By Topic

Software Maintenance and Reengineering (CSMR), 2011 15th European Conference on

Date 1-4 March 2011

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2844 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Welcome from the Conference Chairs

    Publication Year: 2011, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (366 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2011, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Sponsoring and Support

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (288 KB)
    Freely Available from IEEE
  • Invited Talk: Reengineering from a Practitioner's View -- A Personal Lesson's Learned Assessment

    Publication Year: 2011, Page(s):1 - 2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    Reengineering in all its facets is now a well recognized field within information technology literature and practice for more than 25 years. This paper gives a review of reengineering over this period. It is neither intended as a scientific assessment of the "myriad" of papers ever published about this subject area nor as an extensive review of pros and cons of the various reengineering approaches... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Talk: Promises and Challenges of Model-Driven Engineering

    Publication Year: 2011, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The complexity of (software-intensive) systems we build as well as the demands that are put on quality, safety, and maintainability of these systems has grown drastically over the last decades. To tackle this complexity, Model-Driven Engineering (MDE) treats models, in various formalisms, as first-class artifacts. Such models may be obtained by reverse-engineering of existing software artifacts, f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Mining Software Repositories

    Publication Year: 2011, Page(s):5 - 14
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (921 KB) | HTML iconHTML

    Software developers' activities are in general recorded in software repositories such as version control systems, bug trackers and mail archives. While abundant information is usually present in such repositories, successful information extraction is often challenged by the necessity to simultaneously analyze different repositories and to combine the information obtained. We propose to apply proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTFM (Read the Factual Mails) - Augmenting Program Comprehension with Remail

    Publication Year: 2011, Page(s):15 - 24
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2471 KB) | HTML iconHTML

    The advent of globalization has led to the adoption of distributed software development as a common practice. One of its drawbacks-the absence of impromptu meetings - is tackled with other communication means, such as emails, instant messaging, or forums. Mailing lists have proven to be effective for enabling developers' collaboration and coordination: Being asynchronous, emails can evade time zon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranking Refactoring Suggestions Based on Historical Volatility

    Publication Year: 2011, Page(s):25 - 34
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    The widespread acceptance of refactorings as a simple yet effective approach to improve the design of object-oriented systems, has stimulated an effort to develop semi-automatic tools for detecting design flaws, with simultaneous suggestions for their removal. However, even in medium-sized projects the number of detected occurrences can be so large that the refactoring process becomes intractable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the use of lexical information for software system clustering

    Publication Year: 2011, Page(s):35 - 44
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Developers have a lot of freedom in writing comments as well as in choosing identifiers and method names. These are intentional in nature and provide a different relevance of information to understand what a software system implements, and in particular the role of each source file. In this paper we investigate the effectiveness of exploiting lexical information for software system clustering. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Similarity Measures for Software Clustering

    Publication Year: 2011, Page(s):45 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Software clustering is a useful technique to recover architecture of a software system. The results of clustering depend upon choice of entities, features, similarity measures and clustering algorithms. Different similarity measures have been used for determining similarity between entities during the clustering process. In software architecture recovery domain the Jaccard and the Unbiased Ellenbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Benefits of Planning and Grouping Software Maintenance Requests

    Publication Year: 2011, Page(s):55 - 64
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Despite its unquestionable importance, software maintenance usually has a negative image among software developers and even project managers. As a result, it is common to consider maintenance requests as short-term tasks that should be implemented as quick as possible to have a minimal impact for end-users. In order to promote software maintenance to a first-class software development activity, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clone Stability

    Publication Year: 2011, Page(s):65 - 74
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (471 KB) | HTML iconHTML

    Code clones are said to threaten the maintainability of a system -- especially when the system evolves and source code is changed. Whether clones truly increase maintenance effort can be analyzed by comparing the stability of cloned code to the stability of non-cloned code. A previous study found that cloned code is even more stable than non-cloned code and, thus, requiring less maintenance effort... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Clone Detection on Specialized PDGs with Heuristics

    Publication Year: 2011, Page(s):75 - 84
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    PDG-based code clone detection is suitable for detecting on-contiguous code clones while other detection techniques, line-, token-, or AST-based techniques are not. However, PDG-based detection has lower performance for detecting contiguous code clones than the other techniques. Moreover, PDG-based detection is time consuming, so that application to actual software systems is not feasible. The pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Term Weighting Schemes for Labeling Software Clusters

    Publication Year: 2011, Page(s):85 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Clustering techniques have been widely employed for software modularization. The clusters formed as a result of the clustering process may be difficult to understand unless they are appropriately labeled. One method to assign labels is to use term weighting schemes from Information Retrieval and Text Categorization which use weights to assign importance to terms in a document. Some of these term w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Evolution towards Model-Centric Runtime Adaptivity

    Publication Year: 2011, Page(s):89 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Runtime adaptivity is a promising direction towards achieving adaptive behavior for software systems that operate within highly dynamic and non-deterministic environments. Model-centric approaches have proven to be able to successfully address various aspects of runtime adaptivity. In this paper, we propose a target architecture for self-adaptive software systems and show how it facilitates adapta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Domain Specific Dictionaries of Verb-Object Relation from Source Code

    Publication Year: 2011, Page(s):93 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    An identifier is an important key in mapping program elements onto domain knowledge for the purpose of program comprehension. Therefore, if identifiers in a program have inappropriate names, developers can waste a lot of time trying to understand the program. This paper proposes a method for extracting and gathering verb-object (V-O) relations, as good examples of naming, from source code written ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revealing Mistakes in Concern Mapping Tasks: An Experimental Evaluation

    Publication Year: 2011, Page(s):101 - 110
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    Concern mapping is the activity of assigning a stakeholder's concern to its corresponding elements in the source code. This activity is primordial to guide software maintainers in several tasks, such as understanding and restructuring the implementation of existing concerns. Even though different techniques are emerging to facilitate the concern mapping process, they are still manual and error-pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factbase and Decomposition Generation

    Publication Year: 2011, Page(s):111 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The software maintenance research community has developed a large number of approaches that can help maintainers understand large software systems accurately and efficiently. However, tools that can facilitate research in program comprehension are rarely publicly available. In this paper, we introduce two approaches that generate artifacts, such as fact bases and decompositions, that can be used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximating Change Sets at Philips Healthcare: A Case Study

    Publication Year: 2011, Page(s):121 - 130
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    A single development task such as solving a bug or implementing a new feature often involves changing a number of entities, also known together as a change set. Change sets can be approximated from the version control system. They are then used by the architects and developers to take important decisions. So change sets need to be approximated carefully. It is common to assume that two entities ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Deployment Activities and Challenges - A Case Study of Four Software Product Companies

    Publication Year: 2011, Page(s):131 - 140
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Software deployment, including both clean installs and updates, is a crucial activity for all software vendors. It starts with a customer's order of a new release and incorporates all steps taken until the customer is satisfied with the deployed product. Using interviews as the main data collection method, we conducted a case study of four companies to discover their software deployment activities... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.