Identifying objects in legacy systems using design metrics

被引:29
作者
Cimitile, A
De Lucia, A
Di Lucca, GA
Fasolino, AR
机构
[1] Univ Sannio, Fac Engn, I-82100 Benevento, Italy
[2] Univ Naples Federico II, Dipartimento Informat & Sistemist, I-80125 Naples, Italy
[3] Univ Bari, Dipartimento Informat, I-70125 Bari, Italy
关键词
D O I
10.1016/S0164-1212(98)10057-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed against salvaging strategies. The incremental migration of procedurally oriented systems to object-oriented platforms seems to be a feasible approach, although it must be considered as risky as redevelopment. This approach uses reverse engineering activities to abstract an object-oriented model from legacy code. The paper presents a method for decomposing legacy systems into objects. The identification of objects is centred around persistent data stores, such as files or tables in the database, while programs and routines are candidates for implementing the object methods. Associating the methods to the objects is achieved by optimising selected object-oriented design metrics. The rationale behind this choice is that the object-oriented decomposition of a legacy system should not result in a poor design, as this would make the re-engineered system more difficult to maintain. (C) 1999 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:199 / 211
页数:13
相关论文
共 45 条
[1]  
ACHEE AL, 1994, P 3 IEEE WORKSH PROG, P4
[2]  
[Anonymous], 1989, BUZANDARAN PATMUTIWN, P77
[3]   SYSTEM PARTITIONING AND ITS MEASURE [J].
BELADY, LA ;
EVANGELISTI, CJ .
JOURNAL OF SYSTEMS AND SOFTWARE, 1981, 2 (01) :23-29
[4]   PROGRAM UNDERSTANDING AND THE CONCEPT ASSIGNMENT PROBLEM [J].
BIGGERSTAFF, TJ ;
MITBANDER, BG ;
WEBSTER, DE .
COMMUNICATIONS OF THE ACM, 1994, 37 (05) :72-83
[5]  
BREUER PT, 1993, J SOFTWARE MAINTENAN, V5, P13
[6]  
Calliss F. W., 1990, Proceedings. Conference on Software Maintenance 1990 (Cat. No.90CH2921-5), P46, DOI 10.1109/ICSM.1990.131321
[7]  
Canfora G, 1996, SOFTWARE PRACT EXPER, V26, P25, DOI 10.1002/(SICI)1097-024X(199601)26:1<25::AID-SPE994>3.0.CO
[8]  
2-T
[9]   ASSESSING MODULARIZATION AND CODE SCAVENGING TECHNIQUES [J].
CANFORA, G ;
CIMITILE, A ;
VISAGGIO, G .
JOURNAL OF SOFTWARE MAINTENANCE-RESEARCH AND PRACTICE, 1995, 7 (05) :317-331
[10]  
Canfora G., 1993, Proceedings of Working Conference on Reverse Engineering (Cat. No.93TH0534-8), P73, DOI 10.1109/WCRE.1993.287777