By Topic

Proceedings 1994 International Conference on Software Maintenance

19-23 Sept. 1994

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings International Conference on Software Maintenance

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Data-centered program understanding

    Publication Year: 1994, Page(s):272 - 281
    Cited by:  Papers (25)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    Software maintainers use a variety of techniques and representations for understanding programs. Most of these representations first focus on the control structure of a program such as call graphs, control flow graphs and paths. We propose a new approach for program understanding that is data-centered-it first focuses on data and data relationships. We have experimented on both small and large Cob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental process support for code reengineering

    Publication Year: 1994, Page(s):282 - 290
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Reengineering a large code base can be a monumental task, and the situation becomes even worse if the code is concomitantly being modified. Since January 1992, we have been using the MARVEL process centered environment (PCE) for all of our software development, and are currently using it to develop the Oz PCE (MARVEL's successor). Towards this effort, we are reengineering Oz's code base to isolate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensions of software evolution

    Publication Year: 1994, Page(s):296 - 303
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Software evolution is usually considered in terms of corrections, improvements and enhancements. While helpful, this approach does not take into account the fundamental dimensions of well-engineered software systems (the domains, experience, and process) and how they themselves evolve and affect the evolution of systems for which they are the context. I discuss each dimension, provide examples to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving code churn predictions during the system test and maintenance phases

    Publication Year: 1994, Page(s):58 - 67
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    We show how to improve the prediction of gross change using neural networks. We select a multiple regression quality model from the principal components of software complexity metrics collected from a large commercial software system at the beginning of the testing phase. Our measure of quality is based on gross change, and is collected at the end of the maintenance phase. This quality measure is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software maintenance in Norway: a survey investigation

    Publication Year: 1994, Page(s):304 - 313
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The main results from a survey investigation performed in Norwegian organizations within software maintenance are presented. The results are based on responses from 52 Norwegian organizations. The amount of work being reported on maintenance in the investigation is not statistically different from what is reported in other investigations. From a functional point of view, the situation is better th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based user interface migration

    Publication Year: 1994, Page(s):72 - 79
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    A significant problem in reengineering large systems is adapting the user interface to a new environment. Often, drastic changes in the user interface are inevitable, as in migrating a text-based system to a workstation with graphical user interface capabilities. This experience report chronicles a study of user interface migration issues, examining and evaluating current tools and techniques. It ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering requirements for process-control software

    Publication Year: 1994, Page(s):316 - 325
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    A method of reverse engineering requirements for process-control system software is presented, along with a domain-specific functional structure. Techniques are demonstrated on the executable pseudocode of a commercial avionics control system. Resulting requirements are expressed as a state-based model of externally visible behavior specified completely in the language of process control View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Canonical modeling of software complexity and fault correction activity

    Publication Year: 1994, Page(s):374 - 381
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The study applies canonical correlation analysis to investigate the relationship between source code complexity and fault correction activity. Product and process measures collected during the development of a commercial real-time product provide the data for this analysis. Sets of variables represent source code complexity and fault correction activity. Significant canonical correlations along tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference of graphical AUIDL specifications for the reverse engineering of user interfaces

    Publication Year: 1994, Page(s):80 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    A method is presented for inferring abstract user interface specifications from structural and behavioural information which is extracted from the source code. Original algorithms for inference and transformation of user interface specifications are presented together with examples of user interface reverse engineering taken from a COBOL/CICS environment. Current limits and directions for further ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in software process automation-from a practical perspective

    Publication Year: 1994, Page(s):109 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    This paper describes a process-oriented approach currently employed by a DOD software maintenance organization to use an integrated software engineering environment, largely based on commercially-available tools, for enhancing quality and productivity during software maintenance. Before automated support could be provided to the organization, a complete review of existing procedures was required. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain analysis and reverse engineering

    Publication Year: 1994, Page(s):326 - 335
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Current reverse engineering technology is typically based on program analysis methods such as parsing and data flow analysis. As such, it is limited in what it can accomplish. Knowledge of the application domain containing a program can help overcome this limit and aid the comprehension process. The paper discusses the relationship of application domain analysis and reverse engineering. Two case s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity metrics for rule-based expert systems

    Publication Year: 1994, Page(s):382 - 391
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The increasing application of rule-based expert systems has led to the urgent need to quantitatively measure their quality, especially the maintainability which is harder and more expensive than that of conventional software because of the dynamic and evolutionary features of rules. One of the main factors that affect the maintainability of rule-based expert systems is their complexity; but so far... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging practices for complex legacy software systems

    Publication Year: 1994, Page(s):137 - 143
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Modern software development can require large numbers of people over long periods of time to create complex products. Industry trends showing rapid movement of people between companies and job assignments and use of specialized software maintenance groups for all maintenance activities frequently mean that the software engineers supporting (debugging, fixing, enhancing, and completing) products we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experiment on the effect of design recording on impact analysis

    Publication Year: 1994, Page(s):253 - 259
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    An experimental study is presented in which participants perform impact analysis on alternate forms of design record information. The primary objective of the research is to assess the software maintainer's performance with respect to various approaches of design recording. One of the approaches is the model dependency descriptor, which includes decision capturing and explicit traceability links b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A change analysis process to characterize software maintenance projects

    Publication Year: 1994, Page(s):38 - 49
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    In order to improve software maintenance processes, we need to be able to first characterize and assess them. This task needs to be performed in depth and with objectivity since the problems are complex. One approach is to set up a measurement program specifically aimed at maintenance. However, establishing a measurement program requires that one understands the issues and is able to characterize ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inter-module renaming and reorganizing: examples of program manipulation in-the-large

    Publication Year: 1994, Page(s):354 - 361
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Maintaining software often requires repetitive and error prone manipulations of source code, particularly when changes must be propagated across many modules. Practical program manipulation tools can alleviate these problems by automatically making changes throughout a program. Such tools can become even more valuable when they allow for manipulation in-the-large: the systematic modification of al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining static and dynamic analysis of concurrent programs

    Publication Year: 1994, Page(s):89 - 98
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    Concurrent systems are inherently more difficult to analyze and visualize than sequential programs. The difficulty of producing correct concurrent programs is mirrored in maintenance as difficulty in extracting a correct high-level model of task interactions and predicting the effect of a modification to portions of a system. We advocate a methodology that combines static analysis of an abstract m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Substring matching for clone detection and change tracking

    Publication Year: 1994, Page(s):120 - 126
    Cited by:  Papers (51)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Legacy systems pose problems to maintainers that can be solved partially with effective tools. A prototype tool for determining collections of files sharing a large amount of text has been developed and applied to a 40 megabyte source tree containing two releases of the gcc compiler. Similarities in source code and documentation corresponding to software cloning, movement and inertia between relea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact analysis task in software maintenance: a model and a case study

    Publication Year: 1994, Page(s):234 - 242
    Cited by:  Papers (18)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    If better tools are to be developed to support the impact analysis task, greater clarity is needed about the exact nature of that task. This paper presents a definition of impact analysis and distinguishes between impact analysis and program understanding. Impact analysis is a necessarily approximate technique which must focus on the cost-effective minimization of unwanted side-effects. A key to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting regression tests for object-oriented software

    Publication Year: 1994, Page(s):14 - 25
    Cited by:  Papers (23)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    Regression testing is an important but expensive software maintenance activity aimed at providing confidence in modified software. Selective retest methods reduce the cost of regression testing by selecting tests for a modified program from a previously existing test suite. Many researchers have addressed the selective retest problem for procedural-language software, but few have addressed the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain-retargetable reverse engineering. II. Personalized user interfaces

    Publication Year: 1994, Page(s):336 - 342
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    For pt. I see ibid. p. 142-51, 1993 (S.R. Tilley et al.). The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user's specific cognitive abilities and on the palette of tools accessible through the interface. Because software engineers approach program understanding in so many di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software maintenance metrics: a case study

    Publication Year: 1994, Page(s):392 - 401
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    With the advent of total quality management (TQM) organizations are using metrics to improve quality and productivity. Software maintenance organizations are no exception. In 1987 the US Navy established a centralized software support activity (SSA) to provide software maintenance for cryptologic systems. At that time two systems were supported and a software maintenance metrics program was establ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-engineering legacy systems to meet quality requirements: an experience report

    Publication Year: 1994, Page(s):146 - 153
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The paper is a summary of a third party re-engineering project aiming to adjust a legacy system to the new quality standard established by the customer. The quality standard is defined in the form of a set of metrics each associated with a range of acceptable values. A set of 100 programs has been restructured and modularised to meet the quality requirements. When possible, automated tools have be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization of design concepts in legacy systems

    Publication Year: 1994, Page(s):414 - 423
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Complete automation of design recovery of large systems is a desirable but impractical goal due to complexity and size issues, so current research efforts focus on redocumentation and partial design recovery. Pattern matching lies at the center of any design recovery system. In the context of a larger project to develop an integrated reverse engineering environment, we are developing a framework f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.