By Topic

Proceedings Conference on Software Maintenance 1992

9-12 Nov. 1992

Filter Results

Displaying Results 1 - 25 of 48
  • A classification procedure for the effective management of changes during the maintenance process

    Publication Year: 1992, Page(s):328 - 336
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB)

    The authors address the issue of assessing the difficulty of a change based on known or predictable data. They consider the present work as a first step towards the construction of customized economic models for maintainers. They propose a modeling approach, based on regular statistical techniques, that can be used in a variety of software maintenance environments. This approach can be easily auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COMFORM-a software maintenance method based on the software configuration management discipline

    Publication Year: 1992, Page(s):183 - 192
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    COMFORM (configuration management formalisation for maintenance), a method which provides guidelines and procedures for carrying out a variety of activities performed during the maintenance process, is discussed. The proposed method accommodates a change control framework around which the software configuration management discipline is applied. The aim is to exert control over an existing software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference on Software Maintenance 1992 (Cat.No.92CH3206-0)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Identification of program modifications and its applications in software maintenance

    Publication Year: 1992, Page(s):282 - 290
    Cited by:  Papers (39)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    It is pointed out that a major problem in software maintenance is the revalidation of a modified code. It is economically desirable to restrict that process only to those parts of the program that are affected by the modifications. Towards that goal, a formal method is needed to identify the modifications in an automatic way. Such a method is proposed in the present work. The modifications are loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual foundation for software re-engineering

    Publication Year: 1992, Page(s):226 - 235
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    The author presents a conceptual foundation for software re-engineering. The foundation is composed of properties and principles that underlie re-engineering methods, and assumptions about re-engineering. The value of this conceptual foundation is its ability to model understanding of re-engineering, how it is practiced, and how it can be practiced. A general model of software re-engineering is es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software transition: experience and lessons learned

    Publication Year: 1992, Page(s):294 - 298
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    While operating a software maintenance organization, the authors were faced with the challenge of accepting maintenance responsibility from a software developer for several systems. Transition of the first two systems was painful. Based on the experience gained, the authors developed procedures for transition. They believe that those procedures improve the ability of the maintenance organization t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Surgeon's Assistant: results of a pilot study

    Publication Year: 1992, Page(s):236 - 244
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    The author reports on an empirical evaluation of decomposition slicing as a maintenance method as implemented in the Surgeon's Assistant. The improvement-oriented software maintenance model presented by H. D. Rombach and B.T. Ulery (1988) is used as the foundation. A reprise of software process modeling, a short introduction to software maintenance process modeling, and the definition of the evalu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of software changes on module cohesion

    Publication Year: 1992, Page(s):345 - 353
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Program slices are used to model module cohesion. For the authors purposes, a slice is a projection of program text that includes only the data tokens relevant to one output. The authors define six cohesion metrics in terms of these slices, and evaluate the effects of classes of module changes on these metrics. They find that the effects on cohesion metrics are notably more predictable when the ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to regression testing using slicing

    Publication Year: 1992, Page(s):299 - 308
    Cited by:  Papers (68)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    The authors present a novel approach to data-flow-based regression testing that uses slicing type algorithms to explicitly detect definition-use pairs that are affected by a program change. An important benefit of the slicing technique is that, unlike previous techniques, no data flow history is needed nor is the recomputation of data flow for the entire program required to detect affected definit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for process maintenance [software]

    Publication Year: 1992, Page(s):245 - 254
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    The authors present a framework, called the process cycle, which can assist in supporting and controlling process maintenance. The process cycle incorporates engineering management, performance, and improvement of processes by human agents subjected to desirable goals and policy constraints. Process maintenance is supported by incorporating feedback cycles so that processes, goals, and policies ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program dependence analysis

    Publication Year: 1992, Page(s):356 - 365
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The authors first discuss three methods of identifying objects. The first two were suggested by S.S. Liu and N. Wilde; the third method is one that is proposed in the present work and is based on the determination of the receiver of a procedure. The authors believe that the latter method is more natural and precise than the former two. Algorithms that perform precise interprocedural flow-sensitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceability based on design decisions

    Publication Year: 1992, Page(s):309 - 317
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The authors model the different points of view on a software structure as distinct conceptual models. The mapping among models of the same software structure is made through the assumption of design decisions. This mapping is represented as a graph, the model dependency descriptor, which connects components of source models with those in the target models. A traceability relation is set between co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maturity of maintenance [software]

    Publication Year: 1992, Page(s):259 - 260
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The SEI maturity model has been successfully used for evaluating the software process at both the project and organization levels. The SEI model includes specific questions for software maintenance and contains maintenance implicitly as a part of the total maturity level of an organization. In the present work, the authors argue that the SEI model can also be used more specifically for defining th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating user functionality in old code

    Publication Year: 1992, Page(s):200 - 205
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    It is pointed out that software maintainers often have to recover requirements traceability in old code. In other words, they need to determine in which parts of the program the functionality X is implemented. The authors propose a methodology for answering this question based on the use of carefully designed test cases as probes into the code. While the methodology is not applicable to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software measurement for the space shuttle HAL/S maintenance environment

    Publication Year: 1992
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The authors discuss the development of a complexity domain model for the HAL/S programming language in which all of the space shuttle software is written. Their research has indicated that some aspects of software complexity in other programming language environments are strongly related to software problems incurred during software maintenance. The goal of the current research effort is to establ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data flow diagrams: reverse engineering production and animation

    Publication Year: 1992, Page(s):366 - 375
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    The authors propose the use of interactive animation techniques as a support to reverse engineering processes oriented to the synthesis of semantic abstractions. Starting from data flow diagrams, a formal model, called dynamic data flow diagrams (DDFDs), has been defined, which can be used for the production of executable models of a software system. A strategy for the DDFD interactive animation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An outline for a software maintenance course

    Publication Year: 1992, Page(s):320 - 321
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    The author briefly discusses the course structure for the graduate software maintenance course offered at Arizona State University. Introduction to software maintenance, forms of maintenance, reverse engineering and re-engineering, maintenance models, and maintenance personnel are the topics examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A firewall concept for both control-flow and data-flow in regression integration testing

    Publication Year: 1992, Page(s):262 - 271
    Cited by:  Papers (36)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    The authors present a methodology for regression testing and function or system testers. The methodology involves regression testing of modules where dependencies due to both control flow and data flow are taken into account. The control-flow dependency is modeled as a call graph and a firewall defined to include all affected modules which must be retested. Global variables are considered as the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quick tools strategy for program analysis and software maintenance

    Publication Year: 1992, Page(s):206 - 213
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    A strategy for quickly producing special-purpose tools is described. The strategy combines existing tools including simple off-the-shelf text processing tools; rule-based, language-specific analysis tool; and a commercial CASE (computer-aided software engineering) tool. The strategy has been successfully used in the context of the maintenance and reverse engineering of a large, real-time software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved maintenance support by multi-version visualizations

    Publication Year: 1992, Page(s):376 - 383
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The author proposes a set of visualizing techniques exploiting versioning information easily accessible in a software repository. The novel contribution is the active use of version information. The author uses the term multiversion visualizations, since a visual representation containing information aggregated from several versions of the software is computed. The proposed techniques are applicab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can software maintenance be taught?

    Publication Year: 1992, Page(s):322 - 323
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    It is noted that three arguments have been used as the basis for not developing specific courses in software maintenance. The arguments are worded as follows: maintenance is a direct continuation of software development and should therefore be taught as a proper follow-on to the development task; the real technical change is in developing systems from scratch so the technical challenge of performi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining the software process

    Publication Year: 1992, Page(s):2 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The software process movement is described. Organization-wide software processes and the maintenance of defined software processes are considered. It is suggested that the software process movement will find the software maintenance community directly in its mainstream. Even more important, the maintenance community is about to face a double challenge. First, it must struggle to adopt more effecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software lifetime and its evolution process over generations

    Publication Year: 1992, Page(s):63 - 69
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    It is noted that the software evolution process does not end at the death of an individual software system but usually continues over generations through being replaced by newly built software. To explore this research topic, the authors conducted a survey, collecting data of software lifetimes, replacement practices, and factors of replacement. They report the results of the survey and discuss so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software maintenance: an analysis of industrial needs and constraints

    Publication Year: 1992, Page(s):18 - 26
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    The results are given of a series of case studies conducted at different industrial sites in the framework of the ESF/EPSOM (Eureka Software Factory/European Platform for Software Maintenance) project. The approach taken in the case studies was to directly contact software maintainers and obtain their own view of their activity, mainly through the use of interactive methods based on group work. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of portability problems and evaluation

    Publication Year: 1992, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The portability aspects of the FORTRAN and C languages are discussed and the results of porting evaluation are reported. Several experiments were carried out on transferring a fourth-generation language system named STYLE. STYLE was developed for business transaction processing and is designed to greatly speed up application program development. This system is based on the client and server model.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.