Close
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
Close
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
jump to main content
Search Details
Quicksearch:
OK
Result-List
Title
Title
Content
Content
Page
Page
Search Book
Detten, Markus von: Reengineering of component-based software systems in the presence of design deficiencies. 2013
Content
Introduction
Evolution of Business Information Systems
Reverse Engineering of Software Architectures
Problem Statement
Solution Overview
Application Scenarios
Scientific Contributions
Example System
Structure
Foundations and Related Work
Software Architecture Reconstruction
Terminology
Overview of the Methodology
Software Architecture Reconstruction in Archimetrix
Pattern Detection
Terminology
Overview of the Methodology
Pattern Detection in Archimetrix
Refactoring and Reengineering
Terminology
Reengineering in Archimetrix
Hybrid Reverse Engineering Approaches
Bad Smell Detection and Removal
Architecture Reengineering
Architecture Conformance Checking
Architecture Migration and Modernisation
Modularisation
Classification of the Archimetrix Approach
General Assumptions
Design Deficiencies
Types of Software Patterns
Describing Design Deficiencies
Running Example
Further Design Deficiencies
The Archimetrix Process
Contributions
Process Overview
Iterative Architecture Reconstruction
Design Deficiency Formalisation
Limitations
Influence of Deficiencies on the Architecture Reconstruction
Contributions
Reconstruction Process
Metrics
Strategies
Dependencies Between Metrics and Strategies
Influence of Design Deficiency Occurrences on the Metrics
Influence of the Transfer Object Ignorance Deficiency
Susceptibility of Different Metrics and Strategies
Influence of Other Design Deficiencies Occurrences
Result Model
Limitations
Conclusion
Component Relevance Analysis
Motivation
Contributions
Assumptions
Component Relevance
Relevance Metrics
Complexity Metric
Closeness to Threshold Metric
Relevance Calculation
Limitations
Related Approaches
Conclusion
Design Deficiency Detection
Contributions
Assumptions
Pattern Detection with Reclipse
Integration with the Architecture Reconstruction
Input Model for the Deficiency Detection
Auxiliary Component Patterns
Improved Trace Collection through Symbolic Execution
Shortcomings of Current Trace Collection
Systematic Trace Generation
Interpreting the Generated Traces
Related Approaches
Limitations
Limitations of the Deficiency Detection
Limitations of the Improved Trace Generation
Conclusion
Design Deficiency Ranking
Contributions
Assumptions
Ranking Metrics
Structural Accuracy Metric
Deficiency-Specific Ranking Metrics
Rank Calculation
Limitations
Related Approaches
Conclusion
Deficiency Removal
Contributions
Assumptions
Deficiency Removal Process
Manual Deficiency Removal
Removal Guides
Example
Automated Deficiency Removal
Removal Strategies
Behaviour Preservation
Propagating the Removal back to the Source Code
Architecture Preview
Related Approaches
Limitations
Conclusion
Validation
Prototype Implementation
Software Architecture
Example Session
Experiment Setup
Validation Questions
Case Studies
Threats to Validity
Threats to Internal Validity
Threats to External Validity
Case Study 1: Store Example
System Overview
Validation Results
Discussion
Case Study 2: Palladio Fileshare
System Overview
Validation Results
Discussion
Case Study 3: CoCoME
System Overview
Reference Implementation Validation Results
SOFA Implementation Validation Results
Discussion
Time and Effort
Level-II-Validation
Lessons Learned
Conclusion
Results and Conclusions
Future Research Challenges
Meta Models
Generalised Abstract Syntax Tree
Service Architecture Meta Model
Source Code Decorator
Design Deficiencies
Interface Violation
Design Deficiency Problem
Example
Influence on the Architecture Reconstruction
Removal Strategies
Formalisation
Unauthorised Call
Design Deficiency Problem
Example
Influence on the Architecture Reconstruction
Removal Strategies
Formalisation
Inheritance between Components
Design Deficiency Problem
Example
Influence on the Architecture Reconstruction
Removal Strategies
Formalisation
Clustering Configurations
List of Abbreviations
References
Own Publications
Supervised Theses
List of Figures
List of Tables
Index
The search-operation requires javascript to be activated.