2. Atomic Components 3. Conclusion Applying File-based Information Flow and Ase Identification to a Legacy System
نویسندگان
چکیده
Note that, because archsq.bat is generated, the files it shares are not represented here. The name *.tbl refers to a group of 8 files with extension " tbl " which are used by the program in ENTER.bat. This corresponds to the service required to enter the next precinct, then run its canvass worksheet. The preceding section illustrated that, within a batch file, the flow of information between programs through shared files could help understanding the functionality of the batch file. This section presents results of techniques which help understand what happens inside individual programs. We applied two heuristics to identify abstract state encapsulations (ASE-a group of global variables together with the routines which access them): same module heu-ristic and delta-ic heuristic [Gira97]. Seven ASE candidates were identified. One correponds to the function and data required to print the headers in unofficial result summary. The other ASE candidates can be categorized as two groups of clone ASEs: a group of 2 ASEs and another of 3 ASEs. This reflects the fact that many functions have been developed by " copy and modify ". The first group of ASEs corresponds to the high-level functions and data needed to produce canvass worksheets from the database of unofficial election results. The second prepares and prints reports (unofficial results summary and the state and local government reports). The ASEs are useful in that they focus the attention of the analyst trying to understand these program to a smaller portion of the code. If one was looking at only one program , the contribution of the ASEs to understanding could be considered marginal since the programs of WELTAB are relatively small. However, when one looks at the complete systems, the ASEs help focus the attention on similar functionalities across the programs. This lead to another unexpected benefit, by comparing the name of functions, the names of global variables and their relation to their context (data files accessed, functions called, and global variables accessed), one can quickly recognize the clones and their differences. Further techniques for architectural components recovery , like dominance tree analysis to identify large components or ADT identification, were not appropriate for this system. The dominance tree was not deep enough to recognize useful patterns due to the limited depth of the call graph. There was no ADT because no record or union was defined in the WELTAB system. Two complementary approaches to understanding …
منابع مشابه
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In order to address these issues, many organizations have been migrating their legacy systems to new technologies. In this paper, we describe a computer-supported approach aimed at supporting the migration of procedural so...
متن کاملInformation and data flow analysis for forestry sector in Iran as a basic requirement for designing a forest information system (FIS)
ABSTRACT The aim of this study was to evaluate the status of information on forest and data transfer and to identify the gaps in information and data flow in forestry sector in Iran. The study evaluated the data and information flow in three levels (control offices level, provincial offices level and organizational offices level) using the document analysis and questioning (interviews and ques...
متن کاملAn Evolution Scheme for Business Rule Based Legacy Systems
Business rules are compact statements that depict important aspects of business processes. For most enterprises, business rules are embedded in the information systems. As change is inherent in software, information systems turn into legacy ones and their documentations may not reflect the actual business logics. Thus, business rules in legacy systems become significant investments, and it is n...
متن کاملAutomatic Software Clustering via Latent Semantic Analysis
1 This paper appears in the 14 IEEE ASE’99, Cocoa Beach FL, Oct. 12-15, pp. 251-254 Abstract The paper describes the initial results of applying Latent Semantic Analysis (LSA) to program source code and associated documentation. Latent Semantic Analysis is a corpus-based statistical method for inducing and representing aspects of the meanings of words and passages (of natural language) reflecti...
متن کاملIdentification and Prioritizing Factors Affecting Management Information System (MIS) in the Productivity of Physical Education Department of Islamic Azad University of Isfahan
The purpose of this study was to prioritize the factors affecting the management information system (MIS) in the productivity of the physical education department of the Islamic Azad University of Isfahan. The research method is descriptive, applied based on the purpose and applied with a survey approach. The statistical population of this study includes all heads, principals and directors of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998