Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Software Engineering (D.2) > Distribution, Maintenance, and Enhancement (D.2.7) > Restructuring, Reverse Engineering, And Reengineering (D.2.7...)  
 
Options:
 
  1-10 of 48 Reviews about "Restructuring, Reverse Engineering, And Reengineering (D.2.7...)": Date Reviewed
  Refactoring for software design smells: managing technical debt
Suryanarayana G., Samarthyam G., Sharma T., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 258 pp.  Type: Book (978-0-128013-97-7)

While much has been published focused on code smells and implementation-oriented design patterns, there is a dearth of resources for software architects, designers, and developers working on software design at a macro level. This book ...

Aug 21 2015
  Software protection for dynamically generated code
Ghosh S., Hiser J., Davidson J.  PPREW 2013 (Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, Rome, Italy, Jan 26, 2013) 1-12, 2013.  Type: Proceedings

A process-level virtual machine (PVM) is a layer of software interleaved with the application and the host environment; it executes the application. The application binary is either transformed (obfuscated) to a secret instruction-set ...

Apr 9 2014
  Identifying services from legacy batch applications
Komondoor R., Nandivada V., Sinha S., Field J.  ISEC 2012 (Proceedings of the 5th India Software Engineering Conference, Kanpur, India, Feb 22-25, 2012) 13-22, 2012.  Type: Proceedings

Modernization is the current buzzword in the information technology (IT) industry. Legacy IT applications are transformed, reengineered, and modernized to meet the needs of today’s world. Mobile devices are the hot products p...

Dec 17 2012
  Remodularizing Java programs for improved locality of feature implementations in source code
Olszak A., Nørregaard Jørgensen B. Science of Computer Programming 77(3): 131-151, 2012.  Type: Article

Remodularization is about giving a new or additional modular structure to an application’s source code. This activity is particularly important when maintaining an application since remodularizing increases the overall qualit...

May 10 2012
  Oops! . . . I changed it again
Göde N., Harder J.  IWSC 2011 (Proc. of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI, May 23, 2011) 14-20, 2011.  Type: Proceedings

Much effort has been expended in attempting to discover how errors are introduced into software, with the hope of being able to reduce the potentially serious faults occurring in applications. One area of interest is clones--f...

Apr 18 2012
  Extracting code clones for refactoring using combinations of clone metrics
Choi E., Yoshida N., Ishio T., Inoue K., Sano T.  IWSC 2011 (Proceedings of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI, May 23, 2011) 7-13, 2011.  Type: Proceedings

Many tools to detect code duplication are available. What remains lacking is an understanding of how best to use the results these tools provide. Anecdotal evidence suggests that high values for individual clone metrics are not always ...

Feb 16 2012
  Instant code clone search
Lee M., Roh J., Hwang S., Kim S.  FSE 2010 (Proceedings of the 18th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Santa Fe, NM, Nov 7-11, 2010) 167-176, 2010.  Type: Proceedings

Code clone detection has many appealing applications, ranging from maintenance effort reduction to example identification based on similarities. However, traditional approaches to clone detection have a significant feedback loop; hours...

Apr 14 2011
  A desiderata for refactoring-based software modularity improvement
Rama G.  ISEC 2010 (Proceedings of the 3rd India Software Engineering Conference, Mysore, India, Feb 25-27, 2010) 93-102, 2010.  Type: Proceedings

While problems with large, business-critical legacy systems written in older languages, such as Cobol, have been well publicized, less has been reported about similar applications written in more modern languages, such as Java, which h...

May 27 2010
  The IDA Pro book: the unofficial guide to the world’s most popular disassembler
Eagle C., No Starch Press, San Francisco, CA, 2008. 640 pp.  Type: Book (9781593271787)

IDA Pro, the “interactive disassembler,” is the most popular disassembler around--and not without good reason. It combines a powerful, static disassembler with the advantages of an interactive debugger. As ...

Jun 11 2009
  Search-based refactoring: an empirical study
O’Keeffe M., Cinnéide M. Journal of Software Maintenance and Evolution: Research and Practice 20(5): 345-364, 2008.  Type: Article

Organizational processes are dynamic and so is the software they use to meet the dynamic needs of various stakeholders in the process. Often, this dynamism shortens the life cycle of the software used. The life cycle of software largel...

Mar 31 2009
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy