By Topic

Proceedings Seventh Working Conference on Reverse Engineering

23-25 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 42
  • Proceedings Seventh Working Conference on Reverse Engineering

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2000, Page(s):303 - 304
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Studying the process of software change: an analysis of software evolution

    Publication Year: 2000, Page(s):232 - 239
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper describes the analysis and results of studies in software evolution. Four major applications have been studied, three of which are from the commercial sector. The study concentrates on analysing changes in data complexity, as a direct result of the maintenance processes through comparing versions of the same application. Reverse engineering techniques are employed as a means of analysing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental validation of control structure diagrams

    Publication Year: 2000, Page(s):224 - 230
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    Recently one of the first in a series of planned comprehension experiments was performed to measure the effect of the control structure diagram (CSD), reverse engineered from source code, on program comprehensibility. Computer science students in an object oriented programming course were asked to respond to questions regarding the structure and execution of a source code module written in Java. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the behavior of Java programs

    Publication Year: 2000, Page(s):214 - 223
    Cited by:  Papers (28)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    To fully understand the underlying architecture of an object oriented software system, both static and dynamic analyses are needed. Dynamic reverse engineering techniques are especially important for understanding the run-time behavior of objects in a distributed object systems and in systems that rely heavily on polymorphism. Shimba, a prototype reverse engineering environment, has been built to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data reverse engineering: a historical survey

    Publication Year: 2000, Page(s):70 - 78
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Data reverse engineering is a rapidly growing field which is sometimes misunderstood. In our effort to promote the realization that data reverse engineering is a valuable and essential part of reverse engineering and is now finding its place in software engineering, we present a summary of the history of data reverse engineering. A definition of data reverse engineering, a summary of the history o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structured demonstration of five program comprehension tools: lessons learnt

    Publication Year: 2000, Page(s):210 - 212
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The purpose of the article is to report on a structured demonstration for comparing program comprehension tools. Five teams of program comprehension tool designers applied their tools to a set of maintenance tasks on a common subject system. By applying a variety of reverse engineering techniques to a predefined set of tasks, the tools can be compared using a common playing field. A secondary topi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for a single data exchange format

    Publication Year: 2000, Page(s):281 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The paper discusses why IBM is interested in accelerating the development of a single data exchange format. There is a need for a variety of tools that are loosely characterized into two groups: fact extraction and fact usage. These tools have to produce data to share or have to share data from a number of producers. The key problem is the lack of tool interoperability View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing XML-speaking wrappers for WEB applications: towards an interoperating WEB

    Publication Year: 2000, Page(s):59 - 68
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    We discuss an architecture for integrating WWW applications that offer information and services in the same domain. At the center of this architecture exists a mediator, whose responsibilities are to interact with the user and to effectively exchange information with the underlying applications in order to accomplish the user's task. The integration and interoperation of the existing applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing xfig using the Rigi tool suite

    Publication Year: 2000, Page(s):207 - 209
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    An experiment is conducted on how well expert users of program comprehension tools are able to perform specific program understanding and maintenance tasks on the xfig drawing program using these tools. The paper reports on the experiences of the users of the Rigi reverse engineering tool suite. Rigi is an interactive, visual tool designed to help developers better understand and redocument their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next generation data interchange: tool-to-tool application program interfaces

    Publication Year: 2000, Page(s):278 - 280
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Data interchange in the form of a standard exchange format (SEF) is only a first step rewards tool interoperability. Inter-tool communication using files is slow and cumbersome; a better approach would be an application program interface, or API, that allowed tools to communicate with each other directly. The paper argues that such an API is a logical next step that builds on the current drive tow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating legacy user interfaces to the Internet: shifting dialogue initiative

    Publication Year: 2000, Page(s):52 - 58
    Cited by:  Papers (15)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    A critical problem in many businesses today is in reengineering legacy information systems to operate on the Internet. Migrating a sequentially structured program to the Internet requires restructuring it to be event-driven to accommodate a new Web-based user interface. The Model Oriented Reengineering Process for Human-Computer Interface (MORPH) technique and toolset were developed to automatical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying traditional Unix tools during maintenance: an experience report

    Publication Year: 2000, Page(s):203 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The Unix programming environment provides a rich and fairly standard set of generic tools for the development and maintenance of software. In an age of advanced software tools and environments, it is useful to see how new tools compare against an old baseline. The exercise involved performing three tasks: (1) producing summary documentation; (2) evaluating program structure; and (3) reconnoitering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the suitability of data clustering for software remodularisation

    Publication Year: 2000, Page(s):268 - 276
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB)

    The paper describes the investigation of a technique for remodularising legacy software; that of cluster analysis. This technique takes into account data cohesion as an influencing factor of the remodularisation process and compares and contrasts this with calling structure analysis. Cluster analysis is a well-established discipline used in other sciences but only recently linked to software remod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse architecting: an industrial experience report

    Publication Year: 2000, Page(s):42 - 50
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Reverse architecting is a flavour of reverse engineering that concerns the extraction of software architecture models from the system implementation. This paper presents experience in recovering the architecture of an embedded software system developed in Nokia. It outlines the reverse architecting approach, discusses its application on the case study and presents usage scenarios of the extracted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PBS tool demonstration report on xfig

    Publication Year: 2000, Page(s):200 - 202
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The Portable Book Shelf (PBS) (http://www.turing.cs.toronto.edu/phs) software consists of a set of tools to extract and visualize the architecture of a software system. Currently, it can extract the architecture for systems written in C, C++, Java, and PL/IX. The tools can be classified into three categories: 1. The source code extractor (SCE): extracts system artifacts and their relationships fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACCD: an algorithm for comprehension-driven clustering

    Publication Year: 2000, Page(s):258 - 267
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    The software clustering literature contains many different approaches that attempt to automatically decompose software systems. These approaches commonly utilize criteria or measures based on principles such as high cohesion and low coupling, information hiding etc. We present an algorithm that subscribes to a philosophy targeted towards program comprehension and based on subsystem patterns. We di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced clone-analysis to support object-oriented system refactoring

    Publication Year: 2000, Page(s):98 - 107
    Cited by:  Papers (57)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Manual source code copy and modification is often used by programmers as an easy means for functionality reuse. Nevertheless, such practice produces duplicated pieces of code or clones whose consistent maintenance might be difficult to achieve. It also creates implicit links between classes sharing a functionality. Clones are therefore good candidates for system redesign. This paper presents a nov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture-based approach for synthesizing and integrating adapters for legacy software

    Publication Year: 2000, Page(s):128 - 137
    Cited by:  Papers (8)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    In software organizations there is a very real possibility that a commitment to existing assets will require migration of legacy software towards new environments that use modern technology. One technique that has been suggested for facilitating the migration of existing legacy assets to new platforms is via the use of the adapter design pattern, also known as component wrapping. We describe an ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring legacy systems using types

    Publication Year: 2000, Page(s):32 - 41
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    We show how hypertext-based program understanding tools can achieve new levels of abstraction by using inferred type information for cases where the subject software system is written in a weakly typed language. We propose TYPEXPLORER, a tool for browsing COBOL legacy systems based on these types. The paper addresses: how types, an invented abstraction, can be presented meaningfully to software re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing xfig using the Bauhaus tool

    Publication Year: 2000, Page(s):197 - 199
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The Bauhaus project researches reengineering techniques to help program understanding of legacy code. Part of the program understanding task is the discovery of the system's architecture, which consists of components, subsystems, connectors, and constraints. Information about the system is exclusively extracted from the source code (because this is the only reliable source of information), in a se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A maintainability model for industrial software systems using design level metrics

    Publication Year: 2000, Page(s):248 - 256
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Software maintenance is a time consuming and expensive phase of a software product's life-cycle. The paper investigates the use of software design metrics to statistically estimate the maintainability of large software systems, and to identify error prone modules. A methodology for assessing, evaluating and, selecting software metrics for predicting software maintainability is presented. In additi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method and process for iterative reengineering of data in a legacy system

    Publication Year: 2000, Page(s):86 - 96
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    This paper presents an iterative approach to database reengineering, starting from the assumption that for the user organization, the data are the most important assets in a legacy system. The most innovative feature of the proposed approach, in comparison with other rival approaches, is that it can eliminate all the ageing symptoms of the legacy database. The new database can therefore be readily... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering using design patterns

    Publication Year: 2000, Page(s):118 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Starting from a legacy system, originally developed in C and using text files, we first conducted a reverse engineering of this system to obtain its object-oriented analysis model. Then, in a process that is called segmentation, we restructured the code, changing all data structures to abstract data types and procedures to methods, eliminating all data access anomalies. This paper presents an expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering tools as media for imperfect knowledge

    Publication Year: 2000, Page(s):22 - 31
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    Reverse engineering is an imperfect process driven by imperfect knowledge. Most current reverse engineering tools do not adequately consider these inherent characteristics. They focus an representing precise, complete and consistent knowledge and work towards enforcing predefined structures on the processes. According to our experience, this design paradigm seriously limits human-centred reverse e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.