By Topic

Proceedings of the Fourth Working Conference on Reverse Engineering

6-8 Oct. 1997

Filter Results

Displaying Results 1 - 25 of 26
  • Proceedings of the Fourth Working Conference on Reverse Engineering

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Extracting entity-relationship schemas from relational databases: a form-driven approach

    Publication Year: 1997, Page(s):184 - 193
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (861 KB)

    The paper presents a framework for extracting an entity-relationship schema from a set of form model schemas of an operational relational database. Form model schemas gather information, i.e., structural information and constraints among data, extracted from both form structures and instances and then generalized into database semantics using an inference process guided by human activity. The appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1997, Page(s): 247
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • The implications of non-functional requirements for the reengineering of legacy code

    Publication Year: 1997, Page(s):215 - 223
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    The paper describes the process whereby we investigate the implementation of non-functional requirements and their implications on the reengineering process. The authors' work has so far concentrated on the identification of reusable units from existing legacy systems. However, the results from their approaches so far have found that the functionality is difficult to separate into separate units. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain analysis for transformational reuse

    Publication Year: 1997, Page(s):156 - 163
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Domain analysis is an effective technique for enabling both reuse and reverse engineering. The paper shows how domain analysis can provide a framework for combining reverse engineering and forward engineering to implement transformational reuse for information system user interfaces View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program interface reengineering for wrapping

    Publication Year: 1997, Page(s):206 - 214
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper describes a technique for reengineering program interfaces as a prerequisite to wrapping them. Program wrapping is used to encapsulate old software components in a new object-oriented architecture. For this the programs must have well defined interfaces which contain all of their global data. Program interface reengineering as described in the paper is a means to achieving that end. It h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of components for software renovation factories from context-free grammars

    Publication Year: 1997, Page(s):144 - 153
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    The authors present an approach for the generation of components for a software renovation factory. These components are generated from a context-free grammar definition that recognizes the code that has to be renovated. They generate analysis and transformation components that can be instantiated with a specific transformation or analysis task. They apply their approach to COBOL and discuss the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reverse engineering approach to evaluate function point rules

    Publication Year: 1997, Page(s):236 - 245
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Function points are generally used for measuring software functional size from a user perspective. The paper is concerned with the problem of counting function points from source code using the function point analysis proposed by the International Function Point User Group (IFPUG) 1994 standards. The paper presents the Automated FP counting scope and objective, the presentation of an existing semi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensions of database reverse engineering

    Publication Year: 1997, Page(s):176 - 183
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    One continues to be surprised by the variability of reverse engineering problems. When one tackles new problems, one often encounters situations not seen before. For these different situations, one has to adjust reverse engineering techniques, level of effort, and expectations. The paper characterizes dimensions of variation for reverse engineering of databases View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge transfer in database reverse engineering: a supporting case study

    Publication Year: 1997, Page(s):194 - 203
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    While the database reverse engineering problems and solving processes are getting more and more mastered, the academic community is facing the complex problem of knowledge transfer, both in university and industrial contexts. The paper addresses one efficient support of this transfer, namely academic case studies, i.e., small, clean, self-contained applications exhibiting representative problems a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Orphan Adoption problem in architecture maintenance

    Publication Year: 1997, Page(s):76 - 82
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    A lot of research time has been devoted to finding a solution to the problem of automatic clustering, especially in the field of reverse engineering, where decomposing a legacy system to subsystems could be the key to understanding it. Maintaining the obtained structure as a system evolves, however, is a problem that has attracted much less attention. We present the Orphan Adoption problem in arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using visualization for architectural localization and extraction

    Publication Year: 1997, Page(s):56 - 65
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB)

    Understanding the architecture of a program requires determining both the major components into which the system is broken and the ways in which the components interact to accomplish the program's goals. Both static and dynamic analyses of the software can aid in obtaining this understanding. The paper describes an analysis technique for gaining such understanding and a visualization tool, called ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using clustering algorithms in legacy systems remodularization

    Publication Year: 1997, Page(s):33 - 43
    Cited by:  Papers (109)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB)

    Incited by the observation that cluster analysis and the remodularization of software systems solve similar problems, we have done research in both these areas in order to provide theoretical background for the application of cluster analysis in systems remodularization. We present an overview of cluster analysis and of systems remodularization. It appears that system remodularization techniques o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of four reverse engineering tools

    Publication Year: 1997, Page(s):2 - 11
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    Reverse engineering tools support software engineers in the process of analyzing and understanding complex software systems during maintenance activities. The functionality of such tools varies from editing and browsing capabilities to the generation of textual and graphical reports. There are several commercial reverse engineering tools on the market providing different capabilities and supportin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool support for reverse engineering multi-lingual software

    Publication Year: 1997, Page(s):136 - 143
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    Multi-lingual software systems are those in which the component modules are implemented in multiple languages. Reverse engineering such systems raises several issues, particularly with regard to providing automated tool support for the process. GRASP is a prototype software engineering tool designed to provide visualization of software control structure, complexity, and architecture. The paper des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a framework for conceptual and formal outlines of programs

    Publication Year: 1997, Page(s):226 - 235
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1160 KB)

    The author proposes the re-documentation of programs with outlines. The interesting feature of outlines is that they allow one to contract, as in a zoom, the amount of information necessary to understand programs, easing the localization of given computations or identification of the role of a piece of code. As a first stage toward a framework of program outlines, she has defined a model suited to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DARE: domain-augmented reengineering

    Publication Year: 1997, Page(s):164 - 173
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    The author presents the principles of a domain-augmented reengineering approach (DARE) as well as his initial experience of applying sections of it. The principal characteristic of the DARE approach is its focus upon the computational context of a software system, i.e., the business or scientific domain to which it relates. This context information is used both to drive the program understanding a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JACKAL: a hierarchical approach to program understanding

    Publication Year: 1997, Page(s):84 - 93
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    We present a tool, JACKAL, that represents both a program and cliches in an abstract language (AL) expressly developed for the purpose of facilitating the cliche matching task at a very high level rather than using abstract syntax trees. We then apply various matching algorithms to the AL representation. The language and two algorithms are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of abstract data type and abstract state encapsulation detection techniques for architectural understanding

    Publication Year: 1997, Page(s):66 - 75
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    In the context of the authors' research on architectural feature recovery, abstract data type (ADT) and abstract state encapsulation (ASE, also called abstract object) have been identified as two of the smallest components which are useful to build a significant architectural overview of the system. The authors have named these the atomic components of an architecture. The paper compares five publ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation experiments on the detection of programming patterns using software metrics

    Publication Year: 1997, Page(s):44 - 54
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1220 KB)

    Cloning of code fragments in large systems is a common practice that may result in redundant code, higher maintenance costs, and less modular systems. The paper examines and evaluates the use of five data and control flow related metrics for identifying similar code fragments. The metrics are used as signatures for a code fragment. Matching on such signatures results in fast matching that can be u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How do program understanding tools affect how programmers understand programs?

    Publication Year: 1997, Page(s):12 - 21
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    We explore the question of whether program understanding tools enhance or change the way that programmers understand programs. The strategies that programmers use to comprehend programs vary widely. Program understanding tools should enhance or ease the programmer's preferred strategies, rather than impose a fixed strategy that may not always be suitable. We present observations from a user study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cliche recognition in legacy software: a scalable, knowledge-based approach

    Publication Year: 1997, Page(s):94 - 103
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Many software reverse engineering techniques that are sufficiently “light-weight” (i.e. computationally inexpensive) to be able to work on large systems tend to compute syntactic information that, while useful, does not capture the meaning of the program. At the same time, many “heavy-weight” (i.e. computationally expensive) techniques that compute information in terms of h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenarios for the identification of objects in legacy systems

    Publication Year: 1997, Page(s):24 - 32
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    We propose an incremental approach to the identification of (business) objects in legacy applications. In this approach different object identification scenarios can be applied alternately. Three different strategies are presented: function driven, data driven and object driven objectification. We discuss these scenarios and report on experiences gained from applying them to a subsystem of a real ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering is reverse forward engineering

    Publication Year: 1997, Page(s):104 - 113
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Reverse engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering perspective, we gain the insight that much of this difficulty is caused by design decisions made during system development. Such decisions “hide” the program functionality and performance requirements in the fina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New experiments with a constraint-based approach to program plan matching

    Publication Year: 1997, Page(s):114 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    In earlier work, the authors presented some preliminary empirical scalability results for a constraint-based program plan matching algorithm. Those initial experiments had several important shortcomings: they worked with a collection of artificially generated programs, and they applied a particular; general-purpose constraint satisfaction approach. The paper reports the results of a collection of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.