By Topic

Ninth European Conference on Software Maintenance and Reengineering

Date 21-23 March 2005

Filter Results

Displaying Results 1 - 25 of 57
  • Proceedings. Ninth European Conference on Software Maintenance and Reengineering

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (491 KB)
    Freely Available from IEEE
  • Ninth European Conference on Software Maintenance and Reengineering - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Ninth European Conference on Software Maintenance and Reengineering - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Ninth European Conference on Software Maintenance and Reengineering - Table of contents

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Message from Chair

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (57 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s):xi - xiii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Characterizing the Evolution of Class Hierarchies

    Publication Year: 2005, Page(s):2 - 11
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    Analyzing historical information can show how a software system evolved into its current state, which parts of the system are stable and which have changed more. However, historical analysis implies processing a vast amount of information making the interpretation of the results difficult. To address this issue, we introduce the notion of the history of source code artifacts as a first class entit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Prediction Based on Knowledge of Prior Product Versions

    Publication Year: 2005, Page(s):12 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Performance estimation is traditionally carried out when measurement from a product can be obtained. In many cases there is, however, a need to start to make predictions earlier in a development project, when for example different architectures are compared. In this paper, two methods for subjective predictions of performance are investigated. With one of the methods experts estimate the relative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the Relationship between Cumulative Change and Complexity in an Open Source System

    Publication Year: 2005, Page(s):21 - 29
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper explores the relationship between cumulative change and complexity in an evolving Open Source system. The study involves measurements at the function and file level. In order to measure cumulative change, the approach used a metric termed release-touches, which counts the number of releases for which a given file has been modified. Based on the value of this metric, we ranked the files ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ADAMS Re-Trace: A Traceability Recovery Tool

    Publication Year: 2005, Page(s):32 - 41
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    We present the traceability recovery tool developed in the ADAMS artefact management system. The tool is based on an Information Retrieval technique, namely Latent Semantic Indexing and aims at supporting the software engineer in the identification of the traceability links between artefacts of different types. We also present a case study involving seven student projects which represented an idea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-Based Framework for Language Neutral Program Representation and Generic Analysis

    Publication Year: 2005, Page(s):42 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    XML applications are becoming increasingly popular to define structured or semi-structured constrained data in XML for special application areas. In pursuit there is a growing momentum of activities related to XML representation of source code in the area of program comprehension and software re-engineering. The source code and the artifacts extracted from a program are necessarily structured info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Synthesis for Real-Time Systems

    Publication Year: 2005, Page(s):52 - 60
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    In this paper, we present a method for model synthesis. Based on observations of running system, a model that can describe the observed behavior is automatically generated. This allows faster and more accurate modeling of existing systems. The models can be used for impact analysis, verification, documentation etc. The method has been implemented; we describe that implementation and present an eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Unanticipated Dependency Schemas in Class Hierarchies

    Publication Year: 2005, Page(s):62 - 71
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often correspond to well-known schemas, such as hook and template methods, new unanticipated dependency schemas occur in practice, and can consequently be hard to recognize and detect. To tackle this problem, we have applied Conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Entity Relationship Diagram from a Table-Based Legacy Database

    Publication Year: 2005, Page(s):72 - 79
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Current database reverse engineering researches presume that the information regarding semantics of attributes, primary keys, and foreign keys in database tables is complete. However, this may not be the case. In this paper, we present a process that extracts an extended entity relationship diagram from a table-based database with little descriptions for the fields in its tables and no description... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing Cross-Cutting Requirements via Context-Based Constraints

    Publication Year: 2005, Page(s):80 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a requirement even if we don’t precisely know which system elements are involved: a context-based constraint (CoCon) can identify the involved elements according to their context. CoCons support checking the system for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems

    Publication Year: 2005, Page(s):92 - 101
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In order to increase the maintainability and the flexibility of a software, its design and implementation quality must be properly assessed. For this purpose a large number of metrics and several higher-level mechanisms based on metrics are defined in literature. But the accuracy of these quantification means is heavily dependent on the proper selection of threshold values, which is oftentimes tot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Pattern Recovery by Visual Language Parsing

    Publication Year: 2005, Page(s):102 - 111
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    We propose an Object Oriented (OO) design pattern recovery approach which makes use of a design pattern library, expressed in terms of visual grammars, and based on a visual language parsing technique. We also present a visual environment which supports the pattern recognition process by automatically retrieving design patterns from imported UML class diagrams. The visual environment has been auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering Behavioral Design Models from Execution Traces

    Publication Year: 2005, Page(s):112 - 121
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Recovering behavioral design models from execution traces is not an easy task due to the sheer size of typical traces. In this paper, we describe a novel technique for achieving this. Our approach is based on filtering traces by distinguishing the utility components from the ones that implement high-level concepts. In the paper, we first define the concept of utilities; then we present an algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Clustering Based on Dynamic Dependencies

    Publication Year: 2005, Page(s):124 - 133
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The reverse engineering literature contains many software clustering approaches that attempt to cluster large software systems based on the static dependencies between software artifacts. However, the usefulness of clustering based on dynamic dependencies has not been investigated. It is possible that dynamic clusterings can provide a fresh outlook on the structure of a large software system. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process

    Publication Year: 2005, Page(s):134 - 142
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Well-designed object-oriented programs typically consist of a few key classes that work tightly together to provide the bulk of the functionality. As such, these key classes are excellent starting points for the program comprehension process. We propose a technique that uses web-mining principles on execution traces to discover these important and tightly interacting classes. Based on two medium-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Online and Dynamic Impact Analysis Algorithms

    Publication Year: 2005, Page(s):143 - 152
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Impact analysis is the process of determining the effect, or impact, of a change to a software system. Dynamic impact analysis uses data obtained from executing a program to perform analysis after program termination for determining impacts more in line with how a program is used. Online impact analysis has the same goal, but is performed concurrently with program execution. While some of the trad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legacy applications - a case for restoration?

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Summary form only given. Although legacy applications often need attention, it is also the case that "legacy" anything has acquired a bad reputation that (in some cases at least) needs restoration. In this paper the author look at various strategies for large organisations with massive investments in legacy software, processes and systems (in the large), to move forward without necessarily throwin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintenance and Analysis of Visual Programs — An Industrial Case

    Publication Year: 2005, Page(s):158 - 167
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A domain-specific visual language, Function Block Language (FBL), is used in Metso Automation for writing automation control programs. The same engineering environment is used for both forward and reverse engineering activities, providing convenient support for the maintenance and evolution of FBL programs. Various data and program analysis methods are applied to study the FBL programs stored in p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.