International Conference on Software Maintenance, 2002. Proceedings.

3-6 Oct. 2002

Filter Results

Displaying Results 1 - 25 of 88
  • Proceedings International Conference On Software Maintenance ICSM 2002

    Publication Year: 2002, Page(s):i - x
    Request permission for commercial reuse | PDF file iconPDF (383 KB)
    Freely Available from IEEE
  • A post-placement side-effect removal algorithm

    Publication Year: 2002, Page(s):2 - 11
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Side-effects are widely believed to impede program comprehension and have a detrimental effect upon software maintenance. This paper introduces an algorithm for side-effect removal which splits the side-effects into their pure expression meaning and their state-changing meaning. Symbolic execution is used to determine the expression meaning, while transformation is used to place the state-changing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Union slices for program maintenance

    Publication Year: 2002, Page(s):12 - 21
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    Owing to their relative simplicity and wide range of applications, static slices are specifically proposed for software maintenance and program understanding. Unfortunately, in many cases static slices are overly conservative and therefore too large to supply useful information to the software maintainer. Dynamic slicing methods can produce more precise results, but only for one test case. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating context-sensitive slicing and chopping

    Publication Year: 2002, Page(s):22 - 31
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    We present an empirical evaluation of three context-sensitive slicing algorithms and five context-sensitive chopping algorithms, and compare them to context-insensitive methods. Besides the algorithms by Reps et al. (1994, 1995) and Agrawal (2001) we investigate six new algorithms based on variations of k-limited call strings and approximative chopping based on summary information. It turns out th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using dynamic information for the iterative recovery of collaborations and roles

    Publication Year: 2002, Page(s):34 - 43
    Cited by:  Papers (33)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Modeling object-oriented applications using collaborations and roles is now well accepted. Collaboration-based or role-based designs decompose an application into tasks performed by a subset of the applications' classes. Collaborations provide a larger unit of understanding and reuse than classes, and are an important aid in the maintenance and evolution of the software. This kind of design inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICBMC: an improved cohesion measure for classes

    Publication Year: 2002, Page(s):44 - 53
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Class cohesion could be used to evaluate the design quality of classes, to develop test measures for object-oriented software and to restructure poorly designed classes. Among a number of class cohesion measures proposed in the last decade, Chae's measure is based on the structure of the reference graph of a class, which overcomes the limitations of most class cohesion measures. However, it only c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static and dynamic C++ code analysis for the recovery of the object diagram

    Publication Year: 2002, Page(s):54 - 63
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    When a software system enters the maintenance phase, the availability of accurate and consistent information about its organization can help alleviate the difficulties of program understanding. Reverse engineering methods aim at extracting such information directly from the code. While several tools support the recovery of the class diagram from object oriented code, so far no work has attacked th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to the panel session Lehman's laws of software evolution, in context

    Publication Year: 2002, Page(s):66 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (205 KB) | HTML iconHTML
    Freely Available from IEEE
  • The principle of organizational maturity and E-type dynamics

    Publication Year: 2002, Page(s): 68
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implications of software measurement to Lehman's eight laws

    Publication Year: 2002, Page(s): 69
    Request permission for commercial reuse | PDF file iconPDF (188 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laws and principles of evolution

    Publication Year: 2002, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    The understanding of system evolution is of fundamental importance to the software engineering enterprise. Lehman's Laws have been a fundamental and seminal start on the road to that understanding. However, we have a long way to go. We need more instances of systems and their evolution. We need more attributes of those evolutions. We need related process and organizational data. It is a research a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laws of software evolution and their empirical support

    Publication Year: 2002, Page(s): 71
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (193 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applicability of IEEE maintenance process for corrective maintenance outsourcing-an empirical study

    Publication Year: 2002, Page(s):74 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    We establish the context of maintenance outsourcing of mission critical applications by Fortune 500 organizations. We present the results of empirical studies that were conducted at Syntel, a NASDAQ listed application management and e-business solutions company, on 46 software maintenance projects that belonged to various lines of business on the IBM mainframe platform using an automated data coll... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two controlled experiments concerning the usefulness of assertions as a means for programming

    Publication Year: 2002, Page(s):84 - 92
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Assertions, or more generally "programming by contract", have gained widespread acceptance in the computer science community as a means for correct program development. However the literature lacks an empirical evaluation of the benefits a programmer gains by using assertions in his software development. This paper reports two controlled experiments that close this gap. Both experiments compare "p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to classify software maintenance requests

    Publication Year: 2002, Page(s):93 - 102
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    When a software system critical for an organization exhibits a problem during its operation, it is relevant to fix it in a short period of time, to avoid serious economical losses. The problem is therefore noticed by the organization in charge of the maintenance, and it should be correctly and quickly dispatched to the right maintenance team. We propose to automatically classify incoming maintenan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study of distributed software maintenance

    Publication Year: 2002, Page(s):103 - 109
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A large software project may be distributed over multiple sites when the organization believes that there are not enough people to staff a single collocated team. However, previous empirical research in the context of telecommunication organizations has shown that distance may increase cycle time and costs. We report on a large software massive maintenance project in the information systems domain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioural concern modelling for software change tasks

    Publication Year: 2002, Page(s):112 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Many modification tasks on an existing software system result in changes to code that crosscuts the system's structure. Making these changes is difficult because a developer must understand large parts of the system, and must reason about how the modification will interact with the existing behaviour. Typically, developers make these kinds of changes using an ad-hoc approach with tools that help i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An estimation-based management framework for enhancive maintenance in commercial software products

    Publication Year: 2002, Page(s):122 - 130
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In commercial software vendor organizations, evolution of a software product by means of scheduled feature releases is a central activity. Relying on existing work on maintenance task effort prediction, this paper proposes a management framework for periodically capturing updated estimation data and using it as a basis for initial planning and subsequent re-planning of releases. The framework is f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application server to support online evolution

    Publication Year: 2002, Page(s):131 - 140
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    Most online evolution of an application depends on its runtime environment. This paper addresses how to support online evolution by an application server, which is considered as a third kind of system software, besides OS and DBMS. From the view of requirements, evolutions of software can be divided into four categories: evolutions that do not alter requirements, evolutions that alter functional r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The information gathering strategies of software maintainers

    Publication Year: 2002, Page(s):141 - 149
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB) | HTML iconHTML

    In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a system being maintained is a major task. It is also a difficult task because the sources of this information are often limited, inaccessible, or unknown. Clearly this impacts maintenance productivity-simply because of the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool support for measuring complexity in heterogeneous object-oriented software

    Publication Year: 2002, Page(s):152 - 161
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    In this paper the design of a CASE tool for measuring the complexity of object oriented software systems is described. Use of the tool within the software testing and release sub-process is outlined. The paper argues that (i) for metrics to be properly integrated into a software process requires tool support; (ii) tools must support heterogeneous systems often involving multiple programming langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraining software evolution

    Publication Year: 2002, Page(s):162 - 171
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independently and inconsistently. In order to support the evolution of multidimensional software, an environment must ensure that the different dimensions evolve concurrently. This can be accomplished through an integration framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Columbus - reverse engineering tool and schema for C++

    Publication Year: 2002, Page(s):172 - 181
    Cited by:  Papers (70)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    One of the most critical issues in large-scale software development and maintenance is the rapidly growing size and complexity of software systems. As a result of this rapid growth there is a need to better understand the relationships between the different parts of a large software system. In this paper we present a reverse engineering framework called Columbus that is able to analyze large C++ p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture analysis tools to support evolution of large industrial systems

    Publication Year: 2002, Page(s):182 - 191
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    This paper describes an architecture analysis tool-set supporting evolutionary improvement of the software architecture of an existing medical imaging system. The toolset has been developed with co-operation between Philips Research and Philips Medical Systems. The medical imaging system is a large and software intensive system. Improvements to its architecture will lead to many development and bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining software with a security perspective

    Publication Year: 2002, Page(s):194 - 203
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and are difficult to use. Hence it is essential to focus testing effort in areas that have a greater number of security vulnerabilities to develop secure software as well as meet budget and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.