• Nenhum resultado encontrado

Source code

Extracting relative thresholds for source code metrics

Extracting relative thresholds for source code metrics

... We performed an extensive analysis of relative thresholds. Initially, we derive relative thresholds for six source code metrics, using the Qualitas Corpus. Next, we re- port seven studies using these ...

130

An empirical investigation of source code metrics and findbugs warnings

An empirical investigation of source code metrics and findbugs warnings

... the source code at a given location obeys a desired property or not, it will make the safest approximation and issue a warning, regardless of the ...the code is examined can lead to an explosion in ...

95

Conclave : Ontology-Driven Measurement of Semantic Relatedness between Source Code Elements and Problem Domain Concepts

Conclave : Ontology-Driven Measurement of Semantic Relatedness between Source Code Elements and Problem Domain Concepts

... During this stage more knowledge about the system is build and provided to the system end-user. The tools in this stage use as input the ontologies built during the previous stage, and generally fall in one of the two ...

16

investigation of source code mining using novel code mining parameter matrix: recent state of art

investigation of source code mining using novel code mining parameter matrix: recent state of art

... of code mining techniques with the light of existing code mining ...techniques, source code cloning and framework for detecting faulty use of software APIs are been ...detail code ...

10

Source Code Plagiarism Detection Method Using Protégé Built Ontologies

Source Code Plagiarism Detection Method Using Protégé Built Ontologies

... individual of type ProgrammingStructure with three individuals of type SystemFunctions included in it (object property is_included_in). The same rules apply to the next lines of code until we finish parsing all ...

12

Profile Detection Through Source Code Static Analysis

Profile Detection Through Source Code Static Analysis

... their source code. Static code analysis may be defined as the act of analysing source-code without actually executing it, as opposed to dynamic code analysis which is done on ...

13

A source code based model to generate GUI: GUI generation based on source code with declarative language extensions

A source code based model to generate GUI: GUI generation based on source code with declarative language extensions

... from source code based models, as opposed to the use of specialized GUI ...of source code based models is the proximity between the model and the code we want to execute, improving the ...

8

Mining architectural violations from version history

Mining architectural violations from version history

... Software architecture conformance is a key software quality control activity that aims to reveal the progressive gap normally observed between concrete and planned software architectures. However, formally specifying ...

131

Documentação de APIs usando exemplos de código

Documentação de APIs usando exemplos de código

... The authors have built a tool that implements the proposed approach, called Strathcona, which has two main modules: Client and Server. The Client module, a plug-in for the Eclipse IDE, extracts the structural context ...

105

Predicting software defects with causality tests = Predizendo defeitos de software com testes de causalidade

Predicting software defects with causality tests = Predizendo defeitos de software com testes de causalidade

... between source code metrics (as predictors) and the occurrence of ...in source code metrics values can be used to forecast changes in time series of ...the source code of a ...

130

Support For Distributed Programming In Extreme Style

Support For Distributed Programming In Extreme Style

... Integration of JCoverage and Cruise Control tools (Fig. 7) can be approached as one of the implementation challenges as well. The intention was to provide automated source code compilation, tests execution ...

13

Ilha Desterro  vol.70 número1

Ilha Desterro vol.70 número1

... Claudia Springer describes a kind of new sci-i hero: “rampaging muscle-bound cyborgs were replaced by slim young men and women jacked into cyberspace, inspired by ‘console cowboys’ in cyberpunk iction of the 1980s” (in ...

8

Automatically fixing static analysis tools violations

Automatically fixing static analysis tools violations

... the source of warning without obviously changing the ...rule Code should not contain a hard coded reference to an absolute pathname, whose recommended solution involves introducing an environment ...the ...

73

Graphical user interface redefinition addressing users’ diversity

Graphical user interface redefinition addressing users’ diversity

... Complementing those works enables a generic GUI redefinition for all approach fed by the user emotional state. This is beneficial because it enables designers and developers to keep existing design and source ...

9

Understanding the shape of feature code

Understanding the shape of feature code

... the code base, avoiding the upfront investment on creating modules and interfaces [Kästner et ...in source code, metrics quantifying properties, such as scattering, tangling, or nesting, have been ...

102

Speculative Execution by using Software Transactional Memory

Speculative Execution by using Software Transactional Memory

... Finally, we present the performance results when we used the automatic speculative execution mechanism to add speculative execution to the source code of the benchmark. Speculative execu[r] ...

108

Concept Location based on System Dependency Graphs

Concept Location based on System Dependency Graphs

... Finally there is also a text field to the user enter search terms in the comments. When the user press the Search button the list of comments present in the source code are showed in the list of the left ...

72

Adaptive method of lines for multi-component aerosol condensational growth and cloud droplet activation

Adaptive method of lines for multi-component aerosol condensational growth and cloud droplet activation

... A simple yet robust air-parcel model of cloud drop formation utilizing the adaptive method of lines was formulated. Implementation of the model was discussed and its source code is avail[r] ...

45

1998 ACM Subject Classification D.2.7 Distribution, Maintenance, and Enhancement - Re-

1998 ACM Subject Classification D.2.7 Distribution, Maintenance, and Enhancement - Re-

... Feature location techniques are usually organized by types of analysis: (a) dynamic analysis, which is based in software execution traces, and examines programs runtime (e.g. [1, 38]); (b) static analysis, based on ...

16

Comment-based Keyword Programming

Comment-based Keyword Programming

... One line short comment is often used line by line es- pecially on a commercial source code that requires high readability. Comment-based keyword programming is very useful for such situations. Our future ...

5

Show all 2523 documents...

temas relacionados