By Topic

Ninth Working Conference on Reverse Engineering, 2002. Proceedings.

29-1 Nov. 2002

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings Ninth Working Conference on Reverse Engineering WCRE 2002

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (285 KB)
    Freely Available from IEEE
  • An extensible tool for source code representation using XML

    Publication Year: 2002, Page(s):199 - 208
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    One of the problems facing software re-engineering projects is the fact that program source code is invariably stored in ASCII plain text format. This format doesn't reflect the underlying structure of the program. Consequently, software re-engineering or code migration tools need to unearth this structure. This paper explores the possibility of adopting XML format to represent program structure f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies for data reengineering

    Publication Year: 2002, Page(s):211 - 220
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper describes and analyzes a series of strategies to migrate data-intensive applications from a legacy data management system to a modern DMS. Considering two ways to migrate the data and three ways to propagate the corresponding perturbation to the program code, the paper identifies six reference strategies that provide different levels of quality and induce different costs. Three of them ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retargeting Web pages to other computing platforms with VAQUITA

    Publication Year: 2002, Page(s):339 - 348
    Cited by:  Papers (11)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    Mobile platforms are becoming an increasingly important alternative for accessing Web pages. Many Web pages are not suited to these platforms and need to be adapted, or rewritten from scratch. Adaptation can be carried out in two ways: either by dynamic conversion or static reengineering. VAQUITA belongs to the second category by applying a model-based approach to reverse engineer Web pages at a c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s): 349
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Knowledge-based library re-factoring for an open source project

    Publication Year: 2002, Page(s):319 - 328
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Software miniaturization is a form of software re-factoring focused on reducing an application to its bare bones. Porting an application on a hand-held device is likely to require a preliminary step of software miniaturization, plus the development of device drivers dedicated to the new environment and hardware architecture. This paper presents the process and lessons learned in re-factoring a lar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program annotation in XML: a parse-tree based approach

    Publication Year: 2002, Page(s):190 - 198
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    In this paper we describe a technique that can be used to annotate source code with syntactic tags in XML format. This is achieved by modifying the parser generator bison to emit these tags for an arbitrary LALR grammar. We also discuss an immediate application of this technique, a portable modification of the gcc compiler, that allows for XML output for C, Objective C, C++ and Java programs. Whil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and use of class dependency information for Java

    Publication Year: 2002, Page(s):309 - 315
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    In this paper, a method for extracting class dependency information from Java class files is described. Advantages and disadvantages of using this method are discussed The problems of virtual dependence and synthetic methods are explained, and solutions offered. A convenient user interface is presented for making use of the dependency information in the form of an interactive UML class diagram, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A denotational interprocedural program slicer

    Publication Year: 2002, Page(s):181 - 189
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This paper extends a previously developed intraprocedural denotational program slicer to handle procedures. Using the denotational approach, slices can be defined in terms of the abstract syntax of the object language without the need of a control flow graph or similar intermediate structure. The algorithm presented here is capable of correctly handling the interplay between function and procedure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of metaballs to visually map source code structures and analysis results onto 3D space

    Publication Year: 2002, Page(s):299 - 308
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    Many reverse-engineering tools have been developed to derive abstract representations from existing source code. Graphic visuals derived from reverse engineered source code have long been recognized for their impact on improving the comprehensibility of the structural and behavioral aspects of software systems and their source code. As programs become more complex and larger, the sheer volume of i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering thread interactions in a concurrent system

    Publication Year: 2002, Page(s):255 - 264
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Understanding the behavior of a system is a central reverse engineering task, and is crucial for being able to modify, maintain, and improve the system. An often difficult aspect of some system behaviors is concurrency, in particular identifying those areas that exhibit mutual exclusion and those that exhibit synchronization. In this paper we present a technique that builds on our previous work in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revealer: a lexical pattern matcher for architecture recovery

    Publication Year: 2002, Page(s):170 - 178
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Program comprehension is crucial for software maintenance activities and is supported by reverse engineering techniques. Many of them analyze source code and use parsers to create higher-level representations of software systems that are more meaningful to engineers. But the application of parsers is for some reasons not always desirable. In this paper, we introduce Revealer a lightweight source m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for developing transformations using the maintainability soft-goal graph

    Publication Year: 2002, Page(s):77 - 86
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-designed to meet numerous non-functional quality requirements. However mismanagement of the maintenance process and ill-planned modifications usually are amplified in an object-oriented context. The paper presents a re-engine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic component program visualization

    Publication Year: 2002, Page(s):289 - 298
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Dynamic program visualization, i.e. the visualization of the runtime behavior of a program as opposed to the static structure of its source code has been investigated for various kinds of programs, usually on a fairly low level. The focus has been on control flow in procedural programs or on the communication between objects in object-oriented programs. In this paper we explore the usefulness of d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ConSUS: a scalable approach to conditioned slicing

    Publication Year: 2002, Page(s):109 - 118
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Conditioned slicing can be applied to reverse engineering problems which involve the extraction of executable fragments of code in the context of some criteria of interest. This paper introduces ConSUS, a conditioner for the Wide Spectrum Language, WSL. The symbolic executor of ConSUS prunes the symbolic execution paths, and its predicate reasoning system uses the FermaT simplify transformation in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing data-level parallelism in sequential image processing algorithms

    Publication Year: 2002, Page(s):245 - 254
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    As new computer architectures are developed to exploit large-scale data-level parallelism, techniques are needed to retarget legacy sequential code to these platforms. Sequential programming languages force programmers to include sequential artifacts in their code, particularly with respect to how the source code expresses data references (generally assuming a linear address space). In contrast, d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practice patterns for architecture reconstruction

    Publication Year: 2002, Page(s):151 - 160
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Architecture reconstruction embodies benefits for commercial organizations. Reconstructing or recovering the architecture of software systems is primarily driven by the increased awareness of software architectures as a blueprint for systems and the resulting central role of architectures in development paradigms, like software product lines and component-based systems. This is especially the case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating potential parallelism for platform retargeting

    Publication Year: 2002, Page(s):55 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Scientific, symbolic, and multimedia applications present diverse computing workloads with different types of inherent parallelism. Tomorrow's processors will employ varying combinations of parallel execution mechanisms to efficiently harness this parallelism. The explosion of consumer products that incorporate high performance embedded computing will increase the stratification of the processor d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating COBOL systems to the Web by using the MVC design pattern

    Publication Year: 2002, Page(s):329 - 338
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    Integrating legacy Cobol systems into a Web-based architecture is a complex and challenging task. Cobol is not a distributed and object-oriented language, however its integration with other languages or distributed systems is a prerequisite for achieving migration towards Web technologies. Moreover, the user interface and user interaction modalities need to be changed. Numerous strategies have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic grep: regular expressions + relational abstraction

    Publication Year: 2002, Page(s):267 - 276
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Searching source code is one of the most common activities of software engineers. Text editors and other support tools normally provide searching based on lexical expressions (regular expressions). Some more advanced editors provide a way to add semantic direction to some of the searches. Recent research has focused on advancing the semantic options available to text-based queries. Most of these r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying spectral methods to software clustering

    Publication Year: 2002, Page(s):3 - 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    The application of spectral methods to the software clustering problem has the advantage of producing results that are within a known factor of the optimal solution. Heuristic search methods, such as those supported by the Bunch clustering tool, only guarantee local optimality which may be far from the global optimum. In this paper, we apply the spectral methods to the software clustering problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relating expectations to automatically recovered design patterns

    Publication Year: 2002, Page(s):87 - 96
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    At MITRE we are developing tools to aid analysts in assessing the operational usability and quality of object-oriented code. Our tools statically examine source code, automatically recognize the use of design patterns and relate pattern use to software qualities, coding goals, and system engineering expectations about the source code. Thus, through the use of automated design pattern analysis, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using conceptual roles of data for enhanced program comprehension

    Publication Year: 2002, Page(s):119 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Without proper background, it is often very difficult for human beings to understand a legacy code. Domain knowledge is valuable to guide domain experts to efficiently comprehend and reengineer domain applications. In the comprehension process, what domain experts normally do is associate domain concepts in the human mind with their representations in the actual code. This paper is addressed as an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of architectural documentation using XML

    Publication Year: 2002, Page(s):161 - 169
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Documentation generation is the process of creating the system documentation at different levels of abstraction from the source code for a legacy system. The main goal is to help the stakeholders to understand the system with representations at the appropriate abstraction level. We follow an architecture reconstruction method to create an architectural model of the system and we use a documentatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of virtual method invocation for binary translation

    Publication Year: 2002, Page(s):65 - 74
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    The University of Queensland Binary Translator (UQBT) is a static binary translation framework that allows for the translation of binary, executable programs, from one architecture to another one. Using different specification files, the UQBT can be easily tailored for either a new source or target architecture. UQBT employs sophisticated analyses in order to abstract the binary code front the fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.