-
4
-
-
78649781402
-
DECOR: A method for the specification and detection of code and design smells
-
[Online], Available
-
N. Moha, Y.-G. Guéhéneuc, L. Duchien, and A.-F. L. Meur, "DECOR: A method for the specification and detection of code and design smells, " Transactions on Software Engineering (TSE), 2009, 16 pages. [Online]. Available: http://www-etud.iro.umontreal.ca/̃ptidej/Publications/ Documents/TSE09.doc.pdf.
-
(2009)
Transactions on Software Engineering (TSE)
, pp. 16
-
-
Moha, N.1
Guéhéneuc, Y.-G.2
Duchien, L.3
Meur, A.-F.L.4
-
5
-
-
77949346031
-
Facilitating software refactoring with appropriate resolution order of bad smells
-
New York, NY, USA: ACM
-
H. Liu, L. Yang, Z. Niu, Z. Ma, and W. Shao, "Facilitating software refactoring with appropriate resolution order of bad smells, " in ESEC/FSE'09: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. New York, NY, USA: ACM, 2009, pp. 265-268.
-
(2009)
ESEC/FSE'09: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
, pp. 265-268
-
-
Liu, H.1
Yang, L.2
Niu, Z.3
Ma, Z.4
Shao, W.5
-
7
-
-
58849085347
-
Review of "artificial immune systems: A new computational intelligence approach
-
by l.n. de castro and j. timmis (eds) springer, London, 2002
-
F. Azuaje, "Review of "artificial immune systems: a new computational intelligence approach" by l.n. de castro and j. timmis (eds) springer, london, 2002, " Neural Netw., vol. 16, no. 8, pp. 1229-1229, 2003.
-
(2003)
Neural Netw.
, vol.16
, Issue.8
, pp. 1229-1229
-
-
Azuaje, F.1
-
9
-
-
0003885315
-
-
st ed. John Wiley and Sons, March, [Online]. Available
-
st ed. John Wiley and Sons, March 1998. [Online]. Available: www.amazon.com/exec/obidos/tg/detail/-/0471197130/ref=ase\-theantipatterngr/ 103-4749445-6141457.
-
(1998)
Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis
-
-
Brown, W.J.1
Malveau, R.C.2
Brown, W.H.3
McCormick III, H.W.4
Mowbray, T.J.5
-
10
-
-
84880309500
-
A taxonomy and an initial empirical study of bad smells in code
-
Washington, DC, USA: IEEE Computer Society
-
M. Mäntylä, J. Vanhanen, and C. Lassenius, "A taxonomy and an initial empirical study of bad smells in code, " in ICSM'03: Proceedings of the International Conference on Software Maintenance. Washington, DC, USA: IEEE Computer Society, 2003, p. 381.
-
(2003)
ICSM'03: Proceedings of the International Conference on Software Maintenance
, pp. 381
-
-
Mäntylä, M.1
Vanhanen, J.2
Lassenius, C.3
-
11
-
-
14544277795
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing Co. Inc
-
W. C. Wake, Refactoring Workbook. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 2003.
-
(2003)
Refactoring Workbook
-
-
Wake, W.C.1
-
12
-
-
84928744653
-
-
5th ed. by Richard A. Goldsby, Thomas J. Kindt, Barbara A. Osborne, W.H
-
K. J., Immunology, 5th ed. by Richard A. Goldsby, Thomas J. Kindt, Barbara A. Osborne, W.H, 2002.
-
(2002)
Immunology
-
-
-
13
-
-
84892884817
-
Artificial immune system (ais) research in the last five years
-
IEEE, [Online]. Available
-
D. Dasgupta, Z. Ji, and F. Gonzalez, "Artificial immune system (ais) research in the last five years." in IEEE Congress on Evolutionary Computation (1). IEEE, 2003, pp. 123-130. [Online]. Available: http://dblp.uni-trier.de/db/conf/cec/cec2003-1.html#DasguptaJG03.
-
(2003)
IEEE Congress on Evolutionary Computation
, vol.1
, pp. 123-130
-
-
Dasgupta, D.1
Ji, Z.2
Gonzalez, F.3
-
14
-
-
44949220179
-
Generalized needleman-wunsch algorithm for the recognition of t-cell epitopes
-
L. Nanni and A. Lumini, "Generalized needleman-wunsch algorithm for the recognition of t-cell epitopes, " Expert Syst. Appl., vol. 35, no. 3, pp. 1463-1467, 2008.
-
(2008)
Expert Syst. Appl.
, vol.35
, Issue.3
, pp. 1463-1467
-
-
Nanni, L.1
Lumini, A.2
-
15
-
-
78649763463
-
-
Ph.D. dissertation, Stanford, CA, USA, adviser-Batzoglou, Serafim
-
M. Brudno, "Algorithms for comparison of dna sequences, " Ph.D. dissertation, Stanford, CA, USA, 2004, adviser-Batzoglou, Serafim.
-
(2004)
Algorithms for Comparison of Dna Sequences
-
-
Brudno, M.1
-
16
-
-
3543106606
-
Anomaly Detection Using Real-Valued Negative Selection
-
DOI 10.1023/A:1026195112518
-
F. A. González and D. Dasgupta, "Anomaly detection using real-valued negative selection, " Genetic Programming and Evolvable Machines, vol. 4, no. 4, pp. 383-403, 2003. (Pubitemid 37283494)
-
(2003)
Genetic Programming and Evolvable Machines
, vol.4
, Issue.4
, pp. 383-403
-
-
Gonzalez, F.A.1
Dasgupta, D.2
-
17
-
-
0003722376
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing Co. Inc
-
D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1989.
-
(1989)
Genetic Algorithms in Search, Optimization and Machine Learning
-
-
Goldberg, D.E.1
-
18
-
-
34248392200
-
An evaluation of negative selection algorithm with constraint-based detectors
-
New York, NY, USA: ACM, 134-139
-
H. Hou and G. Dozier, "An evaluation of negative selection algorithm with constraint-based detectors, " in ACM-SE 44: Proceedings of the 44th annual Southeast regional conference. New York, NY, USA: ACM, 2006, pp. 134-139.
-
(2006)
ACM-SE 44: Proceedings of the 44th Annual Southeast Regional Conference
-
-
Hou, H.1
Dozier, G.2
-
19
-
-
70449486875
-
Clustering based automatic refactorings identification
-
Washington, DC, USA: IEEE Computer Society
-
I. G. Czibula and G. Czibula, "Clustering based automatic refactorings identification, " in SYNASC'08: Proceedings of the 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. Washington, DC, USA: IEEE Computer Society, 2008, pp. 253-256.
-
(2008)
SYNASC'08: Proceedings of the 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
, pp. 253-256
-
-
Czibula, I.G.1
Czibula, G.2
-
20
-
-
0029718620
-
Applying design metrics to object-oriented frameworks
-
IEEE Computer Society Press
-
K. Erni and C. Lewerentz, "Applying design metrics to object-oriented frameworks, " in Proc. IEEE Symp. Software Metrics. IEEE Computer Society Press, 1996.
-
(1996)
Proc. IEEE Symp. Software Metrics
-
-
Erni, K.1
Lewerentz, C.2
-
21
-
-
47249112957
-
Détection d'anomalies utilisant un langage de description de règle de qualité
-
LMO, Ed
-
H. Alikacem and H. Sahraoui, "Détection d'anomalies utilisant un langage de description de règle de qualité." in actes du 12e colloque LMO, LMO, Ed., 2006.
-
(2006)
Actes Du 12e Colloque LMO
-
-
Alikacem, H.1
Sahraoui, H.2
-
22
-
-
56749185283
-
Search-based refactoring: An empirical study
-
[Online], Available
-
M. O'Keeffe and M. . Cinnéide, "Search-based refactoring: an empirical study." Journal of Software Maintenance, vol. 20, no. 5, pp. 345-364, 2008. [Online]. Available: http://dblp.uni-trier.de/db/ journals/smr/smr20.html#OKeeffeC08
-
(2008)
Journal of Software Maintenance
, vol.20
, Issue.5
, pp. 345-364
-
-
O'Keeffe, M.1
Cinnéide, M.2
-
23
-
-
14844290275
-
Metrics are fitness functions too
-
IEEE Computer Society, [Online], Available
-
M. Harman and J. A. Clark, "Metrics are fitness functions too." in IEEE METRICS. IEEE Computer Society, 2004, pp. 58-69. [Online]. Available: http://dblp.uni-trier.de/db/conf/metrics/metrics2004.html#HarmanC04.
-
(2004)
IEEE Metrics
, pp. 58-69
-
-
Harman, M.1
Clark, J.A.2
-
24
-
-
3543151346
-
A pattern-based framework for software anomaly detection
-
June, [Online]. Available
-
S. C. Kothari, L. Bishop, J. Sauceda, and G. Daugherty, "A pattern-based framework for software anomaly detection, " Software Quality Journal, vol. 12, no. 2, pp. 99-120, June 2004. [Online]. Available: http://springerlink.com/content/v115717r15420214/?p= bf86b148d5d74754baec247cd0661c7c{\&}pi=53.
-
(2004)
Software Quality Journal
, vol.12
, Issue.2
, pp. 99-120
-
-
Kothari, S.C.1
Bishop, L.2
Sauceda, J.3
Daugherty, G.4
-
25
-
-
50249102850
-
Visual detection of design anomalies
-
IEEE, [Online], Available
-
K. Dhambri, H. A. Sahraoui, and P. Poulin, "Visual detection of design anomalies." in CSMR. IEEE, 2008, pp. 279-283. [Online]. Available: http://dblp.uni-trier.de/db/conf/csmr/csmr2008.html#DhambriSP08.
-
(2008)
CSMR
, pp. 279-283
-
-
Dhambri, K.1
Sahraoui, H.A.2
Poulin, P.3
-
26
-
-
35148866968
-
Software defect prediction using artificial immune recognition system
-
Anaheim, CA, USA: ACTA Press
-
C. Catal and B. Diri, "Software defect prediction using artificial immune recognition system, " in SE'07: Proceedings of the 25th conference on IASTED International Multi-Conference. Anaheim, CA, USA: ACTA Press, 2007, pp. 285-290.
-
(2007)
SE'07: Proceedings of the 25th Conference on IASTED International Multi-Conference
, pp. 285-290
-
-
Catal, C.1
Diri, B.2
-
27
-
-
70350678961
-
Danger theory based syn flood attack detection in autonomic network
-
New York, NY, USA: ACM
-
S. Rawat and A. Saxena, "Danger theory based syn flood attack detection in autonomic network, " in SIN'09: Proceedings of the 2nd international conference on Security of information and networks. New York, NY, USA: ACM, 2009, pp. 213-218.
-
(2009)
SIN'09: Proceedings of the 2nd International Conference on Security of Information and Networks
, pp. 213-218
-
-
Rawat, S.1
Saxena, A.2
-
28
-
-
34548087536
-
Modified clonal selection algorithm for learning qualitative compartmental models of metabolic systems
-
New York, NY, USA: ACM
-
W. Pang and G. M. Coghill, "Modified clonal selection algorithm for learning qualitative compartmental models of metabolic systems, " in GECCO'07: Proceedings of the 2007 GECCO conference companion on Genetic and evolutionary computation. New York, NY, USA: ACM, 2007, pp. 2887-2894.
-
(2007)
GECCO'07: Proceedings of the 2007 GECCO Conference Companion on Genetic and Evolutionary Computation
, pp. 2887-2894
-
-
Pang, W.1
Coghill, G.M.2
|