2013
DOI: 10.1007/s40568-013-0037-x
|View full text |Cite
|
Sign up to set email alerts
|

Reengineering of Component-Based Software Systems in the Presence of Design Deficiencies – An Overview

Abstract: In reengineering, up-to-date architecture models are important artifacts to get an overview of a system and to plan and execute the necessary reengineering activities. If such models do not exist, software architecture reconstruction (SAR) techniques can be used to recover them from the system's source code. However, design deficiencies like Interface Violations can influence the architecture reconstruction and thereby adulterate the recovered architecture. This is currently not addressed by SAR approaches. Ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…We showed in our previous work that the presence of design deficiencies in the code can influence the metric values and therefore the clustering results [58,59]. The CTT Metric introduced in this section identifies components for whom one of the aggregated metric values was close to the merging or composition threshold, i.e., the metric value was just high enough to merge or compose the component candidate (or just low enough to discard it, respectively).…”
Section: Closeness To Threshold Metricmentioning
confidence: 99%
See 2 more Smart Citations
“…We showed in our previous work that the presence of design deficiencies in the code can influence the metric values and therefore the clustering results [58,59]. The CTT Metric introduced in this section identifies components for whom one of the aggregated metric values was close to the merging or composition threshold, i.e., the metric value was just high enough to merge or compose the component candidate (or just low enough to discard it, respectively).…”
Section: Closeness To Threshold Metricmentioning
confidence: 99%
“…For example, for the design deficiency Interface Violation [59], the metrics Class Locations, Number of External Accesses, and High Interface Adherence are used. These metrics are explained in detail in [41,58].…”
Section: Communication Via Data Classes Metricmentioning
confidence: 99%
See 1 more Smart Citation