{"title":"Software maintenance: analysis of estimates based on requirement specification in the context of new technologies, a case study","authors":"J. C. Granja-Alvarez","doi":"10.1109/ICSM.2004.1357873","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357873","url":null,"abstract":"Making estimations in areas for which there is no previous experience is a difficult task, and even more so if its performance requires a historical data base (which does not yet exist). The problems involved in making estimates of developments for which very limited historical data are available (as is the case of new technologies) were taken into account in the present study of estimation inaccuracy. This study focuses on the crucial question of the specification of requirements, with regard to their application in the field of new technologies. Our estimation is based on the metrics of function points, which enable us to carry out a study without requiring prior information and which is perfectly compatible with the field of the measuring point, as mentioned in the new version of the COCOMO model.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132569539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Luo, Renkuan Jiang, Lu Zhang, Hong Mei, Jiasu Sun
{"title":"An experimental study of two graph analysis based component capture methods for object-oriented systems","authors":"Jing Luo, Renkuan Jiang, Lu Zhang, Hong Mei, Jiasu Sun","doi":"10.1109/ICSM.2004.1357824","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357824","url":null,"abstract":"The problem of how to partition a software system and thus capture its overall architecture and its constituent components has become a research focus in the community of software engineering. In the literature, many methods have been proposed for solving this problem. For example, both top-down and bottom-up methods based on analyzing the graph representation of software systems have been proposed. We report an experimental study of a top-down method and a bottom-up method. In our study, we focus on the capability of component capture, the capability of architecture recovery and the time complexity for the two methods. According to our results on two real world systems, the studied bottom-up method is superior to the studied top-down method in both aspects, although the time complexity of the bottom-up method remains a big concern for large systems.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fact extraction and code auditing with Columbus and SourceAudit","authors":"R. Ferenc, Árpád Beszédes, T. Gyimóthy","doi":"10.1109/ICSM.2004.1357858","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357858","url":null,"abstract":"Automatic fact extraction from software systems is the fundamental building block in the process of understanding the relationships among a system's elements. We demonstrate the reverse engineering framework called Columbus which is able to automatically extract facts from C++ source code and how the extracted facts can be used in practice. We also mention a special-purpose tool that was developed on top of the Columbus framework. This tool, called SourceAudit, is a code auditor that is able to investigate source code and check it against rules that describe the preferred properties of the code.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125300066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting global causality in testing of distributed and component-based applications","authors":"Jun Li, K. Moore","doi":"10.1109/ICSM.2004.1357869","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357869","url":null,"abstract":"A new approach to testing component-based applications is presented, which exploits the practice in component-based systems of generating stub/skeleton modules and using these stubs/skeletons to construct a global perspective of end-to-end causality of inter-component communication. This global causality is captured regardless of reentrancy, callbacks, thread and process boundaries, and unsynchronized clocks. The captured logs created from the interception points are used to construct a system-wide component interaction model that can expose the inter-component dependencies usually hidden in static analysis of application code. These discovered dependencies are used to create a test boundary for applying a component test harness for that component and the set of dependent components. Similarly, the discovered dependencies can be applied to pruning the available test cases to identify those cases that are best suited to exposing defects when one or more components are changed. A particular advantage of the approach has been the ability to isolate the sequence of events that led up to a crash or a deadlock condition and view the entire system behavior (not just a particular thread's perspective or a linear log of intercepted messages).","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Isnard, E. Perez, Radu Bercaru, Alexandra Galatescu, V. Florian, L. Costea, Dan Conescu, Alexandru Stanciu
{"title":"Integration, customization and maintenance of heterogeneous software with MECASP","authors":"E. Isnard, E. Perez, Radu Bercaru, Alexandra Galatescu, V. Florian, L. Costea, Dan Conescu, Alexandru Stanciu","doi":"10.1109/ICSM.2004.1357861","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357861","url":null,"abstract":"MECASP is a research prototype aiming at the integration, customization and maintenance of heterogeneous software (built with Java, relational DBMSs, tools for graphical interfaces, etc). It can further integrate and manage other types of applications like C++, VB, CORBA, EJB, .NET, etc. It enables the diffusion of the applications in ASP mode, but its use is not limited to the ASP market.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies for handling the activity problem in runtime software evolution by reducing activity","authors":"Jens Gustavsson","doi":"10.1109/ICSM.2004.1357867","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357867","url":null,"abstract":"Runtime software evolution means updating software systems while they are running, something that is useful for systems with high availability requirements. A method is active if it has been called and not yet finished its execution, i.e. it has an activation record on at least one method call stack. Activity is a problem when making runtime updates, since it must be decided how the activation records of updated methods shall be treated. When inactive methods are updated, it is reasonable to have the system run the version of the methods next time they are called. The main goal of this paper is to describe different strategies to reduce the activity and under which circumstances those strategies are viable. To do so we define some properties of active methods in order to facilitate an abstract view on different kinds of activity.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134236914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COSVAM: a technique for assessing software variability in software product families","authors":"S. Deelstra, Marco Sinnema, J. Nijhuis, J. Bosch","doi":"10.1109/ICSM.2004.1357835","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357835","url":null,"abstract":"Evolution of variability is a key factor in the successful exploitation of commonalities in software product families. Assessment of variability can be used to determine how the variability provided by a product family should evolve. We present COSVAM (COVAMOF software variability assessment method), a variability assessment technique that specifically addresses evolution of variability. We exemplify our approach with the Dacolian case study.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133243691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alternative scalable algorithms for lattice-based feature location","authors":"Wei Zhao, Lu Zhang, Dan Hao, Hong Mei, Jiasu Sun","doi":"10.1109/ICSM.2004.1357870","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357870","url":null,"abstract":"Considering the scalability of using formal concept analysis to locate features in source code, we present a set of alternative straightforward algorithms to achieve the same objectives. A preliminary experiment indicates that the alternative algorithms are more scalable to deal with the large numbers of data to some extent.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133630359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Abdelmoez, M. Shereshevsky, R. Gunnalan, H. Ammar, Bo Yu, S. Bogazzi, M. Korkmaz, A. Mili
{"title":"Software architectures change propagation tool (SACPT)","authors":"W. Abdelmoez, M. Shereshevsky, R. Gunnalan, H. Ammar, Bo Yu, S. Bogazzi, M. Korkmaz, A. Mili","doi":"10.1109/ICSM.2004.1357860","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357860","url":null,"abstract":"To assist the analysis software architectures, we have developed a Web-based CASE tool that automates the steps of capturing, modeling, and inspection of software architectures, in order to derive and display the change propagation probabilities.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120965614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Molhado: object-oriented architectural software configuration management","authors":"T. Nguyen, E. Munson, J. Boyland, C. Thao","doi":"10.1109/ICSM.2004.1357856","DOIUrl":"https://doi.org/10.1109/ICSM.2004.1357856","url":null,"abstract":"In this research demonstration, we describes Molhado, a research prototype of an architectural software configuration management (SCM) system that captures the evolution of system architecture, logical structures, and implementation source code in a natural and cohesive manner.","PeriodicalId":348668,"journal":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}