1999
DOI: 10.1145/318774.319262
|View full text |Cite
|
Sign up to set email alerts
|

Transitioning legacy assets to a product line architecture

Abstract: Abstract.A successful software system evolves over time, but this evolution often occurs in an ad-hoc fashion. One approach to structure system evolution is the concept of software product lines where a core architecture supports a variety of application contexts. However, in practice, the high cost and high risks of redevelopment as well as the substantial investments made to develop the existing systems most often mandate significant leverage of the legacy assets. Yet, there is little guidance in the literat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…From a process and business perspective, researchers have developed approaches to reengineer existing systems into an integrated configurable system [7], [14], [49], [52]. These approaches include strategies to make decisions: when to mine, which assets to mine, and whom to involve.…”
Section: Related Workmentioning
confidence: 99%
“…From a process and business perspective, researchers have developed approaches to reengineer existing systems into an integrated configurable system [7], [14], [49], [52]. These approaches include strategies to make decisions: when to mine, which assets to mine, and whom to involve.…”
Section: Related Workmentioning
confidence: 99%
“…The decision depends on many influence factors, including many business and process considerations discussed elsewhere [5], [7], [27], [49], [55], [56]. Recently, She et al even explored extracting variability models from legacy code and other sources [54].…”
Section: Existing Support For Variability Miningmentioning
confidence: 99%
“…For example, if method declaration lock in our running example (target element) is annotated with feature locking whereas the corresponding method invocation in Line 7 (source element) is not annotated, a variant without feature locking would result in a method invocation that cannot be resolved. 5 Already when first experimenting with early versions of the type system over five years ago, we found using type errors for variability mining almost obvious. When annotating a code fragment, say method lock in Figure 1, with a feature, the type system immediately reports errors at all locations at which lock is invoked without the same feature annotation (Lines 7 and 12 in Fig.…”
Section: Type Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Bayer et al [19] propose the RE_MODEL method to integrate reengineering and product line activities in order to achieve a transition into product line architecture. A key element in the method is the blackboard, a work space which is shared for both activities that are done in parallel.…”
Section: Software Product Line Methodsmentioning
confidence: 99%