Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2556871.2556933acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccConference Proceedingsconference-collections
research-article

Clustering Software Components for Component Reuse and Program Restructuring

Published: 01 December 2013 Publication History

Abstract

Clustering Software Components for efficient component retrieval is gaining a significant practical importance in the field of software engineering from academic researchers and software industry. Clustering reduces the search space of components by grouping similar entities together thus ensuring reduced time complexity. Finding software components for efficient software reuse is one of the important problems gaining interest from researchers. In this Paper, we first define a similarity function and then give a generalized approach for clustering software components. A component may be a program module or any software document. The objective of component clustering is to form clusters containing high cohesive and low coupling components. Experiments were conducted with Reuters 21578 dataset by considering 70% of documents for training and 30% as test data.

References

[1]
Rakesh Agrawal et.al. 1993. Mining association rules between sets of items in very large databases, Proceedings of the ACM SIGMOD Conference on Management of data, 1993, 207--216.
[2]
Jong Kook Lee, Seung Jae Jung et.al 2001. Component Identification method with coupling and cohesion. Proceedings of IEEE 8th Asia Pacific Software Engineering Conference.
[3]
Fernando Brito, Miguel Goulao. 2001. Coupling and cohesion as modularization drivers. Are we being over pursuaded. 5th European conference on software of maintenance and ReEngineering, CSMR'2001, 47-57.
[4]
F.Beil et.al. 2002. Frequent-Term based clustering. 8th ACMSIGKDD International conference on knowledge discovery and data mining,2002,436-442.
[5]
O.Maqbool,H.A.Babri. 2004.The weighted combined algorithm : A linkage algorithm for software clustering. CSMR '04 Proceedings of the Eighth Euromicro Working Conference on Software Maintenance and Reengineering, 15-24.
[6]
Chung-Horng Lung et.al. 2004.Applications of clustering techniques to software partitioning, recovery and restructuring, Journal of Systems and Software, Volume 73,2004,227 -- 244.
[7]
Periklis Andritsos, Vassilios Tzerpos. 2005. Information Theoretic software Clustering. IEEE Transactions on Software Engineering, Volume 31, No 2, 2005, 150-165.
[8]
Wen Zhanga, Taketoshi Yoshida, Xijin Tang, Qing Wang. 2010. Text clustering using frequent itemsets, Knowledge-Based Systems, Volume 23, 2010, 379--388.
[9]
Tianming Hu,Sam Yuan Sung, Hui Xiong, Qian Fu. 2008. Discovery of maximum length frequent itemsets, Information Sciences,Volume 178, 2008,Pg.69--87.
[10]
Congnan Luo, Yanjun Li, Soon M. Chung. 2009. Text document clustering based on neighbors, Data & Knowledge Engineering, Volume 68, 2009, 1271--1288.
[11]
Melita Hajdinjak, Andrej Bauer. 2009. Similarity Measures for Relational Databases, Informatica,Volume 33, 2009,143--149.
[12]
Vincent Labatut and Hocine Cherifi. 2011. Accuracy Measures for the Comparison of Classifiers, ICIT 2011 The 5th International Conference on Information Technology.
[13]
Jung-Yi Jiang et.al. 2011. A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification, IEEE Transactions on knowledge and Data Engineering,Vol. 3, No. 3,2011.
[14]
Wen Zhanga et.al. 2011. A comparative study of TF*IDF, LSI and multi-words for text classification. Expert Systems with Applications, Volume 38, 2758--2765.
[15]
Salim kebir, Abdelhak-djamel seriai, Sylvain Chardigny. 2012. Comparing and Combining Genetic and Cluster Algorithms for Software Component Identification, Proceedings of the ACM Fifth International Conference on Computer Science and Software Engineering, 2012,1-8.
[16]
Jian Wang et.al. 2012. Using Fuzzy clustering method to classify the component in the process of software evaluation. Information Technology Journal, Volume 11, Issue 3, 2012, 396-98.
[17]
Vangipuram Radhakrishna, C.Srinivas, C.V.GuruRao. 2013. Document Clustering using hybrid XOR similarity function for efficient component reuse. Procedia Computer Science Journal.
[18]
Chung-Horng Lung, Amit Nandi, Marzia Zaman. 2004. Applications of Clustering to Early Software Life Cycle Phases.
[19]
Chun Yong Chong, Sai Peck Lee, Teck Chaw Ling. 2013. Efficient Software Clustering Technique Using an Adaptive and Preventive Dendrogram Cutting approach, Information and Software Technology, Volume 55 Issue 11.
[20]
Yves Chiricota, Fabien Jourdan, Guy Melançon. 2003. Software Components Capture Using Graph Clustering, Proceedings of the 11th IEEE International Workshop on Program Comprehension.
[21]
Kamran Sartipi, Kostas Kontogiannis. 2001. Component Clustering Based on Maximal Association, Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01).

Cited By

View all
  • (2022)Software Module Clustering: An In-Depth Literature AnalysisIEEE Transactions on Software Engineering10.1109/TSE.2020.304255348:6(1905-1928)Online publication date: 1-Jun-2022
  • (2021)Design and Analysis of activation functions used in deep learning modelsThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492575(1-5)Online publication date: 11-Oct-2021
  • (2021)Design of Gaussian Similarity Measure for Network Anomaly DetectionInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460759(225-230)Online publication date: 5-Apr-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCC '13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
December 2013
285 pages
ISBN:9781450321198
DOI:10.1145/2556871
  • General Chairs:
  • Min Wu,
  • Wei Lee,
  • Program Chairs:
  • Yiyi Zhouzhou,
  • Riza Esa,
  • Xiang Lee
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • ACM Wuhan Chapter: ACM Wuhan Chapter

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Clustering
  2. Similarity function
  3. frequent term
  4. hybrid XNOR

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCC '13

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Software Module Clustering: An In-Depth Literature AnalysisIEEE Transactions on Software Engineering10.1109/TSE.2020.304255348:6(1905-1928)Online publication date: 1-Jun-2022
  • (2021)Design and Analysis of activation functions used in deep learning modelsThe 7th International Conference on Engineering & MIS 202110.1145/3492547.3492575(1-5)Online publication date: 11-Oct-2021
  • (2021)Design of Gaussian Similarity Measure for Network Anomaly DetectionInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460759(225-230)Online publication date: 5-Apr-2021
  • (2021)Fuzzy Feature Similarity Functions for Feature Clustering and Dimensionality ReductionInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460758(219-224)Online publication date: 5-Apr-2021
  • (2021)A SURVEY ON SIMILARITY MEASURES AND MACHINE LEARNING ALGORITHMS FOR CLASSIFICATION AND PREDICTIONInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460755(198-204)Online publication date: 5-Apr-2021
  • (2021)A Survey of Similarity Measures for Time stamped Temporal DatasetsInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460754(193-197)Online publication date: 5-Apr-2021
  • (2021)Fake News Detection Using Machine Learning MethodsInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460753(185-192)Online publication date: 5-Apr-2021
  • (2021)Similarity Association Pattern Mining in Transaction DatabasesInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460752(180-184)Online publication date: 5-Apr-2021
  • (2021)Regression analysis for network intrusion detectionInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460751(173-179)Online publication date: 5-Apr-2021
  • (2021)Study of Detection of DDoS attacks in cloud environment Using Regression AnalysisInternational Conference on Data Science, E-learning and Information Systems 202110.1145/3460620.3460750(166-172)Online publication date: 5-Apr-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media