首页 > 最新文献

11th Working Conference on Reverse Engineering最新文献

英文 中文
Aspect mining through the formal concept analysis of execution traces 方面挖掘通过形式化的概念分析执行轨迹
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.13
P. Tonella, M. Ceccato
The presence of crosscutting concerns, i.e., functionalities that are not assigned to a single modular unit in the implementation, is one of the major problems in software understanding and evolution. In fact, they are hard to locate (scattering) and may give rise to multiple ripple effects (tangling). Aspect oriented programming offers mechanisms to factor them out into a modular unit, called an aspect. Aspect identification in existing code is supported by means of dynamic code analysis. Execution traces are generated for the use cases that exercise the main functionalities of the given application. The relationship between execution traces and executed computational units (class methods) is subjected to concept analysis. In the resulting lattice, potential aspects are detected by determining the use-case specific concepts and examining their specific computational units. When these come from multiple modules (classes) which contribute to multiple use-cases, a candidate aspect is recognized.
横切关注点的存在,例如,在实现中没有分配给单个模块单元的功能,是软件理解和发展中的主要问题之一。事实上,它们很难定位(散射),并可能产生多重涟漪效应(缠结)。面向方面的编程提供了将它们分解成一个称为方面的模块化单元的机制。通过动态代码分析,支持现有代码中的方面识别。为执行给定应用程序的主要功能的用例生成执行跟踪。执行轨迹和执行的计算单元(类方法)之间的关系是概念分析的对象。在生成的晶格中,通过确定特定于用例的概念并检查其特定的计算单元来检测潜在的方面。当这些方面来自多个模块(类),这些模块(类)构成多个用例时,就会识别出一个候选方面。
{"title":"Aspect mining through the formal concept analysis of execution traces","authors":"P. Tonella, M. Ceccato","doi":"10.1109/WCRE.2004.13","DOIUrl":"https://doi.org/10.1109/WCRE.2004.13","url":null,"abstract":"The presence of crosscutting concerns, i.e., functionalities that are not assigned to a single modular unit in the implementation, is one of the major problems in software understanding and evolution. In fact, they are hard to locate (scattering) and may give rise to multiple ripple effects (tangling). Aspect oriented programming offers mechanisms to factor them out into a modular unit, called an aspect. Aspect identification in existing code is supported by means of dynamic code analysis. Execution traces are generated for the use cases that exercise the main functionalities of the given application. The relationship between execution traces and executed computational units (class methods) is subjected to concept analysis. In the resulting lattice, potential aspects are detected by determining the use-case specific concepts and examining their specific computational units. When these come from multiple modules (classes) which contribute to multiple use-cases, a candidate aspect is recognized.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115505558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 218
Loop squashing transformations for amorphous slicing 非晶切片的循环压缩变换
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.26
Lin Hu, M. Harman, R. Hierons, D. Binkley
Program slicing is a source code extraction technique that can be used to support reverse engineering by automatically extracting executable subprograms that preserve some aspect of the original program's semantics. Although minimal slices are not generally computable, safe approximate algorithms can be used to good effect. However, the precision of such slicing algorithms is a major factor in determining the value of slicing for reverse engineering. Amorphous slicing has been proposed as a way of reducing the size of a slice. Amorphous slices preserve the aspect of semantic interest, but not the syntax that denotes it, making them generally smaller than their syntactically restricted counterparts. Amorphous slicing is suitable for many reverse engineering applications, since reverse engineering typically abandons the existing syntax to facilitate structural improvements. Previous work on amorphous slicing has not attempted to exploit its potential to apply loop-squashing transformations. This paper presents an algorithm for amorphous slicing of loops, which identifies induction variables, transformation rule templates and iteration-determining compile-time expressions. The algorithm uses these to squash certain loops into conditional assignments. The paper also presents an inductive proof of the rule templates and illustrates the application of the algorithm with a detailed example of loop squashing.
程序切片是一种源代码提取技术,可以通过自动提取保留原始程序语义某些方面的可执行子程序来支持逆向工程。虽然最小切片通常是不可计算的,但安全的近似算法可以得到很好的效果。然而,这种切片算法的精度是决定切片在逆向工程中价值的主要因素。无定形切片被提出作为一种减小切片尺寸的方法。无定形切片保留了语义感兴趣的方面,但不保留表示它的语法,这使得它们通常比语法受限制的同类更小。非晶切片适用于许多逆向工程应用,因为逆向工程通常放弃现有的语法以促进结构改进。以前关于非晶切片的工作并没有试图利用其应用循环压缩变换的潜力。本文提出了一种无定形循环切片算法,该算法能够识别归纳变量、转换规则模板和确定迭代的编译时表达式。算法使用这些变量将某些循环压缩成条件赋值。本文还对规则模板进行了归纳证明,并以循环压缩为例说明了该算法的应用。
{"title":"Loop squashing transformations for amorphous slicing","authors":"Lin Hu, M. Harman, R. Hierons, D. Binkley","doi":"10.1109/WCRE.2004.26","DOIUrl":"https://doi.org/10.1109/WCRE.2004.26","url":null,"abstract":"Program slicing is a source code extraction technique that can be used to support reverse engineering by automatically extracting executable subprograms that preserve some aspect of the original program's semantics. Although minimal slices are not generally computable, safe approximate algorithms can be used to good effect. However, the precision of such slicing algorithms is a major factor in determining the value of slicing for reverse engineering. Amorphous slicing has been proposed as a way of reducing the size of a slice. Amorphous slices preserve the aspect of semantic interest, but not the syntax that denotes it, making them generally smaller than their syntactically restricted counterparts. Amorphous slicing is suitable for many reverse engineering applications, since reverse engineering typically abandons the existing syntax to facilitate structural improvements. Previous work on amorphous slicing has not attempted to exploit its potential to apply loop-squashing transformations. This paper presents an algorithm for amorphous slicing of loops, which identifies induction variables, transformation rule templates and iteration-determining compile-time expressions. The algorithm uses these to squash certain loops into conditional assignments. The paper also presents an inductive proof of the rule templates and illustrates the application of the algorithm with a detailed example of loop squashing.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117066273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Fingerprinting design patterns 指纹设计图案
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.21
Yann-Gaël Guéhéneuc, H. Sahraoui, Farouk Zaidi
Design patterns describe good solutions to common and recurring problems in program design. The solutions are design motifs which software engineers imitate and introduce in the architecture of their program. It is important to identify the design motifs used in a program architecture to understand solved design problems and to make informed changes to the program. The identification of micro-architectures similar to design motifs is difficult because of the large search space, i.e., the many possible combinations of classes. We propose an experimental study of classes playing roles in design motifs using metrics and a machine learning algorithm to fingerprint design motifs roles. Fingerprints are sets of metric values characterising classes playing a given role. We devise fingerprints experimentally using a repository of micro-architectures similar to design motifs. We show that fingerprints help in reducing the search space of micro-architectures similar to design motifs efficiently using the Composite design motif and the JHotDraw framework.
设计模式描述了程序设计中常见问题和反复出现问题的良好解决方案。解决方案是软件工程师在其程序体系结构中模仿和引入的设计主题。识别程序体系结构中使用的设计主题,以理解已解决的设计问题,并对程序进行明智的更改,这一点非常重要。由于搜索空间大,即类的许多可能组合,因此识别类似于设计主题的微体系结构是困难的。我们提出了一项实验研究,使用度量和机器学习算法来指纹设计图案角色,在设计图案中扮演角色。指纹是一组度量值,用来描述扮演给定角色的类。我们使用类似于设计图案的微架构库来设计指纹实验。使用复合设计基序和JHotDraw框架,指纹有助于有效地减少与设计基序相似的微架构的搜索空间。
{"title":"Fingerprinting design patterns","authors":"Yann-Gaël Guéhéneuc, H. Sahraoui, Farouk Zaidi","doi":"10.1109/WCRE.2004.21","DOIUrl":"https://doi.org/10.1109/WCRE.2004.21","url":null,"abstract":"Design patterns describe good solutions to common and recurring problems in program design. The solutions are design motifs which software engineers imitate and introduce in the architecture of their program. It is important to identify the design motifs used in a program architecture to understand solved design problems and to make informed changes to the program. The identification of micro-architectures similar to design motifs is difficult because of the large search space, i.e., the many possible combinations of classes. We propose an experimental study of classes playing roles in design motifs using metrics and a machine learning algorithm to fingerprint design motifs roles. Fingerprints are sets of metric values characterising classes playing a given role. We devise fingerprints experimentally using a repository of micro-architectures similar to design motifs. We show that fingerprints help in reducing the search space of micro-architectures similar to design motifs efficiently using the Composite design motif and the JHotDraw framework.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
Model-driven business process recovery 模型驱动的业务流程恢复
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.30
Ying Zou, Terence C. Lau, K. Kontogiannis, Tack Tong, Ross McKegney
A business process attempts to encapsulate the delivery of a sequence of tasks, typically starting from accepting a service request and ending at certain points, such as the completion of the service. We propose a model-driven business process recovery framework that captures the essential functional features representing a business process. The framework utilizes static tracing techniques and a number of heuristics to map source code entities to high-level business process entities. A case study is preformed to recover IBM/spl reg/ WebSphere/spl reg/ Business Integration business processes from IBM WebSphere Commerce code. The experimental result demonstrates the effectiveness of the proposed framework.
业务流程试图封装一系列任务的交付,通常从接受服务请求开始,并在某些点结束,例如服务完成。我们提出了一个模型驱动的业务流程恢复框架,该框架捕获表示业务流程的基本功能特征。该框架利用静态跟踪技术和许多启发式方法将源代码实体映射到高级业务流程实体。通过一个案例研究,从IBM WebSphere Commerce代码中恢复IBM/spl reg/ WebSphere/spl reg/ Business Integration业务流程。实验结果证明了该框架的有效性。
{"title":"Model-driven business process recovery","authors":"Ying Zou, Terence C. Lau, K. Kontogiannis, Tack Tong, Ross McKegney","doi":"10.1109/WCRE.2004.30","DOIUrl":"https://doi.org/10.1109/WCRE.2004.30","url":null,"abstract":"A business process attempts to encapsulate the delivery of a sequence of tasks, typically starting from accepting a service request and ending at certain points, such as the completion of the service. We propose a model-driven business process recovery framework that captures the essential functional features representing a business process. The framework utilizes static tracing techniques and a number of heuristics to map source code entities to high-level business process entities. A case study is preformed to recover IBM/spl reg/ WebSphere/spl reg/ Business Integration business processes from IBM WebSphere Commerce code. The experimental result demonstrates the effectiveness of the proposed framework.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Insights into system-wide code duplication 洞察系统范围内的代码复制
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.25
M. Rieger, Stéphane Ducasse, Michele Lanza
Duplication of code is a common phenomenon in the development and maintenance of large software systems. The detection and removal of duplicated code has become a standard activity during the refactoring phases of a software life-cycle. However, code duplication identification tends to produce large amounts of data making the understanding of the duplication situation as a whole difficult. Reengineers can easily lose sight of the forest for the trees. There is a need to support a qualitative analysis of the duplicated code. We propose a number of visualizations of duplicated source elements that support reengineers in answering questions, e.g., which parts of the system are connected by copied code or which parts of the system are copied the most.
在大型软件系统的开发和维护中,代码重复是一种常见的现象。在软件生命周期的重构阶段,检测和删除重复代码已经成为一项标准活动。然而,代码重复识别往往会产生大量的数据,这使得从整体上理解重复情况变得困难。再造工程师很容易只见树木不见森林。有必要支持对重复代码进行定性分析。我们提出了许多复制源元素的可视化,这些元素支持重构工程师回答问题,例如,系统的哪些部分由复制的代码连接,或者系统的哪些部分被复制得最多。
{"title":"Insights into system-wide code duplication","authors":"M. Rieger, Stéphane Ducasse, Michele Lanza","doi":"10.1109/WCRE.2004.25","DOIUrl":"https://doi.org/10.1109/WCRE.2004.25","url":null,"abstract":"Duplication of code is a common phenomenon in the development and maintenance of large software systems. The detection and removal of duplicated code has become a standard activity during the refactoring phases of a software life-cycle. However, code duplication identification tends to produce large amounts of data making the understanding of the duplication situation as a whole difficult. Reengineers can easily lose sight of the forest for the trees. There is a need to support a qualitative analysis of the duplicated code. We propose a number of visualizations of duplicated source elements that support reengineers in answering questions, e.g., which parts of the system are connected by copied code or which parts of the system are copied the most.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Virus analysis: techniques, tools, and research issues tutorial 病毒分析:技术、工具和研究问题教程
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.44
Arun Lakhotia, Prashant Pathak
The tutorial covers techniques, tools, and research issues in analyzing computer viruses. It provides participants the background needed to initiate research in reverse engineering computer viruses.
本教程涵盖分析计算机病毒的技术、工具和研究问题。它为参与者提供了启动计算机病毒逆向工程研究所需的背景知识。
{"title":"Virus analysis: techniques, tools, and research issues tutorial","authors":"Arun Lakhotia, Prashant Pathak","doi":"10.1109/WCRE.2004.44","DOIUrl":"https://doi.org/10.1109/WCRE.2004.44","url":null,"abstract":"The tutorial covers techniques, tools, and research issues in analyzing computer viruses. It provides participants the background needed to initiate research in reverse engineering computer viruses.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128357254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XIRC: a kernel for cross-artifact information engineering in software development environments XIRC:软件开发环境中用于跨工件信息工程的内核
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.45
Michael Eichberg, M. Mezini, K. Ostermann, Thorsten Schäfer
We describe XIRC, a tool and architecture that enables to define queries over a uniform representation of all artifacts of a software project. These queries can be used for general cross-artifact information retrieval or for more special applications like checking implementation restrictions or conformance to style guides. XIRC is also a good basis to implement a broad range of tools for refactoring, generators, aspect-oriented programming and many other domains on top of it.
我们将描述XIRC,它是一种工具和体系结构,能够在软件项目的所有工件的统一表示上定义查询。这些查询可用于一般的跨工件信息检索或更特殊的应用程序,如检查实现限制或样式指南的一致性。XIRC也是实现重构、生成器、面向方面编程和许多其他领域工具的良好基础。
{"title":"XIRC: a kernel for cross-artifact information engineering in software development environments","authors":"Michael Eichberg, M. Mezini, K. Ostermann, Thorsten Schäfer","doi":"10.1109/WCRE.2004.45","DOIUrl":"https://doi.org/10.1109/WCRE.2004.45","url":null,"abstract":"We describe XIRC, a tool and architecture that enables to define queries over a uniform representation of all artifacts of a software project. These queries can be used for general cross-artifact information retrieval or for more special applications like checking implementation restrictions or conformance to style guides. XIRC is also a good basis to implement a broad range of tools for refactoring, generators, aspect-oriented programming and many other domains on top of it.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132586423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Exploring software evolution using spectrographs 利用摄谱仪探索软件进化
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.20
Jingwei Wu, R. Holt, A. Hassan
Software systems become progressively more complex and difficult to maintain. To facilitate maintenance tasks, project managers and developers often turn to the evolution history of the system to recover various kinds of useful information, such as anomalous phenomena and lost design decisions. An informative visualization of the evolution history can help cope with this complexity by highlighting conspicuous evolution events using strong visual cues. We present a scalable visualization technique called evolution spectrographs (ESG). An evolution spectrograph portrays the evolution of a spectrum of components based on a particular property measurement. We describe several special-purpose spectrographs and discuss their use in understanding and supporting software evolution through the case studies of three large software systems (OpenSSH, KOffice and FreeBSD).
软件系统变得越来越复杂,越来越难以维护。为了方便维护任务,项目经理和开发人员经常转向系统的演化历史,以恢复各种有用的信息,例如异常现象和丢失的设计决策。信息可视化的进化历史可以帮助处理这种复杂性,通过突出突出明显的进化事件使用强烈的视觉线索。我们提出了一种可扩展的可视化技术,称为演化光谱仪(ESG)。演化谱仪描绘了基于特定性质测量的组分光谱的演化。我们描述了几个特殊用途的光谱仪,并通过三个大型软件系统(OpenSSH, KOffice和FreeBSD)的案例研究讨论了它们在理解和支持软件进化中的用途。
{"title":"Exploring software evolution using spectrographs","authors":"Jingwei Wu, R. Holt, A. Hassan","doi":"10.1109/WCRE.2004.20","DOIUrl":"https://doi.org/10.1109/WCRE.2004.20","url":null,"abstract":"Software systems become progressively more complex and difficult to maintain. To facilitate maintenance tasks, project managers and developers often turn to the evolution history of the system to recover various kinds of useful information, such as anomalous phenomena and lost design decisions. An informative visualization of the evolution history can help cope with this complexity by highlighting conspicuous evolution events using strong visual cues. We present a scalable visualization technique called evolution spectrographs (ESG). An evolution spectrograph portrays the evolution of a spectrum of components based on a particular property measurement. We describe several special-purpose spectrographs and discuss their use in understanding and supporting software evolution through the case studies of three large software systems (OpenSSH, KOffice and FreeBSD).","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127340408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
A novel software visualisation model to support software comprehension 一种支持软件理解的新型软件可视化模型
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.7
M. J. Pacione, M. Roper, M. Wood
Current software visualisation tools do not address the full range of software comprehension requirements. This paper proposes a novel software visualisation model for supporting object-oriented software comprehension that is intended to address the shortcomings of existing tools. We discuss the previous work that prompted us to develop this model. An initial model is then presented, based on multiple levels of abstraction, multiple perspectives of the software system, and the integration of statically and dynamically extracted information. We review the evaluation tasks used in our previous work and those from the software visualisation and comprehension literature to produce a refined set of evaluation tasks. We then use these tasks to perform an initial assessment of the proposed model. The refined model is then defined more formally. Finally, a concrete example of the use of the model to generate abstraction hierarchies is discussed. We conclude that a visualisation model incorporating a hierarchy of interrelated abstraction levels, combined with structural and behavioural perspectives of the software, will provide effective support for software comprehension.
当前的软件可视化工具不能处理软件理解需求的全部范围。本文提出了一种新的软件可视化模型,用于支持面向对象的软件理解,旨在解决现有工具的缺点。我们讨论了促使我们开发此模型的先前工作。然后,基于多个抽象层次、软件系统的多个透视图以及静态和动态提取信息的集成,提出了一个初始模型。我们回顾了在我们以前的工作中使用的评估任务,以及那些来自软件可视化和理解文献的评估任务,以产生一组精细的评估任务。然后,我们使用这些任务来执行提议的模型的初始评估。然后更正式地定义精化的模型。最后,讨论了使用该模型生成抽象层次的具体示例。我们的结论是,一个可视化模型结合了相互关联的抽象层次的层次,结合了软件的结构和行为观点,将为软件理解提供有效的支持。
{"title":"A novel software visualisation model to support software comprehension","authors":"M. J. Pacione, M. Roper, M. Wood","doi":"10.1109/WCRE.2004.7","DOIUrl":"https://doi.org/10.1109/WCRE.2004.7","url":null,"abstract":"Current software visualisation tools do not address the full range of software comprehension requirements. This paper proposes a novel software visualisation model for supporting object-oriented software comprehension that is intended to address the shortcomings of existing tools. We discuss the previous work that prompted us to develop this model. An initial model is then presented, based on multiple levels of abstraction, multiple perspectives of the software system, and the integration of statically and dynamically extracted information. We review the evaluation tasks used in our previous work and those from the software visualisation and comprehension literature to produce a refined set of evaluation tasks. We then use these tasks to perform an initial assessment of the proposed model. The refined model is then defined more formally. Finally, a concrete example of the use of the model to generate abstraction hierarchies is discussed. We conclude that a visualisation model incorporating a hierarchy of interrelated abstraction levels, combined with structural and behavioural perspectives of the software, will provide effective support for software comprehension.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
A static reference flow analysis to understand design pattern behavior 一个静态参考流分析来理解设计模式的行为
Pub Date : 2004-11-08 DOI: 10.1109/WCRE.2004.9
Chanjin Park, Yoohoon Kang, Chisu Wu, K. Yi
Design patterns are actively used by developers expecting that they provide the design with good quality such as flexibility and reusability. However, according to industrial reports on the use of design patterns, the expectation is not always realized . Especially, points out two causes of inappropriately applied patterns from a case study on a large commercial project: developers inexperienced in design patterns and no connection with project requirement. Wrong decisions on the use of design patterns make the program difficult to understand, and refactoring the program to improve the underlying structure, especially without documentation, can be very tricky. To eliminate wrongly applied patterns or document important decisions automatically, design pattern recovery is important for not only the development phase but also the maintenance phase. Many design pattern recovery approaches focus on structural characteristics and do not touch set-up behavior that configures links between participants and precedes pattern behavior. To detect design patterns implemented in program code more precisely and to show their behavior, we analyze program at expression level. Our approach is based on statically approximating run time behavior among pattern participants. For this, a static program analysis technique is used. Many static analysis techniques for object-oriented languages exist mainly for optimizing compiler in program analysis area.
设计模式被开发人员积极使用,他们希望设计模式能够提供高质量的设计,比如灵活性和可重用性。然而,根据关于设计模式使用的行业报告,期望并不总是实现。特别地,从一个大型商业项目的案例研究中指出了模式应用不当的两个原因:开发人员在设计模式方面缺乏经验,与项目需求没有联系。使用设计模式的错误决策使程序难以理解,重构程序以改进底层结构(尤其是在没有文档的情况下)可能非常棘手。为了消除错误应用的模式或自动记录重要决策,设计模式恢复不仅对开发阶段很重要,对维护阶段也很重要。许多设计模式恢复方法侧重于结构特征,而不涉及配置参与者之间的链接并先于模式行为的设置行为。为了更精确地检测程序代码中实现的设计模式并显示它们的行为,我们在表达式级别对程序进行分析。我们的方法基于静态地近似模式参与者之间的运行时行为。为此,使用了静态程序分析技术。许多面向对象语言的静态分析技术主要用于程序分析领域的编译器优化。
{"title":"A static reference flow analysis to understand design pattern behavior","authors":"Chanjin Park, Yoohoon Kang, Chisu Wu, K. Yi","doi":"10.1109/WCRE.2004.9","DOIUrl":"https://doi.org/10.1109/WCRE.2004.9","url":null,"abstract":"Design patterns are actively used by developers expecting that they provide the design with good quality such as flexibility and reusability. However, according to industrial reports on the use of design patterns, the expectation is not always realized . Especially, points out two causes of inappropriately applied patterns from a case study on a large commercial project: developers inexperienced in design patterns and no connection with project requirement. Wrong decisions on the use of design patterns make the program difficult to understand, and refactoring the program to improve the underlying structure, especially without documentation, can be very tricky. To eliminate wrongly applied patterns or document important decisions automatically, design pattern recovery is important for not only the development phase but also the maintenance phase. Many design pattern recovery approaches focus on structural characteristics and do not touch set-up behavior that configures links between participants and precedes pattern behavior. To detect design patterns implemented in program code more precisely and to show their behavior, we analyze program at expression level. Our approach is based on statically approximating run time behavior among pattern participants. For this, a static program analysis technique is used. Many static analysis techniques for object-oriented languages exist mainly for optimizing compiler in program analysis area.","PeriodicalId":443491,"journal":{"name":"11th Working Conference on Reverse Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
11th Working Conference on Reverse Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1