<--- Back to Details
First PageDocument Content
Extreme programming / Code refactoring / Cloud infrastructure / Renault Clio / Apache Hadoop / Modularity / Code smell / Reusability / Clio / Transport / Private transport / Computing
Date: 2010-09-14 09:17:01
Extreme programming
Code refactoring
Cloud infrastructure
Renault Clio
Apache Hadoop
Modularity
Code smell
Reusability
Clio
Transport
Private transport
Computing

Detecting Software Modularity Violations Sunny Wong and Yuanfang Cai Drexel University Philadelphia, PA, USA {sunny, yfcai}@cs.drexel.edu

Add to Reading List

Source URL: www.cs.drexel.edu

Download Document from Source Website

File Size: 306,68 KB

Share Document on Facebook

Similar Documents

AVOCA GmbH  Extreme Programming Considered Harmful for Reliable Software Development  Status:

AVOCA GmbH Extreme Programming Considered Harmful for Reliable Software Development Status:

DocID: 1t4jS - View Document

Decoupling Extreme Programming from Moores Ike Antkare International Institute of Technology United Slates of Earth

Decoupling Extreme Programming from Moores Ike Antkare International Institute of Technology United Slates of Earth

DocID: 1sDK4 - View Document

A Simple Model of Agile Software Processes – or – Extreme Programming Annealed Glenn Vanderburg 2240 Dampton Dr. Plano, TX 75025

A Simple Model of Agile Software Processes – or – Extreme Programming Annealed Glenn Vanderburg 2240 Dampton Dr. Plano, TX 75025

DocID: 1saAc - View Document

QA to AQ Part Three Shifting from Quality Assurance to Agile Quality “Tearing Down the Walls” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

QA to AQ Part Three Shifting from Quality Assurance to Agile Quality “Tearing Down the Walls” Joseph W. Yoder 1, Rebecca Wirfs-Brock2, Hironori Washizaki3 1 2

DocID: 1raaP - View Document

EFMD Global Focus_Iss.2 Vol.10 www.globalfocusmagazine.com Agile universities Borrowing from concepts first used in the software

EFMD Global Focus_Iss.2 Vol.10 www.globalfocusmagazine.com Agile universities Borrowing from concepts first used in the software

DocID: 1r2YA - View Document