By Topic

2006 22nd IEEE International Conference on Software Maintenance

24-27 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 75
  • 22nd IEEE International Conference on Software Maintenance - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (280 KB)
    Freely Available from IEEE
  • 22nd IEEE International Conference on Software Maintenance - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • 22nd IEEE International Conference on Software Maintenance - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • 22nd IEEE International Conference on Software Maintenance - Table of contents

    Publication Year: 2006, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • On the Challenges of Maintaining Large-Scale Software Systems at Lockheed Martin

    Publication Year: 2006, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Properties of Signature Change Patterns

    Publication Year: 2006, Page(s):4 - 13
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB) | HTML iconHTML

    Understanding function signature change properties and evolution patterns is important for researchers concerned with alleviating signature change impacts, understanding software evolution, and predicting future evolution patterns. We provide detailed signature change properties by analyzing seven software project histories to reveal multiple properties of signature changes, including their kind, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Concern Interfaces

    Publication Year: 2006, Page(s):14 - 23
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Programming languages provide various mechanisms to support information hiding. One problem with information hiding, however, is that providing a stable interface behind which to hide implementation details involves fixing in advance the services offered through the interface. We introduce a flexible approach to define and manage interfaces to achieve separation of concerns in evolving software. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Method Stereotypes

    Publication Year: 2006, Page(s):24 - 34
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    An approach to automatically identify the stereotypes of all the methods in an entire system is presented. A taxonomy for object-oriented class method stereotypes is given that unifies and extends the existing literature to address gaps and deficiencies. Based on this taxonomy, a set of definitions is given and method stereotypes are reverse engineered using lightweight static program analysis. Cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change Impact Analysis for Generic Libraries

    Publication Year: 2006, Page(s):35 - 44
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Since the standard template library (STL), generic libraries in C++ rely on concepts to precisely specify the requirements of generic algorithms (function templates) on their parameters (template arguments). Modifying the definition of a concept even slightly, can have a potentially large impact on the (interfaces of the) entire library. In particular the non-local effects of a change, however, ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ESDM - A Method for Developing Evolutionary Scenarios for Analysing the Impact of Historical Changes on Architectural Elements

    Publication Year: 2006, Page(s):45 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Software maintainers need appropriate information concerning the change they are about to make to a software system so that they can make suitable choices in their decisions. In this paper, we describe a method (called ESDM) for developing evolutionary scenarios that provide information concerning the impact historical changes of different types have had on the quality of software architectural el... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Influence Mechanisms into Impact Analysis for Increased Precision

    Publication Year: 2006, Page(s):55 - 65
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Software change impact analysis is the process of determining the potential effects, or impacts, of a change to a program. Strategies for impact analysis vary in their approach toward the opposing goals of high precision and low analysis time. Fine-grained techniques, such as slicing, can be used to gain very precise knowledge of a change's impact, but may be prohibitively expensive. Coarse-graine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Feature Understanding in an Industrial Setting

    Publication Year: 2006, Page(s):66 - 67
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    Software Engineers frequently need to locate and understand the code that implements a specific user feature of a large system. This paper reports on a study by Motorola Inc. and the Software Engineering Research Center to see if industrial tools currently in use at the company could be adapted for feature understanding View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C Macro Handling in Automated Source Code Transformation Systems

    Publication Year: 2006, Page(s):68 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    In this paper, we present an overview of our approach to C macro handling in the Proteus C/C++ code transformation system. This approach gives us the capability to fully capture the semantics of complex macros without sacrificing high fidelity. As part of the Proteus system, they have been successfully applied to millions of lines of C/C++ code View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Assurance During Maintenance

    Publication Year: 2006, Page(s):70 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Software development, testing, and maintenance tools must yield assurance information in a standardized form. Developers can use this information to argue that the software is adequate for its use and secure enough for the risk. NIST's Software Assurance Metrics And Tool Evaluation (SAMATE) project is developing specifications for software assurance tools. These specifications can include optional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An alternative to Quiescence: Tranquility

    Publication Year: 2006, Page(s):73 - 82
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes (1990). We show that their notion of quiescence as a necessary and sufficient condition for safe runtime changes is too strict and violates the black-box design principle. We introduce a weaker condition, tranquility; easier to obtain, less disruptive for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Updating of Software Systems Based on Aspects

    Publication Year: 2006, Page(s):83 - 92
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Long-running applications such as network services require continuous uptime but also frequent changes to the software. To avoid downtime for software maintenance, applications must be updated at run-time. We describe a system based on the ideas of aspect-oriented programming (AOP) to manage such updates. Join points as defined by AOP establish locations for code modification in a program. We use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Software Maintenance for Mission-Critical Systems

    Publication Year: 2006, Page(s):93 - 103
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Online software maintenance (OSM) is performed while an application is running. It requires transforming the runtime state of the application to go along with updates of its software. The goal is to perform maintenance of mission-critical systems while they continue to run. This research presents dynamically evolvable C++ classes as a way to enable OSM. The associated implementation mechanism is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective Regression Testing of a Host to DotNet Migration

    Publication Year: 2006, Page(s):104 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    This paper describes an industrial migration project in the years 2003/2004. At this time the Austrian Chamber of Commerce was moving its entire software portfolio from an IBM mainframe to a DotNet environment. The company of the author was contracted to test the redeveloped systems. The approach taken was selective regression testing, a method whereby selected, critical results are verified by co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Test Data Generation for Killing Multiple Mutants

    Publication Year: 2006, Page(s):113 - 122
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Software testing is an important technique for assurance of software quality. Mutation testing has been identified as a powerful fault-based technique for unit testing, and there has been some research on automatic generation of test data for mutation testing. However, existing approaches to this kind of test data generation usually generate test data according to one mutant at one time. Thus, mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the Case-Based Ranking Methodology for Test Case Prioritization

    Publication Year: 2006, Page(s):123 - 133
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most faults late, thus delaying the bug fixing activity and eventually the delivery of the software. Prioritizing the test cases so as to optimize the achievement of the testing goal has potentially a positive impact on the te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustain, Enhance, or Replace: Making Decisions on Systems

    Publication Year: 2006, Page(s): 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Which systems should be modernized or enhanced, sustained at the current operating capability, or slated for replacement? IT portfolio management, enterprise architecture, and related planning and analysis management techniques are used by companies and government agencies as frameworks to enable such decisions. This panel will explore how these decisions are made in several enterprises and lesson... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.