2011 15th European Conference on Software Maintenance and Reengineering 2011
DOI: 10.1109/csmr.2011.66
|View full text |Cite
|
Sign up to set email alerts
|

Solutions for Reverse Engineering 4GL Applications, Recovering the Design of a Logistical Wholesale System

Abstract: Re-engineering a legacy software system to support new, modern technologies instead of old ones is not an easy task, especially for large systems with a complex architecture. The use of reverse engineering tools is crucial for different subtasks of the full process, such as re-documenting the old code or recovering its design. There are many tools available to assist developers, but most of these tools were designed to deal with third generation languages (e.g. Java, C, C++, C#). However, many large systems ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(21 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…The maintenance of Magic applications is supported by cost estimation and quality analysis methods [14,15,9]. Architectural analysis, reverse engineering and optimization are visible topics in the Magic community [16,17,3,2], and after some years of Magic development migration to object-oriented languages [18] as well.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The maintenance of Magic applications is supported by cost estimation and quality analysis methods [14,15,9]. Architectural analysis, reverse engineering and optimization are visible topics in the Magic community [16,17,3,2], and after some years of Magic development migration to object-oriented languages [18] as well.…”
Section: Related Workmentioning
confidence: 99%
“…Usual notions of size, complexity and coupling need to be re-interpreted in these cases. Building on previous works on metrics based quality assurance for 4GL [2,3] we take new direction to extend metrics towards product line architectures. Maintaining and releasing similar new products accumulates significant overhead over time.…”
Section: Introductionmentioning
confidence: 99%
“…The implementation of our method for Magic xpa is based on several existing tools. First of all, we use a reverse engineering tool set to access the source files of Magic xpa applications, which was implemented in a previous work of Nagy et al [17]. This toolset was able to analyze magic programs and produce the ASG.…”
Section: Related Workmentioning
confidence: 99%
“…The process starts with the application of the Magic2ASG tool [17] on the source files of the program under test. This tool extracts important information about the actual application by examining its XML based source code.…”
Section: The Magic Test Processmentioning
confidence: 99%
“…We should add here, that most of the presented approaches had a real industrial motivation, allowing us to validate our methods in 'in vivo', industrial environment. Innovation projects sponsored by the European Union also rely on the results of our work [129,132]. In addition, the reverse engineering framework for Magic motivated research studies for the National Scientific Students' Associations Conference.…”
Section: Related Work Chapter 7 Static Security Analysismentioning
confidence: 96%