Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 241000024-5.doi: 10.11896/jsjkx.241000024
• Computer Software & Architecture • Previous Articles Next Articles
CHEN Wangxu, WEN Hao, NI Yang
CLC Number:
[1]LE H T,SHAR L K,BIANCULLI D,et al.Automated reverse engineering of role-based access control policies of web applications[J].Journal of Systems and Software,2022,184:111109. [2]KIENLE H M,MÜLLERH A.The tools perspective on soft-ware reverse engineering:requirements,construction,and evaluation[J].Advances in Computers,2010,79:189-290. [3]CANFORA G,DI PENTA M,CERULO L.Achievements and challenges in software reverse engineering[J].Communications of the ACM,2011,54(4):142-151. [4]CHARALAMPIDOU S,AMPATZOGLOU A,KAROUNTZ-OS E,et al.Empirical studies on software traceability:A mapping study[J].Journal of Software:Evolution and Process,2021,33(2):e2294. [5]HORVATH A,MYERS B,MACVEAN A,et al.Using annotations for sensemaking about code[C]//Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology.2022:1-16. [6]GAO H,KUANG H,MA X,et al.Propagating frugal user feedback through closeness of code dependencies to improve IR-based traceability recovery[J].Empirical Software Engineering,2022,27(2):41. [7]TAO C Q,ZHANG M,GUO H J,et al.Review of Research on Requirements Traceability Approaches for Different Software Artifacts[J].Chinese Journal of Computers,2022,45(11):2393-2419. [8]GAO H,KUANG H,SUN K,et al.Using consensual biterms from text structures of requirements and code to improve IR-based traceability recovery[C]//Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.2022. [9]BURGSTALLER B,EGYEDA.Understanding whererequire-ments are implemented[C]//Proceedings of 2010 IEEE International Conference on Software Maintenance.2010:1-5. [10]VICKNAIR C,MACIAS M,ZHAO Z,et al.A comparison of a graph database and a relational database:a data provenance perspective[C]//Proceedings of the 48th Annual Southeast Regional Conference.2010:1-6. [11]MARIN M,DEURSEN A V,MOONEN L,et al.Identifyingcrosscutting concerns using fan-in analysis[J].ACM Transactions on Software Engineering and Methodology,2007,17(1):1-37. [12]REIF M,EICHBERG M,HERMANNB,et al.Call graph construction for java libraries[C]//Proceedings of 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.2016:474-486. [13]BARDAS A G.Static code analysis[J].Journal of Information Systems & Operations Management,2010,4(2):99-107. [14]LIN Z Q,ZHAO J F,XIE B,et al.A Graph Database Based Method for Parsing and Searching Code Structure[J].Journal of Computer Research and Development,2016,53(3):531-540. [15]ALI K,LAI X,LUO Z,et al.A study of call graph construction for jvm-hosted languages[J].IEEE Transactions on Software Engineering,2019,47(12):2644-2666. [16]REIF M,EICHBERG M,HERMANNB,et al.Call graph construction for java libraries[C]//Proceedings of 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.2016:474-486. [17]SUN Y,GUTIN G.Strong subgraph connectivity of digraphs[J].Graphs and Combinatorics,2021,37:951-970. [18]ARROYUELO D,HOGAN A,NAVARRO G,et al.Time-andspace-efficient regular path queries[C]//Proceedings of 2022 IEEE 38th International Conference on Data Engineering(ICDE).IEEE,2022:3091-3105. [19]BELGUNDI R,KULKARNI Y,JAGDALE B.Analysis ofNative Multi-model Database Using ArangoDB[C]//Proceedings of 3rd International Conference on Sustainable Expert Systems(ICSES 2022).Singapore:Springer Nature Singapore,2023:923-935. [20]KUANG H,MÄDER P,HU H,et al.Do data dependencies in source code complement call dependencies for understanding requirements traceability?[C]//Proceedings of 28th IEEE International Conference on Software Maintenance(ICSM).2012:181-190. |
[1] | LI Chunyu, DENG Long, LI Yongkun, XU Yinlong. Application-aware Disaggregated Storage Design for Remote Memory Graph Database [J]. Computer Science, 2025, 52(1): 151-159. |
[2] | ZOU Chunling, ZHU Zhengzhou. Fusion Model of Housekeeping Service Course Recommendation Based on Knowledge Graph [J]. Computer Science, 2024, 51(2): 47-54. |
[3] | LIANG Jing-ru, E Hai-hong, Song Mei-na. Method of Domain Knowledge Graph Construction Based on Property Graph Model [J]. Computer Science, 2022, 49(2): 174-181. |
[4] | HUANG Mei-gen, LIU Chuan, DU Huan, LIU Jia-le. Research on Cognitive Diagnosis Model Based on Knowledge Graph and Its Application in Teaching Assistant [J]. Computer Science, 2021, 48(6A): 644-648. |
[5] | E Hai-hong, HAN Peng-hao, SONG Mei-na. Conversion Method from Relational Database to Graph Database [J]. Computer Science, 2021, 48(10): 140-144. |
[6] | ZHAO Ping, SHOU Li-dan, CHEN Ke, CHEN Gang, WU Xiao-fan. Storage and Query Model for Localized Search on Temporal Graph Data [J]. Computer Science, 2019, 46(10): 186-194. |
[7] | JIANG Ren-he, ZHENG Xiao-mei, ZHU Xiao-qian, PAN Min-xue and ZHANG Tian. Method of Java Code Repository Construction Based on UML Relationship [J]. Computer Science, 2017, 44(11): 69-79. |
|