By Topic

Software Maintenance and Reengineering, 2002. Proceedings. Sixth European Conference on

Date 13-13 March 2002

Filter Results

Displaying Results 1 - 25 of 30
  • CSMR 2002 [front matter]

    Publication Year: 2002, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (540 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 263
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Reengineering to the Web: a reference architecture

    Publication Year: 2002, Page(s):164 - 173
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Reengineering existing (large-scale) applications to the Web is a complex and highly challenging task. This is due to a variety of demanding requirements for interactive Web applications. High performance is usually required, old interfaces still have to be supported, high availability requirements are usual, information has to be provided to multiple channels and in different formats, pages shoul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On project-specific languages and their application in reengineering

    Publication Year: 2002, Page(s):177 - 185
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    We propose an approach for tuning reengineering tools to particular projects. This approach is based on the informal knowledge of the system, consisting of specific usages of the programming language. We illustrate this process with examples from an industrial project on PL/I to Java conversion View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to software exploration: back-packing with GSEE

    Publication Year: 2002, Page(s):251 - 262
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    Maintaining software is very difficult, not only because of the number of software artifacts, but also due to the large variety of artifacts. Software includes programs as well as makefiles, architectural information, change logs, etc. Different software exploration tools have been proposed in the last decade. Unfortunately, these tools are either specific (e.g. a class browser), or customizable (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal pattern language for refactoring of Lisp programs

    Publication Year: 2002, Page(s):186 - 192
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Refactoring tools are extremely important to prevent errors in legacy systems restructuring. Unfortunately, to be effective, these tools require huge computer resources that cause unacceptable inefficiencies or limit the size of the restructured programs or even the programming language expressiveness. Previous approaches also made it difficult for the programmer to extend the tool with new refact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metric-based selective representation of UML diagrams

    Publication Year: 2002, Page(s):89 - 98
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    UML diagrams are widely employed for modeling of object-oriented software systems. In addition to their application in forward engineering, it is also possible to use them for the re-documentation of existing programs. However, the inherent structure of UML diagrams, which consists of graphical as well as textual information, makes it difficult to read and oversee large diagrams generated from com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting fault-proneness using OO metrics. An industrial case study

    Publication Year: 2002, Page(s):99 - 107
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB)

    Software quality is an important external software attribute that is difficult to measure objectively. In this case study, we empirically validate a set of object-oriented metrics in terms of their usefulness in predicting fault-proneness, an important software quality indicator We use a set of ten software product metrics that relate to the following software attributes: the size of the software,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C to Java migration experiences

    Publication Year: 2002, Page(s):143 - 153
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    With the growing popularity of the Java programming language for both client and server side applications in network-centric computing, there is a rising need for programming libraries that can be easily integrated into Java programs. In a previous paper, we surveyed current strategies for integrating C source code into Java programs, pointed out their weaknesses and presented goals for an improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reengineering Wiki

    Publication Year: 2002, Page(s):217 - 220
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The reverse and reengineering research communities have a strong tradition of collecting, organizing, and unifying research results. Typical examples include an explicit taxonomy, dedicated web sites, an annotated bibliography, as well as efforts in exchange formats and tool evaluation. In this paper we describe and evaluate the use of a web authoring system to integrate such efforts. To that end,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using graph based representations in reengineering

    Publication Year: 2002, Page(s):203 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    We present a graph drawing algorithm that was developed for real-world call graphs, data flows and class hierarchies. The algorithm is an extension of the hierarchical layout method It produces a drawing with orthogonal edges where each edge has at most two bends. We demonstrate practical uses of our algorithm in reengineering process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining static and dynamic views for architecture reconstruction

    Publication Year: 2002, Page(s):47 - 55
    Cited by:  Papers (24)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Static analysis aims at recovering the structure of a software system, while dynamic analysis focuses on its run time behaviour. We propose a technique for combining the analysis of static and dynamic architectural information to support the task of architecture reconstruction. The approach emphasises the correct choice of architecturally significant concepts for the reconstruction process and rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the role of design patterns in quality-driven re-engineering

    Publication Year: 2002, Page(s):230 - 240
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Design patterns have been widely adopted and well investigated by the software engineering community over the past decade. However, their primary use is still associated with forward engineering and the design phase of the software life-cycle. In this paper, we examine design patterns from a different perspective namely, their classification and usage for software re-engineering and restructuring.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit for applying a migration strategy: a case study

    Publication Year: 2002, Page(s):154 - 163
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Many organizations manage their activities by using legacy systems. These are very important for them as they represent an important support for the achievement of the business goals. Numerous strategies have been proposed for migrating legacy systems toward modern architecture. By starting from approaches presented in the literature, this paper provides a reference schema to be applied for increm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WARE: a tool for the reverse engineering of Web applications

    Publication Year: 2002, Page(s):241 - 250
    Cited by:  Papers (31)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (875 KB) | HTML iconHTML

    The development of Web sites and applications is increasing dramatically to satisfy the market requests. The software industry is facing the new demand under the pressure of a very short time-to-market and an extremely high competition. As a result, Web sites and applications are usually developed without a disciplined process: Web applications are directly coded and no, or poor, documentation is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A precise demand-driven definition-use chaining algorithm

    Publication Year: 2002, Page(s):77 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    This paper describes a new demand-driven technique that is able to identify both direct and indirect realizable data-dependencies between statements in the investigated code. Our method also involving control-dependencies and can thus be extended to perform precise forward and backward slicing of computer programs. The interprocedural algorithm presented considers realizable program paths when exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function call trap of Java codes with the help of AspectJ and XML

    Publication Year: 2002, Page(s):207 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    It is shown how the new technologies, AspectJ and XML, can be used for maintenance and development of Java applications. The presented all-purpose software solution gets usable runtime function call information from almost any Java application using the aspect oriented Java extension AspectJ and writes into a simply browsable directory-like structure in XML format without modifying original Java s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data exchange with the columbus schema for c++

    Publication Year: 2002, Page(s):59 - 66
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    To successfully carry out a software maintenance or reengineering task, a suitably assembled set of tools is required, which interoperate seaminglessly. To achieve this goal, an exchange format is needed that can be used to represent the facts extracted from a software system in a standardized way; serving as an output of one tool and as an input for other tools. In this paper we propose a modular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A history concept for design recovery tools

    Publication Year: 2002, Page(s):37 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Many tools have been developed for recovering the design of legacy software. Interactively invoked abstraction operations and re-design transformations play a central role in these tools. A limitation of most existing approaches is, however, that they assume a mostly linear transformation process. They provide little support for iteration, recursion and incremental changes during the recovery proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical reengineering approach for mobile terminal software

    Publication Year: 2002, Page(s):193 - 200
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Embedded devices like mobile phones are very limited in memory and developers always struggle to squeeze in as much information as possible. In most legacy mobile systems, the operating system is a simple scheduler with no complicated multi-tasking capabilities and programs are written in plain C language for efficiency purposes. A family of such embedded products is built to meet the needs of var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering aggregation relationship based on propagation of operations

    Publication Year: 2002, Page(s):223 - 229
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    One of the major obstacles in reverse engineering legacy object-oriented systems is the identification of aggregation relationships. An aggregation relationship is a special kind of an association relationship. Their distinction is mostly of semantic nature and little by implementation mechanism. Most reverse engineering methods on aggregation relationships are based on the lifetime dependence. Si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical analysis of massive maintenance processes

    Publication Year: 2002, Page(s):5 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    We present initial results of applying statistical control techniques to the massive maintenance processes of a software organization rated at the CMM level 3. In particular, we present results from an empirical study conducted on a large massive adaptive maintenance project. In a previous study (2001) we analyzed the correlation between the maintenance size and productivity metrics and produced m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic worklist algorithm for graph reachability problems in program analysis

    Publication Year: 2002, Page(s):67 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Many program analyses involve, or can be expressed in terms of, a graph reachability problem. We present a generic worklist-style algorithm capable of expressing and solving the graph reachability components of many such analyses. We compare our framework with the language reachability framework proposed by Thomas Reps. (1998), and show that some problems are expressible in both frameworks, and so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution support by homogeneously documenting patterns, aspects and traces

    Publication Year: 2002, Page(s):134 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusability of design solutions. Design patterns capture the expertise for reusable design solutions. Aspect-oriented programming is a methodology that enables the modularization of cross-cutting concerns. Traceability links de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-centric software evolution by software metrics and design patterns

    Publication Year: 2002, Page(s):108 - 115
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolution method the quality of a software system is assured in the software design phase by computing various kinds of design metrics from the system architecture, by automatically exploring instances of design patterns and anti-patterns ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.