By Topic

Proceedings of the Sixth European Conference on Software Maintenance and Reengineering

13-13 March 2002

Filter Results

Displaying Results 1 - 25 of 30
  • CSMR 2002 [front matter]

    Publication Year: 2002, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (540 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 263
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • A history concept for design recovery tools

    Publication Year: 2002, Page(s):37 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    Many tools have been developed for recovering the design of legacy software. Interactively invoked abstraction operations and re-design transformations play a central role in these tools. A limitation of most existing approaches is, however, that they assume a mostly linear transformation process. They provide little support for iteration, recursion and incremental changes during the recovery proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metric-based selective representation of UML diagrams

    Publication Year: 2002, Page(s):89 - 98
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    UML diagrams are widely employed for modeling of object-oriented software systems. In addition to their application in forward engineering, it is also possible to use them for the re-documentation of existing programs. However, the inherent structure of UML diagrams, which consists of graphical as well as textual information, makes it difficult to read and oversee large diagrams generated from com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating document and workflow management tools using XML and web technologies: a case study

    Publication Year: 2002, Page(s):24 - 33
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    A critical point for developing successful information systems for distributed organisations is the need for integrating heterogeneous technologies and tools. This paper reports a case study of integrating two key enabling technologies, namely workflow and document management. Integration is achieved by combining several approaches, including software engineering and hypertexts. In this way, we ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A precise demand-driven definition-use chaining algorithm

    Publication Year: 2002, Page(s):77 - 86
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    This paper describes a new demand-driven technique that is able to identify both direct and indirect realizable data-dependencies between statements in the investigated code. Our method also involving control-dependencies and can thus be extended to perform precise forward and backward slicing of computer programs. The interprocedural algorithm presented considers realizable program paths when exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for modeling and evaluating software maintenance process performances

    Publication Year: 2002, Page(s):15 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    This paper presents a method for modeling and evaluating the performances of telecommunication software maintenance process. The method can be used as a special technique within the given generic model as part of an organizational effort to upgrade process maturity and efficiency. It is based on the modeling of software maintenance process as queueing networks and applies process simulation to det... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic worklist algorithm for graph reachability problems in program analysis

    Publication Year: 2002, Page(s):67 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Many program analyses involve, or can be expressed in terms of, a graph reachability problem. We present a generic worklist-style algorithm capable of expressing and solving the graph reachability components of many such analyses. We compare our framework with the language reachability framework proposed by Thomas Reps. (1998), and show that some problems are expressible in both frameworks, and so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of a software component - experiences with a network editor component

    Publication Year: 2002, Page(s):119 - 125
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Even though the benefits of component-based software development are widely accepted, they are easily overestimated. To provide a firmer basis for the general discussion we describe our real life experiences with a software component. Having a lifetime of a whole decade the component has evolved from a class library to an independent component. In this paper we focus on the major evolution steps, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical analysis of massive maintenance processes

    Publication Year: 2002, Page(s):5 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    We present initial results of applying statistical control techniques to the massive maintenance processes of a software organization rated at the CMM level 3. In particular, we present results from an empirical study conducted on a large massive adaptive maintenance project. In a previous study (2001) we analyzed the correlation between the maintenance size and productivity metrics and produced m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data exchange with the columbus schema for c++

    Publication Year: 2002, Page(s):59 - 66
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    To successfully carry out a software maintenance or reengineering task, a suitably assembled set of tools is required, which interoperate seaminglessly. To achieve this goal, an exchange format is needed that can be used to represent the facts extracted from a software system in a standardized way; serving as an output of one tool and as an input for other tools. In this paper we propose a modular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-centric software evolution by software metrics and design patterns

    Publication Year: 2002, Page(s):108 - 115
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolution method the quality of a software system is assured in the software design phase by computing various kinds of design metrics from the system architecture, by automatically exploring instances of design patterns and anti-patterns ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function call trap of Java codes with the help of AspectJ and XML

    Publication Year: 2002, Page(s):207 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    It is shown how the new technologies, AspectJ and XML, can be used for maintenance and development of Java applications. The presented all-purpose software solution gets usable runtime function call information from almost any Java application using the aspect oriented Java extension AspectJ and writes into a simply browsable directory-like structure in XML format without modifying original Java s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal pattern language for refactoring of Lisp programs

    Publication Year: 2002, Page(s):186 - 192
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Refactoring tools are extremely important to prevent errors in legacy systems restructuring. Unfortunately, to be effective, these tools require huge computer resources that cause unacceptable inefficiencies or limit the size of the restructured programs or even the programming language expressiveness. Previous approaches also made it difficult for the programmer to extend the tool with new refact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining static and dynamic views for architecture reconstruction

    Publication Year: 2002, Page(s):47 - 55
    Cited by:  Papers (29)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Static analysis aims at recovering the structure of a software system, while dynamic analysis focuses on its run time behaviour. We propose a technique for combining the analysis of static and dynamic architectural information to support the task of architecture reconstruction. The approach emphasises the correct choice of architecturally significant concepts for the reconstruction process and rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting fault-proneness using OO metrics. An industrial case study

    Publication Year: 2002, Page(s):99 - 107
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB)

    Software quality is an important external software attribute that is difficult to measure objectively. In this case study, we empirically validate a set of object-oriented metrics in terms of their usefulness in predicting fault-proneness, an important software quality indicator We use a set of ten software product metrics that relate to the following software attributes: the size of the software,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-functional integration and coordination of distributed component services

    Publication Year: 2002, Page(s):126 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    The integration of distributed services has been identified as one of the most important challenges of E-business technology. A great deal of progress has been made in the development of methods and techniques for the integration of distributed components but most of the solutions tends to focus on the problem of syntactical and semantical compatibility of the functional services provided or requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperable thin client separation from GUI applications

    Publication Year: 2002, Page(s):211 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    This paper describes the concept of GUI application reengineering with a purpose to detach visualization part into separate lightweight client process runnable on different platforms in distributed environment. Only thin presentation layer of primary application is rewritten and whole application business logic remains intact. Original GUI platform becomes a server platform communicating with remo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical reengineering approach for mobile terminal software

    Publication Year: 2002, Page(s):193 - 200
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Embedded devices like mobile phones are very limited in memory and developers always struggle to squeeze in as much information as possible. In most legacy mobile systems, the operating system is a simple scheduler with no complicated multi-tasking capabilities and programs are written in plain C language for efficiency purposes. A family of such embedded products is built to meet the needs of var... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution support by homogeneously documenting patterns, aspects and traces

    Publication Year: 2002, Page(s):134 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusability of design solutions. Design patterns capture the expertise for reusable design solutions. Aspect-oriented programming is a methodology that enables the modularization of cross-cutting concerns. Traceability links de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reengineering Wiki

    Publication Year: 2002, Page(s):217 - 220
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The reverse and reengineering research communities have a strong tradition of collecting, organizing, and unifying research results. Typical examples include an explicit taxonomy, dedicated web sites, an annotated bibliography, as well as efforts in exchange formats and tool evaluation. In this paper we describe and evaluate the use of a web authoring system to integrate such efforts. To that end,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using graph based representations in reengineering

    Publication Year: 2002, Page(s):203 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    We present a graph drawing algorithm that was developed for real-world call graphs, data flows and class hierarchies. The algorithm is an extension of the hierarchical layout method It produces a drawing with orthogonal edges where each edge has at most two bends. We demonstrate practical uses of our algorithm in reengineering process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C to Java migration experiences

    Publication Year: 2002, Page(s):143 - 153
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    With the growing popularity of the Java programming language for both client and server side applications in network-centric computing, there is a rising need for programming libraries that can be easily integrated into Java programs. In a previous paper, we surveyed current strategies for integrating C source code into Java programs, pointed out their weaknesses and presented goals for an improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering aggregation relationship based on propagation of operations

    Publication Year: 2002, Page(s):223 - 229
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    One of the major obstacles in reverse engineering legacy object-oriented systems is the identification of aggregation relationships. An aggregation relationship is a special kind of an association relationship. Their distinction is mostly of semantic nature and little by implementation mechanism. Most reverse engineering methods on aggregation relationships are based on the lifetime dependence. Si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A toolkit for applying a migration strategy: a case study

    Publication Year: 2002, Page(s):154 - 163
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Many organizations manage their activities by using legacy systems. These are very important for them as they represent an important support for the achievement of the business goals. Numerous strategies have been proposed for migrating legacy systems toward modern architecture. By starting from approaches presented in the literature, this paper provides a reference schema to be applied for increm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.