Proceedings IEEE International Conference on Software Maintenance. ICSM 2001

7-9 Nov. 2001

Filter Results

Displaying Results 1 - 25 of 93
  • Proceedings IEEE International Conference on Software Maintenance. ICSM 2001

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (1971 KB)
    Freely Available from IEEE
  • Extending the UML to support evolution management

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (22 KB) | HTML iconHTML

    Summary form only given. The authors are currently developing a model-driven, repository-based approach to system evolution management. The primary domain of interest is the telecommunication IT system area, but the techniques are applicable to organizations with integrated systems of systems. The approach is model-driven in the sense that data and object-oriented (OO) models (expressed in the Uni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pre/post conditioned slicing

    Publication Year: 2001, Page(s):138 - 147
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Th paper shows how analysis of programs in terms of pre- and postconditions can be improved using a generalisation of conditioned program slicing called pre/post conditioned slicing. Such conditions play an important role in program comprehension, reuse, verification and reengineering. Fully automated analysis is impossible because of the inherent undecidability of pre- and post- conditions. The m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):764 - 766
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Supporting software maintenance by mining software update records

    Publication Year: 2001, Page(s):22 - 31
    Cited by:  Papers (16)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This paper describes the application of inductive methods to data extracted from both source code and software maintenance records. We would like to extract relations that indicate which files in, a legacy system, are relevant to each other in the context of program maintenance. We call these relations maintenance relevance relations. Such a relation could reveal existing complex interconnections ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing and accessing extracted information

    Publication Year: 2001, Page(s):12 - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (137 KB) | HTML iconHTML

    Source code repositories best support program, comprehension tasks when they can successfully answer the many questions a maintainer conceives. To provide the flexibility needed to answer these questions, the Jupiter repository system has been developed. Jupiter using Maia, a model based on annotations, indices and attributes, can store any of the syntactic, type and flow information extractable f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-view software evolution: a UML-based framework for evolving object-oriented software

    Publication Year: 2001, Page(s):386 - 395
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    It is well-known that uncontrolled change to software can lead to increasing evolution costs caused by deteriorating structure and compromised system qualities. For complex systems, the need to carefully manage system evolution is critical. In this paper we outline an approach to managing evolution of object-oriented (OO) software. The approach is based on a goal-directed, cyclic process, in which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OO design patterns, design structure, and program changes: an industrial case study

    Publication Year: 2001, Page(s):580 - 589
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    A primary expected benefit of object-oriented (OO) methods is the creation of software systems that are easier to adapt and maintain. OO design patterns are especially geared to improve adaptability, since patterns generally increase the complexity of an initial design in order to ease future enhancements. For design patterns to really provide benefit, they must reduce the cost of future adaptatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-view architecture trend analysis for medical imaging

    Publication Year: 2001
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB) | HTML iconHTML

    We show how two web-based architecture trend analysis tools, considering different views and their changes over time, contribute to our daily effort to cope with the complexity of a large, software-intensive medical imaging system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented repository services

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (15 KB) | HTML iconHTML

    SoftAnal and SoftRepo are tools developed to provide repository services to a Viennese software house-Software Data Service-that has developed a series of financial service software systems now in the evolution phase. Repository services include automated software measurement, automated code inspection, automated post-documentation, automated generation of test cases, impact analysis, evolution pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software evolution: a road map

    Publication Year: 2001, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of independent verification and validation in maintaining a safety critical evolutionary software in a complex environment: the NASA Space Shuttle program

    Publication Year: 2001, Page(s):118 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    The National Aeronautics and Space Administration (NASA) Space Shuttle program is a multi-billion dollar activity scheduled to span over 40 years. Maintaining such software with requirements for high reliability and mission safety taxes current development methods. The authors present how independent verification and validation (IV&V) activities are used to support these requirements. They als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software evolution. A road map

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB) | HTML iconHTML

    The paper proposes that the evolution of software systems is determined by the type of application and that one must distinguish between static and dynamic applications. Static evolution can be anticipated and planned. Dynamic evolution is by nature ad hoc and must be reactive. Some degree of stability can be brought to dynamic systems by dividing them into components, based on their propensity to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering of the UML class diagram from c++ code in presence of weakly typed containers

    Publication Year: 2001, Page(s):376 - 385
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    UML diagrams, and in particular the most frequently used one, the class diagram, represent a valuable source of information even after the delivery of the system, when it enters the maintenance phase. Several tools provide a reverse engineering engine to recover it from the code. In this paper an algorithm is proposed for the improvement of the accuracy of the UML class diagram extracted from the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A declarative evolution framework for object-oriented design patterns

    Publication Year: 2001, Page(s):570 - 579
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Object-oriented design patterns and high-level refactorings are popular means of implementing and evolving large object-oriented software systems. Unfortunately, these techniques are inadequately supported at implementation level by current-day software development environments. To alleviate this problem, we propose to use the promising technique of declarative metaprogramming. It offers a tight, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the modern code inspection have value?

    Publication Year: 2001, Page(s):281 - 289
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    For years, it was believed that the value of inspections is in finding and fixing defects early in the development process. Otherwise, the cost to find and fix them later is much higher However in examining code inspection data, we are finding that inspections are beneficial for an additional reason. They make the code easier to understand and change. An analysis of data from a recent code inspect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing Java programs

    Publication Year: 2001, Page(s):479 - 487
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The promises of object-orientation and distributed computing could be delivered if the software we needed were written in stone. But it isn't, it changes. The challenge of distributed object-oriented maintenance is to find a means of evolving software, which already has a distributed client base. Working within this scenario, we observe how certain object-oriented language systems seek to support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using design recovery techniques to transform legacy systems

    Publication Year: 2001, Page(s):622 - 631
    Cited by:  Papers (14)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental call graph reanalysis for object-oriented software maintenance

    Publication Year: 2001, Page(s):682 - 691
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    A program's call graph is an essential underlying structure for performing the various interprocedural analyses used in software development tools for object-oriented software systems. For interactive software development tools and software maintenance activities, the call graph needs to remain fairly precise and be updated quickly in response to software changes. The paper presents incremental al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the impact of changing requirements

    Publication Year: 2001, Page(s):190 - 195
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    Determining the impact of requirement changes on software development is critical to project management. We present an impact analysis method to evaluate requirement changes for software development projects that is based on requirements traceability. By using attributes of the work products and traces, we create classes of requirement changes prioritized according to the potential impact. We pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A client-benefits oriented taxonomy of ERP maintenance

    Publication Year: 2001, Page(s):528 - 537
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    The worldwide installed base of Enterprise Resource Planning (ERP) systems has increased rapidly in size over the past 10 years now comprising tens of thousands of installations in large- and medium-sized organizations and millions of licensed users. Similar to traditional Information Systems (IS), ERP systems must be maintained and upgraded. It is therefore not surprising that EPP maintenance act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation of and experiment with semantic differencing

    Publication Year: 2001, Page(s):82 - 91
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Software maintainers face a wide range of difficult tasks including impact analysis and regression testing. Understanding semantic relationships, such as the semantic cohesiveness in a program or the semantic differences between two programs, can help a maintainer address these problems. However, semantic analysis is a difficult problem. For example, few semantic differencing algorithms and even f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using coordination to restructure sequential source code into a concurrent program

    Publication Year: 2001, Page(s):342 - 351
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    A workable approach for modernization of existing software into parallel/distributed applications is through coarse-grain restructuring. If, for instance, entire subroutines of legacy code can be plugged into a new structure, the investment required for the rediscovery of the details of what they do can be spared. The resulting renovated software can then take advantage of the improved performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A graph pattern matching approach to software architecture recovery

    Publication Year: 2001, Page(s):408 - 419
    Cited by:  Papers (16)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    This paper presents a technique for recovering the high level design of legacy software systems based on pattern matching and user defined architectural patterns. Architectural patterns are represented using a description language that is mapped to an attributed relational graph and allows to specify the legacy system components and their data and control flow interactions. Such pattern descriptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entropies as measures of software information

    Publication Year: 2001, Page(s):110 - 117
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (70 KB) | HTML iconHTML

    This paper investigates the use of entropies as measures of software information content. Several entropies, including the well-known Shannon entropy, are characterized by their mathematical properties. Based on these characterizations, the entropies, which are suitable for measuring software systems, are rigorously chosen. By treating a software system as an information source, the function calls... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.