Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings.

22-26 Sept. 2003

Filter Results

Displaying Results 1 - 25 of 61
  • Software architecture recovery based on pattern matching

    Publication Year: 2003, Page(s):293 - 296
    Cited by:  Papers (16)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This paper is a summary of the author's thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined architectural patterns and graph matching techniques. In the proposed model, a high-level view of a software system in terms of the system components and their interactions is represented as a query, using a description langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continual resource estimation for evolving software

    Publication Year: 2003, Page(s):289 - 292
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    A resource estimation approach, specifically oriented towards long-lived software being actively evolved, is proposed and investigated. The approach seeks to be coherent with empirically grounded knowledge including the observation that the software progresses through a series of stages during its lifetime and that a distinctive model characterizes the economics of each individual stage. Instead o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic approach to solving the software clustering problem

    Publication Year: 2003, Page(s):285 - 288
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This paper provides an overview of the author's Ph.D. thesis (2002). The primary contribution of this research involved developing techniques to extract architectural information about a system directly from its source code. To accomplish this objective a series of software clustering algorithms were developed. These algorithms use metaheuristic search techniques to partition a directed graph gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in optimization

    Publication Year: 2003, Page(s):214 - 223
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    This paper describes a case study in which the software architecture of a business application was modified to improve runtime performance. Such modifications should be performed whenever application users encounter known areas of sluggish response, long periods of maintenance, or a change in processing volume requirements. For this particular study, a framework for source code instrumentation was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying the signature concept to plan-based program understanding

    Publication Year: 2003, Page(s):325 - 334
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5307 KB) | HTML iconHTML

    Program understanding tools that are able to process large legacy systems are needed to support software engineers with maintenance tasks. One type of tool, a plan-based program understander, recognizes concepts in the code by comparing the target code against a library of programming plans. For a large plan library, an exhaustive search for a matching plan during concept recognition is not effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for maintaining assurance cases

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB)

    When we build and maintain safety-, mission-, or security-critical systems, we are usually constrained by regulations and acquisition guidelines that requires us to provide a documented body of evidence that the system satisfies specified critical properties. In other words, we must construct an "assurance case" to convince the purchaser or user of the system's suitability or quality. However, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-driven testing of object-oriented systems

    Publication Year: 2003, Page(s):281 - 284
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Many different testing techniques have been proposed by researchers, but essentially only two main testing philosophies exist, black box and white box. There exist a number of different testing methods for structural testing of procedural languages. However, the features of object-oriented languages are not addressed by such techniques. The article explores a new structural testing technique for o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of a software maintenance organization from cost center to service center

    Publication Year: 2003, Page(s):209 - 212
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The paper describes experiences with the evolution of a software maintenance organization for digital set-top boxes of a leading electronics company from a cost center towards a service center. Several years ago a dedicated software maintenance group was constituted. As the costs for software maintenance were not recovered from the customers, the software maintenance group was merely considered a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiple hill climbing approach to software module clustering

    Publication Year: 2003, Page(s):315 - 324
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Automated software module clustering is important for maintenance of legacy systems written in a 'monolithic format' with inadequate module boundaries. Even where systems were originally designed with suitable module boundaries, structure tends to degrade as the system evolves, making re-modularization worthwhile. This paper focuses upon search-based approaches to the automated module clustering p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated support for framework-based software

    Publication Year: 2003, Page(s):148 - 157
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    In this paper, we show how elaborate support for framework-based software evolution can be provided based on explicit documentation of the hot spots of object-oriented application frameworks. Such support includes high-level transformations that guide a developer when instantiating applications from a framework by propagating the necessary changes, as well as application upgrading facilities based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-guided software evolution

    Publication Year: 2003, Page(s):75 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Ensuring that software systems evolve in a desired manner has thus far been an elusive goal. In a continuing effort towards this objective, in this paper we propose a new approach that monitors an evolving software system, or its evolution process, against evolutionary policies so that any feedback obtained can be used to improve the system or its process. Two key concepts that make this possible ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of neural networks for software quality prediction using object-oriented metrics

    Publication Year: 2003, Page(s):116 - 125
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The paper presents the application of neural networks in software quality estimation using object-oriented metrics. Quality estimation includes estimating reliability as well as maintainability of software. Reliability is typically measured as the number of defects. Maintenance effort can be measured as the number of lines changed per class. In this paper, two kinds of investigation are performed:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring software systems

    Publication Year: 2003, Page(s):276 - 280
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Software evolution is required to keep a software system in sync with the ever-changing needs of the system's users and environment. An unfortunate side-effect of evolution is that it often causes the knowledge about a system to degrade, which in turn impedes further evolution. In the dissertation, we investigate techniques and tools that help remedy this situation by supporting the exploration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving hardware, software, and training deployment processes

    Publication Year: 2003, Page(s):377 - 380
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    In this study, we reviewed the deployment practices of selected PEO-STAMIS (Program Executive Office − Standard Management Information System) product managers to better understand the state of the practice within the portfolio of the program executive office. To understand the state of the art in industry and provide a basis of comparison, we examined the practices of government and commerc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructures of virtual IT enterprises

    Publication Year: 2003, Page(s):199 - 208
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Service quality has become a critical survivability factor. The value of IT-business does not only lie in the products but also in the needs it serves. More and more customers require the IT companies with which they do business to continuously improve the speed and quality of their service. To provide seamless high quality service, the collaborating IT-companies/departments must organize themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining design patterns from C++ source code

    Publication Year: 2003, Page(s):305 - 314
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Design patterns are micro architectures that have proved to be reliable, easy-to implement and robust. There is a need in science and industry for recognizing these patterns. We present a new method for discovering design patterns in the source code. This method provides a precise specification of how the patterns work by describing basic structural information like inheritance, composition, aggre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Library miniaturization using static and dynamic information

    Publication Year: 2003, Page(s):235 - 244
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Moving to smaller libraries can be considered as a relevant task when porting software systems to limited-resource devices (e.g., hand-helds). Library miniaturization will be particularly effective if based on both dynamic (keeping into account dependencies exploited during application execution in a given user profile) and static (keeping into account all possible dependencies) information. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a versioning model for component-based software assembly

    Publication Year: 2003, Page(s):138 - 147
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, which deals with source code versioning, becomes insufficient in the world where most components are distributed in a binary form. This paper focuses on solving versioning issues in the SOFA/DCUP (software appliances/dynam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models for the evolution of OS projects

    Publication Year: 2003, Page(s):65 - 74
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Software evolution and maintenance is largely based on data gathered through years of experience: understanding and improving software is often a matter of how much data is available. Open source software offers the opportunity to analyze closely all the phases in the evolution of a project. What's more, data regarding its evolution is generally available for inspections. Based on simply code anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A large-scale empirical study of forward and backward static slice size and context sensitivity

    Publication Year: 2003, Page(s):44 - 53
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    A large-scale study of 43 C programs totaling just over 1 million lines of code is presented. The study includes the forward and backward static slice on every executable statement. In total 2353598 slices were constructed, with an average slice size being just under 30% of the original program. The results also show that ignoring calling-context led to a 50% increase in average slice size and, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding architectural support in industry

    Publication Year: 2003, Page(s):348 - 357
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Software architecture plays a vital role in the development (and hence maintenance) of large complex systems with a long lifetime. It is therefore required that the software architecture is also maintained, i.e. sufficiently documented, clearly communicated, and explicitly controlled. In our experience, these requirements cannot be met without appropriate support. Commercial-off-the-shelf support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software renewal projects estimation using dynamic calibration

    Publication Year: 2003, Page(s):105 - 115
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Effort estimation is a long faced problem, but, in spite of the amount of research spent in this field, it still remains an open issue in the software engineering community. This is true especially in the case of renewal of legacy systems, where the current and well established approaches also fail. This paper presents an application of the method named dynamic calibration for effort estimation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the 'security vulnerability likelihood' of software functions

    Publication Year: 2003, Page(s):266 - 274
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However, the existence of such a tool is predicated on the ability to characterize a function's 'security vulnerability likelihood'. Our hypothesis is that functions near a source of input are most likely to contain security vulne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source code based function point analysis for enhancement projects

    Publication Year: 2003, Page(s):373 - 376
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Function point analysis is a well known established method to estimate the size of software systems and software projects. However, because it is based on functional documentation it is hardly used for sizing legacy systems, in particular enhancement projects. In this short note we sketch briefly how function point analysis can be based on source code. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical success factors in software maintenance: a case study

    Publication Year: 2003, Page(s):190 - 198
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance project. The project in question is the maintenance and evolution of a very large and complex banking application system for securities processing which has been in progress since several years. Eight factors are defined and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.