WIKINDX

TZI Literaturverzeichnis

WIKINDX Resources

Proceedings Article: BibTeX citation key:  Frenzel2007a
P. Frenzel, R. Koschke, A. Breu and K. Angstmann, "Extending the Reflection Method for Consolidating Software Variants into Product Lines" in Proc. of 14th Working Conference on Reverse Engineering, Vancouver, British Columbia, Canada, Oct. 29-31, 2007, pp. 160–169.
Added by: Jochen Quante 2007-09-13 11:23:47    Last edited by: Jochen Quante 2007-11-29 15:54:13
 B 
Categories: AG-Koschke, Contribution to conferences-reviewed, SAT, [ old ---- Adaptive Kommunikation --- old ]
Keywords: architecture reconstruction, product lines, reverse engineering
Creators: Angstmann, Breu, Frenzel, Koschke
Publisher: (Vancouver, British Columbia, Canada)
Collection: Proc. of 14th Working Conference on Reverse Engineering

Number of views:  772
Popularity index:  51.6%

 
Abstract
Software variants emerge from ad-hoc copying in-the-large with adaptations to a specific context. As the number of variants increases, maintaining such software variants becomes more and more difficult and expensive. In contrast to such ad-hoc reuse, software product lines offer organized ways of reuse, taking advantage of similarities of different products. To re-gain control, software variants may be consolidated as organized software product lines.
In this paper, we describe a method and supporting tools to compare software variants at the architectural level extending the reflexion method to software variants. Murphy's reflexion method allows one to reconstruct the module view, a static architectural view describing the static components, their interfaces and dependencies and their grouping as layers and subsystems. The method consists of the specification of the module view and the mapping of implementation components onto the module view. An automatic analysis determines differences between the module view and its implementation.
We extend the reflexion method from single systems to software variants. Because software variants share a very large amount of code, we use clone detection techniques to identify corresponding implementation components between variants. The correspondence is then used to transfer as much of the mapping for the analyzed variants to the next variant to be analyzed.
Added by: Jochen Quante    Last edited by: Jochen Quante

 
Notes
Received "Best Paper Award".
Added by: Jochen Quante    Last edited by: Jochen Quante

 
wikindx      |     Total Resources:  2953     |     Database queries:  43     |     Script execution:  0.5126 secs