1993
DOI: 10.1002/smr.4360050402
|View full text |Cite
|
Sign up to set email alerts
|

A reverse‐engineering approach to subsystem structure identification

Abstract: Reverse‐engineering is the process of extracting system abstractions and design information out of existing software systems. This process involves the identification of software artefacts in a particular subject system, the exploration of how these artefacts interact with one another, and their aggregation to form more abstract system representations that facilitate program understanding. This paper describes our approach to creating higher‐level abstract representations of a subject system, which involves th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
130
0
4

Year Published

1998
1998
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 278 publications
(134 citation statements)
references
References 23 publications
0
130
0
4
Order By: Relevance
“…Rigi [25] also has a concept of omnipresent nodes, which is seemingly similar to the notion of Focus's domain classes. However, the two are defined and used in very different ways.…”
Section: Discussionmentioning
confidence: 99%
“…Rigi [25] also has a concept of omnipresent nodes, which is seemingly similar to the notion of Focus's domain classes. However, the two are defined and used in very different ways.…”
Section: Discussionmentioning
confidence: 99%
“…But the key problem is to choose the relevant set of criteria (or similarity metrics) (Wiggerts, 1997) with which the "natural" boundaries of components can be found. In the reverse-engineering literature, the similarity metrics range from the interconnection strength of RIGI (Muller et al, 1993) to the sophisticated information-theory based measurement of (Andritsos, Tzerpos, 2003, 2005, the information retrieval technique such as Latent Semantic Indexing (Marcus, 2004) or the kind of variables accessed in formal concept analysis (Siff, Reps, 1999) (Tonella, 2001). Then, based on such a similarity metric, an algorithm decides what element should be part of the same cluster (Mitchell, 2003).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, many techniques have been proposed to recover the high level architecture from legacy code. Although the early approaches dealt with the static analysis of the source code, such as the well known fan in and fan out metrics of RIGI (Muller et al, 1993), dynamic analysis techniques have recently attracted much interest in the academic community. The central idea behind these techniques is to execute the legacy software following its use-cases and harvest the time-ordered list of methods or functions that have been executed: the execution trace (Andritsos, Tzerpos, 2003).…”
Section: Introductionmentioning
confidence: 99%
“…Les auteurs des systèmes logiciels d'ingénierie inverse Rigi [58] FlG. 5.14 -Deux partitions Pi et Pi ayant le même graphe quotient GQ.…”
Section: Identifier Et Retirer Les Noeuds Omniprésentsunclassified