Accesso libero

Research on Modularization-based Code Reuse Technology in Software System Development

  
25 set 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Chen, X., Xu, F., Huang, Y., Zhou, X., & Zheng, Z. (2024). An empirical study of code reuse between GitHub and stack overflow during software development. Journal of Systems and Software, 210, 111964. ChenX.XuF.HuangY.ZhouX. & ZhengZ. (2024). An empirical study of code reuse between GitHub and stack overflow during software development. Journal of Systems and Software, 210, 111964.Search in Google Scholar

Wan, Z., Xia, X., Lo, D., & Murphy, G. C. (2019). How does machine learning change software development practices?. IEEE Transactions on Software Engineering, 47(9), 1857-1871. WanZ.XiaX.LoD. & MurphyG. C. (2019). How does machine learning change software development practices?. IEEE Transactions on Software Engineering, 47(9), 1857-1871.Search in Google Scholar

She, X. F., & Bian, B. B. (2022). A Software Reuse Technology Based on Common Factor Method and Its Application in Fast Programming. In Journal of Physics: Conference Series (Vol. 2158, No. 1, p. 012001). IOP Publishing. SheX. F. & BianB. B. (2022). A Software Reuse Technology Based on Common Factor Method and Its Application in Fast Programming. In Journal of Physics: Conference Series (Vol. 2158, No. 1, p. 012001). IOP Publishing.Search in Google Scholar

Abdalkareem, R., Shihab, E., & Rilling, J. (2017). On code reuse from stackoverflow: An exploratory study on android apps. Information and Software Technology, 88, 148-158. AbdalkareemR.ShihabE. & RillingJ. (2017). On code reuse from stackoverflow: An exploratory study on android apps. Information and Software Technology, 88, 148-158.Search in Google Scholar

Benureau, F. C., & Rougier, N. P. (2018). Re-run, repeat, reproduce, reuse, replicate: transforming code into scientific contributions. Frontiers in neuroinformatics, 11, 69. BenureauF. C. & RougierN. P. (2018). Re-run, repeat, reproduce, reuse, replicate: transforming code into scientific contributions. Frontiers in neuroinformatics, 11, 69.Search in Google Scholar

Gharehyazie, M., Ray, B., & Filkov, V. (2017, May). Some from here, some from there: Cross-project code reuse in github. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) (pp. 291-301). IEEE. GharehyazieM.RayB. & FilkovV. (2017, May). Some from here, some from there: Cross-project code reuse in github. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) (pp. 291-301). IEEE.Search in Google Scholar

Li, Y., Zhou, Q., Li, B., & Zhuang, Y. (2023, November). GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification. In 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 422-433). IEEE. LiY.ZhouQ.LiB. & ZhuangY. (2023, November). GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification. In 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 422-433). IEEE.Search in Google Scholar

Osiievskyi, S., Kolomiitsev, O., Open’ko, P., Tretiak, V., Petrenko, O., & Petrenko, O. (2022). Method of increasing the reliability of knowledge-oriented systems software through code reuse mechanisms. Social Development and Security, 12(1), 47-60. OsiievskyiS.KolomiitsevO.Open’koP.TretiakV.PetrenkoO. & PetrenkoO. (2022). Method of increasing the reliability of knowledge-oriented systems software through code reuse mechanisms. Social Development and Security, 12(1), 47-60.Search in Google Scholar

Saeed, S., Jhanjhi, N. Z., Naqvi, M., & Humayun, M. (2019). Analysis of software development methodologies. International Journal of Computing and Digital Systems, 8(5), 446-460. SaeedS.JhanjhiN. Z.NaqviM. & HumayunM. (2019). Analysis of software development methodologies. International Journal of Computing and Digital Systems, 8(5), 446-460.Search in Google Scholar

Irshad, M., Petersen, K., & Poulding, S. (2018). A systematic literature review of software requirements reuse approaches. Information and Software Technology, 93, 223-245. IrshadM.PetersenK. & PouldingS. (2018). A systematic literature review of software requirements reuse approaches. Information and Software Technology, 93, 223-245.Search in Google Scholar

Xia, X., Bao, L., Lo, D., Kochhar, P. S., Hassan, A. E., & Xing, Z. (2017). What do developers search for on the web?. Empirical Software Engineering, 22, 3149-3185. XiaX.BaoL.LoD.KochharP. S.HassanA. E. & XingZ. (2017). What do developers search for on the web?. Empirical Software Engineering, 22, 3149-3185.Search in Google Scholar

Wu, Y., Wang, S., Bezemer, C. P., & Inoue, K. (2019). How do developers utilize source code from stack overflow?. Empirical Software Engineering, 24, 637-673. WuY.WangS.BezemerC. P. & InoueK. (2019). How do developers utilize source code from stack overflow?. Empirical Software Engineering, 24, 637-673.Search in Google Scholar

Gao, J., Yang, X., Fu, Y., Jiang, Y., & Sun, J. (2018, September). Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (pp. 896-899). GaoJ.YangX.FuY.JiangY. & SunJ. (2018, September). Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (pp. 896-899).Search in Google Scholar

Rajakumari, K. E. (2020, May). Towards a novel conceptual framework for analyzing code clones to assist in software development and software reuse. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 105-111). IEEE. RajakumariK. E. (2020, May). Towards a novel conceptual framework for analyzing code clones to assist in software development and software reuse. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 105-111). IEEE.Search in Google Scholar

Huang, H., Youssef, A. M., & Debbabi, M. (2017, April). Binsequence: Fast, accurate and scalable binary code reuse detection. In Proceedings of the 2017 ACM on Asia conference on computer and communications security (pp. 155-166). HuangH.YoussefA. M. & DebbabiM. (2017, April). Binsequence: Fast, accurate and scalable binary code reuse detection. In Proceedings of the 2017 ACM on Asia conference on computer and communications security (pp. 155-166).Search in Google Scholar

Zinoviev, D. (2021). Resourceful Code Reuse. Pragmatic Bookshelf. ZinovievD. (2021). Resourceful Code Reuse. Pragmatic Bookshelf.Search in Google Scholar

Huang, Q., Liao, D., Xing, Z., Zuo, Z., Wang, C., & Xia, X. (2023). Semantic-enriched code knowledge graph to reveal unknowns in smart contract code reuse. ACM Transactions on Software Engineering and Methodology, 32(6), 1-37. HuangQ.LiaoD.XingZ.ZuoZ.WangC. & XiaX. (2023). Semantic-enriched code knowledge graph to reveal unknowns in smart contract code reuse. ACM Transactions on Software Engineering and Methodology, 32(6), 1-37.Search in Google Scholar

Khapre, S., Singh, P., Shankar, A., Nayak, S. R., & Diwakar, M. (2023). Context-based intelligent recommendation by code reuse for smart decision support and cognitive adaptive systems. International Journal of Intelligent Unmanned Systems, 11(1), 75-87. KhapreS.SinghP.ShankarA.NayakS. R. & DiwakarM. (2023). Context-based intelligent recommendation by code reuse for smart decision support and cognitive adaptive systems. International Journal of Intelligent Unmanned Systems, 11(1), 75-87.Search in Google Scholar

Sedano, T., Ralph, P., & Péraire, C. (2017, May). Software development waste. In 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) (pp. 130-140). IEEE. SedanoT.RalphP. & PéraireC. (2017, May). Software development waste. In 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) (pp. 130-140). IEEE.Search in Google Scholar

Pascarella, L., Palomba, F., Di Penta, M., & Bacchelli, A. (2018, May). How is video game development different from software development in open source?. In Proceedings of the 15th International Conference on Mining Software Repositories (pp. 392-402). PascarellaL.PalombaF.Di PentaM. & BacchelliA. (2018, May). How is video game development different from software development in open source?. In Proceedings of the 15th International Conference on Mining Software Repositories (pp. 392-402).Search in Google Scholar

Bridgham, D. (2017). Code Reuse. In Social Media Data Extraction and Content Analysis (pp. 433-451). IGI Global. BridghamD. (2017). Code Reuse. In Social Media Data Extraction and Content Analysis (pp. 433-451). IGI Global.Search in Google Scholar

Shen, Z., & Spruit, M. (2019). A systematic review of open source clinical software on GitHub for improving software reuse in smart healthcare. Applied Sciences, 9(1), 150. ShenZ. & SpruitM. (2019). A systematic review of open source clinical software on GitHub for improving software reuse in smart healthcare. Applied Sciences, 9(1), 150.Search in Google Scholar

Fowler, M. (2018). Refactoring: improving the design of existing code. Addison-Wesley Professional. FowlerM. (2018). Refactoring: improving the design of existing code. Addison-Wesley Professional.Search in Google Scholar

Liu, M. X., Kittur, A., & Myers, B. A. (2021). To reuse or not to reuse? A framework and system for evaluating summarized knowledge. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), 1-35. LiuM. X.KitturA. & MyersB. A. (2021). To reuse or not to reuse? A framework and system for evaluating summarized knowledge. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), 1-35.Search in Google Scholar

Setoodeh, Z., Moosavi, M. R., Fakhrahmad, M., & Bidoki, M. (2021). A proposed model for source code reuse detection in computer programs. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1-14. SetoodehZ.MoosaviM. R.FakhrahmadM. & BidokiM. (2021). A proposed model for source code reuse detection in computer programs. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 1-14.Search in Google Scholar

Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee & Dong Hoon Lee.(2024). DROPSYS: Detection of ROP attacks using system information. Computers & Security 103813-. KimSeon KwonJinHongjooJooKyunghoLeeJiwon & LeeDong Hoon. (2024). DROPSYS: Detection of ROP attacks using system information. Computers & Security 103813-.Search in Google Scholar

Cheng Chao, Qiao Xinyu, Zhang Bangcheng, Luo Hao, Zhou Yang & Chen Hongtian.(2021). Multiblock Dynamic Slow Feature Analysis-Based System Monitoring for Electrical Drives of High-Speed Trains. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT ChaoChengXinyuQiaoBangchengZhangHaoLuoYangZhou & HongtianChen. (2021). Multiblock Dynamic Slow Feature Analysis-Based System Monitoring for Electrical Drives of High-Speed Trains. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENTSearch in Google Scholar

Jiake Li, Junqing Li & Ying Xu.(2025). HGNP: A PCA-based heterogeneous graph neural network for a family distributed flexible job shop. Computers & Industrial Engineering 110855-110855. LiJiakeLiJunqing & XuYing. (2025). HGNP: A PCA-based heterogeneous graph neural network for a family distributed flexible job shop. Computers & Industrial Engineering 110855-110855.Search in Google Scholar

Rajesh Kumar Shrivastava & Chittaranjan Hota.(2021). UnderTracker: Generating Robust Binaries Using Execution Flow Traces. Information Systems Frontiers(4), 1-16. ShrivastavaRajesh Kumar & HotaChittaranjan. (2021). UnderTracker: Generating Robust Binaries Using Execution Flow Traces. Information Systems Frontiers(4), 1-16.Search in Google Scholar

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro