Use este identificador para citar ou linkar para este item:
http://repositorio.ufla.br/jspui/handle/1/32998
Registro completo de metadados
Campo DC | Valor | Idioma |
---|---|---|
dc.creator | Maffort, Cristiano | - |
dc.creator | Valente, Marco Tulio | - |
dc.creator | Terra, Ricardo | - |
dc.creator | Bigonha, Mariza | - |
dc.creator | Anquetil, Nicolas | - |
dc.creator | Hora, André | - |
dc.date.accessioned | 2019-02-25T11:54:05Z | - |
dc.date.available | 2019-02-25T11:54:05Z | - |
dc.date.issued | 2016-06 | - |
dc.identifier.citation | MAFFORT, C. et al. Mining architectural violations from version history. Empirical Software Engineering, [S. l.], v. 21, n. 3, p. 854-895, June 2016. | pt_BR |
dc.identifier.uri | https://link.springer.com/article/10.1007/s10664-014-9348-2 | pt_BR |
dc.identifier.uri | http://repositorio.ufla.br/jspui/handle/1/32998 | - |
dc.description.abstract | Software architecture conformance is a key software quality control activity that aims to reveal the progressive gap normally observed between concrete and planned software architectures. However, formally specifying an architecture can be difficult, as it must be done by an expert of the system having a high level understanding of it. In this paper, we present a lightweighted approach for architecture conformance based on a combination of static and historical source code analysis. The proposed approach relies on four heuristics for detecting absences (something expected was not found) and divergences (something prohibited was found) in source code based architectures. We also present an architecture conformance process based on the proposed approach. We followed this process to evaluate the architecture of two industrial-strength information systems, achieving an overall precision of 62.7 % and 53.8 %. We also evaluated our approach in an open-source information retrieval library, achieving an overall precision of 59.2 %. We envision that an heuristic-based approach for architecture conformance can be used to rapidly raise architectural warnings, without deeply involving experts in the process. | pt_BR |
dc.language | en_US | pt_BR |
dc.publisher | Springer | pt_BR |
dc.rights | restrictAccess | pt_BR |
dc.source | Empirical Software Engineering | pt_BR |
dc.subject | Software architecture conformance | pt_BR |
dc.subject | Software architecture erosion | pt_BR |
dc.subject | Reflexion models | pt_BR |
dc.subject | Mining software repositories | pt_BR |
dc.subject | Conformidade de arquitetura de software | pt_BR |
dc.subject | Software arquitetura erosão | pt_BR |
dc.subject | Software arquitetura conformidade | pt_BR |
dc.subject | Modelos de reflexão | pt_BR |
dc.subject | Repositórios de software de mineração | pt_BR |
dc.title | Mining architectural violations from version history | pt_BR |
dc.type | Artigo | pt_BR |
Aparece nas coleções: | DCC - Artigos publicados em periódicos |
Arquivos associados a este item:
Não existem arquivos associados a este item.
Os itens no repositório estão protegidos por copyright, com todos os direitos reservados, salvo quando é indicado o contrário.
Ferramentas do administrador