SOFTWARE ARCHITECTURE RECOVERY WITH ERROR TOLERANCE AND PENALTY COST IN GRAPH MINING
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
In the vast literature Software architecture has been recovered through graphs During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the phase in which we will find the same sub graph which is present in source graph and query graph In most of the papers, it was stated that graph matching is complete. But in reality matching between the raphs is not appropriately complete. We call this an error in matching. In this paper we investigate the applicability of error correcting graph matching algorithm, Graph Isomorphism by Decision Tree to ompensate the Software Architecture ecovery.
Authors and Affiliations
Shaheda Akthar , Sk. Md. Rafi
Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud Computing
The aim of workflow scheduling system is to schedule the workflows within the user given deadline to achieve a good success rate. Workflow is a set of tasks processed in a predefined order based on its data and control d...
Web Log Clustering Approaches – A Survey
As more organization rely on the Internet and the World Wide Web to conduct business, the proposed strategies and techniques for market analysis need to be revisited in this context. We therefore present a survey of the...
Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk
Vigenere cipher is a polyalphabetic substitution cipher with a very large key space. In this paper we have investigated the use of PSO for the cryptanalysis of vigenere cipher and proposed PSO with Markov chain random wa...
Person Identification System Based on Electrocardiogram Signal Using LabVIEW
This paper presents a method to analyze electrocardiogram (ECG) signal, extract the features, for the real time human identification. Data were obtained from short-term Lead-I ECG records (only one lead) of forty student...
Enhancing Security Of Agent-Oriented Techniques Programs Code Using Jar Files
Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice...