Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings.

28-28 March 2003

Filter Results

Displaying Results 1 - 25 of 44
  • Proceedings Seventh European Conference on Software Maintenance and Reengineering

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB)

    The following topics are dealt with: Transformations; Web applications; refactoring; component-based programming; testing; metrics; object oriented-tooling; aspect-oriented programming; maintenance; software clustering techniques; cloning and slicing and tool integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):419 - 420
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Using a taxonomy tool to identify changes in OO software

    Publication Year: 2003, Page(s):213 - 222
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    In this paper, we present a taxonomy that allows the maintainer to catalog OO classes based on the characteristics of the class. The characteristics of a class include the properties of data items and methods, as well as the relationships with other classes in the application. We construct a tool to track changes across multiple releases of software applications containing hundreds of classes, pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving legacy system toward eLegacy system in eBusiness context

    Publication Year: 2003, Page(s):201 - 210
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    The enactment of eBusiness processes requires the effective usage of the existing legacy applications in the eBusiness initiatives. Therefore, technical issues are not enough to drive the evolution of the existing legacy applications, but it is necessary to consider also problems concerning the perspectives, strategies, and businesses of the enterprises. In particular, there is a strict relationsh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web applications design and maintenance using symbolic model checking

    Publication Year: 2003, Page(s):63 - 72
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    We present an approach to automatic checking of the correctness of Web applications structure during their lifecycle. The approach adopts the well-established symbolic model checking technique and the associated tool SMV. A formalism allows the designer to describe the model of a Web-based system. Computation Tree Logic (CTL) is adopted as language to define the properties to be verified. The appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining results from security assessments

    Publication Year: 2003, Page(s):341 - 350
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Security assessments are cosily and lime consuming and cannot be carried out from scratch each lime a system is updated or modified This motivates the need for specific methodology addressing the maintenance Of assessment results, in particular, and a component-oriented approach to security assessment in general This paper presents such a methodology in the selling of model-based security assessme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of metrics for object-oriented design logical stability

    Publication Year: 2003, Page(s):193 - 200
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    As changes are made to an object-oriented design, its structure and/or behavior may be affected. Modifications made to one class can have ripple effects on other classes in the design. The stability of an object-oriented design indicates its resistance to interclass propagation of changes that the design would have when it is modified There are two aspects of design stability: logical stability an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using observation and refinement to improve distributed systems test

    Publication Year: 2003, Page(s):153 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Testing a distributed system is difficult. Good testing depends on both skill and understanding the system under test. We have developed a method to observe the system at the CORBA remote-procedure-call level and then use dynamic-query-based visualization to refine and improve the test cases. The method and accompanying tools have been tested and refined by using them as part of the software suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Light-weight product-lines for evolution and maintenance of Web sites

    Publication Year: 2003, Page(s):53 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Software reengineering and maintenance are two classical activities in software engineering. Today, software maintenance is a time consuming task because requirements change and evolve frequently. Moreover, in certain domains, such as the Web domain is, these changes happen very often. In this way, new techniques to engineer Web sites are needed in order to reduce the time to market of Web product... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of constructors in the context of refactoring object-oriented systems

    Publication Year: 2003, Page(s):111 - 120
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    Constructors play an essential role in object-oriented (OO) languages as a means of object creation. Yet, very little empirical evidence exists on constructors, trends in their composition and how they impact comprehension and encapsulation of OO classes. In this paper, we empirically investigate the opportunities, benefits and problems of refactoring class constructors across a sample of classes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full reuse maintenance process for reducing software degradation

    Publication Year: 2003, Page(s):289 - 298
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    It is known that during maintenance activities system quality tends to degrade. This work presents a field investigation carried out on two industrial projects with the aim of comparing the effectiveness of the "full reuse" maintenance process with an "iterative enhancement" one. The results of the work confirm the greater effectiveness of the first process in slowing down the degradation of softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving to smaller libraries via clustering and genetic algorithms

    Publication Year: 2003, Page(s):307 - 316
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    There may be several reasons to reduce a software system to its bare bone removing the extra fat introduced during development or evolution. Porting the software system on embedded devices or palmtops are just two examples. This paper presents an approach to re-factoring libraries with the aim of reducing the memory requirements of executables. The approach is organized in two steps. The first ste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems within support (upfront maintenance)

    Publication Year: 2003, Page(s):331 - 340
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Software support (upfront maintenance) processes are one of the most diverse and complex to define. So far, they have not achieved enough attention. Most research effort has been put into the development and maintenance processes and the improvement of these processes. However, very little research has been done within their supporting processes - the processes that extensively mediate or eliminat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design derivation of an open, Java-based reengineering platform

    Publication Year: 2003, Page(s):239 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Essential reengineering platform functionality can be made more accessible, and even extended, using Java as a basis for platform development, as follows. The process of software reengineering tool development should be able to enjoy the benefits conferred by "open" enabling technologies. Reengineering tool development and use involves distinctive processes and thus has distinctive requirements of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric-based approach to enhance design quality through meta-pattern transformations

    Publication Year: 2003, Page(s):183 - 192
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    During the evolution of object-oriented legacy systems, improving the design quality is. most often a highly demanded objective. For such systems which have a large number of classes and are subject to frequent modifications, detection and correction of design defects is a complex task. The use of automatic detection and correction tools can be helpful for this task. Various research approaches ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering legacy application to e-business with modified Rational Unified Process

    Publication Year: 2003, Page(s):143 - 150
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Experience in reengineering a legacy application into a web based J2EE system with modified Rational Unified Process (RUP) is presented RUP is adopted into an onsite-offshore development model along with ISO 9001 and SEI CMM Level 5 standards. The new application has above 2500 code components and the effort is about 100 person years. For the benefit of software development community, some of our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software documentation: how much is enough?

    Publication Year: 2003, Page(s):13 - 15
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    It is a well-known fact that software documentation is, in practice, poor and incomplete. Though specification, design, and test documents-among other things-are required by standards and capability maturity models (e.g., SEI CMM), such documentation does not exist in a complete and consistent form in most organizations. When documents are produced, they tend to follow no defined standard and lack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Cobol to Java recycling

    Publication Year: 2003, Page(s):40 - 50
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    In this paper an approach for automated source-to-source translation from Cobol to Java is presented. The primary goal of this approach is to ensure that the generated code will be maintainable. In some cases this is achieved even by sacrificing complete functional equivalence of the generated code with the original program. We also intensively use encapsulation to hide away difficulties of langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactoring browser with preprocessor

    Publication Year: 2003, Page(s):101 - 110
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    This paper presents Xrefactory a refactoring browser for C and Java languages. The paper discusses a way how refactoring browsers can thresh-passe non-trivial complications introduced by the C pre-preprocessor Resolving those problems is the next step toward so long expected refactoring browser for C++. Our solution is based on practical implementation and exemplified on renaming refactorings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some optimal object-based architectural features for corrective maintenance

    Publication Year: 2003, Page(s):281 - 288
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    We investigate the relationship between some characteristics of software architecture present at the top-level design stage and the resulting corrective maintainability of five Ada systems. Measures are developed for both internal and external complexity for the subset of packages, within our five projects, that were changed to correct a software fault. These measures involve the context coupling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracker - a tool for change propagation in Java

    Publication Year: 2003, Page(s):223 - 229
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    During software evolution, programmers add new functionalities and release new versions of software. This is complicated work, particularly in large applications, and tools are needed to deal with it. In this paper we introduce a tool named JTracker that helps programmers implement change propagation in Java applications. We conducted a case study of a change in open source application JMeter, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling legacy system accessibility by Web heterogeneous clients

    Publication Year: 2003, Page(s):73 - 81
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (502 KB) | HTML iconHTML

    In the Internet era, a challenging issue consists of defining viable solutions for integrating existing enterprise systems and making them accessible from heterogeneous client devices by exploiting the common infrastructure offered by the Web. This paper presents an integration approach that exploits black-box techniques for capturing the dynamic and static models of a legacy system user interface... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast flow analysis to compute fuzzy estimates of risk levels

    Publication Year: 2003, Page(s):351 - 360
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    In the context of software quality assessment, this paper proposes original flow analyses which propagate numerical estimates of blocking risks along an inter-procedural control flow graph (CFG) and which combine these estimates along the different CFG paths using fuzzy logic operations. Two specialized analyses can be further defined in terms of definite and possible flow analysis. The definite a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A debugging strategy based on requirements of testing

    Publication Year: 2003, Page(s):160 - 169
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Testing and debugging are activities that consume a significant amount of the software quality and maintenance budget. To reduce such cost, the use of testing information for debugging purposes has been advocated In general, heuristics are used to select structural testing requirements (nodes, branches, and definition use associations) more closely related to the manifestation of failures which ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting evolution in component-based development using component libraries

    Publication Year: 2003, Page(s):123 - 132
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Component-based software development (CBSD) is a very promising software engineering technique for improving reuse and maintenance. Nevertheless, there are still some difficulties in practice when reusing, maintaining and evolving components and/or component-based (CB) applications. We review the concepts of version and configuration management and apply them in the context of CBSD. The use of mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.