Proceedings of the Third European Conference on Software Maintenance and Reengineering (Cat. No. PR00090)

5-5 March 1999

Filter Results

Displaying Results 1 - 25 of 27
  • Proceedings of the Third European Conference on Software Maintenance and Reengineering (Cat. No. PR00090)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1999, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 1999, Page(s): 203
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Architecture level prediction of software maintenance

    Publication Year: 1999, Page(s):139 - 147
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    A method for the prediction of software maintainability during software architecture design is presented. The method takes: the requirement specification; the design of the architecture; expertise from software engineers; and, possibly, historical data as input and generates a prediction of the average effort for a maintenance task. Scenarios are used by the method to concretize the maintainabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating objects from C code-features of the CORET tool-set

    Publication Year: 1999, Page(s):91 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The CORET tool set serves to restructure legacy C code into semantically equivalent C++ code with semantically coherent objects. To obtain semantical coherence, the object structure is derived from a forwardly developed object oriented analysis model. The paper focuses on the code transformation aspects and addresses special problems due to the fact that we had to depart from C as source language ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A change impact model for changeability assessment in object-oriented software systems

    Publication Year: 1999, Page(s):130 - 138
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Growing maintenance costs have become a major concern for developers and users of software systems. Changeability is an important aspect of maintainability, especially in environments where software changes are frequently required. In this work, the assumption that high-level design has an influence on maintainability is carried over to changeability and investigated for quality characteristics. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a user-controlled software renovation factory

    Publication Year: 1999, Page(s):83 - 90
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    Part of software maintenance consists of applying program transformations system-wide. In a number of recent papers, a factory approach has been advocated in which one program after another is fed to an assembly line that consists of a sequence of transformation tools. The general feeling seems to be that such factories have to be constructed and operated by specialists (the `vendors'). We think t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for regression testing: selecting test case sets taylored to possibly modified functionalities

    Publication Year: 1999, Page(s):2 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    Regression testing is one of the most important and expensive activities of software maintenance. It involves testing the modified program to reveal faults introduced during maintenance and keeping the software's level of reliability, as cheaply as possible. Two techniques of regression testing are discussed. The first is a selective technique (H.K.N. Leung and L. White, 1989) which identifies the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing requirements change using metrics and action planning

    Publication Year: 1999, Page(s):122 - 128
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Software evolves and managing software evolution, in particular requirements evolution, is necessary to sustain the effectiveness of the system to meet the changing needs of its users. Measurement is central to underpinning sound and rational management decisions. However, few measurement schemes or metrics have been proposed that can aid software managers manage requirements change and evolution.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restructuring of COBOL/CICS legacy systems

    Publication Year: 1999, Page(s):72 - 82
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    We provide a strategy to restructure transaction processing systems. Such systems are core assets of most modern business operations, so their enhancement is crucial. Before large scale renovation of transaction processing systems can take place, they need to be restructured. We argue that teleprocessing systems are unstructured by their nature. We approach the problems from a technical viewpoint ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying as an enabling technology in software reengineering

    Publication Year: 1999, Page(s):42 - 50
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    It is argued that different kinds of reengineering technologies can be based on querying. Several reengineering technologies are presented as being integrated into a technically oriented reengineering taxonomy. The usefulness of querying is pointed out with respect to these reengineering technologies. To impose querying as a base technology in reengineering, examples are given with respect to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selection of reverse engineering methods for relational databases

    Publication Year: 1999, Page(s):194 - 197
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    The problem of choosing a method for the reverse engineering of relational database systems is not trivial. Methods have different input requirements, and each legacy system has its particular characteristics that restrict information availability. In this paper, we propose a classification framework based on the method's input requirements, namely: attribute semantics, attribute name consistency,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experiment of legacy code segmentation to improve maintainability

    Publication Year: 1999, Page(s):111 - 119
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    An experiment with procedure oriented legacy code originally developed in C programming language and Xview graphical interface language is described. Its purpose is to segment the code to improve system maintainability. The segmentation is preceded by the legacy system reverse engineering according to an overall process called Fusion/RE. This process produces an object oriented system analysis mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of different flow insensitive points-to analyses on DEF/USE sets

    Publication Year: 1999, Page(s):62 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Points-to analysis is required as a preliminary step for many code analyses used in program understanding and maintenance. Different flow insensitive points-to analyses have been proposed in literature. They are extremely appealing with respect to the flow sensitive counterparts because of their high efficiency. Their output consisting of a set of points-to pairs which hold for the given program, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture comprehension tools for a PBX system

    Publication Year: 1999, Page(s):31 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    The comprehension of the dynamic and static structure of a system is of main importance for purposes of adding features, bug solving, and for redesign activities. This holds particularly for systems where the features tend to be strongly intertwined. In telephony systems, there is feature interaction both at specification and implementation level. We report on a dedicated environment called URSA: ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to manage variance in legacy systems

    Publication Year: 1999, Page(s):190 - 193
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Different market areas set different requirements on software-intensive products. A careful domain analysis yields the predictable variance that can be managed at the architectural and design levels, but the unpredictable variance that is detected only during the maintenance phase is usually managed at the implementation level, due to the high costs of the system re-design or re-architecting. Thus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a usage profile in software quality models

    Publication Year: 1999, Page(s):148 - 157
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    Faults discovered by customers are an important aspect of software quality. The working hypothesis of this paper is that variables derived from an execution profile can be useful in software quality models. An execution profile of a software system consists of the probability of execution of each module during operations. Execution represents opportunities for customers to discover faults. However... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Java library subsets for deployment on embedded systems

    Publication Year: 1999, Page(s):102 - 110
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Embedded systems provide means for enhancing the functionality delivered by small-sized electronic devices such as hand-held computers and cellular phones. Java is a programming language which incorporates a number of features that are useful for developing such embedded systems. However the size and the complexity of the Java language and its libraries have slowed its adoption for embedded system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing use-cases and domain knowledge for comprehending resource usage-experience report

    Publication Year: 1999, Page(s):14 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Philips Electronics is a world wide electronics company that develops many products containing embedded software. These products range from shavers with only a few hundred bytes of software to medical equipment with millions of lines of source code. Large systems are subject to successive changes during several years, which diminishes understanding. Furthermore, due to the cost reduction of a syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of function pointers on the call graph

    Publication Year: 1999, Page(s):51 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they are accessed by means of pointers, in order to comprehend the functionalities of the system. Although several points-to analysis algorithms have been proposed in literature to provide information about memory locations re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software defect report and tracking system in an intranet

    Publication Year: 1999, Page(s):198 - 201
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Describes a case study where SofTrack (a software defect reporting and tracking system) was implemented using Internet technology in a geographically distributed organization. Four medium- to large-sized information systems with different levels of maturity are being analysed within the scope of this project. They belong to the Portuguese Navy's Information Systems Infrastructure and were develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of analysis and redesign activities in information system reengineering

    Publication Year: 1999, Page(s):160 - 168
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Emerging key technologies like the World Wide Web, object-orientation, and distributed computing enable new applications, e.g., in the area of electronic commerce, management information systems, and decision support systems. Today, many companies face the problem that they have to reengineer pre-existing information systems to take advantage of these technologies. Various computer-aided reenginee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing and maintaining architectural quality

    Publication Year: 1999, Page(s):22 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Software architecture analysis is a cost effective means of controlling risk and maintaining system quality throughout the processes of software design, development and maintenance. The paper presents a sequence of steps that maps architectural quality goals into scenarios that measure the goals, mechanisms that realize the scenarios and analytic models that measure the results. This mapping ensur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering relations into abstract ER schemas for database reverse engineering

    Publication Year: 1999, Page(s):169 - 176
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Database reverse engineering (DBRE) methods recover conceptual data models from physical databases. The bottom-up nature of these methods imposes two major limitations. First, they do not provide an initial high level abstract schema suitable for use as a basis for reasoning about the application domain: a single detailed schema is only produced at the very end of the project. Second, they provide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MANTEMA: a complete rigorous methodology for supporting maintenance based on the ISO/IEC 12207 standard

    Publication Year: 1999, Page(s):178 - 181
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    The maintenance of information systems is one of the greatest problems in the software life cycle; it is the most conflictive, costliest, less planeable; and the process requiring the most resources. In spite of this reality, most organizations do not possess methodologies for maintenance. The imperative need for controlling the maintenance process has carried us to propose a maintenance methodolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.