{"id":"https://openalex.org/W4388562304","doi":"https://doi.org/10.1109/icstcc59206.2023.10308446","title":"Enumerating class relations weights to assess their importance in a graph representation model for detecting key classes using PageRank","display_name":"Enumerating class relations weights to assess their importance in a graph representation model for detecting key classes using PageRank","publication_year":2023,"publication_date":"2023-10-11","ids":{"openalex":"https://openalex.org/W4388562304","doi":"https://doi.org/10.1109/icstcc59206.2023.10308446"},"language":"en","primary_location":{"id":"doi:10.1109/icstcc59206.2023.10308446","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icstcc59206.2023.10308446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 27th International Conference on System Theory, Control and Computing (ICSTCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059604865","display_name":"Ciprian-Bogdan Chiril\u0103","orcid":"https://orcid.org/0000-0002-7819-5237"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ciprian-Bogdan Chirila","raw_affiliation_strings":["University Politehnica,Computer and Information Technology Department,Timi&#x015F;oara,Romania"],"affiliations":[{"raw_affiliation_string":"University Politehnica,Computer and Information Technology Department,Timi&#x015F;oara,Romania","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054247897","display_name":"Ioana \u015eora","orcid":"https://orcid.org/0000-0002-9994-7274"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ioana Sora","raw_affiliation_strings":["University Politehnica,Computer and Information Technology Department,Timi&#x015F;oara,Romania"],"affiliations":[{"raw_affiliation_string":"University Politehnica,Computer and Information Technology Department,Timi&#x015F;oara,Romania","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059604865"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80966186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7797559499740601},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5411303639411926},{"id":"https://openalex.org/keywords/pagerank","display_name":"PageRank","score":0.5152883529663086},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5023820400238037},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47980549931526184},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.4730997085571289},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.448112815618515},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4481085538864136},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.44693008065223694},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.44645392894744873},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.4445532262325287},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.436825692653656},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.43518713116645813},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4126175343990326},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4101484417915344},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2982737421989441},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.27375754714012146},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2550560235977173}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7797559499740601},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5411303639411926},{"id":"https://openalex.org/C2779172887","wikidata":"https://www.wikidata.org/wiki/Q184316","display_name":"PageRank","level":2,"score":0.5152883529663086},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5023820400238037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47980549931526184},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.4730997085571289},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.448112815618515},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4481085538864136},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.44693008065223694},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.44645392894744873},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.4445532262325287},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.436825692653656},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.43518713116645813},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4126175343990326},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4101484417915344},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2982737421989441},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.27375754714012146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2550560235977173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icstcc59206.2023.10308446","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icstcc59206.2023.10308446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 27th International Conference on System Theory, Control and Computing (ICSTCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1579932672","https://openalex.org/W1854214752","https://openalex.org/W2133567642","https://openalex.org/W2141506510","https://openalex.org/W2151996389","https://openalex.org/W2152640357","https://openalex.org/W2513930182","https://openalex.org/W2767190431","https://openalex.org/W2967497827","https://openalex.org/W2980135568","https://openalex.org/W2986567607","https://openalex.org/W3111924279","https://openalex.org/W3131052962","https://openalex.org/W3196135853","https://openalex.org/W4229023790","https://openalex.org/W4237217008","https://openalex.org/W4296992894","https://openalex.org/W4308427718"],"related_works":["https://openalex.org/W2164913793","https://openalex.org/W2094595170","https://openalex.org/W2886906914","https://openalex.org/W3142708836","https://openalex.org/W2125116336","https://openalex.org/W1593375320","https://openalex.org/W2765394967","https://openalex.org/W2138410417","https://openalex.org/W2103701733","https://openalex.org/W1536501326"],"abstract_inverted_index":{"The":[0,196],"most":[1,140],"crucial":[2],"classes":[3,34,61,126],"in":[4,27,39],"an":[5,199],"object-oriented":[6],"software":[7,21,40],"system":[8,22],"are":[9,24,127],"known":[10,210],"as":[11,16,104],"key":[12,60,73],"classes.":[13,142],"They":[14],"serve":[15],"the":[17,20,54,57,99,121,125,134,137,145,169,172,204,208,213,216],"backbone":[18],"of":[19,49,59,136,147,155,171,183,201,203,215],"and":[23,82,110,162,194],"typically":[25],"documented":[26],"project":[28],"documentation":[29,52],"or":[30,50],"executive":[31],"summaries.":[32],"Key":[33],"play":[35],"a":[36,47,63,86,91,116],"vital":[37],"role":[38],"reengineering":[41],"tasks,":[42],"particularly":[43],"when":[44],"there":[45],"is":[46,95,177],"lack":[48],"inadequate":[51],"for":[53,71,157,164],"project.":[55],"Therefore,":[56],"detection":[58],"becomes":[62],"significant":[64],"concern.":[65],"Various":[66],"methods":[67],"have":[68],"been":[69],"reported":[70],"detecting":[72],"classes,":[74,102],"including":[75],"static":[76,87],"code":[77,80,88],"analysis,":[78,81],"dynamic":[79],"machine":[83],"learning.":[84],"In":[85],"analysis":[89,118],"approach,":[90],"weighted":[92,122,173],"graph":[93,123],"model":[94],"employed":[96],"to":[97],"represent":[98],"relationships":[100],"between":[101],"such":[103],"inheritance,":[105],"interface":[106],"realization,":[107],"field":[108],"usage,":[109],"return":[111],"type":[112],"usage.":[113],"By":[114],"applying":[115],"link":[117],"algorithm":[119],"on":[120,130,179],"model,":[124],"ranked":[128],"based":[129],"their":[131],"importance,":[132],"enabling":[133],"identification":[135],"top":[138],"20":[139],"critical":[141],"To":[143],"evaluate":[144],"significance":[146],"class":[148,166],"relations,":[149],"we":[150],"generate":[151],"all":[152],"possible":[153],"combinations":[154],"weights":[156],"three":[158],"pairs":[159],"(0,1),":[160],"(1,2)":[161],"(1,5)":[163],"each":[165],"relation":[167],"during":[168],"construction":[170],"graph.":[174],"Our":[175],"approach":[176],"tested":[178],"14":[180],"analyzed":[181],"systems":[182],"varying":[184],"sizes,":[185],"encompassing":[186],"different":[187],"domains":[188],"like":[189],"games,":[190],"web":[191],"servers,":[192],"utilities,":[193],"more.":[195],"results":[197],"indicate":[198],"improvement":[200],"1%":[202],"Recall":[205],"values":[206],"over":[207],"best":[209],"result":[211],"from":[212],"state":[214],"art.":[217]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
