Browse All Reviews
Software Engineering (D.2)
Distribution, Maintenance, and Enhancement (D.2.7)
> Restructuring, Reverse Engineering, And Reengineering (D.2.7...)
All Media Types
1-10 of 48 Reviews about "
Restructuring, Reverse Engineering, And Reengineering (D.2.7...)
Refactoring for software design smells: managing technical debt
Suryanarayana G., Samarthyam G., Sharma T., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 258 pp. Type: Book (978-0-128013-97-7)
While much has been published focused on code smells and implementation-oriented design patterns, there is a dearth of resources for software architects, designers, and developers working on software design at a macro level. This book ...
Aug 21 2015
Software protection for dynamically generated code
Ghosh S., Hiser J., Davidson J. PPREW 2013 (Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, Rome, Italy, Jan 26, 2013) 1-12, 2013. Type: Proceedings
A process-level virtual machine (PVM) is a layer of software interleaved with the application and the host environment; it executes the application. The application binary is either transformed (obfuscated) to a secret instruction-set ...
Apr 9 2014
Identifying services from legacy batch applications
Komondoor R., Nandivada V., Sinha S., Field J. ISEC 2012 (Proceedings of the 5th India Software Engineering Conference, Kanpur, India, Feb 22-25, 2012) 13-22, 2012. Type: Proceedings
Modernization is the current buzzword in the information technology (IT) industry. Legacy IT applications are transformed, reengineered, and modernized to meet the needs of today’s world. Mobile devices are the hot products p...
Dec 17 2012
Remodularizing Java programs for improved locality of feature implementations in source code
Olszak A., Nørregaard Jørgensen B. Science of Computer Programming 77(3): 131-151, 2012. Type: Article
Remodularization is about giving a new or additional modular structure to an application’s source code. This activity is particularly important when maintaining an application since remodularizing increases the overall qualit...
May 10 2012
Oops! . . . I changed it again
Göde N., Harder J. IWSC 2011 (Proc. of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI, May 23, 2011) 14-20, 2011. Type: Proceedings
Much effort has been expended in attempting to discover how errors are introduced into software, with the hope of being able to reduce the potentially serious faults occurring in applications. One area of interest is clones--f...
Apr 18 2012
Extracting code clones for refactoring using combinations of clone metrics
Choi E., Yoshida N., Ishio T., Inoue K., Sano T. IWSC 2011 (Proceedings of the 5th International Workshop on Software Clones, Waikiki, Honolulu, HI, May 23, 2011) 7-13, 2011. Type: Proceedings
Many tools to detect code duplication are available. What remains lacking is an understanding of how best to use the results these tools provide. Anecdotal evidence suggests that high values for individual clone metrics are not always ...
Feb 16 2012
Instant code clone search
Lee M., Roh J., Hwang S., Kim S. FSE 2010 (Proceedings of the 18th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Santa Fe, NM, Nov 7-11, 2010) 167-176, 2010. Type: Proceedings
Code clone detection has many appealing applications, ranging from maintenance effort reduction to example identification based on similarities. However, traditional approaches to clone detection have a significant feedback loop; hours...
Apr 14 2011
A desiderata for refactoring-based software modularity improvement
Rama G. ISEC 2010 (Proceedings of the 3rd India Software Engineering Conference, Mysore, India, Feb 25-27, 2010) 93-102, 2010. Type: Proceedings
While problems with large, business-critical legacy systems written in older languages, such as Cobol, have been well publicized, less has been reported about similar applications written in more modern languages, such as Java, which h...
May 27 2010
The IDA Pro book: the unofficial guide to the world’s most popular disassembler
Eagle C., No Starch Press, San Francisco, CA, 2008. 640 pp. Type: Book (9781593271787)
IDA Pro, the “interactive disassembler,” is the most popular disassembler around--and not without good reason. It combines a powerful, static disassembler with the advantages of an interactive debugger. As ...
Jun 11 2009
Search-based refactoring: an empirical study
O’Keeffe M., Cinnéide M. Journal of Software Maintenance and Evolution: Research and Practice 20(5): 345-364, 2008. Type: Article
Organizational processes are dynamic and so is the software they use to meet the dynamic needs of various stakeholders in the process. Often, this dynamism shortens the life cycle of the software used. The life cycle of software largel...
Mar 31 2009
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud