共 50 条
- [2] Identifying objects in legacy systems FIFTH INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION - IWPC '97, PROCEEDINGS, 1997, : 138 - 147
- [3] Identifying trustworthiness deficit in legacy systems using the NFR approach 1600, U.S. Department of Defense (27):
- [4] Scenarios for the identification of objects in legacy systems PROCEEDINGS OF THE FOURTH WORKING CONFERENCE ON REVERSE ENGINEERING, 1997, : 24 - 32
- [5] Using design recovery techniques to transform legacy systems IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, : 622 - 631
- [8] An experiment in identifying persistent objects in large systems INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1998, : 122 - 130
- [9] Identifying Design Requirements for Wireless Routing Link Metrics 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
- [10] Identifying Accurate Refactoring Opportunities Using Metrics PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 141 - 146