Detten, Markus von: Reengineering of component-based software systems in the presence of design deficiencies. 2013
Content
- Introduction
- Evolution of Business Information Systems
- Reverse Engineering of Software Architectures
- Problem Statement
- Solution Overview
- Application Scenarios
- Scientific Contributions
- Example System
- Structure
- Foundations and Related Work
- Software Architecture Reconstruction
- Pattern Detection
- Refactoring and Reengineering
- Hybrid Reverse Engineering Approaches
- Bad Smell Detection and Removal
- Architecture Reengineering
- Classification of the Archimetrix Approach
- General Assumptions
- Design Deficiencies
- Types of Software Patterns
- Describing Design Deficiencies
- Running Example
- Further Design Deficiencies
- The Archimetrix Process
- Contributions
- Process Overview
- Iterative Architecture Reconstruction
- Design Deficiency Formalisation
- Limitations
- Influence of Deficiencies on the Architecture Reconstruction
- Contributions
- Reconstruction Process
- Influence of Design Deficiency Occurrences on the Metrics
- Influence of the Transfer Object Ignorance Deficiency
- Susceptibility of Different Metrics and Strategies
- Influence of Other Design Deficiencies Occurrences
- Result Model
- Limitations
- Conclusion
- Component Relevance Analysis
- Motivation
- Contributions
- Assumptions
- Component Relevance
- Relevance Metrics
- Relevance Calculation
- Limitations
- Related Approaches
- Conclusion
- Design Deficiency Detection
- Contributions
- Assumptions
- Pattern Detection with Reclipse
- Integration with the Architecture Reconstruction
- Improved Trace Collection through Symbolic Execution
- Shortcomings of Current Trace Collection
- Systematic Trace Generation
- Interpreting the Generated Traces
- Related Approaches
- Limitations
- Conclusion
- Design Deficiency Ranking
- Contributions
- Assumptions
- Ranking Metrics
- Rank Calculation
- Limitations
- Related Approaches
- Conclusion
- Deficiency Removal
- Contributions
- Assumptions
- Deficiency Removal Process
- Manual Deficiency Removal
- Automated Deficiency Removal
- Removal Strategies
- Behaviour Preservation
- Propagating the Removal back to the Source Code
- Architecture Preview
- Related Approaches
- Limitations
- Conclusion
- Validation
- Prototype Implementation
- Experiment Setup
- Validation Questions
- Case Studies
- Threats to Validity
- Case Study 1: Store Example
- Case Study 2: Palladio Fileshare
- Case Study 3: CoCoME
- System Overview
- Reference Implementation Validation Results
- SOFA Implementation Validation Results
- Discussion
- Time and Effort
- Level-II-Validation
- Lessons Learned
- Conclusion
- Meta Models
- Design Deficiencies
- Interface Violation
- Design Deficiency Problem
- Example
- Influence on the Architecture Reconstruction
- Removal Strategies
- Formalisation
- Unauthorised Call
- Design Deficiency Problem
- Example
- Influence on the Architecture Reconstruction
- Removal Strategies
- Formalisation
- Inheritance between Components
- Clustering Configurations
- List of Abbreviations
- References
- Own Publications
- Supervised Theses
- List of Figures
- List of Tables
- Index
