Proceedings of the Sixth European Conference on Software Maintenance and Reengineering

13-13 March 2002

Filter Results

Displaying Results 1 - 25 of 30
  • CSMR 2002 [front matter]

    Publication Year: 2002, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (540 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 263
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Using graph based representations in reengineering

    Publication Year: 2002, Page(s):203 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    We present a graph drawing algorithm that was developed for real-world call graphs, data flows and class hierarchies. The algorithm is an extension of the hierarchical layout method It produces a drawing with orthogonal edges where each edge has at most two bends. We demonstrate practical uses of our algorithm in reengineering process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WARE: a tool for the reverse engineering of Web applications

    Publication Year: 2002, Page(s):241 - 250
    Cited by:  Papers (34)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (875 KB) | HTML iconHTML

    The development of Web sites and applications is increasing dramatically to satisfy the market requests. The software industry is facing the new demand under the pressure of a very short time-to-market and an extremely high competition. As a result, Web sites and applications are usually developed without a disciplined process: Web applications are directly coded and no, or poor, documentation is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical reengineering approach for mobile terminal software

    Publication Year: 2002, Page(s):193 - 200
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Embedded devices like mobile phones are very limited in memory and developers always struggle to squeeze in as much information as possible. In most legacy mobile systems, the operating system is a simple scheduler with no complicated multi-tasking capabilities and programs are written in plain C language for efficiency purposes. A family of such embedded products is built to meet the needs of var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the role of design patterns in quality-driven re-engineering

    Publication Year: 2002, Page(s):230 - 240
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Design patterns have been widely adopted and well investigated by the software engineering community over the past decade. However, their primary use is still associated with forward engineering and the design phase of the software life-cycle. In this paper, we examine design patterns from a different perspective namely, their classification and usage for software re-engineering and restructuring.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting fault-proneness using OO metrics. An industrial case study

    Publication Year: 2002, Page(s):99 - 107
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB)

    Software quality is an important external software attribute that is difficult to measure objectively. In this case study, we empirically validate a set of object-oriented metrics in terms of their usefulness in predicting fault-proneness, an important software quality indicator We use a set of ten software product metrics that relate to the following software attributes: the size of the software,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal pattern language for refactoring of Lisp programs

    Publication Year: 2002, Page(s):186 - 192
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Refactoring tools are extremely important to prevent errors in legacy systems restructuring. Unfortunately, to be effective, these tools require huge computer resources that cause unacceptable inefficiencies or limit the size of the restructured programs or even the programming language expressiveness. Previous approaches also made it difficult for the programmer to extend the tool with new refact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering to the Web: a reference architecture

    Publication Year: 2002, Page(s):164 - 173
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Reengineering existing (large-scale) applications to the Web is a complex and highly challenging task. This is due to a variety of demanding requirements for interactive Web applications. High performance is usually required, old interfaces still have to be supported, high availability requirements are usual, information has to be provided to multiple channels and in different formats, pages shoul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C to Java migration experiences

    Publication Year: 2002, Page(s):143 - 153
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    With the growing popularity of the Java programming language for both client and server side applications in network-centric computing, there is a rising need for programming libraries that can be easily integrated into Java programs. In a previous paper, we surveyed current strategies for integrating C source code into Java programs, pointed out their weaknesses and presented goals for an improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-functional integration and coordination of distributed component services

    Publication Year: 2002, Page(s):126 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    The integration of distributed services has been identified as one of the most important challenges of E-business technology. A great deal of progress has been made in the development of methods and techniques for the integration of distributed components but most of the solutions tends to focus on the problem of syntactical and semantical compatibility of the functional services provided or requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering aggregation relationship based on propagation of operations

    Publication Year: 2002, Page(s):223 - 229
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    One of the major obstacles in reverse engineering legacy object-oriented systems is the identification of aggregation relationships. An aggregation relationship is a special kind of an association relationship. Their distinction is mostly of semantic nature and little by implementation mechanism. Most reverse engineering methods on aggregation relationships are based on the lifetime dependence. Si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metric-based selective representation of UML diagrams

    Publication Year: 2002, Page(s):89 - 98
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    UML diagrams are widely employed for modeling of object-oriented software systems. In addition to their application in forward engineering, it is also possible to use them for the re-documentation of existing programs. However, the inherent structure of UML diagrams, which consists of graphical as well as textual information, makes it difficult to read and oversee large diagrams generated from com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function call trap of Java codes with the help of AspectJ and XML

    Publication Year: 2002, Page(s):207 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    It is shown how the new technologies, AspectJ and XML, can be used for maintenance and development of Java applications. The presented all-purpose software solution gets usable runtime function call information from almost any Java application using the aspect oriented Java extension AspectJ and writes into a simply browsable directory-like structure in XML format without modifying original Java s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to software exploration: back-packing with GSEE

    Publication Year: 2002, Page(s):251 - 262
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    Maintaining software is very difficult, not only because of the number of software artifacts, but also due to the large variety of artifacts. Software includes programs as well as makefiles, architectural information, change logs, etc. Different software exploration tools have been proposed in the last decade. Unfortunately, these tools are either specific (e.g. a class browser), or customizable (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-centric software evolution by software metrics and design patterns

    Publication Year: 2002, Page(s):108 - 115
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolution method the quality of a software system is assured in the software design phase by computing various kinds of design metrics from the system architecture, by automatically exploring instances of design patterns and anti-patterns ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On project-specific languages and their application in reengineering

    Publication Year: 2002, Page(s):177 - 185
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    We propose an approach for tuning reengineering tools to particular projects. This approach is based on the informal knowledge of the system, consisting of specific usages of the programming language. We illustrate this process with examples from an industrial project on PL/I to Java conversion View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit for applying a migration strategy: a case study

    Publication Year: 2002, Page(s):154 - 163
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Many organizations manage their activities by using legacy systems. These are very important for them as they represent an important support for the achievement of the business goals. Numerous strategies have been proposed for migrating legacy systems toward modern architecture. By starting from approaches presented in the literature, this paper provides a reference schema to be applied for increm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution support by homogeneously documenting patterns, aspects and traces

    Publication Year: 2002, Page(s):134 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusability of design solutions. Design patterns capture the expertise for reusable design solutions. Aspect-oriented programming is a methodology that enables the modularization of cross-cutting concerns. Traceability links de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical analysis of massive maintenance processes

    Publication Year: 2002, Page(s):5 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    We present initial results of applying statistical control techniques to the massive maintenance processes of a software organization rated at the CMM level 3. In particular, we present results from an empirical study conducted on a large massive adaptive maintenance project. In a previous study (2001) we analyzed the correlation between the maintenance size and productivity metrics and produced m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperable thin client separation from GUI applications

    Publication Year: 2002, Page(s):211 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    This paper describes the concept of GUI application reengineering with a purpose to detach visualization part into separate lightweight client process runnable on different platforms in distributed environment. Only thin presentation layer of primary application is rewritten and whole application business logic remains intact. Original GUI platform becomes a server platform communicating with remo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of a software component - experiences with a network editor component

    Publication Year: 2002, Page(s):119 - 125
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Even though the benefits of component-based software development are widely accepted, they are easily overestimated. To provide a firmer basis for the general discussion we describe our real life experiences with a software component. Having a lifetime of a whole decade the component has evolved from a class library to an independent component. In this paper we focus on the major evolution steps, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for modeling and evaluating software maintenance process performances

    Publication Year: 2002, Page(s):15 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    This paper presents a method for modeling and evaluating the performances of telecommunication software maintenance process. The method can be used as a special technique within the given generic model as part of an organizational effort to upgrade process maturity and efficiency. It is based on the modeling of software maintenance process as queueing networks and applies process simulation to det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reengineering Wiki

    Publication Year: 2002, Page(s):217 - 220
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The reverse and reengineering research communities have a strong tradition of collecting, organizing, and unifying research results. Typical examples include an explicit taxonomy, dedicated web sites, an annotated bibliography, as well as efforts in exchange formats and tool evaluation. In this paper we describe and evaluate the use of a web authoring system to integrate such efforts. To that end,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating document and workflow management tools using XML and web technologies: a case study

    Publication Year: 2002, Page(s):24 - 33
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    A critical point for developing successful information systems for distributed organisations is the need for integrating heterogeneous technologies and tools. This paper reports a case study of integrating two key enabling technologies, namely workflow and document management. Integration is achieved by combining several approaches, including software engineering and hypertexts. In this way, we ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.