Proceedings 2000 International Conference on Software Maintenance

11-14 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 32
  • Proceedings International Conference on Software Maintenance

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Trends in preserving and enhancing the value of software

    Publication Year: 2000, Page(s):6 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB)

    This paper reviews five key questions about determining software value. It then groups some major trend issues that are relevant to software value into four clusters. Then, drawing upon existing practices, it notes trends in seven value-preserving and value-enhancing groups of processes. In conclusion, it points to the critical role of management in preserving and enhancing the value of software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving the value of software - a CIO perspective

    Publication Year: 2000
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    This paper outlines a management (chief information officer) perspective of software quality based on a portfolio management approach. It outlines how an assessment of quality and strategic importance can be used to develop a strategy for applications maintenance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventive maintenance! Do we know what it is?

    Publication Year: 2000, Page(s):12 - 14
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB)

    Inconsistency exists within the software community surrounding the understanding of and adherence to the IEEE definition of preventive maintenance, due to the congruence between the IEEE definitions of perfective and preventive maintenance. A panel debate is advocated to discuss the definition and current state of preventive maintenance practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do we know what preventive maintenance is?

    Publication Year: 2000, Page(s):15 - 17
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB)

    After setting the context with a brief review of some history, this paper places preventive software maintenance in that context, as brought up to date. It closes by pointing out a link between scheduled maintenance and preventive maintenance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What is preventive software maintenance?

    Publication Year: 2000, Page(s):18 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB)

    Approaches software maintenance from the service point of view. I particularly emphasize co-operation with the client. My definition of software maintenance is that software maintenance refers to all the actions that are needed to keep software in such a running order that it achieves all its objectives from the beginning until the end of its usage. The ideas I present are based on several softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging program comprehension tools by design navigation

    Publication Year: 2000, Page(s):22 - 32
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1378 KB)

    Source code investigation is one of the most time-consuming activities during software maintenance and evolution, yet currently-available tool support suffers from several shortcomings. Browsing is typically limited to low-level elements, investigation is only supported as a one-way activity, and tools provide little help in getting an encompassing picture of the system under examination. In our r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TraceGraph: immediate visual location of software features

    Publication Year: 2000, Page(s):33 - 39
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB)

    Software engineers often need to locate where particular features of a program are implemented in order to fix a bug or introduce an enhancement. This paper describes a tool called TraceGraph to support this task, particularly for large, long-running or interactive software. TraceGraph provides a simple visual display of the program's trace which allows changes in execution to be easily distinguis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information retrieval models for recovering traceability links between code and documentation

    Publication Year: 2000, Page(s):40 - 49
    Cited by:  Papers (50)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB)

    The research described in the paper is concerned with the application of information retrieval to software maintenance, and in particular to the problem of recovering traceability links between the source code of a system and its free text documentation. We introduce a method based on the general idea of vector space information retrieval and apply it in two case studies to trace C++ source code o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering class diagrams from data-intensive legacy systems

    Publication Year: 2000, Page(s):52 - 63
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (987 KB)

    Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among the objects, or recover only a part of them. The paper describes a method for recovering an OO (object oriented) model together with the objects and relationships among them. The proposed approach integrates the results of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An alternative source code analysis

    Publication Year: 2000, Page(s):64 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (898 KB)

    All aspects of software engineering strive toward guaranteeing that an implemented algorithm performs the intended tasks. The paper describes results in investigating the relationship between specifications and re-engineered code for data processing programs in COBOL, and develops strategies for assigning significance to identified differences. A modified F(p) notation representation of the progra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web site analysis: structure and evolution

    Publication Year: 2000, Page(s):76 - 86
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1009 KB)

    Web sites are becoming important assets for several companies, which need to incorporate sophisticated technologies into complex and large Web based systems. As a consequence, methodologies and tools are required for their design, implementation and maintenance. In particular the possibility for a site to evolve so as to provide updated and accessible information is a fundamental need. Web sites a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture transformations

    Publication Year: 2000, Page(s):88 - 96
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    In order to understand and improve software, we commonly examine and manipulate its architecture. For example, we may want to examine the architecture at different levels of abstraction or zoom-in on one portion of the system. We may discover that the extracted architecture has deviated from our mental model of the software and hence we may want to repair it. The paper identifies the commonality b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restructuring program identifier names

    Publication Year: 2000, Page(s):97 - 107
    Cited by:  Papers (57)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB)

    The identifiers chosen by programmers as entity names contain valuable information. They are often the starting point for the program understanding activities, especially when high level views, like the call graph, are available. An approach for the restructuring of program identifier names is proposed, aimed at improving their meaningfulness. It considers two forms of standardization, associated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The application of correctness preserving transformations to software maintenance

    Publication Year: 2000, Page(s):108 - 117
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (913 KB)

    The size and complexity of hardware and software systems continues to grow, making the introduction of subtle errors a more likely possibility. A major goal of software engineering is to enable developers to construct systems that operate reliably despite increased size and complexity. One approach to achieving this goal is through formal methods: mathematically based languages, techniques and too... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying reasons for software changes using historic databases

    Publication Year: 2000, Page(s):120 - 130
    Cited by:  Papers (138)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (963 KB)

    Large scale software products must constantly change in order to adapt to a changing environment. Studies of historic data from legacy software systems have identified three specific causes of this change: adding new features; correcting faults; and restructuring code to accommodate future changes. Our hypothesis is that a textual description field of a change is essential to understanding why tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution in open source software: a case study

    Publication Year: 2000, Page(s):131 - 142
    Cited by:  Papers (174)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (846 KB)

    Most studies of software evolution have been performed on systems developed within a single company using traditional management techniques. With the widespread availability of several large software systems that have been developed using an "open source" development approach, we now have a chance to examine these systems in detail, and see if their evolutionary narratives are significantly differ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studying the evolution and enhancement of software features

    Publication Year: 2000, Page(s):143 - 151
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB)

    The evolution and enhancement of features during system evolution can have significant effects on its coherence as well as its internal architecture. Studying the evolution of system features and concepts across a product line from an external or problem domain perspective can inform the process of identifying and designing future features. We show how we derive three primary views (morphological,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can metrics help to bridge the gap between the improvement of OO design quality and its automation?

    Publication Year: 2000, Page(s):154 - 162
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (797 KB)

    During the evolution of object-oriented (OO) systems, the preservation of a correct design should be a permanent quest. However, for systems involving a large number of classes and that are subject to frequent modifications, the detection and correction of design flaws may be a complex and resource-consuming task. The use of automatic detection and correction tools can be helpful for this task. Va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics of software evolution as effort predictors - a case study

    Publication Year: 2000, Page(s):163 - 172
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (947 KB)

    Despite its importance, cost estimation in the context of continuing software evolution has been relatively unexplored. This paper addresses this omission by describing some models that predict effort as a function of a suite of metrics of software evolution. It presents a case study relating to the evolution of the kernel of a mainframe operating system. Six models based on eight different indica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of black-box modernization approaches for information systems

    Publication Year: 2000, Page(s):173 - 183
    Cited by:  Papers (24)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    Information systems are critical assets for modern enterprises and incorporate key knowledge acquired over the life of an organization. These systems must be updated continuously to reflect evolving business practices. Unfortunately, repeated modification has a cumulative effect on system complexity, and the rapid evolution of technology quickly renders existing technologies obsolete. Eventually, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prevention is better than cure [the Year 2000 problem]

    Publication Year: 2000, Page(s):184 - 193
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (782 KB)

    Was all the mania lending up to the turn of the millennium warranted or was it just a load of computer maintenance ballyhoo designed to attract attention? In this paper, we spot-test a selected number of Swedish companies to establish their state of preparedness just prior to meeting the new millennium as well as the effects they have encountered immediately after the turn of the millennium. These... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C/C++ conditional compilation analysis using symbolic execution

    Publication Year: 2000, Page(s):196 - 206
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB)

    Conditional compilation is one of the most powerful parts of a C/C++ environment available for building software for different platforms with different feature sets. Although conditional compilation is powerful, it can be difficult to understand and is error-prone. In large software systems, file inclusion, conditional compilation and macro substitution are closely related and are often largely in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to limit the WYNOT problem

    Publication Year: 2000, Page(s):207 - 215
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (742 KB)

    Software evolution in a cooperative environment, where a pool of maintainers/developers contribute to the overall system changes, is challenging due to several factors, such as the poor communication among individuals and the high number of produced changes. Conflicting or contradictory changes, unforeseen or unexpected dependencies may result in a non working system. We propose a strategy aimed t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ConSIT: a conditioned program slicer

    Publication Year: 2000, Page(s):216 - 226
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    Conditioned slicing is a powerful generalisation of static and dynamic slicing which has applications to many problems in software maintenance and evolution, including reuse, reengineering and program comprehension. However there has been relatively little work on the implementation of conditioned slicing. Algorithms for implementing conditioned slicing necessarily involve reasoning about the valu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.