AN EFFECTIVE RETRIVAL SCHEME FOR SOFTWARE COMPONENT REUSE

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 7

Abstract

Software component reuse has become of much interest in the software community due to its potential benefits, cost benefit, time saving, etc. which include increased product quality and decreased product development cost and estimated schedule. To select a component for reuse is very difficult because there are many components with approximate same name, same functionality etc. which make the reuse of component very time consuming. Hence there is required a technique which make the selection of component efficient and fast. For this purpose we purposed a scheme for the selection of component which will be more efficient than earlier scheme.

Authors and Affiliations

Vishal , Subhash Chander , Jasmer Kundu

Keywords

Related Articles

A Recent Survey on Bloom Filters in Network Intrusion Detection Systems

Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security sy...

Quantum computation and Biological stress: A Hypothesis

We propose that biological systems may behave as quantum computers.We have earlier hypothesized that patterns of quantum computation may be altered in stress and this leads to the change in the consciousness vector of bi...

Frequent Pattern Mining using CATSIM Tree

Efficient algorithms to discover frequent patterns are essential in data mining research. Frequent pattern mining is emerging as powerful tool for many business applications such as e-commerce, recommender systems and su...

UEP based on Proximity Pilot Subcarriers with QAM in OFDM

A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with QAM (Quadrature Amplitude Modulation) schemes. With...

Comparative study of various PKINIT methods used in Advanced Kerberos

Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used...

Download PDF file
  • EP ID EP130116
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Vishal, Subhash Chander, Jasmer Kundu (2012). AN EFFECTIVE RETRIVAL SCHEME FOR SOFTWARE COMPONENT REUSE. International Journal on Computer Science and Engineering, 4(7), 1354-1361. https://europub.co.uk/articles/-A-130116