Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261)

12-14 Oct. 1998

Filter Results

Displaying Results 1 - 25 of 31
  • Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Assisting human understanding to aid the targeting of necessary reengineering work

    Publication Year: 1998, Page(s):2 - 9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB)

    Reengineering is a necessary but expensive process. Therefore if ways of reducing the cost of reengineering can be found, then this can help to direct limited budgets to where they are most needed. This paper evaluates a number of ways in which early predictions of the benefits of performing reengineering work can be made. The early predictions estimate whether potential reuse candidates can be ob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change and adaptive maintenance detection in Java software systems

    Publication Year: 1998, Page(s):10 - 19
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Java is a relatively new programming language that is gaining popularity due to its network-centric features and platform independence (Write Once, Run Anywhere). This popularity has caused rapid evolution in the libraries that are available for Java applications. This evolution, in combination with Java's run-time linking, may cause incompatibilities between an application and the library it depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • REP-chaRacterising and Exploiting Process components: results of experimentation

    Publication Year: 1998, Page(s):20 - 29
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB)

    Software processes require continuous innovations to improve their quality and increase their maturity. Integrating process components, proposed in previous published works, to improve a process requires the formalisation of their informal description. This requirement stems from the need to understand and evaluate how adequate the process components are to the requirements of the innovation and h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating architectural extractors

    Publication Year: 1998, Page(s):30 - 39
    Cited by:  Papers (26)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB)

    One of the goals of reverse engineering a software system is to extract an architectural design from the source code. This paper compares a selection of tools available to perform this architectural recovery. The following tools are examined: Rigi (Muller, 1996), the Dali workbench (Kazman and Carriere, 1998), the Software Bookshelf (PBS) (Finnigan et al., 1997), CIA (Chen et al., 1990) and SNiFF+... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FEPSS: a flexible and extensible program comprehension support system

    Publication Year: 1998, Page(s):40 - 49
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB)

    This paper describes the architecture of an ongoing developed Flexible and Extensible Program comprehension Support System (FEPSS). Program comprehension is a process for supporting users to understand a software system and is required for forward, reverse engineering, and re-engineering. In a program comprehension process some artifacts such as control-flow graphs and data-flow graphs need to be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A graph-based object identification process for procedural programs

    Publication Year: 1998, Page(s):50 - 58
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    We describe a reengineering process for transforming procedural systems into object-oriented systems. The method is based on the program representation model, which is restructured by merging together cohesive components of the system. We present the model restructuring technique and discuss how the restructured model can be used for object identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental migration strategies: data flow analysis for wrapping

    Publication Year: 1998, Page(s):59 - 68
    Cited by:  Papers (11)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Incremental migration strategies entail the decomposition of large legacy systems in components that can be independently and selectively replaced; this reduces the costs and risks of a migration program. The legacy components are encapsulated into object wrappers and used (through the wrapper interface) in their original form until new components take up their functions with an acceptable level o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the knowledge required to understand a program

    Publication Year: 1998, Page(s):69 - 78
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    This paper is concerned with the units of knowledge used in understanding programs. A pilot study was conducted wherein a short, but complex, program was examined looking for knowledge atoms, the units from which program understanding is built. The resulting atoms were categorized along three orthogonal axes of knowledge type, design decision used, and the type of analysis required to uncover the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing recovered function and structure of legacy software components

    Publication Year: 1998, Page(s):79 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    We are employing ManSART, a software architecture recovery system, to reverse engineer large scale legacy software systems. We semi-automatically recover software structure and functionality abstractions working primarily from source code. A major technical contribution for our work is that we interpret and integrate the results of localized, language-specific source code analyses in the context o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Native patterns

    Publication Year: 1998, Page(s):89 - 103
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB)

    We generate a native pattern language from a context-free grammar. So if we have the underlying grammar of code that needs to be analyzed, or renovated the pattern language comes for free. We use native patterns for recognition and renovation of code. The pattern language is global in the sense that patterns can match entire programs. We illustrate native patterns by discussing a tool that remedia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented re-engineering of information systems in a heterogeneous distributed environment

    Publication Year: 1998, Page(s):104 - 114
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB)

    Distributed object-oriented environments are the architecture of choice for supporting modern, highly flexible business processes. Existing host-based information systems (IS) must be integrated into these environments in order to preserve their investments in a changing environment. In this paper we present a strategy that establishes a cooperative co-existence of legacy and new IS in a distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outlining C loops: preliminary results and trends

    Publication Year: 1998, Page(s):115 - 124
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB)

    We report on a system developed to construct outlines of loops in C programs. It is derived from a model and a system previously defined to outline LISP loops, that have both been enhanced to handle those constructs of an imperative language like C that were out of scope in (pure functional) LISP, especially: iterative control flow structures, variable assignments, and manipulations of arrays, str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PACKRAT: a software reengineering case study

    Publication Year: 1998, Page(s):125 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB)

    Reengineering is the process of examination, understanding, and alteration of a system with the intent of implementing the system in a new form. Many approaches for design recovery or reverse engineering have been suggested, most with some type of support tool. Since a project's time constraints may prohibit use of sophisticated techniques and/or tools due to the learning curves associated with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program comprehension in multi-language systems

    Publication Year: 1998, Page(s):135 - 143
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB)

    This paper presents an approach to program comprehension in multi-language systems. Such systems are characterized by a high amount of source codes in various languages for programming, database definition and job control. Coping with those systems requires the references crossing the language boundaries to be analyzed. Using the EER/GRAL approach to graph-based conceptual modeling, models represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering of legacy systems based on transformation using the object oriented paradigm

    Publication Year: 1998, Page(s):144 - 153
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    Legacy systems that were originally developed using the procedure-oriented approach can be reengineered according to the object-oriented paradigm by the process proposed in this paper. Three phases are included in such a process: an object oriented reverse engineering phase, in which an object oriented analysis model of the legacy system is produced by Fusion/RE; a segmentation phase, in which the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for integrating software architecture and reengineering models: CORUM II

    Publication Year: 1998, Page(s):154 - 163
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB)

    This paper discusses the requirements and a generic framework for the integration of architectural and code-based reengineering tools. This framework is needed because there is a large number of stand-alone reengineering tools that operate at different levels of abstraction ranging from "code-level" to software architecture. For the purposes of reengineering a complete system however, these tools ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for repository software

    Publication Year: 1998, Page(s):164 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB)

    A repository is a database that holds information about models, implementation artifacts, and their mappings. This paper concerns the use of a repository for database applications. A repository is a necessary prerequisite to leverage the full potential of reverse engineering. Fundamentally we need to document the correspondence of reverse-engineered models to the original database schema. In princ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering by mining dynamic repositories

    Publication Year: 1998, Page(s):174 - 182
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB)

    This paper presents some preliminary results on applying information retrieval and knowledge-mining techniques to reverse engineering of legacy systems. In order to support a dynamic environment, we take an approach of integrating lightweight tools. Instead of forcing a user to use a fixed environment, our approach provides a basic information repository, which manages information extracted from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reverse engineering of vendor databases

    Publication Year: 1998, Page(s):183 - 190
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB)

    We articulate the notion of reverse engineering of vendor databases and argue that this is a compelling technology that organizations should be routinely practicing. We take the perspective of a large organization that is a consumer of software (and not the perspective of a software vendor). We frequently reverse engineer vendor databases in our consulting practice and the technology has been enth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ROMEO: reverse engineering from OO source code to OMT design

    Publication Year: 1998, Page(s):191 - 200
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB)

    The reverse engineering method of object oriented systems (ROMEO) takes the source code for an existing OO system and derives a no-loss representation of the system documented in object-oriented modeling technique (OMT) format. This representation of the system is derived through the use of a series of transformations. This paper describes in detail all the transformation steps needed for the extr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable visualizations to support reverse engineering: a framework for evaluation

    Publication Year: 1998, Page(s):201 - 209
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB)

    Visualizations of software can be utilized in varying degrees throughout the software development cycle as aids to comprehension, analysis, and measurement. This research focuses on the experimental evaluation and refinement of a set of scalable visualizations that show promise for improving the overall software process. The roles which visualizations may play during reverse engineering and mainte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural manipulations of software architecture using Tarski relational algebra

    Publication Year: 1998, Page(s):210 - 219
    Cited by:  Papers (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB)

    A software architecture is typically drawn as a nested set of box and arrow diagrams. The boxes represent components of the software system and the edges represent interactions These diagrams correspond to typed graphs, in which there are a number of "types" or "colors" of edges, and in which there is a distinguished "contain" relation that represents the system hierarchy (the nesting of boxes). D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Type inference for COBOL systems

    Publication Year: 1998, Page(s):220 - 230
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Types are a good starting point for various software reengineering tasks. Unfortunately, programs requiring reengineering most desperately are written in languages without an adequate type system (such as COBOL). To solve this problem, we propose a method of automated type inference for these languages. The main ingredients are that if variables are compared using some relational operator their ty... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual representation model for software subsystem decomposition

    Publication Year: 1998, Page(s):231 - 240
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    Decomposing a software system into subsystems is an important activity in the reverse engineering and maintenance domains. One approach to subsystem decomposition is based on data mining techniques. The ISA (Identification of Subsystems based on Associations) methodology decomposes a software system into subsystems by mining association rules from a database representation of the target system. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.