Proceedings Seventh Working Conference on Reverse Engineering

23-25 Nov. 2000

Filter Results

Displaying Results 1 - 25 of 42
  • Proceedings Seventh Working Conference on Reverse Engineering

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2000, Page(s):303 - 304
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • A reference architecture for Web servers

    Publication Year: 2000, Page(s):150 - 159
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    A reference software architecture for a domain defines the fundamental components of the domain and the relations between them. Research has shown the benefits of having a reference architecture for product development, software reuse and maintenance. Many mature domains, such as compilers and operating systems, have well-known reference architectures. We present a process to derive a reference ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting the Delta IC approach to component recovery

    Publication Year: 2000, Page(s):140 - 149
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    Component recovery supports program understanding, architecture recovery and reuse. Among the best known techniques for detection of reusable objects (related global variables and their accessor functions) is Delta-IC (Canfora et al., 1996). This paper re-visits the original approach and extends it in different ways. It describes a variant of Delta-IC suitable for reverse engineering that omits th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovering use case models from object-oriented code: a thread-based approach

    Publication Year: 2000, Page(s):108 - 117
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    Use case models describe the behavior of a software system from the user's perspective. This paper presents a reverse engineering approach for recovering a use case model from object-oriented code. The approach identifies use cases by analyzing class method activation sequences triggered by input events and terminated by output events. The approach produces a structured use case model including di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching database reverse engineering

    Publication Year: 2000, Page(s):79 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    We report on an experience in teaching database reverse engineering. We found a graduated sequence of case studies to be effective. Our evidence is anecdotal, but we believe the observations will be helpful for improving teaching techniques View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structured demonstration of five program comprehension tools: lessons learnt

    Publication Year: 2000, Page(s):210 - 212
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The purpose of the article is to report on a structured demonstration for comparing program comprehension tools. Five teams of program comprehension tool designers applied their tools to a set of maintenance tasks on a common subject system. By applying a variety of reverse engineering techniques to a predefined set of tasks, the tools can be compared using a common playing field. A secondary topi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACCD: an algorithm for comprehension-driven clustering

    Publication Year: 2000, Page(s):258 - 267
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    The software clustering literature contains many different approaches that attempt to automatically decompose software systems. These approaches commonly utilize criteria or measures based on principles such as high cohesion and low coupling, information hiding etc. We present an algorithm that subscribes to a philosophy targeted towards program comprehension and based on subsystem patterns. We di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FAMIX and XMI

    Publication Year: 2000, Page(s):296 - 298
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Exchange formats have gained lots of attention. Multiple tools need to interact and/or work on the some software system. Especially there is a need to reuse parser technology. Within the FAMOOS project we have developed a model for representing object-oriented software systems at the program entity level. The model has been designed for language independence, extensibility and information exchange... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating legacy user interfaces to the Internet: shifting dialogue initiative

    Publication Year: 2000, Page(s):52 - 58
    Cited by:  Papers (15)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    A critical problem in many businesses today is in reengineering legacy information systems to operate on the Internet. Migrating a sequentially structured program to the Internet requires restructuring it to be event-driven to accommodate a new Web-based user interface. The Model Oriented Reengineering Process for Human-Computer Interface (MORPH) technique and toolset were developed to automatical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture-based approach for synthesizing and integrating adapters for legacy software

    Publication Year: 2000, Page(s):128 - 137
    Cited by:  Papers (8)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    In software organizations there is a very real possibility that a commitment to existing assets will require migration of legacy software towards new environments that use modern technology. One technique that has been suggested for facilitating the migration of existing legacy assets to new platforms is via the use of the adapter design pattern, also known as component wrapping. We describe an ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced clone-analysis to support object-oriented system refactoring

    Publication Year: 2000, Page(s):98 - 107
    Cited by:  Papers (58)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Manual source code copy and modification is often used by programmers as an easy means for functionality reuse. Nevertheless, such practice produces duplicated pieces of code or clones whose consistent maintenance might be difficult to achieve. It also creates implicit links between classes sharing a functionality. Clones are therefore good candidates for system redesign. This paper presents a nov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data reverse engineering: a historical survey

    Publication Year: 2000, Page(s):70 - 78
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Data reverse engineering is a rapidly growing field which is sometimes misunderstood. In our effort to promote the realization that data reverse engineering is a valuable and essential part of reverse engineering and is now finding its place in software engineering, we present a summary of the history of data reverse engineering. A definition of data reverse engineering, a summary of the history o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing xfig using the Rigi tool suite

    Publication Year: 2000, Page(s):207 - 209
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    An experiment is conducted on how well expert users of program comprehension tools are able to perform specific program understanding and maintenance tasks on the xfig drawing program using these tools. The paper reports on the experiences of the users of the Rigi reverse engineering tool suite. Rigi is an interactive, visual tool designed to help developers better understand and redocument their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A maintainability model for industrial software systems using design level metrics

    Publication Year: 2000, Page(s):248 - 256
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Software maintenance is a time consuming and expensive phase of a software product's life-cycle. The paper investigates the use of software design metrics to statistically estimate the maintainability of large software systems, and to identify error prone modules. A methodology for assessing, evaluating and, selecting software metrics for predicting software maintainability is presented. In additi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PBS tool demonstration report on xfig

    Publication Year: 2000, Page(s):200 - 202
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The Portable Book Shelf (PBS) (http://www.turing.cs.toronto.edu/phs) software consists of a set of tools to extract and visualize the architecture of a software system. Currently, it can extract the architecture for systems written in C, C++, Java, and PL/IX. The tools can be classified into three categories: 1. The source code extractor (SCE): extracts system artifacts and their relationships fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studying the process of software change: an analysis of software evolution

    Publication Year: 2000, Page(s):232 - 239
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper describes the analysis and results of studies in software evolution. Four major applications have been studied, three of which are from the commercial sector. The study concentrates on analysing changes in data complexity, as a direct result of the maintenance processes through comparing versions of the same application. Reverse engineering techniques are employed as a means of analysing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for a single data exchange format

    Publication Year: 2000, Page(s):281 - 283
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    The paper discusses why IBM is interested in accelerating the development of a single data exchange format. There is a need for a variety of tools that are loosely characterized into two groups: fact extraction and fact usage. These tools have to produce data to share or have to share data from a number of producers. The key problem is the lack of tool interoperability View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing XFIG with GUPRO

    Publication Year: 2000, Page(s):194 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    GUPRO (Generic Unit for Program Understanding, http://www.gupro.de) provides an adaptable and extensible workbench for program understanding and software reengineering. GUPRO is strongly based on graph technology, i.e. source code is parsed into graph structures which are accessible by graph algorithms and a general graph query language GReQL. In GUPRO, these base technologies are combined into re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data exchange in Bauhaus

    Publication Year: 2000, Page(s):293 - 295
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    In the context of the Bauhaus project, reengineering environments to support program understanding of legacy code are being developed. Bauhaus defines two formats to represent information that has been extracted from source code. One of these formats, RG, is suitable as an exchange format. This paper introduces RG, describes how it is represented as an exchanged format, and discusses schema conver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse architecting: an industrial experience report

    Publication Year: 2000, Page(s):42 - 50
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Reverse architecting is a flavour of reverse engineering that concerns the extraction of software architecture models from the system implementation. This paper presents experience in recovering the architecture of an embedded software system developed in Nokia. It outlines the reverse architecting approach, discusses its application on the case study and presents usage scenarios of the extracted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic re-engineering of binary code with run-time feedbacks

    Publication Year: 2000, Page(s):2 - 10
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Dynamic binary translation is the process of translating and optimising executable code from one machine to another at run-time, while the program is executing on the target machine. The translation technique is a process of low-level re-engineering consisting of an initial reverse engineering phase followed by a forward engineering phase. UQDBT, a machine-adaptable dynamic binary translator, can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GXL: toward a standard exchange format

    Publication Year: 2000, Page(s):162 - 171
    Cited by:  Papers (100)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    This paper describes ongoing work toward the development of a standard software exchange format (SEF), for exchanging information among tools that analyze computer programs. A particular exchange format called GXL (Graph Exchange Language) is proposed. GXL can be viewed as a merger of well known formats (e.g. GraX, PROGRES, RPA, RSF and TA) for exchanging typed, attributed, directed graphs. By usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering using design patterns

    Publication Year: 2000, Page(s):118 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Starting from a legacy system, originally developed in C and using text files, we first conducted a reverse engineering of this system to obtain its object-oriented analysis model. Then, in a process that is called segmentation, we restructured the code, changing all data structures to abstract data types and procedures to methods, eliminating all data access anomalies. This paper presents an expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Method and process for iterative reengineering of data in a legacy system

    Publication Year: 2000, Page(s):86 - 96
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    This paper presents an iterative approach to database reengineering, starting from the assumption that for the user organization, the data are the most important assets in a legacy system. The most innovative feature of the proposed approach, in comparison with other rival approaches, is that it can eliminate all the ageing symptoms of the legacy database. The new database can therefore be readily... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.