{"title":"Workshop Introduction Astrenet Aspect Analysis","authors":"M. Harman, S. Black, P. Tonella","doi":"10.1109/WCRE.2006.56","DOIUrl":"https://doi.org/10.1109/WCRE.2006.56","url":null,"abstract":"AAA 2006 is the first Astrenet Aspect Analysis workshop, a workshop that brings together the Aspect Oriented Software Development community and the community currently gathered under the ASTReNet network namely: Program Analysis, Slicing and Transformation. The workshop, held in Benevento, Italy, brings together these two groups to listen to expert researchers, panelists and keynotes and to discuss state-of-the-art tools, techniques and ideas from both industry and academia to both consolidate pre-existing research and inspire new research ideas.","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116857687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massimo Colosimo, A. D. Lucia, G. Scanniello, G. Tortora
{"title":"MELIS: an Eclipse Based Environment for the Migration of Legacy Systems to the Web","authors":"Massimo Colosimo, A. D. Lucia, G. Scanniello, G. Tortora","doi":"10.1109/WCRE.2006.34","DOIUrl":"https://doi.org/10.1109/WCRE.2006.34","url":null,"abstract":"In this demonstration, we present MELIS (migration environment for legacy information systems) an integrated environment for the migration of legacy systems to a multi-tier Web-based architecture. This environment has been developed as an Eclipse plug-in to support the software engineer in the migration of the graphical user interface, and in the restructuring and wrapping of the original legacy code","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"419 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern-based Reengineering of Software Systems","authors":"Matthias Meyer","doi":"10.1109/WCRE.2006.42","DOIUrl":"https://doi.org/10.1109/WCRE.2006.42","url":null,"abstract":"The described approach supports the detection of anti pattern implementations in source code. Thus, it can be used for the evaluation of existing software in the planning stage of reengineering activities. In addition, the approach supports the actual reengineering by facilitating the improvement of anti pattern instances by transformations and the verification of those transformations","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125390299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment","authors":"Anthony Cox, Trevor J. Smedley","doi":"10.1109/WCRE.2006.49","DOIUrl":"https://doi.org/10.1109/WCRE.2006.49","url":null,"abstract":"In this report, we detail our experiences in performing a reverse engineering task in an adversarial environment. When source code developers are required by law, but not by spirit, to permit their code to be reverse engineered, several factors increase in significance. Specifically, when examining source code to detect patent infringement on behalf of a plaintiff, examiners face a more challenging situation due to the actions of the defendants. We describe our experiences in such a situation and document the factors that aided and impeded the process","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Refactoring Detection based on UMLDiff Change-Facts Queries","authors":"Zhenchang Xing, Eleni Stroulia","doi":"10.1109/WCRE.2006.48","DOIUrl":"https://doi.org/10.1109/WCRE.2006.48","url":null,"abstract":"Refactoring is an important activity in the evolutionary development of object-oriented software systems. Several IDEs today support the automated application of some refactorings; at the same time, there is substantial on-going research aimed at developing support for deciding when and how software should be refactored and for estimating the effect of the refactoring on the quality requirements of the software. On the other hand, understanding the refactorings in the evolutionary history of a software system is essential in understanding its design rationale. Yet, only very limited support exists for detecting refactorings. In this paper, we present our approach for detecting refactorings by analyzing the system evolution at the design level. We evaluate our method with case studies, examining two realistic examples of object-oriented software","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Control Flow Graphs for Crosscutting Concerns","authors":"J. Krinke","doi":"10.1109/WCRE.2006.37","DOIUrl":"https://doi.org/10.1109/WCRE.2006.37","url":null,"abstract":"Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adoption to an aspect-oriented design. This paper describes an automatic static aspect mining approach, where the control flow graphs of a program are investigated for recurring execution patterns based on different constraints, such as the requirement that the patterns have to exist in different calling contexts. A case study done with the implemented tool shows that most discovered crosscutting candidates are instances of crosscutting delegation and should not be refactored into aspects","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems","authors":"M. Fischer, H. Gall","doi":"10.1109/WCRE.2006.26","DOIUrl":"https://doi.org/10.1109/WCRE.2006.26","url":null,"abstract":"Structural analyses frequently fall short in an adequate representation of historical changes for retrospective analysis. By compounding the two underlying information spaces in a single approach, the comprehension about the interaction between evolving requirements and system development can be improved significantly. We therefore propose a lightweight approach based on release history data and source code changes, which first selects entities with evolutionary outstanding characteristics and then indicates their structural dependencies via commonly used source code entities. The resulting data sets and visualizations aim at a holistic view to point out and assess structural stability, recurring modifications, or changes in the dependencies of the file-sets under inspection. In this paper we describe our approach and its results in terms of the Mozilla case study. Our approach completes typical release history mining and source code analysis approaches, therefore past restructuring events, new, shifted, and removed dependencies can be spotted easily","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Lormans, H. Groß, A. Deursen, R. Solingen, A. Stehouwer
{"title":"Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study","authors":"M. Lormans, H. Groß, A. Deursen, R. Solingen, A. Stehouwer","doi":"10.1109/WCRE.2006.38","DOIUrl":"https://doi.org/10.1109/WCRE.2006.38","url":null,"abstract":"Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the process for reconstructing these views, and built a tool, ReqAnalyst, to support this method. In this paper, we investigate to what extent we can automatically generate requirements views to monitor requirements in test categories and test cases. The technique used for retrieving the necessary data is an information retrieval technique called latent semantic indexing (LSI). We applied our method in a case study at LogicaCMG. We defined a number of requirements views and experimented with different reconstruction settings to generate these views","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Engineering of System Interfaces A Report from the Field","authors":"H. Sneed, Stephan H. Sneed","doi":"10.1109/WCRE.2006.50","DOIUrl":"https://doi.org/10.1109/WCRE.2006.50","url":null,"abstract":"This paper is a report on three real industrial projects conducted to redocument the system interfaces of existing application systems - trading system, a health insurance system and a bank credit system. The first reverse engineering project was for the purpose of accessing the backend C server software from Web clients. The second project was for the purpose of testing the interfaces between COBOL subsystems running parallel in two interconnected environments - computer and a Bull mainframe. The third project was to extract procedures from existing PL/I programs for reuse as Web services. The lessons learned from the three projects are assessed to draw conclusions on how to improve the development process","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Reverse Engineering using System Dependency Graphs","authors":"Anthony Cleve, J. Henrard, Jean-Luc Hainaut","doi":"10.1109/WCRE.2006.22","DOIUrl":"https://doi.org/10.1109/WCRE.2006.22","url":null,"abstract":"Data reverse engineering (DRE) is a complex and costly process that requires a deep understanding of large data-intensive software systems. This process can be made easier with the use of program understanding methods and tools. In this paper, we focus on the program slicing technique and we show how it can be adapted to support DRE. We present a DML-independent SDG construction approach involving the analysis of database operations as a first stage. We describe a tool based upon this approach and we report on two industrial DRE projects","PeriodicalId":306640,"journal":{"name":"2006 13th Working Conference on Reverse Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}