Article ID Journal Published Year Pages File Type
8953927 Information and Software Technology 2018 13 Pages PDF
Abstract
Conclusion: Our empirical evaluation shows that the implemented architectural rules recovered by our method consist of abstract representations of (a large number of) module dependencies, providing a concise view of dependencies that can be inspected by developers to identify occurrences of architectural violations and undocumented rules.
Related Topics
Physical Sciences and Engineering Computer Science Human-Computer Interaction
Authors
, , ,