Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,565 papers from all fields of science
Search
Sign In
Create Free Account
Code refactoring
Known as:
Extract Method
, Reengineering
, Refactoring
Expand
Code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behaviour. Refactoring…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Android Studio
Blender (software)
Block Range Index
Clang
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Allen, Rob. 2001. Workflow: An Introduction, WfMC External Relations Committee. Depdiknas, 2008. Kamus Besar Bahasa Indonesia , Pusat Bahasa Departemen Pendidikan Nasional. Ellitan, Lena. 1999…
D. Pustaka
2010
Corpus ID: 110947910
Highly Cited
2008
Highly Cited
2008
Modeling the growth response of Cladophora in a Laurentian Great Lake to the exotic invader Dreissena and to lake warming
S. Malkin
,
S. Guildford
,
R. Hecky
2008
Corpus ID: 18026276
A Cladophora growth model (CGM) is calibrated and validated here to simulate attached and sloughed Cladophora biomass in daily…
Expand
Highly Cited
2005
Highly Cited
2005
Acoustic-phonon propagation in rectangular semiconductor nanowires with elastically dissimilar barriers
E. Pokatilov
,
D. Nika
,
A. Balandin
2005
Corpus ID: 121742823
We have theoretically studied acoustic phonon spectra and phonon propagation in rectangular nanowires embedded within elastically…
Expand
Highly Cited
2004
Highly Cited
2004
Model-driven business process recovery
Ying Zou
,
Terence C. Lau
,
K. Kontogiannis
,
Tack Tong
,
Ross McKegney
Working Conference on Reverse Engineering
2004
Corpus ID: 1647469
A business process attempts to encapsulate the delivery of a sequence of tasks, typically starting from accepting a service…
Expand
Highly Cited
2001
Highly Cited
2001
Security for Workflow Systems
V. Atluri
Information Security Technical Report
2001
Corpus ID: 3638150
Highly Cited
2000
Highly Cited
2000
Using graph rewriting to specify software architectural transformations
Hoda Fahmy
,
R. Holt
Proceedings ASE . Fifteenth IEEE International…
2000
Corpus ID: 1295700
In order to understand, analyze and possibly modify software, we commonly examine and manipulate its architecture. For example…
Expand
Highly Cited
1999
Highly Cited
1999
GraX-an interchange format for reengineering tools
J. Ebert
,
Bernt Kullbach
,
A. Winter
Sixth Working Conference on Reverse Engineering…
1999
Corpus ID: 14310090
Current research in software reengineering offers a great amount of tools specialized on certain reengineering tasks. The…
Expand
Highly Cited
1999
Highly Cited
1999
Dealing with Obsolete Parts
Ronald C. Stogdill
IEEE Design & Test of Computers
1999
Corpus ID: 1830543
The US Air Force has launched an initiative to develop an affordable, systematic approach to dealing with obsolete electronic…
Expand
Highly Cited
1995
Highly Cited
1995
The Reengineering Revolution - the Handbook
M. Hammer
,
S. Stanton
1995
Corpus ID: 109221610
In "Reengineering the Corporation" Michael Hammer introduced to reengineering success. He and his colleague Steven Stanton offer…
Expand
Highly Cited
1994
Highly Cited
1994
A new approach to finding objects in programs
P. Livadas
,
T. Johnson
J. Softw. Maintenance Res. Pract.
1994
Corpus ID: 17621271
Software maintenance is difficult and costly because the maintainer must understand the existing relationships in the maintained…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE