ASSESSING MODULARIZATION AND CODE SCAVENGING TECHNIQUES

被引:4
作者
CANFORA, G [1 ]
CIMITILE, A [1 ]
VISAGGIO, G [1 ]
机构
[1] UNIV BARI, DIPARTIMENTO INFORMAT, BARI, ITALY
来源
JOURNAL OF SOFTWARE MAINTENANCE-RESEARCH AND PRACTICE | 1995年 / 7卷 / 05期
关键词
LEGAGY SYSTEMS; MODULARIZATION; REENGINEERING; MAINTENANCE; TECHNOLOGY TRANSFER;
D O I
10.1002/smr.4360070504
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The destiny of legacy software is a relevant economic problem. Many companies are experiencing the friction that legacy systems oppose to the change and growth of their business. Nevertheless, these systems cannot be simply discarded and replaced with new ones developed according to the new organization requirements. Existing systems record a great deal of knowledge and expertise used to set up solutions to real problems in different application domains and it is imperative that this knowledge must not be lost, partly because it may not be recorded anywhere else than in the code. This paper discusses the problems related to the modularization of legacy systems, with the emphasis being placed on the automation of code scavenging. It is argued that a balance must be struck between the modularization of legacy code, and the production of reusable, easy-to-evolve modules. The paper provides a framework for examining system modularization methods and identifies a set of attributes that define their quality. An overview of modularization techniques is presented, and an evaluation is made to assess their strength and identify and understand their major limitations. Finally, an attempt is made to identify techniques and tools that are mature enough to be transferred from research laboratories to industry.
引用
收藏
页码:317 / 331
页数:15
相关论文
共 20 条
[1]  
Benedusi P., 1989, Proceedings: Conference on Software Maintenance (Cat. No.89CH2744-1), P180, DOI 10.1109/ICSM.1989.65208
[2]  
CANFORA G, 1994, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P424, DOI 10.1109/ICSM.1994.336752
[3]  
Canfora G., 1993, Proceedings. Conference on Software Maintenance 1993. CSM-93 (Cat. No.93CH3360-5), P200, DOI 10.1109/ICSM.1993.366942
[4]  
Canfora G., 1993, Proceedings IEEE Second Workshop on Program Comprehension (Cat. No.93TH0551-2), P36, DOI 10.1109/WPC.1993.263908
[5]  
Canfora G., 1994, Proceedings of the 20th EUROMICRO Conference. EUROMICRO 94. System Architecture and Integration, P140, DOI 10.1109/EURMIC.1994.390396
[6]   A LOGIC-BASED APPROACH TO REVERSE ENGINEERING TOOLS PRODUCTION [J].
CANFORA, G ;
CIMITILE, A ;
DECARLINI, U .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (12) :1053-1064
[7]  
CANFORA G, 1993, 5TH P INT C SOFTW EN, P507
[8]   SOFTWARE SALVAGING AND THE CALL DOMINANCE TREE [J].
CIMITILE, A ;
VISAGGIO, G .
JOURNAL OF SYSTEMS AND SOFTWARE, 1995, 28 (02) :117-127
[9]  
DUNN MF, 1994, P INT C SOFTWARE ENG, P381
[10]   USING TOOL ABSTRACTION TO COMPOSE SYSTEMS [J].
GARLAN, D ;
KAISER, GE ;
NOTKIN, D .
COMPUTER, 1992, 25 (06) :30-38