2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) 2017
DOI: 10.1109/compsac.2017.142
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…After importance estimation, to visualize interactions related to core objects, we exploit the object grouping and visualization algorithm proposed in our previous work [20]. The algorithm takes our core identification result as its input.…”
Section: Object Grouping and Visualization Of Intergroup Interactionsmentioning
confidence: 99%
See 1 more Smart Citation
“…After importance estimation, to visualize interactions related to core objects, we exploit the object grouping and visualization algorithm proposed in our previous work [20]. The algorithm takes our core identification result as its input.…”
Section: Object Grouping and Visualization Of Intergroup Interactionsmentioning
confidence: 99%
“…This paper is an extended version of our previous work [20]. The main differences from our previous work are as follows:…”
Section: Introductionmentioning
confidence: 99%
“…Noda et al proposed a dynamic analysis‐based technique that reduces the number of lifelines (and interactions) in reverse‐engineered sequence diagrams by selecting only the important objects in a software system. The identification of the core objects is achieved by detecting the long‐lived and frequently accessed objects in the execution traces.…”
Section: Overview Of State‐of‐the‐art Techniquesmentioning
confidence: 99%
“…Afterwards, UML state machine and sequence diagrams are reverse engineered from the gathered information. The problems of merging the recorded execution traces are addressed in [22], where a method for identifying systems key behavior and generating a readable sequence diagrams is presented. There are several studies on reverse engineering specifically use case diagrams.…”
Section: Related Workmentioning
confidence: 99%
“…The new extending use case and combined use case are joined by extend relation(Figure 4, line 21). Combined use cases' activity diagram is appended with decision node, reference (callBehaviorAction) to the new activity diagram, and merge node(Figure 4, lines[22][23][24].…”
mentioning
confidence: 99%