Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings 1994 International Conference on Software Maintenance

19-23 Sept. 1994

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings International Conference on Software Maintenance

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Software maintenance in Norway: a survey investigation

    Publication Year: 1994, Page(s):304 - 313
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The main results from a survey investigation performed in Norwegian organizations within software maintenance are presented. The results are based on responses from 52 Norwegian organizations. The amount of work being reported on maintenance in the investigation is not statistically different from what is reported in other investigations. From a functional point of view, the situation is better th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering requirements for process-control software

    Publication Year: 1994, Page(s):316 - 325
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    A method of reverse engineering requirements for process-control system software is presented, along with a domain-specific functional structure. Techniques are demonstrated on the executable pseudocode of a commercial avionics control system. Resulting requirements are expressed as a state-based model of externally visible behavior specified completely in the language of process control View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain analysis and reverse engineering

    Publication Year: 1994, Page(s):326 - 335
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Current reverse engineering technology is typically based on program analysis methods such as parsing and data flow analysis. As such, it is limited in what it can accomplish. Knowledge of the application domain containing a program can help overcome this limit and aid the comprehension process. The paper discusses the relationship of application domain analysis and reverse engineering. Two case s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain-retargetable reverse engineering. II. Personalized user interfaces

    Publication Year: 1994, Page(s):336 - 342
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    For pt. I see ibid. p. 142-51, 1993 (S.R. Tilley et al.). The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user's specific cognitive abilities and on the palette of tools accessible through the interface. Because software engineers approach program understanding in so many di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of results in software maintenance through external replication

    Publication Year: 1994, Page(s):50 - 57
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Empirical studies carried out to help understand the problems of software maintenance are widely held to be of value. A view perhaps less widely recognised within the software engineering domain is that experiments should be replicated both internally and externally to validate the results and build up a cohesive body of knowledge. This paper presents the external replication findings of an experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extension of a transformation system for maintenance: dealing with data-intensive programs

    Publication Year: 1994, Page(s):344 - 353
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    The paper, following the theme set out in a previous paper by K.H. Bennett et al. (see ibid., 1992) provides more results of the research programme on reverse engineering. It concentrates on dealing with data-intensive programs such as those written in COBOL. The problems with data-intensive programs are addressed, our solutions to these problems are discussed, a prototype built on our approach is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining static and dynamic analysis of concurrent programs

    Publication Year: 1994, Page(s):89 - 98
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    Concurrent systems are inherently more difficult to analyze and visualize than sequential programs. The difficulty of producing correct concurrent programs is mirrored in maintenance as difficulty in extracting a correct high-level model of task interactions and predicting the effect of a modification to portions of a system. We advocate a methodology that combines static analysis of an abstract m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving code churn predictions during the system test and maintenance phases

    Publication Year: 1994, Page(s):58 - 67
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    We show how to improve the prediction of gross change using neural networks. We select a multiple regression quality model from the principal components of software complexity metrics collected from a large commercial software system at the beginning of the testing phase. Our measure of quality is based on gross change, and is collected at the end of the maintenance phase. This quality measure is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inter-module renaming and reorganizing: examples of program manipulation in-the-large

    Publication Year: 1994, Page(s):354 - 361
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Maintaining software often requires repetitive and error prone manipulations of source code, particularly when changes must be propagated across many modules. Practical program manipulation tools can alleviate these problems by automatically making changes throughout a program. Such tools can become even more valuable when they allow for manipulation in-the-large: the systematic modification of al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transferring re-engineering technology to a software development and maintenance organization: an experience report

    Publication Year: 1994, Page(s):100 - 108
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    Technology transfer does not happen spontaneously after research results and prototypes have been demonstrated. Researchers need to get more actively involved in “pushing technology out of the door.” This paper describes an experiment that we conducted in 1993 to facilitate technology transfer. There are two aspects of this experiment: the integration of a re-engineering process into a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experiment on the effect of design recording on impact analysis

    Publication Year: 1994, Page(s):253 - 259
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    An experimental study is presented in which participants perform impact analysis on alternate forms of design record information. The primary objective of the research is to assess the software maintainer's performance with respect to various approaches of design recording. One of the approaches is the model dependency descriptor, which includes decision capturing and explicit traceability links b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design extraction by adiabatic multi-perspective abstraction

    Publication Year: 1994, Page(s):191 - 200
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Design extraction of an unfamiliar system is a complex cognitive task. This paper presents an approach that can help human expert in exploring a large and complex code information space of unfamiliar software. It provides her/him a platform to access the code information with flexible, fine and delicate control over volume and composition of the accessed information sub-space. The proposed approac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based user interface migration

    Publication Year: 1994, Page(s):72 - 79
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    A significant problem in reengineering large systems is adapting the user interface to a new environment. Often, drastic changes in the user interface are inevitable, as in migrating a text-based system to a workstation with graphical user interface capabilities. This experience report chronicles a study of user interface migration issues, examining and evaluating current tools and techniques. It ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming through disciplined modification

    Publication Year: 1994, Page(s):362 - 371
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    The paper addresses the issue of safe modification of code, as required in maintenance or in development by reuse. It presents a framework for modeling and recording program development. The framework is based on the notion of planning, workplan, and product. An example of program modification using the development record is detailed; it shows how the framework and the records can be used to drive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of the state of the art for application management

    Publication Year: 1994, Page(s):161 - 169
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    This paper describes work completed for the Application Management Environments and Support (AMES) project. AMES is concerned with providing methods and tools for the effective support of application management. We describe an evaluation framework for application management which we have proposed. The framework uses a three layer approach, consisting of a strategic, operational and service level. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging practices for complex legacy software systems

    Publication Year: 1994, Page(s):137 - 143
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Modern software development can require large numbers of people over long periods of time to create complex products. Industry trends showing rapid movement of people between companies and job assignments and use of specialized software maintenance groups for all maintenance activities frequently mean that the software engineers supporting (debugging, fixing, enhancing, and completing) products we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in software process automation-from a practical perspective

    Publication Year: 1994, Page(s):109 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    This paper describes a process-oriented approach currently employed by a DOD software maintenance organization to use an integrated software engineering environment, largely based on commercially-available tools, for enhancing quality and productivity during software maintenance. Before automated support could be provided to the organization, a complete review of existing procedures was required. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity metrics for rule-based expert systems

    Publication Year: 1994, Page(s):382 - 391
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The increasing application of rule-based expert systems has led to the urgent need to quantitatively measure their quality, especially the maintainability which is harder and more expensive than that of conventional software because of the dynamic and evolutionary features of rules. One of the main factors that affect the maintainability of rule-based expert systems is their complexity; but so far... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization of design concepts in legacy systems

    Publication Year: 1994, Page(s):414 - 423
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Complete automation of design recovery of large systems is a desirable but impractical goal due to complexity and size issues, so current research efforts focus on redocumentation and partial design recovery. Pattern matching lies at the center of any design recovery system. In the context of a larger project to develop an integrated reverse engineering environment, we are developing a framework f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstracting plan-like program information: a demonstration

    Publication Year: 1994, Page(s):262 - 271
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Most programmers spend far more time understanding and modifying existing programs than they spend developing new programs. Current program views used for understanding programs seek to support understanding mainly at the program analysis level; that is, many views are often graphical representations of program analysis concepts, such as the program's data and control dependence graphs, abstract s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change impact identification in object oriented software maintenance

    Publication Year: 1994, Page(s):202 - 211
    Cited by:  Papers (71)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    In the object-oriented (OO) paradigm, new features (such as encapsulation, aggregation, inheritance, polymorphism and dynamic binding) introduce new problems in software testing and maintenance. One of them is the difficulty of identifying the affected components (such as classes) when changes are made in object-oriented class libraries or programs. This paper discusses the types of code changes i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensions of software evolution

    Publication Year: 1994, Page(s):296 - 303
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Software evolution is usually considered in terms of corrections, improvements and enhancements. While helpful, this approach does not take into account the fundamental dimensions of well-engineered software systems (the domains, experience, and process) and how they themselves evolve and affect the evolution of systems for which they are the context. I discuss each dimension, provide examples to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A change analysis process to characterize software maintenance projects

    Publication Year: 1994, Page(s):38 - 49
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    In order to improve software maintenance processes, we need to be able to first characterize and assess them. This task needs to be performed in depth and with objectivity since the problems are complex. One approach is to set up a measurement program specifically aimed at maintenance. However, establishing a measurement program requires that one understands the issues and is able to characterize ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference of graphical AUIDL specifications for the reverse engineering of user interfaces

    Publication Year: 1994, Page(s):80 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    A method is presented for inferring abstract user interface specifications from structural and behavioural information which is extracted from the source code. Original algorithms for inference and transformation of user interface specifications are presented together with examples of user interface reverse engineering taken from a COBOL/CICS environment. Current limits and directions for further ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.