Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
8953927 | Information and Software Technology | 2018 | 13 Pages |
Abstract
Conclusion: Our empirical evaluation shows that the implemented architectural rules recovered by our method consist of abstract representations of (a large number of) module dependencies, providing a concise view of dependencies that can be inspected by developers to identify occurrences of architectural violations and undocumented rules.
Related Topics
Physical Sciences and Engineering
Computer Science
Human-Computer Interaction
Authors
Vanius Zapalowski, Ingrid Nunes, Daltro José Nunes,