Proceedings Conference on Software Maintenance 1992

9-12 Nov. 1992

Filter Results

Displaying Results 1 - 25 of 48
  • A classification procedure for the effective management of changes during the maintenance process

    Publication Year: 1992, Page(s):328 - 336
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB)

    The authors address the issue of assessing the difficulty of a change based on known or predictable data. They consider the present work as a first step towards the construction of customized economic models for maintainers. They propose a modeling approach, based on regular statistical techniques, that can be used in a variety of software maintenance environments. This approach can be easily auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COMFORM-a software maintenance method based on the software configuration management discipline

    Publication Year: 1992, Page(s):183 - 192
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    COMFORM (configuration management formalisation for maintenance), a method which provides guidelines and procedures for carrying out a variety of activities performed during the maintenance process, is discussed. The proposed method accommodates a change control framework around which the software configuration management discipline is applied. The aim is to exert control over an existing software... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference on Software Maintenance 1992 (Cat.No.92CH3206-0)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Improved maintenance support by multi-version visualizations

    Publication Year: 1992, Page(s):376 - 383
    Cited by:  Papers (4)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The author proposes a set of visualizing techniques exploiting versioning information easily accessible in a software repository. The novel contribution is the active use of version information. The author uses the term multiversion visualizations, since a visual representation containing information aggregated from several versions of the software is computed. The proposed techniques are applicab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability models and metrics for space shuttle maintenance position statement

    Publication Year: 1992
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    The use of software reliability models as an aid to software maintenance, with applications to the space shuttle onboard software, is described. In addition to supporting the maintenance function, the use of reliability models throughout the life of the software supports other functions such as reliability assessment, design feasibility assessment, and management of human and computer resources. R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost benefit analysis and the art of software maintenance

    Publication Year: 1992, Page(s):70 - 77
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    As software maintenance requirements continue to grow, conflicting with demands for new development, managers must continually evaluate the cost effectiveness of various maintenance strategies. He shows that one can measure and use a significant benefit from maintenance-the reduction in failure risk-to evaluate maintenance strategies. The ability to measure the differential risk of failure in modu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics for assessing a software system's maintainability

    Publication Year: 1992, Page(s):337 - 344
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    It is noted that the factors of software that determine or influence maintainability can be organized into a hierarchical structure of measurable attributes. For each of these attributes the authors show a metric definition consistent with the published definitions of the software characteristic being measured. The result is a tree structure of maintainability metrics which can be used for purpose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software measurement for the space shuttle HAL/S maintenance environment

    Publication Year: 1992
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The authors discuss the development of a complexity domain model for the HAL/S programming language in which all of the space shuttle software is written. Their research has indicated that some aspects of software complexity in other programming language environments are strongly related to software problems incurred during software maintenance. The goal of the current research effort is to establ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering: resolving conflicts between expected and actual software designs

    Publication Year: 1992, Page(s):32 - 40
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    A real-time embedded system was the subject of a series of experiments in reverse engineering. These experiments used a method of reverse engineering, called synchronized refinement, that analyzes a program, describing its behavior in the vocabulary of the application domain and its structure in terms of design decisions. The results provide insight into the role of domain knowledge in this type o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paradigms for maintenance

    Publication Year: 1992, Page(s):80 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    A discussion on paradigms for maintenance covers the following topics: the object-oriented paradigm for software maintenance; an integrated approach to reverse engineering; arguments for developing and accepting multiple paradigms for software maintenance; and reverse engineering versus re-engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of software changes on module cohesion

    Publication Year: 1992, Page(s):345 - 353
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Program slices are used to model module cohesion. For the authors purposes, a slice is a projection of program text that includes only the data tokens relevant to one output. The authors define six cohesion metrics in terms of these slices, and evaluate the effects of classes of module changes on these metrics. They find that the effects on cohesion metrics are notably more predictable when the ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using semantic differencing to reduce the cost of regression testing

    Publication Year: 1992, Page(s):41 - 50
    Cited by:  Papers (26)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    An algorithm is presented that reduces the cost of regression testing by reducing the number of test cases that must be rerun and by reducing the size of the program that they must be run on. The algorithm uses dependence graphs and program slicing to partition the components of the new program into two sets: preserved points-components that have unchanged run-time behaviour; and affected points-c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An outline for a software maintenance course

    Publication Year: 1992, Page(s):320 - 321
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    The author briefly discusses the course structure for the graduate software maintenance course offered at Arizona State University. Introduction to software maintenance, forms of maintenance, reverse engineering and re-engineering, maintenance models, and maintenance personnel are the topics examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of portability problems and evaluation

    Publication Year: 1992, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The portability aspects of the FORTRAN and C languages are discussed and the results of porting evaluation are reported. Several experiments were carried out on transferring a fourth-generation language system named STYLE. STYLE was developed for business transaction processing and is designed to greatly speed up application program development. This system is based on the client and server model.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eliminating non-traversable paths from structured programs

    Publication Year: 1992, Page(s):156 - 164
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1044 KB)

    A formal procedure is given based on the use of regular expressions, to identify and eliminate nontraversable paths in a structured program. By reducing the use of control variables, the program is transformed into an unstructured variant and then restructured into a semantic equivalent of the original program with nontraversable paths eliminated. The authors demonstrate this procedure with an exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program dependence analysis

    Publication Year: 1992, Page(s):356 - 365
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    The authors first discuss three methods of identifying objects. The first two were suggested by S.S. Liu and N. Wilde; the third method is one that is proposed in the present work and is based on the determination of the receiver of a procedure. The authors believe that the latter method is more natural and precise than the former two. Algorithms that perform precise interprocedural flow-sensitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to regression testing using slicing

    Publication Year: 1992, Page(s):299 - 308
    Cited by:  Papers (73)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    The authors present a novel approach to data-flow-based regression testing that uses slicing type algorithms to explicitly detect definition-use pairs that are affected by a program change. An important benefit of the slicing technique is that, unlike previous techniques, no data flow history is needed nor is the recomputation of data flow for the entire program required to detect affected definit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tailoring the software engineering Institute's (SEI) Capability Maturity Model (CMM) to a software sustaining engineering organization

    Publication Year: 1992, Page(s):137 - 144
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    The Software Engineering Institute's Softwares Process Maturity Model was developed to provide a basis for assessing an organization's ability to perform software engineering activities. It also provides a guide for improving an organization's software engineering capability. The maturity model was designed on the basis of concepts associated with developing new, large, complex systems. This has l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating the inspection process into a software maintenance organization

    Publication Year: 1992, Page(s):51 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The results are given of introducing the inspection process into an established software life cycle maintenance organization. The results were obtained while implementing a major system enhancement and support the continued use of software inspection in the maintenance environment, for both system enhancements and problem corrections. The defect data collected provided the quantitative information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can software maintenance be taught?

    Publication Year: 1992, Page(s):322 - 323
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    It is noted that three arguments have been used as the basis for not developing specific courses in software maintenance. The arguments are worded as follows: maintenance is a direct continuation of software development and should therefore be taught as a proper follow-on to the development task; the real technical change is in developing systems from scratch so the technical challenge of performi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual foundation for software re-engineering

    Publication Year: 1992, Page(s):226 - 235
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    The author presents a conceptual foundation for software re-engineering. The foundation is composed of properties and principles that underlie re-engineering methods, and assumptions about re-engineering. The value of this conceptual foundation is its ability to model understanding of re-engineering, how it is practiced, and how it can be practiced. A general model of software re-engineering is es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining the software process

    Publication Year: 1992, Page(s):2 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The software process movement is described. Organization-wide software processes and the maintenance of defined software processes are considered. It is suggested that the software process movement will find the software maintenance community directly in its mainstream. Even more important, the maintenance community is about to face a double challenge. First, it must struggle to adopt more effecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for dynamic evolution of object-oriented specifications

    Publication Year: 1992, Page(s):96 - 104
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    It is noted that the evolution of specifications is necessary to accommodate the evolution of requirements and design decisions during the software development and maintenance process. The authors are concerned with formal description techniques that allow the development of executable specifications, especially executable object-oriented specifications of distributed systems. They propose a two-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maturity of maintenance [software]

    Publication Year: 1992, Page(s):259 - 260
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The SEI maturity model has been successfully used for evaluating the software process at both the project and organization levels. The SEI model includes specific questions for software maintenance and contains maintenance implicitly as a part of the total maturity level of an organization. In the present work, the authors argue that the SEI model can also be used more specifically for defining th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software restructuring by enforcing localization and information hiding

    Publication Year: 1992, Page(s):165 - 172
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    It is shown how the semantic basis underlying modern system structure constructs (supported in languages such as Ada and C++) can be used to simplify the understanding of software written in conventional imperative languages. The restructuring technique analyzes the input source code system into a hierarchical system structure that exploits information hiding and localization properties. This hier... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.