共 50 条
- [3] An evaluation of clone detection techniques for identifying crosscutting concerns [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2004, : 200 - 209
- [4] Identifying the Crosscutting among Concerns by Methods' Calls Analysis [J]. SOFTWARE ENGINEERING, BUSINESS CONTINUITY, AND EDUCATION, 2011, 257 : 147 - 158
- [5] A Comparison of Approaches to Legacy System Crosscutting Concerns Mining [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 813 - 816
- [7] Identifying composite crosscutting concerns through semi-supervised learning [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (12): : 1525 - 1545
- [8] A classification of crosscutting concerns [J]. ICSM 2005: PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2005, : 673 - 676
- [9] Techniques for the Identification of Crosscutting Concerns: A Systematic Literature Review [J]. INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 569 - 579
- [10] Modularizing Crosscutting Concerns with Ptolemy [J]. AOSD 2011 PROCEEDINGS AND COMPANION MATERIAL, 2011, : 61 - 62