of web applications [Nguyen et al 2013c], refactoring to aspects [Vidal and Marcos 2013, Vidal and Marcos 2012, Marin et al 2009, refactoring C macros [Medeiros et al 2014, Overbey et al 2014, refactoring product lines [Schulze et al 2013], among others. Table 4 shows our quality criteria.…”
Section: Quality Assessmentmentioning
confidence: 99%
“…Indeed, as argued in [17], some domain variability should be implemented as crosscutting concerns. When a template engine does not support Aspect Oriented Programming (AOP) [18,19,20], templates may suffer metacode tangling (multiple variable concerns implemented simultaneously in a template) or metacode scattering (a variable concern implemented in multiple templates).…”
Section: Introductionmentioning
confidence: 99%