Number of the records: 1  

Extracting Behavior Specification of Components in Legacy Applications

  1. 1.
    SYSNO ASEP0334290
    Document TypeC - Proceedings Paper (int. conf.)
    R&D Document TypeConference Paper
    TitleExtracting Behavior Specification of Components in Legacy Applications
    TitleExtrakce specifikace chování komponent v nasazených aplikacích
    Author(s) Poch, T. (CZ)
    Plášil, František (UIVT-O) RID
    Source TitleComponent-Based Software Engineering. - Berlin : Springer, 2009 / Lewis G.A. ; Poernomo I. ; Hofmeister C. - ISBN 978-3-642-02413-9
    Pagess. 87-103
    Number of pages17 s.
    ActionCBSE 2009. International Symposium on Component Based Software Engineering /12./
    Event date24.06.2009-26.06.2009
    VEvent locationEast Stroudsburg
    CountryUS - United States
    Event typeWRD
    Languageeng - English
    CountryDE - Germany
    Keywordsreverse engineering ; component behavior specification
    Subject RIVJC - Computer Hardware ; Software
    CEZAV0Z10300504 - UIVT-O (2005-2011)
    UT WOS000268062200006
    EID SCOPUS70350674891
    DOI10.1007/978-3-642-02414-6_6
    AnnotationA challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structure of the source code of a component and the extracted specification; in particular, this is important for both user comprehension and for interpretation of results of any further formal verification. Even though the reverse engineering techniques providing behavior specification have already been applied on object oriented software and components, none of them targets the interplay of both the externally and internally triggered activities on the component’s provided and required interfaces from a single perspective. This paper targets the problem in the scope of Behavior Protocols and components given as a set of Java classes accompanied with information on component boundaries. To demonstrate viability of the proposed approach, this technique has been partially applied in the JAbstractor tool for the SOFA component model.
    WorkplaceInstitute of Computer Science
    ContactTereza Šírová, sirova@cs.cas.cz, Tel.: 266 053 800
    Year of Publishing2010
Number of the records: 1  

  This site uses cookies to make them easier to browse. Learn more about how we use cookies.