By Topic

2010 14th European Conference on Software Maintenance and Reengineering

15-18 March 2010

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Welcome from the Conference Chairs

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Sponsor, technical co-sponsors, and participating organizations

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Committees and Conference Organization

    Publication Year: 2010, Page(s):xii - xiv
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Keynote: Serge Demeyer

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Summary form only. In biology and medicine "in vitro" and "in vivo" are considered two complimentary sides of the same coin, living in symbiotic relationship with one another for the greater good of the research discipline. In vitro research is necessary, because laboratory conditions allow the investigator to have full control over the experimental context, necessary to study the causal relations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Judith Bishop

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB)

    An operating system is frequently the largest and most fundamental piece of software on a computer. From its installation, it rapidly transforms into an individualized ecosystem, based on its connections to other software, compilers, drivers, intranet and user habits. Companies such as Microsoft are no longer maintaining one operating system, but billions of individual versions of it. So how does ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Jesús Villasante

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (49 KB)

    There is growing momentum around Cloud Computing among technology providers, end users, and academia. It is considered as a key theme for both the research constituency itself and for policy makers. Even though Cloud computing is a commercial reality and the adoption rate of cloud computing services is growing, there are major issues that need to be smoothed out before big businesses will truly co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental Reflexion Analysis

    Publication Year: 2010, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Architecture conformance checking is implemented in many commercial and research tools. These tools typically implement the reflex ion analysis originally proposed by Murphy and Not kin. This analysis allows for structural validation of an architecture model against a source model connected by a mapping from source entities onto architecture entities. Given this mapping, the reflex ion analysis co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting and Evaluating Service Oriented Architecture in Industry

    Publication Year: 2010, Page(s):11 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (578 KB) | HTML iconHTML

    In this paper, we present a descriptive case study covering the re-engineering and further evolution of adopting service oriented architecture (SOA) in industry. The goal of this case study is to identify the possible benefits and bottlenecks of adopting SOA, as well as to come up with best practices and research directions based on real-life experience gained in IT industry. The case involves an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting Optimal Maintenance Plans Based on Cost/Reliability Tradeoffs for Software Subject to Structural and Behavioral Changes

    Publication Year: 2010, Page(s):21 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Software maintenance is assuming ever more a crucial role in the lifecycle due to the high variability of software requirements and environment. New development paradigms are being defined to support the numerous decisions that have to be taken after the software deployment. On the basis of the increasing request of software quality, nonfunctional attributes should enter in the decisional process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heuristic-Based Approach to Identify Concepts in Execution Traces

    Publication Year: 2010, Page(s):31 - 40
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understanding and maintenance. This paper proposes an approach to identify concepts in execution traces by finding cohesive and decoupled fragments of the traces. The approach relies on search-based optimization techniques, textual analysis o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilizing Debug Information to Compact Loops in Large Program Traces

    Publication Year: 2010, Page(s):41 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    In recent years, dynamic program execution traces have been utilized in an attempt to better understand the runtime behavior of various software systems. The unfortunate reality of such traces is that they become very large. Even traces of small programs can produce many millions of messages between different software artifacts. This not only affects the load on computer memory and storage, but it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating Coverage Metrics for Dynamic Web Applications

    Publication Year: 2010, Page(s):51 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Building comprehensive test suites for web applications poses new challenges in software testing. Coverage criteria used for traditional systems to assess the quality of test cases are simply not sufficient for complex dynamic applications. As a result, faults in web applications can often be traced to insufficient testing coverage of the complex interactions between the components. This paper pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Agility in Adaptive and Perfective Software Maintenance

    Publication Year: 2010, Page(s):61 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    The subject of this paper is the results of an industrial initiative undertaken to analyze factors that contributed to making adaptive and perfective maintenance agile for a set of software systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Migration from a Product to a Data Warehouse Using ETL Tool

    Publication Year: 2010, Page(s):63 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    One of emerging trends in today's market is usage of products for core business operations instead of using homegrown code. Migration from application to a new product or from one product to another is considered very risky. Each product will not expose their underlying database due to Intellectual property rights (IPR). This paper attempts to describe an approach used for migration of historical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences from a Brazilian Bank Reengineering Project

    Publication Year: 2010, Page(s):66 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    The migration of legacy mainframe applications to new web technologies is a challenge faced by several organizations. Since 2005, the Pitang and C.E.S.A.R companies are involved in a large migration project for a bank institution, aiming to migrate NATURAL/ADABAS legacy mainframe source code to a web-based platform. In this paper, we briefly describe the project's evolution and lessons learned. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques

    Publication Year: 2010, Page(s):68 - 77
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The existing software engineering literature has empirically shown that a proper choice of identifiers influences software understandability and maintainability. Researchers have noticed that identifiers are one of the most important source of information about program entities and that the semantic of identifiers guide the cognitive process. Recognizing the words forming identifiers is not an eas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Similarities Beyond Copy & Paste

    Publication Year: 2010, Page(s):78 - 87
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Redundant source code hinders software maintenance, since updates have to be performed in multiple places. This holds independent of whether redundancy was created by copy&paste or by independent development of behaviorally similar code. Existing clone detection tools successfully discover syntactically similar redundant code. They thus work well for redundancy that has been created by copy&am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Probabilistic Based Approach towards Software System Clustering

    Publication Year: 2010, Page(s):88 - 96
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    In this paper we present a clustering based approach to partition software systems into meaningful subsystems. In particular, the approach uses lexical information extracted from four zones in Java classes, which may provide a different contribution towards software systems partitioning. To automatically weigh these zones, we introduced a probabilistic model, and applied the Expectation-Maximizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the Past Say It All? Using History to Predict Change Sets in a CMDB

    Publication Year: 2010, Page(s):97 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all items impacted by each change are updated as needed. This paper presents a method of decision support that helps guarantee that each change set (those items to be updated in the change) contains all the software or hard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effort-Aware Defect Prediction Models

    Publication Year: 2010, Page(s):107 - 116
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    Defect Prediction Models aim at identifying error-prone modules of a software system to guide quality assurance activities such as tests or code reviews. Such models have been actively researched for more than a decade, with more than 100 published research papers. However, most of the models proposed so far have assumed that the cost of applying quality assurance activities is the same for each m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.