By Topic

International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings.

22-26 Sept. 2003

Filter Results

Displaying Results 1 - 25 of 61
  • Exploring software systems

    Publication Year: 2003, Page(s):276 - 280
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Software evolution is required to keep a software system in sync with the ever-changing needs of the system's users and environment. An unfortunate side-effect of evolution is that it often causes the knowledge about a system to degrade, which in turn impedes further evolution. In the dissertation, we investigate techniques and tools that help remedy this situation by supporting the exploration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience in developing interoperations among legacy information systems using partial reverse engineering

    Publication Year: 2003, Page(s):369 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    At ICSM01 Johnson and Rosebrugh proposed a new methodology, based on formal specification techniques and partial reverse engineering, for developing interoperations among legacy information systems. The present brief paper reports on progress to date in designing such interoperations for major health informatics information systems. We describe briefly the methodology, argue for the value of parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service learning in software engineering and maintenance

    Publication Year: 2003
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    We discuss a service-learning program called EPICS (engineering projects in community service). More specifically, we describe an effort to incorporate EPICS within computer science and computer engineering curricula at Purdue University and Butler University, respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Massively reengineering architectures with automated tools

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB)

    Architectures are intended to be structuring principles for applications. However, with legacy systems they are often based on assumptions which have long since changed, and are now an obstacle. We believe that the fluidity of architecture is a function of the tools available for massively modifying systems. In this paper, we briefly sketch a tool, DMS, for making massive changes, and focus on how... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards evergreen architectures: on the usage of scenarios in system architecting

    Publication Year: 2003, Page(s):298 - 303
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2671 KB) | HTML iconHTML

    The system architecture of successful systems typically enjoys a long life (ten years or more). From an architecting point of view, there are two major challenges. The first challenge is to establish the "right" initial architecture that satisfies the strategic intentions, the needs and the requirements of its stakeholders and intended users. The second challenge is to nurture the architecture and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the 'security vulnerability likelihood' of software functions

    Publication Year: 2003, Page(s):266 - 274
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However, the existence of such a tool is predicated on the ability to characterize a function's 'security vulnerability likelihood'. Our hypothesis is that functions near a source of input are most likely to contain security vulne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for managing evolving product line architectures

    Publication Year: 2003, Page(s):358 - 367
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    The use of product lines is recognized as beneficial in promoting and structuring both component and architecture reuse throughout an organization. While the business practices of using product lines are well-understood and representations for specifying and capturing the underlying architecture of a product line are coming of age, support environments for managing the evolution of product line ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying the signature concept to plan-based program understanding

    Publication Year: 2003, Page(s):325 - 334
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5307 KB) | HTML iconHTML

    Program understanding tools that are able to process large legacy systems are needed to support software engineers with maintenance tasks. One type of tool, a plan-based program understander, recognizes concepts in the code by comparing the target code against a library of programming plans. For a large plan library, an exhaustive search for a matching plan during concept recognition is not effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture recovery based on pattern matching

    Publication Year: 2003, Page(s):293 - 296
    Cited by:  Papers (16)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This paper is a summary of the author's thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined architectural patterns and graph matching techniques. In the proposed model, a high-level view of a software system in terms of the system components and their interactions is represented as a query, using a description langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructures of virtual IT enterprises

    Publication Year: 2003, Page(s):199 - 208
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Service quality has become a critical survivability factor. The value of IT-business does not only lie in the products but also in the needs it serves. More and more customers require the IT companies with which they do business to continuously improve the speed and quality of their service. To provide seamless high quality service, the collaborating IT-companies/departments must organize themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of the interaction diagrams from C++ code

    Publication Year: 2003, Page(s):159 - 168
    Cited by:  Papers (24)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object interactions is far more complex than designing the object structure in forward engineering, the problem of understanding object interactions during code evolution is even harder, because the related information is spread... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis and change management of UML models

    Publication Year: 2003, Page(s):256 - 265
    Cited by:  Papers (50)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The use of Unified Modeling Language (UML) analysis/design models on large projects leads to a large number of interdependent UML diagrams. As software systems evolve, those diagrams undergo changes to, for instance, correct errors or address changes in the requirements. Those changes can in turn lead to subsequent changes to other elements in the UML diagrams. Impact analysis is then defined as t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for understanding conceptual changes in evolving source code

    Publication Year: 2003, Page(s):431 - 439
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    As systems evolve, they become harder to understand because the implementation of concepts (e.g. business rules) becomes less coherent. To preserve source code comprehensibility, we need to be able to predict how this property will change. This would allow the construction of a tool to suggest what information should be added or clarified (e.g. in comments) to maintain the code's comprehensibility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding architectural support in industry

    Publication Year: 2003, Page(s):348 - 357
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Software architecture plays a vital role in the development (and hence maintenance) of large complex systems with a long lifetime. It is therefore required that the software architecture is also maintained, i.e. sufficiently documented, clearly communicated, and explicitly controlled. In our experience, these requirements cannot be met without appropriate support. Commercial-off-the-shelf support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiple hill climbing approach to software module clustering

    Publication Year: 2003, Page(s):315 - 324
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Automated software module clustering is important for maintenance of legacy systems written in a 'monolithic format' with inadequate module boundaries. Even where systems were originally designed with suitable module boundaries, structure tends to degrade as the system evolves, making re-modularization worthwhile. This paper focuses upon search-based approaches to the automated module clustering p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring software sustainability

    Publication Year: 2003, Page(s):450 - 459
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5443 KB) | HTML iconHTML

    Planning and management of software sustainment is impaired by a lack of consistently applied, practical measures. Without these measures, it is impossible to determine the effect of efforts to improve sustainment practices. In this paper we provide a context for evaluating sustainability and discuss a set of measures developed at the Software Engineering Institute at Carnegie Mellon University. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Difference tools for analysis and design documents

    Publication Year: 2003, Page(s):13 - 22
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    This paper presents a concept and tools for the detection and visualization of differences between versions of graphical software documents such as ER, class or object diagrams, state charts, etc. We first analyze the problems which occur when comparing graphical documents and displaying their similarities and differences. Our basic approach is to use a unified document which contains the common a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continual resource estimation for evolving software

    Publication Year: 2003, Page(s):289 - 292
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    A resource estimation approach, specifically oriented towards long-lived software being actively evolved, is proposed and investigated. The approach seeks to be coherent with empirically grounded knowledge including the observation that the software progresses through a series of stages during its lifetime and that a distinctive model characterizes the economics of each individual stage. Instead o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical success factors in software maintenance: a case study

    Publication Year: 2003, Page(s):190 - 198
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance project. The project in question is the maintenance and evolution of a very large and complex banking application system for securities processing which has been in progress since several years. Eight factors are defined and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A large-scale empirical study of forward and backward static slice size and context sensitivity

    Publication Year: 2003, Page(s):44 - 53
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    A large-scale study of 43 C programs totaling just over 1 million lines of code is presented. The study includes the forward and backward static slice on every executable statement. In total 2353598 slices were constructed, with an average slice size being just under 30% of the original program. The results also show that ignoring calling-context led to a 50% increase in average slice size and, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of neural networks for software quality prediction using object-oriented metrics

    Publication Year: 2003, Page(s):116 - 125
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The paper presents the application of neural networks in software quality estimation using object-oriented metrics. Quality estimation includes estimating reliability as well as maintainability of software. Reliability is typically measured as the number of defects. Maintenance effort can be measured as the number of lines changed per class. In this paper, two kinds of investigation are performed:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the nature of software evolution

    Publication Year: 2003, Page(s):83 - 93
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Over the past several years, we have been developing methods of measuring the change characteristics of evolving software systems. Not all changes to software systems are equal. Some changes to these systems are very small and have low impact on the system as a whole. Other changes are substantial and have a very large impact of the fault proneness of the complete system. In this study we will ide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated support for framework-based software

    Publication Year: 2003, Page(s):148 - 157
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    In this paper, we show how elaborate support for framework-based software evolution can be provided based on explicit documentation of the hot spots of object-oriented application frameworks. Such support includes high-level transformations that guide a developer when instantiating applications from a framework by propagating the necessary changes, as well as application upgrading facilities based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QuaTrace: a tool environment for (semi-) automatic impact analysis based on traces

    Publication Year: 2003, Page(s):246 - 255
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Cost estimation of changes to software systems is often inaccurate and implementation of changes is time consuming, cost intensive, and error prone. One reason for these problems is that relationships between documentation entities (e.g., between different requirements) are not documented at all or only incompletely. In this paper, we describe a constructive approach to support later changes to so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression test selection based on intermediate code for virtual machines

    Publication Year: 2003, Page(s):420 - 429
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Regression testing is testing applied to software that has been modified. It basically entails re-testing the software with previous test cases to confirm that the modifications made to the software do not have an adverse effect. But re-executing all test cases is normally cost prohibitive, and thus much research has been done on selecting test cases from a test suite without compromising the reli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.