Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings.

22-26 Sept. 2003

Filter Results

Displaying Results 1 - 25 of 61
  • A heuristic approach to solving the software clustering problem

    Publication Year: 2003, Page(s):285 - 288
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This paper provides an overview of the author's Ph.D. thesis (2002). The primary contribution of this research involved developing techniques to extract architectural information about a system directly from its source code. To accomplish this objective a series of software clustering algorithms were developed. These algorithms use metaheuristic search techniques to partition a directed graph gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-driven testing of object-oriented systems

    Publication Year: 2003, Page(s):281 - 284
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Many different testing techniques have been proposed by researchers, but essentially only two main testing philosophies exist, black box and white box. There exist a number of different testing methods for structural testing of procedural languages. However, the features of object-oriented languages are not addressed by such techniques. The article explores a new structural testing technique for o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring software systems

    Publication Year: 2003, Page(s):276 - 280
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Software evolution is required to keep a software system in sync with the ever-changing needs of the system's users and environment. An unfortunate side-effect of evolution is that it often causes the knowledge about a system to degrade, which in turn impedes further evolution. In the dissertation, we investigate techniques and tools that help remedy this situation by supporting the exploration of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience in developing interoperations among legacy information systems using partial reverse engineering

    Publication Year: 2003, Page(s):369 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    At ICSM01 Johnson and Rosebrugh proposed a new methodology, based on formal specification techniques and partial reverse engineering, for developing interoperations among legacy information systems. The present brief paper reports on progress to date in designing such interoperations for major health informatics information systems. We describe briefly the methodology, argue for the value of parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software renewal projects estimation using dynamic calibration

    Publication Year: 2003, Page(s):105 - 115
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Effort estimation is a long faced problem, but, in spite of the amount of research spent in this field, it still remains an open issue in the software engineering community. This is true especially in the case of renewal of legacy systems, where the current and well established approaches also fail. This paper presents an application of the method named dynamic calibration for effort estimation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the 'security vulnerability likelihood' of software functions

    Publication Year: 2003, Page(s):266 - 274
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However, the existence of such a tool is predicated on the ability to characterize a function's 'security vulnerability likelihood'. Our hypothesis is that functions near a source of input are most likely to contain security vulne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructures of virtual IT enterprises

    Publication Year: 2003, Page(s):199 - 208
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Service quality has become a critical survivability factor. The value of IT-business does not only lie in the products but also in the needs it serves. More and more customers require the IT companies with which they do business to continuously improve the speed and quality of their service. To provide seamless high quality service, the collaborating IT-companies/departments must organize themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An environment for managing evolving product line architectures

    Publication Year: 2003, Page(s):358 - 367
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    The use of product lines is recognized as beneficial in promoting and structuring both component and architecture reuse throughout an organization. While the business practices of using product lines are well-understood and representations for specifying and capturing the underlying architecture of a product line are coming of age, support environments for managing the evolution of product line ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the maintenance history of a legacy software system

    Publication Year: 2003, Page(s):95 - 104
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    A considerable amount of system maintenance experience can be found in bug tracking and source code configuration management systems. Data mining and machine learning techniques allow one to extract models from past experience that can be used in future predictions. By mining the software change record, one can therefore generate models that can be used in future maintenance activities. In this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis and change management of UML models

    Publication Year: 2003, Page(s):256 - 265
    Cited by:  Papers (55)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The use of Unified Modeling Language (UML) analysis/design models on large projects leads to a large number of interdependent UML diagrams. As software systems evolve, those diagrams undergo changes to, for instance, correct errors or address changes in the requirements. Those changes can in turn lead to subsequent changes to other elements in the UML diagrams. Impact analysis is then defined as t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical success factors in software maintenance: a case study

    Publication Year: 2003, Page(s):190 - 198
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance project. The project in question is the maintenance and evolution of a very large and complex banking application system for securities processing which has been in progress since several years. Eight factors are defined and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated support for framework-based software

    Publication Year: 2003, Page(s):148 - 157
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    In this paper, we show how elaborate support for framework-based software evolution can be provided based on explicit documentation of the hot spots of object-oriented application frameworks. Such support includes high-level transformations that guide a developer when instantiating applications from a framework by propagating the necessary changes, as well as application upgrading facilities based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A large-scale empirical study of forward and backward static slice size and context sensitivity

    Publication Year: 2003, Page(s):44 - 53
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    A large-scale study of 43 C programs totaling just over 1 million lines of code is presented. The study includes the forward and backward static slice on every executable statement. In total 2353598 slices were constructed, with an average slice size being just under 30% of the original program. The results also show that ignoring calling-context led to a 50% increase in average slice size and, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service learning in software engineering and maintenance

    Publication Year: 2003
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    We discuss a service-learning program called EPICS (engineering projects in community service). More specifically, we describe an effort to incorporate EPICS within computer science and computer engineering curricula at Purdue University and Butler University, respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving hardware, software, and training deployment processes

    Publication Year: 2003, Page(s):377 - 380
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    In this study, we reviewed the deployment practices of selected PEO-STAMIS (Program Executive Office − Standard Management Information System) product managers to better understand the state of the practice within the portfolio of the program executive office. To understand the state of the art in industry and provide a basis of comparison, we examined the practices of government and commerc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models for the evolution of OS projects

    Publication Year: 2003, Page(s):65 - 74
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Software evolution and maintenance is largely based on data gathered through years of experience: understanding and improving software is often a matter of how much data is available. Open source software offers the opportunity to analyze closely all the phases in the evolution of a project. What's more, data regarding its evolution is generally available for inspections. Based on simply code anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding architectural support in industry

    Publication Year: 2003, Page(s):348 - 357
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Software architecture plays a vital role in the development (and hence maintenance) of large complex systems with a long lifetime. It is therefore required that the software architecture is also maintained, i.e. sufficiently documented, clearly communicated, and explicitly controlled. In our experience, these requirements cannot be met without appropriate support. Commercial-off-the-shelf support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the nature of software evolution

    Publication Year: 2003, Page(s):83 - 93
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Over the past several years, we have been developing methods of measuring the change characteristics of evolving software systems. Not all changes to software systems are equal. Some changes to these systems are very small and have low impact on the system as a whole. Other changes are substantial and have a very large impact of the fault proneness of the complete system. In this study we will ide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QuaTrace: a tool environment for (semi-) automatic impact analysis based on traces

    Publication Year: 2003, Page(s):246 - 255
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Cost estimation of changes to software systems is often inaccurate and implementation of changes is time consuming, cost intensive, and error prone. One reason for these problems is that relationships between documentation entities (e.g., between different requirements) are not documented at all or only incompletely. In this paper, we describe a constructive approach to support later changes to so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving software maintenance by using agent-based remote maintenance shell

    Publication Year: 2003, Page(s):440 - 449
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    The paper deals with a method developed for software maintenance called remote maintenance shell. It allows software installation, modification and verification on the remote target system without suspending its regular operation. The method is based on remote operations performed by mobile agents. The role of remote maintenance shell in software maintenance is elaborated, as well as its architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On modeling software architecture recovery as graph matching

    Publication Year: 2003, Page(s):224 - 234
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    This paper presents a graph matching model for the software architecture recovery problem. Because of their expressiveness, the graphs have been widely used for representing both the software system and its high-level view, known as the conceptual architecture. Modeling the recovery process as graph matching is an attempt to identify a sub-optimal transformation from a pattern graph, representing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving tolerant grammars from a base-line grammar

    Publication Year: 2003, Page(s):179 - 188
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    A grammar-based approach to tool development in reengineering and reverse engineering promises precise structure awareness, but it is problematic in two respects. Firstly, it is a considerable up-front investment to obtain a grammar for a relevant language or cocktail of languages. Existing work on grammar recovery addresses this concern to some extent. Secondly, it is often not feasible to insist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic architectural flexibility

    Publication Year: 2003, Page(s):389 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Most projects commit to a set of required features and (at best) a most-likely budget and schedule for developing them. This means that, even before the changes start coming, there is roughly a 50% chance that the most-likely budget and schedule are insufficient, and the project is headed for an overrun. Planning for change in a development project is essential. But how much should be invested in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression test selection based on intermediate code for virtual machines

    Publication Year: 2003, Page(s):420 - 429
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Regression testing is testing applied to software that has been modified. It basically entails re-testing the software with previous test cases to confirm that the modifications made to the software do not have an adverse effect. But re-executing all test cases is normally cost prohibitive, and thus much research has been done on selecting test cases from a test suite without compromising the reli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a versioning model for component-based software assembly

    Publication Year: 2003, Page(s):138 - 147
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, which deals with source code versioning, becomes insufficient in the world where most components are distributed in a binary form. This paper focuses on solving versioning issues in the SOFA/DCUP (software appliances/dynam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.