International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings.

22-26 Sept. 2003

Filter Results

Displaying Results 1 - 25 of 61
  • Improving software maintenance by using agent-based remote maintenance shell

    Publication Year: 2003, Page(s):440 - 449
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (384 KB) | HTML iconHTML

    The paper deals with a method developed for software maintenance called remote maintenance shell. It allows software installation, modification and verification on the remote target system without suspending its regular operation. The method is based on remote operations performed by mobile agents. The role of remote maintenance shell in software maintenance is elaborated, as well as its architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for understanding conceptual changes in evolving source code

    Publication Year: 2003, Page(s):431 - 439
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    As systems evolve, they become harder to understand because the implementation of concepts (e.g. business rules) becomes less coherent. To preserve source code comprehensibility, we need to be able to predict how this property will change. This would allow the construction of a tool to suggest what information should be added or clarified (e.g. in comments) to maintain the code's comprehensibility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression test selection based on intermediate code for virtual machines

    Publication Year: 2003, Page(s):420 - 429
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    Regression testing is testing applied to software that has been modified. It basically entails re-testing the software with previous test cases to confirm that the modifications made to the software do not have an adverse effect. But re-executing all test cases is normally cost prohibitive, and thus much research has been done on selecting test cases from a test suite without compromising the reli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continual resource estimation for evolving software

    Publication Year: 2003, Page(s):289 - 292
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (244 KB) | HTML iconHTML

    A resource estimation approach, specifically oriented towards long-lived software being actively evolved, is proposed and investigated. The approach seeks to be coherent with empirically grounded knowledge including the observation that the software progresses through a series of stages during its lifetime and that a distinctive model characterizes the economics of each individual stage. Instead o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DART: a framework for regression testing "nightly/daily builds" of GUI applications

    Publication Year: 2003, Page(s):410 - 419
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (390 KB) | HTML iconHTML

    "Nightly/daily building and smoke testing" have become widespread since they often reveal bugs early in the software development process. During these builds, software is compiled, linked, and (re)tested with the goal of validating its basic functionality. Although successful for conventional software, smoke tests are difficult to develop and automatically rerun for software that has a graphical u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic approach to solving the software clustering problem

    Publication Year: 2003, Page(s):285 - 288
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (284 KB) | HTML iconHTML

    This paper provides an overview of the author's Ph.D. thesis (2002). The primary contribution of this research involved developing techniques to extract architectural information about a system directly from its source code. To accomplish this objective a series of software clustering algorithms were developed. These algorithms use metaheuristic search techniques to partition a directed graph gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewall regression testing of GUI sequences and their interactions

    Publication Year: 2003, Page(s):398 - 409
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5946 KB) | HTML iconHTML

    Testing graphical user interfaces (GUI) is difficult, involving many states, inputs and events. Another serious problem is that in testing GUI, not all effects created by the testing are observable. We have previously reported a scalable method for testing GUIs based on complete interactions sequences (CIS). A CIS is a sequence of GUI objects and selections that collaborate to produce a response f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-driven testing of object-oriented systems

    Publication Year: 2003, Page(s):281 - 284
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB) | HTML iconHTML

    Many different testing techniques have been proposed by researchers, but essentially only two main testing philosophies exist, black box and white box. There exist a number of different testing methods for structural testing of procedural languages. However, the features of object-oriented languages are not addressed by such techniques. The article explores a new structural testing technique for o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in optimization

    Publication Year: 2003, Page(s):214 - 223
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (309 KB) | HTML iconHTML

    This paper describes a case study in which the software architecture of a business application was modified to improve runtime performance. Such modifications should be performed whenever application users encounter known areas of sluggish response, long periods of maintenance, or a change in processing volume requirements. For this particular study, a framework for source code instrumentation was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic architectural flexibility

    Publication Year: 2003, Page(s):389 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (265 KB) | HTML iconHTML

    Most projects commit to a set of required features and (at best) a most-likely budget and schedule for developing them. This means that, even before the changes start coming, there is roughly a 50% chance that the most-likely budget and schedule are insufficient, and the project is headed for an overrun. Planning for change in a development project is essential. But how much should be invested in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring software systems

    Publication Year: 2003, Page(s):276 - 280
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB) | HTML iconHTML

    Software evolution is required to keep a software system in sync with the ever-changing needs of the system's users and environment. An unfortunate side-effect of evolution is that it often causes the knowledge about a system to degrade, which in turn impedes further evolution. In the dissertation, we investigate techniques and tools that help remedy this situation by supporting the exploration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of a software maintenance organization from cost center to service center

    Publication Year: 2003, Page(s):209 - 212
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (243 KB) | HTML iconHTML

    The paper describes experiences with the evolution of a software maintenance organization for digital set-top boxes of a leading electronics company from a cost center towards a service center. Several years ago a dedicated software maintenance group was constituted. As the costs for software maintenance were not recovered from the customers, the software maintenance group was merely considered a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of neural networks for software quality prediction using object-oriented metrics

    Publication Year: 2003, Page(s):116 - 125
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (292 KB) | HTML iconHTML

    The paper presents the application of neural networks in software quality estimation using object-oriented metrics. Quality estimation includes estimating reliability as well as maintainability of software. Reliability is typically measured as the number of defects. Maintenance effort can be measured as the number of lines changed per class. In this paper, two kinds of investigation are performed:... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source-based software risk assessment

    Publication Year: 2003, Page(s):385 - 388
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (295 KB) | HTML iconHTML

    The paper reports on a method for software risk assessments that take into account "primary facts" and "secondary facts". Primary facts are those obtained through automatically analyzing the source code of a system, and secondary facts are those facts obtained from people working with or on the system, and available documentation. We describe how both types of facts are retrieved, and how we are b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the 'security vulnerability likelihood' of software functions

    Publication Year: 2003, Page(s):266 - 274
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (316 KB) | HTML iconHTML

    Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However, the existence of such a tool is predicated on the ability to characterize a function's 'security vulnerability likelihood'. Our hypothesis is that functions near a source of input are most likely to contain security vulne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructures of virtual IT enterprises

    Publication Year: 2003, Page(s):199 - 208
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (333 KB) | HTML iconHTML

    Service quality has become a critical survivability factor. The value of IT-business does not only lie in the products but also in the needs it serves. More and more customers require the IT companies with which they do business to continuously improve the speed and quality of their service. To provide seamless high quality service, the collaborating IT-companies/departments must organize themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software renewal projects estimation using dynamic calibration

    Publication Year: 2003, Page(s):105 - 115
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (396 KB) | HTML iconHTML

    Effort estimation is a long faced problem, but, in spite of the amount of research spent in this field, it still remains an open issue in the software engineering community. This is true especially in the case of renewal of legacy systems, where the current and well established approaches also fail. This paper presents an application of the method named dynamic calibration for effort estimation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy and an initial empirical study of bad smells in code

    Publication Year: 2003, Page(s):381 - 384
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    This paper presents research in progress, as well as tentative findings related to the empirical study of so called bad code smells. We present a taxonomy that categorizes similar bad smells. We believe that taxonomy makes the smells more understandable and recognizes the relationships between smells. Additionally, we present our initial findings from an empirical study of the use of the smells fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards evergreen architectures: on the usage of scenarios in system architecting

    Publication Year: 2003, Page(s):298 - 303
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2671 KB) | HTML iconHTML

    The system architecture of successful systems typically enjoys a long life (ten years or more). From an architecting point of view, there are two major challenges. The first challenge is to establish the "right" initial architecture that satisfies the strategic intentions, the needs and the requirements of its stakeholders and intended users. The second challenge is to nurture the architecture and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Library miniaturization using static and dynamic information

    Publication Year: 2003, Page(s):235 - 244
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (395 KB) | HTML iconHTML

    Moving to smaller libraries can be considered as a relevant task when porting software systems to limited-resource devices (e.g., hand-helds). Library miniaturization will be particularly effective if based on both dynamic (keeping into account dependencies exploited during application execution in a given user profile) and static (keeping into account all possible dependencies) information. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe upgrading without restarting

    Publication Year: 2003, Page(s):129 - 137
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (511 KB) | HTML iconHTML

    The distributed development and maintenance paradigm for component delivery is fraught with problems. One wants a relationship between developers and clients that is autonomous and anonymous. Yet components written in languages such as C++ require the recompilation of all dependent subsystems when a new version of a component is released. The design of Java's binary format has side-stepped this co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis and change management of UML models

    Publication Year: 2003, Page(s):256 - 265
    Cited by:  Papers (55)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (308 KB) | HTML iconHTML

    The use of Unified Modeling Language (UML) analysis/design models on large projects leads to a large number of interdependent UML diagrams. As software systems evolve, those diagrams undergo changes to, for instance, correct errors or address changes in the requirements. Those changes can in turn lead to subsequent changes to other elements in the UML diagrams. Impact analysis is then defined as t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated support for framework-based software

    Publication Year: 2003, Page(s):148 - 157
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1015 KB) | HTML iconHTML

    In this paper, we show how elaborate support for framework-based software evolution can be provided based on explicit documentation of the hot spots of object-oriented application frameworks. Such support includes high-level transformations that guide a developer when instantiating applications from a framework by propagating the necessary changes, as well as application upgrading facilities based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using intentional source-code views to aid software maintenance

    Publication Year: 2003, Page(s):169 - 178
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (415 KB) | HTML iconHTML

    The conceptual structure of existing software systems is often implicit or non-existing in the source code. We propose the lightweight abstraction of intentional source-code views as a means of making these conceptual structures more explicit. Based on the experience gained with two case studies, we illustrate how intentional source-code views can simplify and improve software understanding, maint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical success factors in software maintenance: a case study

    Publication Year: 2003, Page(s):190 - 198
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (279 KB) | HTML iconHTML

    The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance project. The project in question is the maintenance and evolution of a very large and complex banking application system for securities processing which has been in progress since several years. Eight factors are defined and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.