2006 13th Working Conference on Reverse Engineering最新文献

筛选
英文 中文
Workshop Introduction Astrenet Aspect Analysis 工作坊简介:星象分析
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.56
M. Harman, S. Black, P. Tonella
{"title":"Workshop Introduction Astrenet Aspect Analysis","authors":"M. Harman, S. Black, P. Tonella","doi":"10.1109/WCRE.2006.56","DOIUrl":"https://doi.org/10.1109/WCRE.2006.56","url":null,"abstract":"AAA 2006 is the first Astrenet Aspect Analysis workshop, a workshop that brings together the Aspect Oriented Software Development community and the community currently gathered under the ASTReNet network namely: Program Analysis, Slicing and Transformation. The workshop, held in Benevento, Italy, brings together these two groups to listen to expert researchers, panelists and keynotes and to discuss state-of-the-art tools, techniques and ideas from both industry and academia to both consolidate pre-existing research and inspire new research ideas.","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116857687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the Web MELIS:用于将遗留系统迁移到Web的基于Eclipse的环境
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.34
Massimo Colosimo, A. D. Lucia, G. Scanniello, G. Tortora
{"title":"MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the Web","authors":"Massimo Colosimo, A. D. Lucia, G. Scanniello, G. Tortora","doi":"10.1109/WCRE.2006.34","DOIUrl":"https://doi.org/10.1109/WCRE.2006.34","url":null,"abstract":"In this demonstration, we present MELIS (migration environment for legacy information systems) an integrated environment for the migration of legacy systems to a multi-tier Web-based architecture. This environment has been developed as an Eclipse plug-in to support the software engineer in the migration of the graphical user interface, and in the restructuring and wrapping of the original legacy code","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pattern-based Reengineering of Software Systems 基于模式的软件系统再造
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.42
Matthias Meyer
{"title":"Pattern-based Reengineering of Software Systems","authors":"Matthias Meyer","doi":"10.1109/WCRE.2006.42","DOIUrl":"https://doi.org/10.1109/WCRE.2006.42","url":null,"abstract":"The described approach supports the detection of anti pattern implementations in source code. Thus, it can be used for the evaluation of existing software in the planning stage of reengineering activities. In addition, the approach supports the actual reengineering by facilitating the improvement of anti pattern instances by transformations and the verification of those transformations","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125390299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment 支持诉讼的逆向工程:在对抗环境中的经验
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.49
Anthony Cox, Trevor J. Smedley
{"title":"Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment","authors":"Anthony Cox, Trevor J. Smedley","doi":"10.1109/WCRE.2006.49","DOIUrl":"https://doi.org/10.1109/WCRE.2006.49","url":null,"abstract":"In this report, we detail our experiences in performing a reverse engineering task in an adversarial environment. When source code developers are required by law, but not by spirit, to permit their code to be reverse engineered, several factors increase in significance. Specifically, when examining source code to detect patent infringement on behalf of a plaintiff, examiners face a more challenging situation due to the actions of the defendants. We describe our experiences in such a situation and document the factors that aided and impeded the process","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Refactoring Detection based on UMLDiff Change-Facts Queries 基于UMLDiff变更事实查询的重构检测
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.48
Zhenchang Xing, Eleni Stroulia
{"title":"Refactoring Detection based on UMLDiff Change-Facts Queries","authors":"Zhenchang Xing, Eleni Stroulia","doi":"10.1109/WCRE.2006.48","DOIUrl":"https://doi.org/10.1109/WCRE.2006.48","url":null,"abstract":"Refactoring is an important activity in the evolutionary development of object-oriented software systems. Several IDEs today support the automated application of some refactorings; at the same time, there is substantial on-going research aimed at developing support for deciding when and how software should be refactored and for estimating the effect of the refactoring on the quality requirements of the software. On the other hand, understanding the refactorings in the evolutionary history of a software system is essential in understanding its design rationale. Yet, only very limited support exists for detecting refactorings. In this paper, we present our approach for detecting refactorings by analyzing the system evolution at the design level. We evaluate our method with case studies, examining two realistic examples of object-oriented software","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Mining Control Flow Graphs for Crosscutting Concerns 挖掘横切关注点的控制流图
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.37
J. Krinke
{"title":"Mining Control Flow Graphs for Crosscutting Concerns","authors":"J. Krinke","doi":"10.1109/WCRE.2006.37","DOIUrl":"https://doi.org/10.1109/WCRE.2006.37","url":null,"abstract":"Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adoption to an aspect-oriented design. This paper describes an automatic static aspect mining approach, where the control flow graphs of a program are investigated for recurring execution patterns based on different constraints, such as the requirement that the patterns have to exist in different calling contexts. A case study done with the implemented tool shows that most discovered crosscutting candidates are instances of crosscutting delegation and should not be refactored into aspects","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems EvoGraph:大型软件系统演化和结构分析的轻量级方法
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.26
M. Fischer, H. Gall
{"title":"EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems","authors":"M. Fischer, H. Gall","doi":"10.1109/WCRE.2006.26","DOIUrl":"https://doi.org/10.1109/WCRE.2006.26","url":null,"abstract":"Structural analyses frequently fall short in an adequate representation of historical changes for retrospective analysis. By compounding the two underlying information spaces in a single approach, the comprehension about the interaction between evolving requirements and system development can be improved significantly. We therefore propose a lightweight approach based on release history data and source code changes, which first selects entities with evolutionary outstanding characteristics and then indicates their structural dependencies via commonly used source code entities. The resulting data sets and visualizations aim at a holistic view to point out and assess structural stability, recurring modifications, or changes in the dependencies of the file-sets under inspection. In this paper we describe our approach and its results in terms of the Mozilla case study. Our approach completes typical release history mining and source code analysis approaches, therefore past restructuring events, new, shifted, and removed dependencies can be spotted easily","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.38
M. Lormans, H. Groß, A. Deursen, R. Solingen, A. Stehouwer
{"title":"Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study","authors":"M. Lormans, H. Groß, A. Deursen, R. Solingen, A. Stehouwer","doi":"10.1109/WCRE.2006.38","DOIUrl":"https://doi.org/10.1109/WCRE.2006.38","url":null,"abstract":"Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the process for reconstructing these views, and built a tool, ReqAnalyst, to support this method. In this paper, we investigate to what extent we can automatically generate requirements views to monitor requirements in test categories and test cases. The technique used for retrieving the necessary data is an information retrieval technique called latent semantic indexing (LSI). We applied our method in a case study at LogicaCMG. We defined a number of requirements views and experimented with different reconstruction settings to generate these views","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Reverse Engineering of System Interfaces A Report from the Field 系统接口的逆向工程——来自现场的报告
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.50
H. Sneed, Stephan H. Sneed
{"title":"Reverse Engineering of System Interfaces A Report from the Field","authors":"H. Sneed, Stephan H. Sneed","doi":"10.1109/WCRE.2006.50","DOIUrl":"https://doi.org/10.1109/WCRE.2006.50","url":null,"abstract":"This paper is a report on three real industrial projects conducted to redocument the system interfaces of existing application systems - trading system, a health insurance system and a bank credit system. The first reverse engineering project was for the purpose of accessing the backend C server software from Web clients. The second project was for the purpose of testing the interfaces between COBOL subsystems running parallel in two interconnected environments - computer and a Bull mainframe. The third project was to extract procedures from existing PL/I programs for reuse as Web services. The lessons learned from the three projects are assessed to draw conclusions on how to improve the development process","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Reverse Engineering using System Dependency Graphs 使用系统依赖图的数据逆向工程
2006 13th Working Conference on Reverse Engineering Pub Date : 2006-10-23 DOI: 10.1109/WCRE.2006.22
Anthony Cleve, J. Henrard, Jean-Luc Hainaut
{"title":"Data Reverse Engineering using System Dependency Graphs","authors":"Anthony Cleve, J. Henrard, Jean-Luc Hainaut","doi":"10.1109/WCRE.2006.22","DOIUrl":"https://doi.org/10.1109/WCRE.2006.22","url":null,"abstract":"Data reverse engineering (DRE) is a complex and costly process that requires a deep understanding of large data-intensive software systems. This process can be made easier with the use of program understanding methods and tools. In this paper, we focus on the program slicing technique and we show how it can be adapted to support DRE. We present a DML-independent SDG construction approach involving the analysis of database operations as a first stage. We describe a tool based upon this approach and we report on two industrial DRE projects","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信