2011 15th European Conference on Software Maintenance and Reengineering 2011
DOI: 10.1109/csmr.2011.8
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the use of lexical information for software system clustering

Abstract: Developers have a lot of freedom in writing comments as well as in choosing identifiers and method names. These are intentional in nature and provide a different relevance of information to understand what a software system implements, and in particular the role of each source file.In this paper we investigate the effectiveness of exploiting lexical information for software system clustering. In particular we explore the contribution of the combined use of six different dictionaries, corresponding to the six p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
59
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 76 publications
(60 citation statements)
references
References 36 publications
(85 reference statements)
0
59
0
1
Order By: Relevance
“…• Algorithm for Comprehension-Driven Clustering (ACDC) [47] [14], [15] and two of its variants, • Architecture Recovery using Concerns (ARC) [21]. The selected techniques have been previously published, they are automated, and they have been designed specifically for architecture recovery.…”
Section: Selected Recovery Techniquesmentioning
confidence: 99%
See 4 more Smart Citations
“…• Algorithm for Comprehension-Driven Clustering (ACDC) [47] [14], [15] and two of its variants, • Architecture Recovery using Concerns (ARC) [21]. The selected techniques have been previously published, they are automated, and they have been designed specifically for architecture recovery.…”
Section: Selected Recovery Techniquesmentioning
confidence: 99%
“…Recent work has focused on utilizing textual input [14], [15], [33], [21] obtained from source code and comments. The resulting techniques combine textual input with other commonly-used architecture recovery mechanisms, such as objective function maximization or hierarchical clustering.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations