Proceedings of the 17th International Conference on Software Engineering - ICSE '95 1995
DOI: 10.1145/225014.225032
|View full text |Cite
|
Sign up to set email alerts
|

Reverse engineering to the architectural level

Abstract: Recovery of higher level "design" information and the ability to create dynamic, task adaptable software documentation is crucial to supporting a number of program understanding activities. This paper presents research that demonstrates that reverse engineering technology can be used to recover software architecture representations of source code.We have developed a framework that integrates reverse engineering technology and architectural style representations.Using the framework, analysts can recover custom,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
1

Year Published

1998
1998
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(34 citation statements)
references
References 16 publications
0
33
0
1
Order By: Relevance
“…Rigi used clustering to form cohesive subsystems [15]; Harris et al used clustering of files to support their bottom-up recovery process [16]; Sartipi et al used an approach based on association rule mining and clustering to recover system's architecture [17]. Unlike other software clustering tools, Bunch clustering system uses search techniques to perform clustering, which decomposes legacy system into subsystems by partitioning the entity and relation graph of the legacy code.…”
Section: Related Workmentioning
confidence: 99%
“…Rigi used clustering to form cohesive subsystems [15]; Harris et al used clustering of files to support their bottom-up recovery process [16]; Sartipi et al used an approach based on association rule mining and clustering to recover system's architecture [17]. Unlike other software clustering tools, Bunch clustering system uses search techniques to perform clustering, which decomposes legacy system into subsystems by partitioning the entity and relation graph of the legacy code.…”
Section: Related Workmentioning
confidence: 99%
“…This involves obtaining from the UML model a description similar to the one represented in an ADL, using either formal transformations [9] or various reverse engineering heuristics (e.g., [15]). …”
Section: Abstractionmentioning
confidence: 99%
“…This thesis is about the analysis of software quality attributes of existing systems using ARE. Several ARE approaches were already existing when we started our work in 1999, for example (Müller et al 1993, Krikhaar 1999, Harris et al 1995b, Eixelsberger et al 1998, Guo et al 1999, Bowman et al 1999. Our initial attention was on the DALI workbench ) and the Portable Book-shelf (Finnigan et al 1997).…”
Section: Chapter 1 Introductionmentioning
confidence: 99%