2014 21st Asia-Pacific Software Engineering Conference 2014
DOI: 10.1109/apsec.2014.34
|View full text |Cite
|
Sign up to set email alerts
|

Interactive Scalable Abstraction of Reverse Engineered UML Class Diagrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Moreover, knowledge of role stereotypes can aid in reducing the information presented to developers through design summarisation. Initial studies into summarisation have been described by Osman et al (2014). These studies showed that additional semantic information about components in the design could be useful.…”
Section: Use In Program Comprehensionmentioning
confidence: 99%
“…Moreover, knowledge of role stereotypes can aid in reducing the information presented to developers through design summarisation. Initial studies into summarisation have been described by Osman et al (2014). These studies showed that additional semantic information about components in the design could be useful.…”
Section: Use In Program Comprehensionmentioning
confidence: 99%
“…There are several academic approaches on architectural views oriented to soft-ware comprehension tasks, for example: CodeCity (Wettel et al 2011), eCity+ (Khan et al 2014), AIVA (Snajberk et al 2012;najberk et al 2013), SAABs (Osman et al 2014), Softwarenaut (Lungu et al 2014), VizDSL (Morgan et al 2018), Modigen (Gerhart and Boger 2016), EuGENia, 17 Moose, 18 and GRAPH (Bergel et al 2014).…”
Section: Software Visualizationmentioning
confidence: 99%
“…A fast way to recover missing documentation is to rely on reverse engineering [9]. However, reverse engineered models have a tendency to become overly complex since they do not contain the abstraction mechanisms usually applied manually by architects [10]. Some of these abstractions can be achieved by methods of filtering software entities.…”
Section: B Separating Names-used and User-names In The Feature Vectormentioning
confidence: 99%