Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleDecember 2023
Code smell prioritization in object‐oriented software systems: A systematic literature review
Journal of Software: Evolution and Process (WSMR), Volume 35, Issue 12https://doi.org/10.1002/smr.2536AbstractCode smells indicate poor design and imperfection in coding style. They increase maintenance costs and degrade software quality. Detecting and mitigating these code smells reduce the effects of flaws present in the software design. However, to ...
image image
- research-articleDecember 2022
Crossing Learning Thresholds Progressively via Active Learning
SPLASH-E 2022: Proceedings of the 2022 ACM SIGPLAN International Symposium on SPLASH-EPages 14–23https://doi.org/10.1145/3563767.3568128Existence of thresholds in learning has been long recognized. Their nature has been well characterized, and it is recognized that they need to be treated differently from other core concepts. Helping learners cross thresholds has been identified as ...
- research-articleSeptember 2011
Assessment of maintainability metrics for object-oriented software system
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 36, Issue 5Pages 1–7https://doi.org/10.1145/2020976.2020983Many organizations assess the maintainability of software systems before they are deployed. Object-oriented design has been shown to be a useful technique to develop and deliver quality software. Objectoriented metrics can be used to assess the ...
- ArticleAugust 2011
UML Visual Modeling Technology and Application
ICFCSE '11: Proceedings of the 2011 International Conference on Future Computer Science and EducationPages 509–512https://doi.org/10.1109/ICFCSE.2011.130Unified Modeling Language is a kind of language which can be applied to describing, visualizing, framing software system and to business modeling. It contains analysis, design and realization of object-oriented technology, providing abundant, precise ...
- research-articleNovember 2010
Assessment of usability metrics for object-oriented software system
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 35, Issue 6Pages 1–4https://doi.org/10.1145/1874391.1874400The demand for efficient software is increasing day by day. For this reason software developers need appropriate metrics for the development of software applications. Usability is one of the most important fields in software engineering and a highly ...
-
- ArticleJuly 2009
Description Logic Framework for Access Control and Security in Object-Oriented Systems
RSFDGrC '07: Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular ComputingPages 565–573https://doi.org/10.1007/978-3-540-72530-5_68Integrating the RBAC model in object-oriented systems is a natural way to describe authorization policies. We extend the RBAC model for access control in object-oriented systems in the context of the Access Control List. In this paper, we discuss ...
- articleJuly 2007
A Petri Net Based Method for Refining Object Oriented System Specifications
Electronic Notes in Theoretical Computer Science (ENTCS) (ENTCS), Volume 187Pages 161–172https://doi.org/10.1016/j.entcs.2006.08.050In object-oriented system design, requirements are given as use cases in the form of object interaction scenarios. One need to derive, from these object interaction scenarios, object-based behavioural specifications for implementation purposes. In this ...
- articleSeptember 2005
An RBAC-Based Access Control Model for Object-Oriented Systems Offering Dynamic Aspect Features
IEICE - Transactions on Information and Systems (TROIS), Volume E88-D, Issue 9Pages 2143–2147https://doi.org/10.1093/ietisy/e88-d.9.2143This paper proposes a model for access control within object-oriented systems. The model is based on RBAC (role-based access control) and is called DRBAC (dynamic RBAC). Although RBAC is powerful in access control, the original design of RBAC required ...
- articleJune 2005
Extracting Components from Object-Oriented System: A Transformational Approach
IEICE - Transactions on Information and Systems (TROIS), Volume E88-D, Issue 6Pages 1178–1190https://doi.org/10.1093/ietisy/e88-d.6.1178The increasing complexity and shorter life cycle of software have made it necessary to reuse software. Object-oriented development has not facilitated extensive reuse of software and it has become difficult to manage and understand modern object-...
- ArticleSeptember 2002
Trust Objects in Electronic Commerce Transactions
OOIS '02: Proceedings of the 8th International Conference on Object-Oriented. Information SystemsPages 31–39People see trust as an important key issue in embracing electronic commerce. In this paper we review trust within the context of electronic commerce and we propose a trust model, which is based on object-oriented concepts.
- ArticleJuly 1995
Reengineering procedural into object-oriented systems
This paper describes a reengineering tool for automatically transforming a system composed of procedural programs into a functionally comparable object-oriented system. The transformation into the object-oriented form locates redundant duplicated and ...
- ArticleJuly 1995
Reengineering procedural into object-oriented systems
This paper describes a reengineering tool for automatically transforming a system composed of procedural programs into a functionally comparable object-oriented system. The transformation into the object-oriented form locates redundant duplicated and ...
- ArticleMarch 1995
Design goals of object-oriented wrappers for the Mach microkernel
The Taligent Object System (TOS) is an object-oriented system hosted on a modern microkernel, Mach. Mach has a procedural application programming interface (API) defined in the C programming language. This paper presents the design goals for a set of C++...
- ArticleOctober 1994
Object behavior composition by transition and state composition
Behavior composition is essential to construct an object-oriented system from interacting objects. We propose a method to compose behaviors of the objects typically found in real-time applications. In our approach, the behaviors of individual objects ...
- research-articleMarch 1990
A Buffer-Based Method for Storage Allocation in an Object-Oriented System
IEEE Transactions on Computers (ITCO), Volume 39, Issue 3Pages 375–383https://doi.org/10.1109/12.48867As some object-oriented computing systems support the object type buffer by hardware, it is reasonable to base their free storage management on a set of buffers, each containing free storage blocks of a specific length. Then memory space can normally be ...
- research-articleSeptember 1987
Edmas: An Object-Oriented, Locally Distributed Mail System
IEEE Transactions on Software Engineering (ISOF), Volume 13, Issue 9Pages 1001–1009https://doi.org/10.1109/TSE.1987.233522The Eden Project conducts research in the design and implementation of a distributed computing environment for a local area network. A specific goal in designing Eden was to provide users the advantages of both physical distribution and logical ...