An alternative approach to developing reusable components from scratch is to recover them from existing systems. In this paper, we apply program slicing, introduced by Weiser, to the problem of extracting reusable functions from ill-structured programs. We extend the definition of program slice to a transform slice, one that includes statements which contribute directly or indirectly to transform a set of input variables into a set of output variables. Unlike conventional program slicing, these statements do not include neither the statements necessary to get input data nor the statements which test the binding conditions of the function. Transform slicing presupposes the knowledge that a function is performed in the code and its partial sp...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
An alternative approach to developing reusable components from scratch is to recover them from exist...
An alternative approach to developing reusable components from scratch is to recover them from exist...
An alternative approach to developing reusable components from scratch is to recover them from exis...
An alternative approach to developing reusable components from scratch is to recover them from exist...
To make an existing program easier to understand and modify, we propose the identification and extra...
To make an existing program easier to understand and modify, we propose the identification and extra...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
We present a new program slicing process for identifying and extracting code fragments implementing ...
We present a new program slicing process for identifying and extracting code fragments implementing ...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
An alternative approach to developing reusable components from scratch is to recover them from exist...
An alternative approach to developing reusable components from scratch is to recover them from exist...
An alternative approach to developing reusable components from scratch is to recover them from exis...
An alternative approach to developing reusable components from scratch is to recover them from exist...
To make an existing program easier to understand and modify, we propose the identification and extra...
To make an existing program easier to understand and modify, we propose the identification and extra...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
The identification of reusable assets in existing systems is an important problem to be solved to sp...
We present a new program slicing process for identifying and extracting code fragments implementing ...
We present a new program slicing process for identifying and extracting code fragments implementing ...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...
Program slicing is a well known family of techniques used to identify code fragments which depend on...