Earticle

현재 위치 Home

Non-Source Code Refactoring: A Systematic Literature Review

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSEIA) 바로가기
  • 간행물
    International Journal of Software Engineering and Its Applications SCOPUS 바로가기
  • 통권
    Vol.9 No.6 (2015.06)바로가기
  • 페이지
    pp.197-214
  • 저자
    Siti Rochimah, Siska Arifiani, Vika F. Insanittaqwa
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A251349

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Since software refactoring techniques were introduced, the process is commonly applied to alter the structure of source code. However, there is also increasing popularity in the topic of refactoring in other software artifacts at non-source code level. This paper provides a systematic literature review of existing studies in non-source code refactoring. We use two digital libraries as publication source, IEEExplore and Science Direct, to obtain published articles in non-source code refactoring topic published in between 2002 – 2014 with certain keywords. The 20 selected literatures then processed based on certain criteria, including the refactoring method and refactoring identification source. Then we use this information to provide categorization of non-source code refactoring activity and the advantages and disadvantages of each category. The systematic literature review performed has provided categorization of non-source code refactoring method and has shown that each method has certain advantages and disadvantages. Refactoring detection at non-source code level can be done in the software design model, source code with non-conventional detection, and other software artifacts. The methods used can be categorized as heuristic method, where the refactoring identification is done based on certain rules, and non-heuristic method, where the refactoring identification is done with a certain algoritm that explores every possibility of refactoring opportunities. The advantage of heuristic method is the speed and precision. The disadvantage of this method is the needed effort to produce the rules and the possibility of the non optimal result. The advantage of non-heuristic method is it can yield a generally more optimal result. The disadvantage of non-heuristic method is that the result depends strongly on the robustness of each algorithm.

목차

Abstract
 1. Introduction
 2. Related Works
 3. Background
  3.1. Software Refactoring
  3.2. Non-source Code Refactoring
 4. Research Method
  4.1. Research Questions
  4.2. Search Strategy
  4.3. Data Selection
  4.4. Study Quality Assessment
  4.5. Data Extraction and Analysis
 5. Result
  5.1. RQ1: Non-source Code Refactoring Categorization
  5.2. RQ2: Approaches or Methods used in Non-source Code Refactoring
  5.3. RQ3: Advantages and Disadvantages of Each Kind of Methods in Non-source Code Refactoring
 6. Limitations of the Study
 7. Conclusions
 APPENDIX
 References

키워드

Software Refactoring Non-Source Code Refactoring High Level Refactoring

저자

  • Siti Rochimah [ Department of Informatics Institut Teknologi Sepuluh Nopember ]
  • Siska Arifiani [ Department of Informatics Institut Teknologi Sepuluh Nopember ]
  • Vika F. Insanittaqwa [ Department of Informatics Institut Teknologi Sepuluh Nopember ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Software Engineering and Its Applications
  • 간기
    월간
  • pISSN
    1738-9984
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Software Engineering and Its Applications Vol.9 No.6

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장