By Topic

Software, IET

Issue 3 • Date June 2013

Filter Results

Displaying Results 1 - 4 of 4
  • Guest Editorial: The 11th IEEE International Working Conference on Source Code Analysis and Manipulation

    Publication Year: 2013 , Page(s): 129 - 130
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (76 KB)  

    This Special Issue collects three contributions that are substantially revised versions of the papers that appear in the conference proceedings of SCAM 2011 - The 11th IEEE International Working Conference on Source Code Analysis and Manipulation. The aim of the Source Code Analysis and Manipulation conference series is to bring together researchers and practitioners working on theory, techniques ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program analysis too loopy? Set the loops aside

    Publication Year: 2013 , Page(s): 131 - 149
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (687 KB)  

    Among the many obstacles to efficient and sound program analysis, loops may be the most prevalent. In program analyses that traverse paths, loops introduce a variable, possibly infinite and number of paths. This study assesses the potential of a program analysis technique that analyses loops separately and replaces the loop with a summary, similar to how many analyses use summaries for interproced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I2SD: reverse engineering Sequence Diagrams Enterprise Java Beans from with interceptors

    Publication Year: 2013 , Page(s): 150 - 166
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1371 KB)  

    An Enterprise JavaBeans (EJB) interceptor is a software mechanism that provides for introducing behaviour implemented as separate code into the execution of a Java application. In this way, EJB interceptors provide a clear separation of the core functionality of the bean and other concerns, such as logging or performance analysis. Despite the beauty of the idea behind the i nterceptors, developing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conflict-aware optimal scheduling of prioritised code clone refactoring

    Publication Year: 2013 , Page(s): 167 - 186
    Cited by:  Papers (6)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1038 KB)  

    Duplicated or similar source code, also known as code clones, are possible malicious 'code smells' that may need to be removed through refactoring to enhance maintainability. Among many potential refactoring opportunities, the choice and order of a set of refactoring activities may have distinguishable effect on the design/code quality measured in terms of software metrics. Moreover, there may be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Software publishes papers on all aspects of the software lifecycle, including design, development, implementation and maintenance.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_sen@theiet.org