Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Formulation of Clamshell Diagram and Its Application to Source Code Reading

View through CrossRef
When describing an idea using letters and diagrams, the concept becomes clear and it is easier to see what to do to achieve a goal. Among the design creation support tools, we focus attention on the Thinking Process Development Diagram of 6 layers. We refer to it as a Clamshell Diagram, and present 16 principles to constitute the diagram. Then we report the support system for drawing the diagrams using a Web browser. Design creation support tools are also useful for analyzing the existing good or bad instances. We therefore attempt to investigate how to represent a source code by means of Clamshell Diagram and apply to GNU Hello to draw a diagram. Using the diagram representation of source code, we can see the whole-part relationship and the problem-solution relationship at a time.
Title: Formulation of Clamshell Diagram and Its Application to Source Code Reading
Description:
When describing an idea using letters and diagrams, the concept becomes clear and it is easier to see what to do to achieve a goal.
Among the design creation support tools, we focus attention on the Thinking Process Development Diagram of 6 layers.
We refer to it as a Clamshell Diagram, and present 16 principles to constitute the diagram.
Then we report the support system for drawing the diagrams using a Web browser.
Design creation support tools are also useful for analyzing the existing good or bad instances.
We therefore attempt to investigate how to represent a source code by means of Clamshell Diagram and apply to GNU Hello to draw a diagram.
Using the diagram representation of source code, we can see the whole-part relationship and the problem-solution relationship at a time.

Related Results

Incidental Collocation Learning from Different Modes of Input and Factors That Affect Learning
Incidental Collocation Learning from Different Modes of Input and Factors That Affect Learning
Collocations, i.e., words that habitually co-occur in texts (e.g., strong coffee, heavy smoker), are ubiquitous in language and thus crucial for second/foreign language (L2) learne...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
Code Plagiarism Checking Function and Its Application for Code Writing Problem in Java Programming Learning Assistant System
Code Plagiarism Checking Function and Its Application for Code Writing Problem in Java Programming Learning Assistant System
A web-based Java programming learning assistant system (JPLAS) has been developed for novice students to study Java programming by themselves while enhancing code reading and code ...
ASP Formulation Development Journey, Optimisation and Validation for Mangala Field
ASP Formulation Development Journey, Optimisation and Validation for Mangala Field
Abstract Mangala is a large low salinity, high quality fluvial oil field reservoir in India with STOIIP of over one billion barrels of waxy and moderately viscous cr...

Back to Top