By Topic

Software Maintenance (ICSM), 2010 IEEE International Conference on

Date 12-18 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 95
  • Additional reviewers

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Commitee

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (625 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • ERA track Program Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Industrial track Program Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (30 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Committee

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (199 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Tool demonstrations committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Certifying software robustness using program slicing

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Robustness of a program is the degree of system correctness of all parts. Measuring robustness is a goal for many researchers. In this paper, program slicing is used to build a robustness hierarchy, where this hierarchy will be used to test, and build a robust program. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program analysis and transformation for data-intensive system evolution

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Data-intensive software systems are generally made of a database and a collection of application programs in strong interaction with the former. They constitute critical assets in most enterprises, since they support business activities in all production and management domains. Data-intensive systems form most of the so-called legacy systems: they typically are one or more decades old, they are ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering object-oriented distributed systems

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    A significant part of the modern software systems are designed and implemented as object-oriented distributed applications, addressing the needs of a globally-connected society. While they can be analyzed focusing only on their object-oriented nature, their understanding and quality assessment require very specific, technology-dependent analysis approaches. This doctoral dissertation describes a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software asset management

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Software asset management represents an important part of software maintenance. The paper describes the main issues arising from several aspects such as legislation, management, and finance. It analyses the design of a software asset management system developed for University purposes and addresses the most significant issues in this environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conversion of fast inter-procedural static analysis to model checking

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Large scale software model checking is a difficult problem in part because of the complexity created by inter-procedural function calling. Fastest current solution for this problem claim a polynomial time for only a partial resolution. Static analysis suffers of the same complexity but some work has observed linear time and space complexity for some specific problems. Our research describes how we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical software evolvability - code smells and human evaluations

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Low software evolvability may increase costs of software development for over 30%. In practice, human evaluations and discoveries of software evolvability dictate the actions taken to improve the software evolvability, but the human side has often been ignored in prior research. This dissertation synopsis proposes a new group of code smells called the solution approach, which is based on a study o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved size and effort estimation models for software maintenance

    Publication Year: 2010, Page(s):1 - 2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    This paper provides a brief description of our study proposing improvements to the COCOMO models for estimating maintenance size and effort. The proposed size and effort models take into account characteristics of software maintenance that have not been addressed in the current COCOMO models. We found that the proposed models potentially improve the estimation accuracies of software maintenance pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • History-sensitive recovery of product line features

    Publication Year: 2010, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    Since software product lines (SPLs) increasingly have to satisfy additional requirements, their designs might degenerate over time. The degeneration is caused by various reasons. For instance, the features suddenly start to be realized and they evolved in inconsistent ways across multiple products. In an extreme case, the SPL code is fully or partially replicated and individually changed across se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coherent Software Cities

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Coherent Software Cities are a software visualization approach which adopts the city metaphor to support the comprehension of various aspects of evolving software systems. For this purpose, the approach implements a three-staged modeling chain yielding coherent sets of application specific visualizations. In this context, a new layout approach for software cities is presented, which explicitly tak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using ontology fragments in concept location

    Publication Year: 2010, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Concept location is the process of locating relevant source code fragments where a change must be made. Concept location requires programmers' understanding of the program and their ability to formulate effective concept location queries. This research presents a systematic approach to query formulation that uses ontology fragments. Preliminary results of a case study demonstrate that only small, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical and conceptual identifier dispersion: Measures and relation to fault proneness

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Poorly-chosen identifiers have been reported in the literature as misleading and increasing the program comprehension effort. Identifiers are composed of terms, which can be dictionary words, acronyms, contractions, or simple strings. We conjecture that the use of identical terms in different contexts may increase the risk of faults. We investigate our conjecture using a measure combining term ent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting reusable services from legacy object-oriented systems

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    Migrating legacy object-oriented system functionalities to SOA environment is a important problem that frequently arises in many system maintenance and integration tasks. A service is often implemented by complex collaborations of many objects in an object-oriented system. Such complexity brings impedance mismatch between service and object. Moreover, the delocalized nature of object-oriented syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Playing with refactoring: Identifying extract class opportunities through game theory

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    In software engineering, developers must often find solutions to problems balancing competing goals, e.g., quality versus cost, time to market versus resources, or cohesion versus coupling. Finding a suitable balance between contrasting goals is often complex and recommendation systems are useful to support developers and managers in performing such a complex task. We believe that contrasting goal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven detection of Design Patterns

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Tracing source code elements of an existing Object Oriented software system to the components of a Design Pattern is a key step in program comprehension or re-engineering. It helps, mainly for legacy systems, to discover the main design decisions and trade-offs that are often not documented. In this paper an approach is presented to automatically detect Design Patterns in existing Object Oriented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.