首页 > 最新文献

12th Working Conference on Reverse Engineering (WCRE'05)最新文献

英文 中文
Architecture recovery and abstraction from the perspective of processes 从过程的角度进行架构恢复和抽象
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.6
Qingshan Li, Hua Chu, Shengming Hu, Ping Chen, Zhao Yun
For the increasing complexity of software systems, the main work of software development, maintenance and evolution has been focused on the comprehension of the existing systems. In order to help users comprehend at all aspects and levels of a target system, it is necessary to reversely recover and abstract its high-level architecture, which can reflect the framework and holistic behavioral features of the software system. This paper deals with the problems of architecture recovery from the perspective of process. An approach of extracting process structure graph (PSG) from a target system is presented based on the features of the relations among processes on UNIX platform. First, the static code fragment of a dynamic process can be recognized, then a mapping algorithm that can identify the correspondence between the dynamic process ID and the static process module is given. On the basis of the algorithm, an incremental construction algorithm of PSG and a slicing algorithm for class structure in a process module are implemented respectively. The experimental results show that the extracted PSG is correct, effective and can reflect the high-level structure of the target system in detail at the process level.
随着软件系统复杂性的不断增加,软件开发、维护和演化的主要工作已经集中在对现有系统的理解上。为了帮助用户在各个方面和层次上理解目标系统,有必要对其高层架构进行反向恢复和抽象,以反映软件系统的框架和整体行为特征。本文从过程的角度探讨了体系结构恢复问题。基于UNIX平台上进程间关系的特点,提出了一种从目标系统中提取进程结构图的方法。首先对动态进程的静态代码片段进行识别,然后给出了动态进程ID与静态进程模块对应关系的映射算法。在此基础上,分别实现了PSG的增量构建算法和进程模块中类结构的切片算法。实验结果表明,所提取的PSG是正确、有效的,能够在过程层面上详细反映目标系统的高层结构。
{"title":"Architecture recovery and abstraction from the perspective of processes","authors":"Qingshan Li, Hua Chu, Shengming Hu, Ping Chen, Zhao Yun","doi":"10.1109/WCRE.2005.6","DOIUrl":"https://doi.org/10.1109/WCRE.2005.6","url":null,"abstract":"For the increasing complexity of software systems, the main work of software development, maintenance and evolution has been focused on the comprehension of the existing systems. In order to help users comprehend at all aspects and levels of a target system, it is necessary to reversely recover and abstract its high-level architecture, which can reflect the framework and holistic behavioral features of the software system. This paper deals with the problems of architecture recovery from the perspective of process. An approach of extracting process structure graph (PSG) from a target system is presented based on the features of the relations among processes on UNIX platform. First, the static code fragment of a dynamic process can be recognized, then a mapping algorithm that can identify the correspondence between the dynamic process ID and the static process module is given. On the basis of the algorithm, an incremental construction algorithm of PSG and a slicing algorithm for class structure in a process module are implemented respectively. The experimental results show that the extracted PSG is correct, effective and can reflect the high-level structure of the target system in detail at the process level.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Capturing nontrivial concerns in object-oriented software 捕获面向对象软件中的重要关注点
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.11
M. Trifu, Volker Kuttruff
Code that is scattered and tangled as a result of orthogonal concerns seriously hinders software maintenance and reuse. As OO decompositions are unable to cleanly encapsulate such orthogonal (cross-cutting) concerns simultaneously, new ideas and languages were devised to capture and encapsulate them. In this paper, we argue that the current leading approaches (AOP as it is understood in AspectJ and MDSOC), although a step forward in the right direction, have some serious limitations. We, then, propose a new conceptual model for encapsulating concerns identified in existing OO code, which we apply to an example taken from the Java Swing library. Our case study shows that our approach is able to capture cross-cutting concerns in a cleaner and more elegant fashion than current state of the art approaches.
由于正交关注点导致的代码分散和纠缠严重阻碍了软件的维护和重用。由于OO分解无法同时清晰地封装这种正交(横切)关注点,因此设计了新的思想和语言来捕获和封装它们。在本文中,我们认为当前领先的方法(在AspectJ和MDSOC中所理解的AOP)虽然在正确的方向上向前迈进了一步,但却有一些严重的局限性。然后,我们提出一个新的概念模型,用于封装在现有的OO代码中标识的关注点,我们将其应用到取自Java Swing库的一个示例中。我们的案例研究表明,我们的方法能够以一种比当前技术状态更清晰、更优雅的方式捕获横切关注点。
{"title":"Capturing nontrivial concerns in object-oriented software","authors":"M. Trifu, Volker Kuttruff","doi":"10.1109/WCRE.2005.11","DOIUrl":"https://doi.org/10.1109/WCRE.2005.11","url":null,"abstract":"Code that is scattered and tangled as a result of orthogonal concerns seriously hinders software maintenance and reuse. As OO decompositions are unable to cleanly encapsulate such orthogonal (cross-cutting) concerns simultaneously, new ideas and languages were devised to capture and encapsulate them. In this paper, we argue that the current leading approaches (AOP as it is understood in AspectJ and MDSOC), although a step forward in the right direction, have some serious limitations. We, then, propose a new conceptual model for encapsulating concerns identified in existing OO code, which we apply to an example taken from the Java Swing library. Our case study shows that our approach is able to capture cross-cutting concerns in a cleaner and more elegant fashion than current state of the art approaches.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131899451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Symbolic interpretation of legacy assembly language 遗留汇编语言的符号解释
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.31
J. Carette, P. K. Chowdhury
We apply static analysis and symbolic interpretation techniques to reverse engineer the semantics of legacy assembler code. We examine the case of IBM-1800 programs in detail. From the documented operational semantics of the IBM-1800, we simultaneously obtain an emulator and a symbolic analysis program. Augmented with some control flow information, we can use the symbolic analysis to provide both complete and generic semantics for some interesting code sequences.
我们应用静态分析和符号解释技术来逆向工程遗留汇编代码的语义。我们详细研究了IBM-1800程序的情况。从IBM-1800的操作语义文档中,我们同时获得了一个仿真器和一个符号分析程序。通过增加一些控制流信息,我们可以使用符号分析为一些有趣的代码序列提供完整的和通用的语义。
{"title":"Symbolic interpretation of legacy assembly language","authors":"J. Carette, P. K. Chowdhury","doi":"10.1109/WCRE.2005.31","DOIUrl":"https://doi.org/10.1109/WCRE.2005.31","url":null,"abstract":"We apply static analysis and symbolic interpretation techniques to reverse engineer the semantics of legacy assembler code. We examine the case of IBM-1800 programs in detail. From the documented operational semantics of the IBM-1800, we simultaneously obtain an emulator and a symbolic analysis program. Augmented with some control flow information, we can use the symbolic analysis to provide both complete and generic semantics for some interesting code sequences.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115347499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design pattern detection in Eiffel systems 艾菲尔系统中的设计模式检测
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.14
Wei Wang, Vassilios Tzerpos
The use of design patterns in a software system can provide strong indications about the rationale behind the system's design. As a result, automating the detection of design pattern instances could be of significant help to the process of reverse engineering large software systems. In this paper, we introduce DPVK (Design Pattern Verification toolKit), the first reverse engineering tool to detect pattern instances in Eiffel systems. DPVK is able to detect several different design patterns by examining both the static structure and the dynamic behaviour of a system written in Eiffel. We present three case studies that were performed to assess DPVK's effectiveness.
在软件系统中使用设计模式可以为系统设计背后的基本原理提供强有力的指示。因此,自动检测设计模式实例对大型软件系统的逆向工程过程有很大的帮助。在本文中,我们介绍了DPVK(设计模式验证工具包),这是第一个在Eiffel系统中检测模式实例的逆向工程工具。DPVK能够通过检查用Eiffel编写的系统的静态结构和动态行为来检测几种不同的设计模式。我们提出了三个案例研究,以评估DPVK的有效性。
{"title":"Design pattern detection in Eiffel systems","authors":"Wei Wang, Vassilios Tzerpos","doi":"10.1109/WCRE.2005.14","DOIUrl":"https://doi.org/10.1109/WCRE.2005.14","url":null,"abstract":"The use of design patterns in a software system can provide strong indications about the rationale behind the system's design. As a result, automating the detection of design pattern instances could be of significant help to the process of reverse engineering large software systems. In this paper, we introduce DPVK (Design Pattern Verification toolKit), the first reverse engineering tool to detect pattern instances in Eiffel systems. DPVK is able to detect several different design patterns by examining both the static structure and the dynamic behaviour of a system written in Eiffel. We present three case studies that were performed to assess DPVK's effectiveness.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Enhancing security using legality assertions 使用合法性断言增强安全性
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.36
Lei Wang, J. Cordy, T. Dean
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large overhead and false warnings. The approach described in this paper uses legality assertions, source code assertions inserted before each subscript and pointer dereference that explicitly check that the referencing expression actually specifies a location within the array or object pointed at run time. A transformation system is developed to analyze a program and annotate it with appropriate assertions automatically. This approach detects buffer vulnerabilities in both stack and heap memory as well as potential buffer overflows in library functions. Runtime checking through using automatically inferred assertions considerably enhances the accuracy and efficiency of buffer overflow detection. A number of example buffer overflow-exploiting C programs are used to demonstrate the effectiveness of this approach.
在过去十年中,缓冲区溢出是最常见的安全漏洞形式。已经提出了许多技术来解决此类攻击。有些限制只保护堆栈上的返回地址;其他一些更通用,但具有不希望的属性,例如大开销和错误警告。本文所描述的方法使用合法性断言、在每个下标之前插入的源代码断言和指针解引用来显式检查引用表达式是否实际上指定了在运行时指向的数组或对象中的位置。开发了一个转换系统,可以自动对程序进行分析,并用适当的断言对程序进行注释。这种方法检测堆栈和堆内存中的缓冲区漏洞,以及库函数中潜在的缓冲区溢出。通过使用自动推断的断言进行运行时检查,大大提高了缓冲区溢出检测的准确性和效率。使用了一些利用缓冲区溢出的C程序示例来演示这种方法的有效性。
{"title":"Enhancing security using legality assertions","authors":"Lei Wang, J. Cordy, T. Dean","doi":"10.1109/WCRE.2005.36","DOIUrl":"https://doi.org/10.1109/WCRE.2005.36","url":null,"abstract":"Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large overhead and false warnings. The approach described in this paper uses legality assertions, source code assertions inserted before each subscript and pointer dereference that explicitly check that the referencing expression actually specifies a location within the array or object pointed at run time. A transformation system is developed to analyze a program and annotate it with appropriate assertions automatically. This approach detects buffer vulnerabilities in both stack and heap memory as well as potential buffer overflows in library functions. Runtime checking through using automatically inferred assertions considerably enhances the accuracy and efficiency of buffer overflow detection. A number of example buffer overflow-exploiting C programs are used to demonstrate the effectiveness of this approach.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116716786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Boxology of NBA and TA: a basis for understanding software architecture NBA和TA的盒子学:理解软件架构的基础
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.10
A. Malton, R. Holt
Box-and-arrow diagrams seem inevitable for presentation of software architecture; however, the term "boxology" often mocks their over-use, especially when informal. We introduce in this paper a formal boxology to serve as a semantic domain for graph-based software architecture representation languages: the nested boxes and arrows (NBA) model. NBA graphs use commonly-adopted features of structure diagrams for software: boxes for objects, arrows for relations, attributes for values, and a containment hierarchy. NBA graphs are visualized using a number of conventions, and are transmitted in exchange languages such as GXL and TA. The NBA model is formalized as typed graphs with attributes and an identified spanning tree (containment). Meta-modeling is defined and formalized by schemas, which are also NBA graphs. The universal schema is defined. A number of tools have been developed to query, manipulate and visualize NBA graphs
框图和箭头图对于软件架构的表示似乎是不可避免的;然而,术语“boxology”经常嘲笑它们的过度使用,尤其是在非正式的时候。本文介绍了一种形式化的盒子学,作为基于图的软件体系结构表示语言的语义域:嵌套框与箭头(NBA)模型。NBA图形使用软件结构图的常用特性:方框表示对象,箭头表示关系,属性表示值,以及包含层次结构。NBA图表使用许多惯例进行可视化,并以GXL和TA等交换语言传输。NBA模型被形式化为带有属性和标识生成树(包含)的类型化图。元建模是由模式定义和形式化的,模式也是NBA图。定义了通用模式。已经开发了许多工具来查询、操作和可视化NBA图表
{"title":"Boxology of NBA and TA: a basis for understanding software architecture","authors":"A. Malton, R. Holt","doi":"10.1109/WCRE.2005.10","DOIUrl":"https://doi.org/10.1109/WCRE.2005.10","url":null,"abstract":"Box-and-arrow diagrams seem inevitable for presentation of software architecture; however, the term \"boxology\" often mocks their over-use, especially when informal. We introduce in this paper a formal boxology to serve as a semantic domain for graph-based software architecture representation languages: the nested boxes and arrows (NBA) model. NBA graphs use commonly-adopted features of structure diagrams for software: boxes for objects, arrows for relations, attributes for values, and a containment hierarchy. NBA graphs are visualized using a number of conventions, and are transmitted in exchange languages such as GXL and TA. The NBA model is formalized as typed graphs with attributes and an identified spanning tree (containment). Meta-modeling is defined and formalized by schemas, which are also NBA graphs. The universal schema is defined. A number of tools have been developed to query, manipulate and visualize NBA graphs","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Source versus object code extraction for recovering software architecture 用于恢复软件架构的源代码与目标代码提取
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.30
A. Hassan, Z. Jiang, R. Holt
The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an up to date view of the architecture could be recovered from the system's implementation. Source code or object code extractors may be used to recover the architecture. In this paper, we explore using two types of extractors (source code and object code extractors) to recover the architecture of several large open source systems. We then investigate the differences between the results produced by these extractors to gain a better understanding of the benefits and limitations of each type of extractor. Our experimental results show that both types of extractors have their benefits and limitations. For example, an object code extractor is easier to implement while a source code extractor recovers more dependencies that exist in the source code as seen by developers.
许多大型软件系统的架构很少有文档记录,即使有文档记录,也通常是过时的。为了支持开发人员维护和发展这些系统,可以从系统实现中恢复架构的最新视图。可以使用源代码或目标代码提取器来恢复体系结构。在本文中,我们探索了使用两种类型的提取器(源代码和目标代码提取器)来恢复几个大型开源系统的体系结构。然后,我们研究了这些提取器产生的结果之间的差异,以更好地了解每种提取器的优点和局限性。实验结果表明,两种提取器各有优缺点。例如,目标代码提取器更容易实现,而源代码提取器可以恢复开发人员所看到的源代码中存在的更多依赖关系。
{"title":"Source versus object code extraction for recovering software architecture","authors":"A. Hassan, Z. Jiang, R. Holt","doi":"10.1109/WCRE.2005.30","DOIUrl":"https://doi.org/10.1109/WCRE.2005.30","url":null,"abstract":"The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an up to date view of the architecture could be recovered from the system's implementation. Source code or object code extractors may be used to recover the architecture. In this paper, we explore using two types of extractors (source code and object code extractors) to recover the architecture of several large open source systems. We then investigate the differences between the results produced by these extractors to gain a better understanding of the benefits and limitations of each type of extractor. Our experimental results show that both types of extractors have their benefits and limitations. For example, an object code extractor is easier to implement while a source code extractor recovers more dependencies that exist in the source code as seen by developers.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multiple layer clustering of large software systems 大型软件系统的多层聚类
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.24
Bill Andreopoulos, Aijun An, Vassilios Tzerpos, Xiaogang Wang
Software clustering algorithms presented in the literature rarely incorporate in the clustering process dynamic information, such as the number of function invocations during runtime. Moreover, the structure of a software system is often multi-layered, while existing clustering algorithms often create flat system decompositions. This paper presents a software clustering algorithm called MULICsoft that incorporates in the clustering process both static and dynamic information. MULICsoft produces layered clusters with the core elements of each cluster assigned to the top layer. We present experimental results of applying MULICsoft to a large open-source system. Comparison with existing software clustering algorithms indicates that MULICsoft is able to produce decompositions that are close to those created by system experts.
文献中提出的软件聚类算法很少在聚类过程中包含动态信息,如运行时函数调用的次数。此外,软件系统的结构往往是多层的,而现有的聚类算法往往造成扁平的系统分解。本文提出了一种将静态和动态信息结合在聚类过程中的软件聚类算法MULICsoft。MULICsoft生成分层集群,每个集群的核心元素分配到顶层。我们给出了将MULICsoft应用于大型开源系统的实验结果。与现有软件聚类算法的比较表明,MULICsoft能够产生接近系统专家创建的分解。
{"title":"Multiple layer clustering of large software systems","authors":"Bill Andreopoulos, Aijun An, Vassilios Tzerpos, Xiaogang Wang","doi":"10.1109/WCRE.2005.24","DOIUrl":"https://doi.org/10.1109/WCRE.2005.24","url":null,"abstract":"Software clustering algorithms presented in the literature rarely incorporate in the clustering process dynamic information, such as the number of function invocations during runtime. Moreover, the structure of a software system is often multi-layered, while existing clustering algorithms often create flat system decompositions. This paper presents a software clustering algorithm called MULICsoft that incorporates in the clustering process both static and dynamic information. MULICsoft produces layered clusters with the core elements of each cluster assigned to the top layer. We present experimental results of applying MULICsoft to a large open-source system. Comparison with existing software clustering algorithms indicates that MULICsoft is able to produce decompositions that are close to those created by system experts.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Architecture-Driven Modernization (ADM) 架构驱动的现代化(ADM)
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.7
P. Newcomb
The today’s diffusion of web services and service– oriented architecture is posing the basis for radical changes in the way of developing, evolving and testing software systems. This tutorial outlines some main research challenges on this topic, and provides guidelines and practical solutions for i) realizing service–oriented systems able to support QoS-aware dynamic binding ii) helping the comprehension of service–oriented systems and iii) testing service– oriented systems.
当今网络服务和面向服务的体系结构的扩散为软件系统的开发、发展和测试方式的根本变化奠定了基础。本教程概述了该主题的一些主要研究挑战,并为以下方面提供了指导和实用的解决方案:1)实现能够支持qos感知动态绑定的面向服务系统;2)帮助理解面向服务系统;3)测试面向服务系统。
{"title":"Architecture-Driven Modernization (ADM)","authors":"P. Newcomb","doi":"10.1109/WCRE.2005.7","DOIUrl":"https://doi.org/10.1109/WCRE.2005.7","url":null,"abstract":"The today’s diffusion of web services and service– oriented architecture is posing the basis for radical changes in the way of developing, evolving and testing software systems. This tutorial outlines some main research challenges on this topic, and provides guidelines and practical solutions for i) realizing service–oriented systems able to support QoS-aware dynamic binding ii) helping the comprehension of service–oriented systems and iii) testing service– oriented systems.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116829848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Workshop on Code Based Software Security Assessments (CoBaSSA 2005) 基于程式码的软件保安评估工作坊(CoBaSSA 2005)
Pub Date : 2005-11-07 DOI: 10.1109/WCRE.2005.34
L. Moonen, S. Mancoridis
Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
提供教程演示的摘要和演示者的简短专业简介。完整的报告没有作为会议记录的一部分提供出版。
{"title":"Workshop on Code Based Software Security Assessments (CoBaSSA 2005)","authors":"L. Moonen, S. Mancoridis","doi":"10.1109/WCRE.2005.34","DOIUrl":"https://doi.org/10.1109/WCRE.2005.34","url":null,"abstract":"Provides an abstract of the tutorial presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.","PeriodicalId":119724,"journal":{"name":"12th Working Conference on Reverse Engineering (WCRE'05)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2005-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
12th Working Conference on Reverse Engineering (WCRE'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1