By Topic

Software Maintenance and Reengineering, 2009. CSMR '09. 13th European Conference on

Date 24-27 March 2009

Filter Results

Displaying Results 1 - 25 of 73
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3510 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • Welcome from the Conference Chairs

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2009, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Freely Available from IEEE
  • Design for Maintenance - Use of Engineering Principles and Product Line Technology

    Publication Year: 2009, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB)

    Software systems become increasingly complex, embedded into critical technical or business environments, evolving, and long-living. Other engineering disciplines design for modifiability, testability, and many other –ilities a-priori. In software engineering we teach the corresponding principles and laws in software engineering curricula, but we have failed to introduce them into wide-spre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To Use or Not to Use? The Metrics to Measure Software Quality (Developers' View)

    Publication Year: 2009, Page(s):3 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The research related to software product metrics is becoming increasingly important and widespread. One of the most popular research topics in this area is the development of different software quality models that are based on product metrics. These quality models can be used to assist software project managers in making decisions e.g. if the most “critical” parts of the code have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stevens Lecture on Software Development Methods at CSMR 2009

    Publication Year: 2009, Page(s):5 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    The international Stevens Award was created to recognize outstanding contributions to the literature or practice of methods for software and systems development. Harry Sneed is honored "for his leadership and many contributions to the practice and principled growth of software maintenance techniques and their industrialization." View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Comprehension Pitfalls in Class Hierarchies

    Publication Year: 2009, Page(s):7 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Despite many advances in program comprehension, polymorphism and inheritance are still the cause of many misunderstandings in object-oriented code. In this paper, we present a suite of such concrete, recurrent patterns where particular ways of using inheritance and polymorphism can easily mislead developers and maintainers during software understanding activities. We define these as comprehension ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Complexity of Large-Scale Software Systems

    Publication Year: 2009, Page(s):17 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    Today companies apply software systems with more than 14 million Lines of Code (LOC), which are still maintainable and expandable in spite of their size. On the other hand, you will find smaller software systems (> 200,000 LOC), which can either only be adapted with considerable effort, or which cannot be adapted at all. Why are some software systems fraught with maintenance problems while othe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Clustering Using Dynamic Analysis and Static Dependencies

    Publication Year: 2009, Page(s):27 - 36
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Decomposing a software system into smaller, more manageable clusters is a common approach to support the comprehension of large systems. In recent years, researchers have focused on clustering techniques to perform such architectural decomposition, with the most predominant clustering techniques relying on the static analysis of source code. We argue that these static structural relationships are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Security Analysis Based on Input-Related Software Faults

    Publication Year: 2009, Page(s):37 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and there are only a few effective automatic tools available to help developers. In this paper we present an approach to help developers locate vulnerabilities by marking parts of the source code that involve user input. We focus ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Failure Diagnosis Support in Distributed Large-Scale Software Systems Based on Timing Behavior Anomaly Correlation

    Publication Year: 2009, Page(s):47 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    Manual failure diagnosis in large-scale software systems is time-consuming and error-prone. Automatic failure diagnosis support mechanisms can potentially narrow down, or even localize faults within a very short time which both helps to preserve system availability. A large class of automatic failure diagnosis approaches consists of two steps: 1) computation of component anomaly scores; 2) global ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool Support for Fault Localization Using Architectural Models

    Publication Year: 2009, Page(s):59 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    Locating software faults is a problematic activity in many systems. Existing tool approaches usually work close to the system implementation, requiring the developer to perform tedious code analyses in which the amount of information she must manage is usually overwhelming. This problem calls for approaches able to work at higher abstraction levels than code. In this context, we present a tool app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of TreeNet in Predicting Object-Oriented Software Maintainability: A Comparative Study

    Publication Year: 2009, Page(s):69 - 78
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (635 KB) | HTML iconHTML

    There is an increasing interest in more accurate prediction of software maintainability in order to better manage and control software maintenance. Recently, TreeNet has been proposed as a novel advance in data mining that extends and improves the CART (classification and regression trees) model using stochastic gradient boosting. This paper empirically investigates whether the TreeNet model yield... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Guidance when Restructuring Variabilities in Software Product Lines

    Publication Year: 2009, Page(s):79 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Software product lines (SPLs) encompass a family of software systems developed from reusable assets. One issue during SPL maintenance is the decision about which mechanism should be used to restructure variabilities aiming at improving the modularity of the SPL artifacts. Due to the great variety of mechanisms (inheritance, configuration files, aspect-oriented programming), selecting the incorrect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent Fine-Grained Versioning of UML Models

    Publication Year: 2009, Page(s):89 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    Concurrent versioning of source code is a common and well-established practice to manage concurrency and consistency within source code repository. With the growing complexity of nowadays software systems, the need for high level representations of the system to develop becomes inevitable. These software models evolve together with the software system, thus requiring versioning management. Moreove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation

    Publication Year: 2009, Page(s):99 - 108
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    In this paper we present a new technique able to recover behavioral design pattern instances which combines static analysis, based on visual language parsing, with dynamic analysis, based on source code instrumentation. In particular, the dynamic analysis is performed through the automatic instrumentation of the method calls involved in the candidate pattern instances identified during static anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Dataflow-Based Concern Identification Approach

    Publication Year: 2009, Page(s):109 - 118
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Concern identification aims to identify the implementation of a functional concern in existing source code. The dataflow-based concern identification approach starts from a set of concern seeds and uses static dataflow information to extract the data skeleton of a functional concern. This paper builds upon previous work on dataflow-based concern identification and presents three improvements to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Extract Method Refactoring Opportunities

    Publication Year: 2009, Page(s):119 - 128
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Extract method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a variety of design problems. However, existing tools and methodologies support extraction of methods based on a set of statements selected by the user in the original method. The goal of the proposed methodology is to aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting SOA – Experiences from Nine Finnish Organizations

    Publication Year: 2009, Page(s):129 - 138
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Service-Oriented Architecture is expanding its footprint in an organizationpsilas IT landscape. The era of early adopters is over. However, the path to SOA is long, slow and sometimes even bumpy. Many organizations have taken the first steps, and also bumps, in SOA adoption already many years ago.Adoption has been started for various reasons; typically, motivation is derived from a problem situati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.