Initial Recommendations for Improving Maintenance Strategy

  • Elizabeth Burd
  • Malcolm Munro
  • Sonata Pakötienš

Abstract

Chapter 7 investigates how the study of evolutionary trends can be used to assist the maintenance process. A number of different techniques are used; this includes call, file and data analysis. The results of each of these techniques are investigated by using versions of four different industrial applications. The results of the analysis process are analysed in detail. Finally, initial recommendations are made, based on the analysis process of how maintenance interventions can be improved.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Anquetil99]
    Anquetil N., Lethbridge T.C. “Experiments with Clustering as a Software Remodularization Method”, IEEE Sixth Working Conference on Reverse Engineering, pp. 235–255, 1999.Google Scholar
  2. [Burd96a]
    Burd E.L., Munro M., Wezeman C, “Analysing Large COBOL Programs: the extraction of reusable modules”, published in Proceedings of the International Conference on Software Maintenance, California, IEEE Press, 1996.Google Scholar
  3. [Burd96b]
    Burd E.L., Munro M., Wezeman C, “Extracting Reuseable Modules from Legacy Code: Considering issues of module granularity”, published in Proceedings of the 3rd Working Conference on Reverse Engineering, California, IEEE Press, 1996.Google Scholar
  4. [Burd97a]
    Burd E.L., Munro M., “Enriching Program Comprhension for Software Reuse”, published in the Proceedings of the International Workshop on Program Comprehension: IWPC 97, IEEE Press 1997.Google Scholar
  5. [Burd97b]
    Burd E.L., Munro M., “Investigating the Maintenance Implications of the Replication of Code”, to be published in the Proceeedings of the International Conference on Software Maintenance; ICSM′97, IEEE Press 1997.Google Scholar
  6. [Burd97c]
    Burd E.L., Munro M., “The Implication of Non-functional Requirements for the Reengineering of Legacy Code”, published in Proceedings of the 4th Working Conference on Reverse Engineering, Amsterdam, IEEE Press, 1997.Google Scholar
  7. [Burd98a]
    Burd E.L., Munro M., “Examining Software Evolution to Support Re-engineering of Legacy Code”, published in the Proceedings of the International Workshop on the Principle of Software Evolution, 1998.Google Scholar
  8. [Burd99a]
    Burd E.L., “A method for remodularising legacy code”, PhD Thesis, University of Durham, 1999.Google Scholar
  9. [Burd99b]
    Burd E.L., Munro M., “An initial approach towards measuring and characterising software evolution” published within the Proceedings of the Working Conference on Reverse Engineering; WCRE99, Atlanta, IEEE Press, 1999.Google Scholar
  10. [Canfora95]
    Canfora G., Cimitile A., Visaggio G.,“Assessing Modularization and Code Scavenging Techniques”, Journal of Software Maintenance, Vol. 7, No. 5, October 1995.Google Scholar
  11. [Chikofsky90]
    Chikofsky E., Cross J., “Reverse Engineering and Design Recovery — a taxonomy”, IEEE Software, 1990.Google Scholar
  12. [Cimitile97]
    Cimitile A., De Lucia A., Di Lucca G.A. Fasolino A.R., “Identifying Objects in Legacy Systems”, International Workshop on Program Comprehension’, IEEE Press 1997.Google Scholar
  13. [Everitt93]
    Everitt B.S. “Cluster Analysis”, Edward Arnold, ISBN 0-340-584793, 1993.Google Scholar
  14. [Girard97]
    Girard J-F., Koschke R., “Finding Components in a Hierarchy of Modules: a step towards architectural understanding”, International Conference on Software Maintenance’, IEEE Press, 1997.Google Scholar
  15. [Henderson00]
    Henderson P., (ed.) “Systems engineering for business process change”, Springer 2000, ISBN 1-85233-222-0.Google Scholar
  16. [Lakhotia97]
    Lakhotia A., “A Unified Framework For Expressing Software Subsystem Classification Techniques”, Journal of Systems and Software, 36:211–231, 1997.CrossRefGoogle Scholar
  17. [Mancoridis98]
    Mancoridis S., Mitchell B.S., Rorres C, Chen Y., Gansner E.R. “Using Automatic Clustering to Produce High-Level System Organisations of Source Code”, IEEE International Workshop on Program Comprehension, pp. 45–52, 1998.Google Scholar
  18. [Mancoridis99]
    Mancoridis S., Mitchell B.S., Chen Y. Gansner E.R., “Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures”, IEEE International Conference on Software Maintenance, pp. 50–59, 1999.Google Scholar
  19. [Sneath73]
    Sneath P.H.A., Sokal R.R., “Numerical Taxonomy”, W. H. Freeman and Sons, ISBN: 0-7167-0697-0, 1973.Google Scholar
  20. [Standish84]
    Standish T.A., “An Essay on Software Reuse”, IEEE Transactions on Software Engineering, Vol. 10, No. 5, September 1984.Google Scholar
  21. [Tracz87]
    Tracz W, “Ada reusability efforts: a survey of the state of the practice” Proceedings of the fifth National Conference on Ada technology, Arlingtion Va., March 1987.Google Scholar
  22. [Wiggerts97]
    Wiggerts T.A., “Using Clustering Algorithms in Legacy Systems Remodularization”, Fourth Working Conference on Reverse Engineering, pp. 33–43, 1997.Google Scholar

Copyright information

© Springer-Verlag London 2002

Authors and Affiliations

  • Elizabeth Burd
  • Malcolm Munro
  • Sonata Pakötienš

There are no affiliations available

Personalised recommendations