By Topic

2007 IEEE International Conference on Software Maintenance

Date 2-5 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 87
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (489 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):1 - 10
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2007, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2007, Page(s):1 - 34
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Commentary]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (448 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Advertisements]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Staff or society listings

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Staff or society listings

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Staff or society listings

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Staff or society listings

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Houston: We are in Overload

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    During the flight of Apollo 13, an oxygen tank blew up threatening the lives of the astronauts. When it happened, James Lovell Jr. told the Houston control center, "Hey Houston, we 've had a problem here." Although not as catastrophic, software developers productivity is being threatened by an inundation of information: source code is easier and easier to traverse and to find, email inboxes are st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agree or Change! Making Services Evolve

    Publication Year: 2007, Page(s):2 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB) | HTML iconHTML

    Service-centric systems are developed by composition and configuration of services, i.e., "software components that can be used but that are not owned". Services are most often not under control of consumers. They are indeed made available by third parties, they are autonomously developed and managed, and can in principle change without notification. Service Level Agreements (SLAs) define the exac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Inevitable Stability of Software Change

    Publication Year: 2007, Page(s):4 - 13
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Real software systems change and become more complex over time. But which parts change and which parts remain stable? Common wisdom, for example, states that in a well-designed object-oriented system, the more popular a class is, the less likely it is to change from one version to the next, since changes to this class are likely to impact its clients. We have studied consecutive releases of severa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the Lexicon Used by Programmers during Sofware Evolution

    Publication Year: 2007, Page(s):14 - 23
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Identifiers represent an important source of information for programmers understanding and maintaining a system. Self-documenting identifiers reduce the time and effort necessary to obtain the level of understanding appropriate for the task at hand. While the role of the lexicon in program comprehension has long been recognized, only a few works have studied the quality and enhancement of the iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clone Smells in Software Evolution

    Publication Year: 2007, Page(s):24 - 33
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Although source code cloning (copy&paste programming) represents a significant threat to the maintainability of a software system, problems usually start to arise only when the system evolves. Most of the related research papers tackle the question of finding code clones in one particular version of the software only, leaving the dynamic behavior of the clones out of consideration. Eliminating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Unusual Code

    Publication Year: 2007, Page(s):34 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    We describe an automated approach to finding code fragments that are unusual and hence might represent potential problems. Many potential problems in programs arise in code that is uncommon either because it represents rarely used constructs and hence is unfamiliar to the programmer, or because it represents a mistyping or other error that still happens to be legal code, albeit not very common. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evidence-Based Analysis and Inferring Preconditions for Bug Detection

    Publication Year: 2007, Page(s):44 - 53
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    An important part of software maintenance is fixing software errors and bugs. Static analysis based tools can tremendously help and ease software maintenance. In order to gain user acceptance, a static analysis tool for detecting bugs has to minimize the incidence of false alarms. A common cause of false alarms is the uncertainty over which inputs into a program are considered legal. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Location and Extraction using Landmarks and Barriers

    Publication Year: 2007, Page(s):54 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Identifying and isolating the source code associated with a particular feature is a problem that frequently arises in many maintenance tasks. The delocalised nature of object-oriented systems, where the code associated with a feature is distributed across many interrelated objects, makes this problem particularly challenging. This paper presents an approach that combines landmark' methods that hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JTourBus: Simplifying Program Understanding by Documentation that Provides Tours Through the Source Code

    Publication Year: 2007, Page(s):64 - 73
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Many small and medium-sized systems have little or no design documentation, which makes program understanding during maintenance enormously more difficult when performed by outsiders. Thus, if only minimal design documentation is available, which form should it take to maximize its usefulness? We suggest that it is helpful if the documentation describes a tour through the source code, leading the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment

    Publication Year: 2007, Page(s):74 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4636 KB) | HTML iconHTML

    Parallel developments are becoming increasingly prevalent in the building and evolution of large-scale software systems. Our previous studies of a large industrial project showed that there was a linear correlation between the degree of parallelism and the likelihood of defects in the changes. To further study the relationship between parallel changes and faults, we have designed and implemented a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching Control Flow of Program Versions

    Publication Year: 2007, Page(s):84 - 93
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that dynamically behave the same even though they statically appear to be different. Recently dynamic matching [18] was proposed by us which uses execution histories to automatically produce mappings between instructions in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Package Surface Blueprints: Visually Supporting the Understanding of Package Relationships

    Publication Year: 2007, Page(s):94 - 103
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6909 KB) | HTML iconHTML

    Large object-oriented applications are structured over large number of packages. Packages are important but complex structural entities that may be difficult to understand since they play different development roles (i.e., class containers, code ownership basic structure, architectural elements...). Maintainers of large applications face the problem of understanding how packages are structured in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.