Facets of Software Component Repository
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations. Storage and representation of reusable software components in software repositories to assist retrieval is a key concern area. In this paper we have discussed various assets of the component repository like component searching mechanisms and classifications such as Free Text, Enumerated, Attribute Value, and Faceted classifications. Developers and end users can formulate highlevel, aspect-based queries to retrieve components according to their needs.
Authors and Affiliations
Vaneet Kaur , Shivani Goel
The proposed quantum computational basis of deep ecology: its implications for agriculture
Quantum computation has been proposed to generate consciousness. The terms atman field and consciousness vector have also been used to describe the properties of consciousness. It has also been proposed that the human ac...
Approaches for Managing and Analyzing Unstructured Data
Large volumes of data that will be stored and accessed in future is unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value f...
Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks
Wireless Sensor Networks are resource constrained application specific adhoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for...
EFFICIENT TRANSACTION REDUCTION IN ACTIONABLE PATTERN MINING FOR HIGH VOLUMINOUS DATASETS BASED ON BITMAP AND CLASS LABELS
Frequent pattern mining in databases plays an indispensable role in many data mining tasks namely, classification, clustering, and association rules analysis. When a large number of item sets are processed by the databas...
Comprehensive Survey on DDOS attack with its mitigation Techniques
The remarkable development and accomplishment of Internet has changed the way customary vital administrations, for example, managing an account, transportation, prescription, training and guard are worked. Presently they...