2015
DOI: 10.1016/j.scico.2013.11.021
|View full text |Cite
|
Sign up to set email alerts
|

Understanding software artifact provenance

Abstract: In a well designed software system, units of related functionality are organized into modules and classes, which are in turn arranged into inheritance trees, package hierarchies, components, libraries, frameworks, and services. The trade-offs between simplicity versus flexibility and power are carefully considered, and interfaces are designed that expose the key functional properties of a component while hiding much of the complexity of the implementation details. However, over time the design integrity of a w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…However, it should be considered that this event addressed the provenance challenges in the general scope and not specifically in the SP domain. The results dating from only 2005 also shows the lack of maturity of this research field and the need, as underscored by some authors [9][10] [16], for more scientific papers about using provenance in the context of SP.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it should be considered that this event addressed the provenance challenges in the general scope and not specifically in the SP domain. The results dating from only 2005 also shows the lack of maturity of this research field and the need, as underscored by some authors [9][10] [16], for more scientific papers about using provenance in the context of SP.…”
Section: Related Workmentioning
confidence: 99%
“…It tracks the provenance of source code and generates provenance reports to facilitate the management of its intellectual property. Other works, such as [10] [16], motivate the need to model and extract software artifacts provenance. Davies et al [10] explore the recovery of the provenance of software artifacts by a broad set of techniques (signature matching, source code fact extraction, software clone detection, call flow graph matching, string matching, historical analyses etc.)…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the second part of this work we explore the implications of such a huge replication factor on the problem of software provenance tracking [19,20] at the massive scale of public source code, addressing our second research question:…”
Section: Introductionmentioning
confidence: 99%
“…In the last part of the paper, we explore the implications of such multiplication on the problem of software provenance tracking [14,15] for public source code. We ask ourselves: is it feasible to keep track of all the different contexts in which a given file or commit occur across the entire corpus?…”
Section: Introductionmentioning
confidence: 99%