Search Results - "Anquetil, N"
-
1
Extracting concepts from file names; a new file clustering criterion
Published in Proceedings / International Conference on Software Engineering (1998)“…Decomposing complex software systems into conceptually independent subsystems is a significant software engineering activity which received considerable…”
Get full text
Conference Proceeding Journal Article -
2
Characterizing the informal knowledge contained in systems
Published in Proceedings Eighth Working Conference on Reverse Engineering (2001)“…Program comprehension of legacy systems is a highly knowledge-intensive task. One of the goals of reverse engineering is to propose automated help to relate…”
Get full text
Conference Proceeding -
3
A comparison of graphs of concept for reverse engineering
Published in Proceedings IWPC 2000. 8th International Workshop on Program Comprehension (2000)“…To group related things together (for example to form subsystems), researchers in reverse engineering are looking for algorithms that create meaningful groups…”
Get full text
Conference Proceeding -
4
What do developers consider magic literals? A smalltalk perspective
Published in Information and software technology (01-09-2022)“…Literals are constant values (numbers, strings, etc.) used in the source code. Magic literals are such values used without an explicit explanation of their…”
Get full text
Journal Article -
5
A disturbing result on the knowledge used during software maintenance
Published in Ninth Working Conference on Reverse Engineering, 2002. Proceedings (2002)“…As part of a long term project aiming at empowering software maintainers with knowledge based tools, we conducted an empirical study on the knowledge they use…”
Get full text
Conference Proceeding -
6
Ten Years Later, Experiments with Clustering as a Software Remodularization Method
Published in 2009 16th Working Conference on Reverse Engineering (01-10-2009)“…In this talk we will first review our research program that led to the paper which has been designated the most influential paper from WCRE 1999. The paper…”
Get full text
Conference Proceeding -
7
A Framework to Compare Alert Ranking Algorithms
Published in 2012 19th Working Conference on Reverse Engineering (01-10-2012)“…To improve software quality, rule checkers statically check if a software contains violations of good programming practices. On a real sized system, the alerts…”
Get full text
Conference Proceeding -
8
Legacy Software Restructuring: Analyzing a Concrete Case
Published in 2011 15th European Conference on Software Maintenance and Reengineering (01-03-2011)“…Software re-modularization is an old preoccupation of reverse engineering research. The advantages of a well structured or modularized system are well known…”
Get full text
Conference Proceeding -
9
Uncovering Causal Relationships between Software Metrics and Bugs
Published in 2012 16th European Conference on Software Maintenance and Reengineering (01-03-2012)“…Bug prediction is an important challenge for software engineering research. It consist in looking for possible early indicators of the presence of bugs in a…”
Get full text
Conference Proceeding -
10
A risk taxonomy proposal for software maintenance
Published in 21st IEEE International Conference on Software Maintenance (ICSM'05) (2005)“…There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in…”
Get full text
Conference Proceeding -
11
Legacy software evaluation model for outsourced maintainer
Published in Eighth European Conference on Software Maintenance and Reengineering, 2004. CSMR 2004. Proceedings (2004)“…Outsourcing has become common practice in the software industry. Organizations routinely subcontract the maintenance of their software assets to specialized…”
Get full text
Conference Proceeding -
12
An Empirical Model for Continuous and Weighted Metric Aggregation
Published in 2011 15th European Conference on Software Maintenance and Reengineering (01-03-2011)“…It is now understood that software metrics alone are not enough to characterize software quality. To cope with this problem, most of advanced and/or…”
Get full text
Conference Proceeding -
13
JavaCompExt: Extracting Architectural Elements from Java Source Code
Published in 2009 16th Working Conference on Reverse Engineering (01-01-2009)“…Software architecture erosion is a general problem in legacy software. To fight this trend, component models and languages are designed to try to make…”
Get full text
Conference Proceeding -
14
Domain specific warnings: Are they any better?
Published in 2012 28th IEEE International Conference on Software Maintenance (ICSM) (01-09-2012)“…Tools to detect coding standard violations in source code are commonly used to improve code quality. One of their original goals is to prevent bugs, yet, a…”
Get full text
Conference Proceeding -
15
Comment je fais… l’examen échographique des canaux semi-circulaires du fœtus
Published in Gynécologie, obstétrique & fertilité (01-09-2016)Get full text
Journal Article -
16
How I do… the ultrasound examination of fetal semicircular canals
Published in Gynécologie, obstétrique & fertilité (01-09-2016)Get full text
Journal Article -
17
Experiments with clustering as a software remodularization method
Published in Sixth Working Conference on Reverse Engineering (Cat. No.PR00303) (1999)“…As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key…”
Get full text
Conference Proceeding -
18
Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs
Published in 2012 16th European Conference on Software Maintenance and Reengineering (01-03-2012)“…To harness the complexity of big legacy software, software engineering tools need more and more information on these systems. This information may come from…”
Get full text
Conference Proceeding -
19
Recovering software architecture from the names of source files
Published in Journal of software maintenance (01-05-1999)“…We discuss how to extract a useful set of subsystems from a set of existing source‐code file names. This problem is challenging because many legacy systems use…”
Get full text
Journal Article