2011 IEEE 11th International Working Conference on Source Code Analysis and Manipulation 2011
DOI: 10.1109/scam.2011.5
|View full text |Cite
|
Sign up to set email alerts
|

I2SD: Reverse Engineering Sequence Diagrams from Enterprise Java Beans with Interceptors

Abstract: Abstract-An Enterprise JavaBeans (EJB) interceptor is a software mechanism that provides for introducing behavior implemented as separate code into the execution of a Java application. In this way EJB interceptors provide a clear separation of the core functionality of the bean and other concerns, such as logging or performance analysis. Despite the beauty of the idea behind the interceptors, developing, testing and managing dependencies introduced by the interceptors are considered to be daunting tasks. For e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 23 publications
1
10
0
Order By: Relevance
“…Out of 323 014 methods that could possibly have been intercepted, only 5057 ( ≃ 1.57%) methods were intercepted. This result seems to support the finding of our previous study [27] stating that the use of interceptors is usually limited to a relatively small part of the software system. Closer inspection of the data reveals, however, a slightly different picture: † 19 systems did not include intercepted methods at all.…”
Section: Business Methods Interceptors In Practicesupporting
confidence: 91%
“…Out of 323 014 methods that could possibly have been intercepted, only 5057 ( ≃ 1.57%) methods were intercepted. This result seems to support the finding of our previous study [27] stating that the use of interceptors is usually limited to a relatively small part of the software system. Closer inspection of the data reveals, however, a slightly different picture: † 19 systems did not include intercepted methods at all.…”
Section: Business Methods Interceptors In Practicesupporting
confidence: 91%
“…Working with GlassFish Bob has learned that it is possible to expose all interfaces of a bean as local business interfaces by adding the Local annotation with no arguments, and used this to his advantage. Charlotte, Bob's senior, wants to gain more understanding of the application Bob is developing by calculating business-method-based metrics (Roubtsov et al, 2013). The metric tool she uses presents alarming results when analysing Bob's application.…”
Section: Discussionmentioning
confidence: 99%
“…However, this research focused on sequence diagram reconstruction for EJB-based applications with interceptors and also merely reported on the discrepancies rather than presenting an approach for the systematic discovery of those. As opposed to reconstructing a sequence diagram for one business method (Serebrenik et al, 2009), subsequent research on reverse engineering sequence diagrams for EJB-based applications with interceptors (Roubtsov et al, 2011;Roubtsov et al, 2013) advocated interceptor-based metric (scenario depth) and large-scale empirical studies of the interceptor use. Specifically, for large-scale empirical studies of the use of business method interceptors one first has to identify all business methods within a given project as only invocations of business methods can be intercepted by business method interceptors.…”
Section: Related Workmentioning
confidence: 99%
“…Reverse engineering SysML sequence and activity diagrams from the source code can be considered similarly to [18] [30]. Furthermore, model-based development using automotive ADLs is a young field, where the language specification or metamodel of architectural models evolve in short period of time, which causes model co-evolution problem.…”
Section: Discussionmentioning
confidence: 99%