Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings.

28-28 March 2003

Filter Results

Displaying Results 1 - 25 of 44
  • Proceedings Seventh European Conference on Software Maintenance and Reengineering

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB)

    The following topics are dealt with: Transformations; Web applications; refactoring; component-based programming; testing; metrics; object oriented-tooling; aspect-oriented programming; maintenance; software clustering techniques; cloning and slicing and tool integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):419 - 420
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Light-weight product-lines for evolution and maintenance of Web sites

    Publication Year: 2003, Page(s):53 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Software reengineering and maintenance are two classical activities in software engineering. Today, software maintenance is a time consuming task because requirements change and evolve frequently. Moreover, in certain domains, such as the Web domain is, these changes happen very often. In this way, new techniques to engineer Web sites are needed in order to reduce the time to market of Web product... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Cobol to Java recycling

    Publication Year: 2003, Page(s):40 - 50
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    In this paper an approach for automated source-to-source translation from Cobol to Java is presented. The primary goal of this approach is to ensure that the generated code will be maintainable. In some cases this is achieved even by sacrificing complete functional equivalence of the generated code with the original program. We also intensively use encapsulation to hide away difficulties of langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards automatical migration of transformation rules after grammar extension

    Publication Year: 2003, Page(s):30 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    The paper addresses two problems in software maintenance. Firstly, some maintenance tasks require modifications of the grammar. A change in a grammar can make abstract syntax and transformation rules outdated, which then themselves become subject to a maintenance process. Secondly, it is essential that after a repair programs look as much as possible as they looked before. Especially comments and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characteristics of open source projects

    Publication Year: 2003, Page(s):317 - 327
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Most empirical studies about Open Source (OS) projects or products are vertical and usually deal with the flagship, successful projects. There is a substantial lack of horizontal studies to shed light on the whole population of projects, including failures. This paper presents a horizontal study aimed at characterizing OS projects. We analyze a sample of around 400 projects from a popular OS proje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revitalizing modifiability of legacy assets

    Publication Year: 2003, Page(s):19 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    We discuss the modifiability of Cobol legacy code and propose an approach to improving the modifiability using automatic restructuring transformations. We developed an algorithm that allows application of these transformations to large industrial Cobol systems. We demonstrate the adaptability of the transformations by extending them with new transformation patterns. Two case studies (nearly 3 mill... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving to smaller libraries via clustering and genetic algorithms

    Publication Year: 2003, Page(s):307 - 316
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    There may be several reasons to reduce a software system to its bare bone removing the extra fat introduced during development or evolution. Porting the software system on embedded devices or palmtops are just two examples. This paper presents an approach to re-factoring libraries with the aim of reducing the memory requirements of executables. The approach is organized in two steps. The first ste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast symbolic evaluation of C/C++ preprocessing using conditional values

    Publication Year: 2003, Page(s):170 - 179
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    C/C++ code relying on preprocessing can be quite complex to analyze. This is often due to free preprocessing variables set at compile time. In general, preprocessing selectively compile parts of the source code based on the values of preprocessing variables which may be free. In this case, the relations between these parts can only be represented by conditional expressions using the free variables... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software documentation: how much is enough?

    Publication Year: 2003, Page(s):13 - 15
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    It is a well-known fact that software documentation is, in practice, poor and incomplete. Though specification, design, and test documents-among other things-are required by standards and capability maturity models (e.g., SEI CMM), such documentation does not exist in a complete and consistent form in most organizations. When documents are produced, they tend to follow no defined standard and lack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving legacy system toward eLegacy system in eBusiness context

    Publication Year: 2003, Page(s):201 - 210
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    The enactment of eBusiness processes requires the effective usage of the existing legacy applications in the eBusiness initiatives. Therefore, technical issues are not enough to drive the evolution of the existing legacy applications, but it is necessary to consider also problems concerning the perspectives, strategies, and businesses of the enterprises. In particular, there is a strict relationsh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JSPick-a server pages design recovery tool

    Publication Year: 2003, Page(s):230 - 236
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    This paper presents the reverse engineering tool JSPick, which recovers page signatures and form types from server pages based presentation layers. A formal semantics of the tool is given in pseudo-evaluation style. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software clustering techniques and the use of combined algorithm

    Publication Year: 2003, Page(s):301 - 306
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    As the age of software systems increases they tend to deviate from their actual design and architecture. It becomes more and more difficult to manage and maintain such systems. We explore the idea of software clustering for reverse engineering and re-modularization. Clustering together software artifacts provides an automatic technique for discovering high level abstract entities within a system. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A debugging strategy based on requirements of testing

    Publication Year: 2003, Page(s):160 - 169
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Testing and debugging are activities that consume a significant amount of the software quality and maintenance budget. To reduce such cost, the use of testing information for debugging purposes has been advocated In general, heuristics are used to select structural testing requirements (nodes, branches, and definition use associations) more closely related to the manifestation of failures which ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software services and software maintenance

    Publication Year: 2003, Page(s):3 - 12
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Software services are being promoted as the next big step forward in software engineering. Inevitably, both service vendor and service client programs will require maintenance. We present a service architecture that has been motivated by a long term vision for software as something which is used, not owned. This architecture is used to show how evolution of software can be achieved. It uses the ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of metrics for object-oriented design logical stability

    Publication Year: 2003, Page(s):193 - 200
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    As changes are made to an object-oriented design, its structure and/or behavior may be affected. Modifications made to one class can have ripple effects on other classes in the design. The stability of an object-oriented design indicates its resistance to interclass propagation of changes that the design would have when it is modified There are two aspects of design stability: logical stability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracker - a tool for change propagation in Java

    Publication Year: 2003, Page(s):223 - 229
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    During software evolution, programmers add new functionalities and release new versions of software. This is complicated work, particularly in large applications, and tools are needed to deal with it. In this paper we introduce a tool named JTracker that helps programmers implement change propagation in Java applications. We conducted a case study of a change in open source application JMeter, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weaving aspects into C++ applications for validation of temporal invariants

    Publication Year: 2003, Page(s):249 - 258
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1007 KB) | HTML iconHTML

    In this paper, we describe temporal invariants, which are class invariants that are qualified by the operators eventually, always, never, or already. Temporal invariants can capture assertions that may not be valid initially but, as the program continues, must eventually become valid. Moreover, temporal invariants can indicate references to memory that should eventually be deallocated. To facilita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effort drivers in maintenance outsourcing-an experiment using Taguchi's methodology

    Publication Year: 2003, Page(s):271 - 280
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    We establish the context of software maintenance outsourcing of large commercial systems and discuss the problem of estimating the maintenance effort in absence of key parameters such as development effort and maintenance history. To arrive at the drivers that could have a significant effect on the maintenance effort, an experiment was conducted at Syntel, a NASDAQ listed application management an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full reuse maintenance process for reducing software degradation

    Publication Year: 2003, Page(s):289 - 298
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    It is known that during maintenance activities system quality tends to degrade. This work presents a field investigation carried out on two industrial projects with the aim of comparing the effectiveness of the "full reuse" maintenance process with an "iterative enhancement" one. The results of the work confirm the greater effectiveness of the first process in slowing down the degradation of softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting evolution in component-based development using component libraries

    Publication Year: 2003, Page(s):123 - 132
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Component-based software development (CBSD) is a very promising software engineering technique for improving reuse and maintenance. Nevertheless, there are still some difficulties in practice when reusing, maintaining and evolving components and/or component-based (CB) applications. We review the concepts of version and configuration management and apply them in the context of CBSD. The use of mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast flow analysis to compute fuzzy estimates of risk levels

    Publication Year: 2003, Page(s):351 - 360
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    In the context of software quality assessment, this paper proposes original flow analyses which propagate numerical estimates of blocking risks along an inter-procedural control flow graph (CFG) and which combine these estimates along the different CFG paths using fuzzy logic operations. Two specialized analyses can be further defined in terms of definite and possible flow analysis. The definite a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using observation and refinement to improve distributed systems test

    Publication Year: 2003, Page(s):153 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Testing a distributed system is difficult. Good testing depends on both skill and understanding the system under test. We have developed a method to observe the system at the CORBA remote-procedure-call level and then use dynamic-query-based visualization to refine and improve the test cases. The method and accompanying tools have been tested and refined by using them as part of the software suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring browser with preprocessor

    Publication Year: 2003, Page(s):101 - 110
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    This paper presents Xrefactory a refactoring browser for C and Java languages. The paper discusses a way how refactoring browsers can thresh-passe non-trivial complications introduced by the C pre-preprocessor Resolving those problems is the next step toward so long expected refactoring browser for C++. Our solution is based on practical implementation and exemplified on renaming refactorings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CodeCrawler-lessons learned in building a software visualization tool

    Publication Year: 2003, Page(s):409 - 418
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    Software visualization tools face many challenges in terms of their implementation, including scalability, usability, adaptability, and durability. Such tools, like many other research tools, tend to have a short life cycle and are vulnerable to software evolution processes because of the complex problem domain and the constantly changing requirements which are dictated by research goals. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.