Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Substring Matching for Clone Detection and Change Tracking
ICSM '94 Proceedings of the International Conference on Software Maintenance
Visualizing textual redundancy in legacy source
CASCON '94 Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research
Experiences in program understanding
CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 1
Identifying redundancy in source code using fingerprints
CASCON '93 Proceedings of the 1993 conference of the Centre for Advanced Studies on Collaborative research: software engineering - Volume 1
Using textual redundancy to study The Mintainability of source
Advances in software engineering
Navigating the textual redundancy web in legacy source
CASCON '96 Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
Hi-index | 0.00 |
As software systems evolve, their source, data, and documentation files change. Understanding the location and magnitude of this change can reveal information about the evolution process and the system itself.For processes that affect only small amounts of text, change can be identified by removing large blocks of identical text in common among snapshots of the system taken at different times. The results can be summarized to show where change has happened.A technique referred to as components of redundancy is introduced that allocates the amount of matching with nodes in the directory tree in a way that provides useful insight.Two case studies are presented that show different applications of this kind of change analysis: the evolution of source as a result of development and maintenance activities and the change caused by the installation of software on the system folder of a personal computer.These two examples show that this is a general purpose technology that addresses a set of problems in a number of unrelated domains. Other such applications involve the study of a complex build process, change in databases, or any malicious or unintentional modification to computer systems.