Software Re-Documentation Process and Tool
|
|
|
- Eunice Ellis
- 9 years ago
- Views:
Transcription
1 Software Re-Documentation Process and Tool Nicolas Anquetil, Kathia M. Oliveira, Anita G.M. dos Santos, Paulo C.S. da Silva jr., Laesse C. de Araujo jr., and Susa D.C.F. Vieira UCB Catholic University of Brasília, Brasília, Brazil Abstract. Researchers and professionals know the importance of the documentation for the efficient maintenance of legacy software. Unfortunately, many legacy systems lack this important artifact. Maintenance then becomes a difficult process where software engineers must study and understand the system over and over again. A possible solution out of this situation is to re-document the legacy system. In this article we will present a software re-documentation process, its main features, and constituting activities. We will also present a tool we are developing to automate this process as much as possible. This tools runs in Java and is currently designed for Visual Basic legacy systems. 1 Introduction It is an accepted fact that legacy software systems are generally poorly documented. This fact makes it extremely difficult to understand and maintain such systems. Redocumenting them could be a great help to keep them alive. In this paper, we describe a redocumentation process we designed and our first efforts to automate it. A tool, called Redoc, will be described which currently automates two of the activities of our process for legacy systems written in Visual Basic. In the following sections, we will first present the software redocumentation process (section 2). Then we discuss some existing approaches to redocumentation with a focus on existing tools (section 3). In section 4, we present the Redoc tool. And finally we propose our conclusions and possible future work. 2 The Redocumentation Process Wewerecalledtohelpredocumentatingthemainsystemofanorganization.for this, we had to define a redocumentation process. Common sense imposed that the process should have the three following characteristics: Reverse engineering process: A redocumentation process should be based on a bottom-up approach, taking advantage of the existing code. Light weight documentation: To lower the costs and maximize the chances of the recreated documentation being maintained afterward, we will follow Pressman s recommendation [4, p.807] to limit it to the minimum required.
2 Good quality/price ratio: We tried to favor documentation artifacts that could be produce automatically or semi-automatically and still offered valuable information for maintenance. As illustrated in Figure 1, our process is composed of three main phases which include seven activities: Preparation Phase: analyze the state of the software and its documentation. Planning Phase: decide what parts of the system should be redocumented first and what will be the general approach. Redocumentation Phase: recreate the various documents, it constitutes the core of the redocumentation process. System Inventory PREPARATION System Assessment PLANNING Redocumentation Planning High Level View Definition REDOCUMENTATION Cross Reference Extraction Subsystems Definition Low Level Documentation Fig. 1. Activities of the Redocumentation Process (black box: activity automated 1, gray box:activity is partially automated) To keep the documentation to a minimum, we decided to do mostly without what we call the intermediate documentation which, during development, would be generated during the analysis and design activities. We try, in the process, to concentrate on what we call the high level and the low level documentation. Traceability between these two levels is guaranteed by a set of cross references (e.g. between implemented funcionalities and implementing routines) extracted automatically. There are two activities to the Preparation phase: System Inventory: The goal of the first activity is to get an idea of the size of the problem and provide basic information needed in the following activities. It answers questions like: What exactly constitutes the system? What is known about it? Where to find these informations and new ones? The inventory is performed along three main axes: (i) software components and functionalities, (ii) documentation and (iii) people. System Assessment: The second step consists in assessing the level of confidence one can have in the code, the documentation and the other sources of information. This is useful to plan the redocumentation in itself and the maintenance in general. 1 The automation of some activities will be discussed in section 4
3 There is only one activity to the Planning phase: Redocumentation Planning: This activity is the prelude to the redocumentation work in itself. It consists in defining how the redocumentation will be performed and what are the priorities. The planning will be based on results of the preceding phase. Other important points to consider are the maintenance load expectancy and the strategic evaluation of the importance of each part of the system. There are four activities to the Redocumentation phase: High Level View Definition: In this activity, one must document a first high level view of the system: functionalities, interaction with other systems or specific hardware, etc. Each functionality listed in the System Inventory should be shortly described. Cross References Extraction: This activity will result in the identification of cross references: routine to routine (call graph), routine to data (CRUD table), data to data (data model), and functionality to routine. It will be important to do such things as impact analysis, feature location, etc. Subsystems Definition: This activity will result in a top down view of the system, its subsystems and their components. If the architectural decomposition is known and agreed upon by all, each subsystem listed in the System Inventory must be documented, describing its objective, and what components and funcionalities it contains. In case there is no agreed upon decomposition, we propose to create one using some clustering algorithm (e.g. [1,3,7]). Low Level Documentation: In this final activity, each independent item identified during the planning will be commented. This activity is to a large extent a manual one, the software engineers must consider each item independently, analyse it and document it. 3 Existing Approaches to Software Re-Documentation Redocumentation is mainly a problem for large systems where the size alone is already a significant complexity factor. This is one of the reason why there has been a lot of work on automation of this task over the years. Freeman and Munroe, in [2], discuss some requirements for a redocumentation tool and what documents should be produced during redocumentation. There already exists some tools to help redocumenting. The simplest would be the tools to extract some documentation from the source code (e.g. javadoc). These tools extract the signature of classes, methods, etc. and sometimes also format comments. Rajlich [5] proposes a tool to incrementally generate an hypertext documentation of a software as it is maintained. But there is no specific process for redocumentation per se. Rigi [8] is a reverse engineering environment to help understand, restructure, andvisualizethecomponentsofalegacysystem.itcouldhelpinaredocumentation effort, but it is primarily a program comprehension tool and it does
4 not, in itself, specify how one goes about redocumenting. A more organizational approach is adopted in [6], where Tilley et al. specify some requirements for re-documentation and show how Rigi could help in producing it. However the work does not specify a process (sequence of steps). 4 A Software Re-Documentation Environment We started to develop a software environment to support software engineers in the execution of the various activities of the redocumentation process. The Redoc environment has two goals: First, it should guide its users through the execution of the various activities, allowing them to register the result of these activities. Second, it should provide automate as much as possible the activities of the process that may be automated. The Redoc environnement is still in an early stage. It is developed in java using the graphical library Swing. It currently parses systems written in Visual Basic and implements the two activities of the software redocumentation process which may be automated (in black in Figure 1). In the System Inventory activity, one must list the components of the system, and its functionalities. Since Visual Basic (VB) is Object Oriented 2,the components will be classes and their methods. One must also list the tables that make up the system. The Redoc environment uses javacc 3 to parse the Visual Basic code: Extraction of classes and methods is straightforward, they are readily available in the language grammar. To discover all the functionalities implemented in the system, we use the menus of the application. This is possible because, in VB, the graphical interface is built through a tool which generates the code in a standardized way. Other languages may raise more difficulties. Toidentifythetablesusedinthesystem,wealsoparsethecodetoidentify the SQL queries it contains and to what tables they refer. Usually the SQL queries are manually programmed and do not follow the same strict patterns as graphical instructions do. They may also be dynamically constructed in the program from data entered by the user. This would make them impossible to be automatically analyzed in the general case. Fortunately, in practice, SQL queries are dynamic only with regard to the values of the columns, and not the tables accessed. This allows our approach to work in most cases. Figure 2, left part, presents a snapshot of the inventory window. The window shows the functionalities, the classes and their methods, and the tables. All these informations are extracted automatically. The rigth part of the figure presents a snapshot of the window to enter (manually) a new contact person. A similar window exist for documents. 2 Actually, VB is not truly OO, but it does contain classes, methods
5 Fig. 2. Result of the automated System Inventory for a system in Visual Basic (left) and a window to enter a new contact person that may help in the redocumentation process (right) These two examples illustrate the two goals of the environment: automating some activities for the user (left part of the picture), and keeping track of the realization of the activities and registering their result (right part). The second automated activity is the Cross Reference Extraction. There are four types of cross references: Data X data: The data X data cross-reference corresponds to finding the relations between the tables used in the system. This is done, again, parsing thesqlqueriestodetectthejoinsmadebetweentables. Routine X Data: The routine X data cross-reference is easy to compute once the table inventory problem is solved. Knowing what tables are accessed from the SQL queries, it is simple to know in what method this query occurs and therefore which methods access which tables. A bit more difficult is to built a CRUD table where each access is marked as Create, Read, Update, or Delete. For this, the tool analyzes the first word of each query (insert, select, update, or delete). Routine X routine: The routine X routine cross-reference is a simple call graph among the methods and offers no special difficulties. Funcionalidade X routine: The Functionalities X routine cross-reference consists in identifying what routines implements a functionality. As we identify functionalities from the application menus, it is a simple matter to identify the starting point of a functionality and then compute transitive closure on the call graph from that point. However, there is more to it than that, because a functionality will usually call one or several windows where the actual execution of the functionality will be triggered by clicking a button.
6 5 Conclusion and Future Work It is generally accepted in software engineering that most of legacy software suffer from a lack of up-to-date documentation. Redocumentation is the natural solution to help maintaining these software systems. However, there is little work on how this can be done and what tools we need to actually redocument. In this article, we presented a process for software redocumentation and the steps we are taking to automate it as much as possible. We are developing a software redocumentation environment that will (a) help people register the results of the various activities of the process, and (b) help people gathering the information they need by automating some activities. Two activities (System Inventory and Cross-Reference Extraction) have already been automated and we are now working on a new project to help automate a third activity (System Quality Assessment) Acknowledgment This work is part of the Knowledge Management in Software Engineering project, which is supported by the CNPq, an institution of the Brazilian government for scientific and technological development. References 1. Nicolas Anquetil and Timothy C. Lethbridge. Experiments with Clustering as a Software Remodularization Method. In Working Conference on Reverse Engineering, pages IEEE, IEEE Comp. Soc. Press, Oct Robert M. Freeman and Malcolm Munro. Redocumentation for the maintenance of software. In Proceedings of the ACM 30th Annual Southeast Conference, pages ACM, ACM Press, Apr Arun Lakhotia. A unified framework for expressing software subsystem classification techniques. J. of Systems and Software, 36: , Mar Roger S. Pressman. Software Engineering: A Practitioner s Approach. McGraw-Hill, 5th edition, Václav Rajlich. Incremental redocumentation using the web. IEEE Software, 17(5):102 6, Sep Scott R. Tilley. Documenting-in-the-large vs. documenting-in-the-small. In Proceedings of CASCON 93, pages IBM Centre for Advanced Studies, Oct Theo A. Wiggerts. Using Clustering Algorithms in Legacy Systems Remodularization. In Working Conference on Reverse Engineering, pages IEEE, IEEE Comp.Soc.Press,Oct Kenny Wong, Scott R. Tilley, Hausi A. Müller, and Margaret-Anne D. Storey. Structural redocumentation: A case study. IEEE Software, 12(1):46 54, Jan 1995.
Which Documentation For Software Maintenance?
Which Documentation For Software Maintenance? Sergio Cozzetti B. de Souza 1, Nicolas Anquetil 1, Káthia M. de Oliveira 1 1 UCB - Catholic University of Brasilia SGAN 916 Môdulo B - Av. W5 Norte Brasília
Using Library Dependencies for Clustering
Using Library Dependencies for Clustering Jochen Quante Software Engineering Group, FB03 Informatik, Universität Bremen [email protected] Abstract: Software clustering is an established approach
A Visualization Method to Support Impacts Analysis in Program Understanding
A Visualization Method to Support Impacts Analysis in Program Understanding Rita Noremi Bt Mohamad Centre for Advanced Software Engineering (CASE) Universiti Teknologi Malaysia Kuala Lumpur, Malaysia [email protected]
Based on Chapter 11, Excel 2007 Dashboards & Reports (Alexander) and Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond (Scheck)
Reporting Results: Part 2 Based on Chapter 11, Excel 2007 Dashboards & Reports (Alexander) and Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond (Scheck) Bullet Graph (pp. 200 205, Alexander,
ProTeach Portfolio Support Providers: Facilitating Connections. Evidence and Analysis
ProTeach Portfolio Support Providers: Facilitating Connections Evidence and Analysis What is Evidence? Evidence is the information that a candidate provides within a commentary, using quotations from students
Qi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
The Main Page of RE STATS will provide the range of data at the very top of the page.
RE STATS Navigator can be accessed from Tempo under the Financials Tab at the top. It will be your bottom option under the drop down menu. The Main Page of RE STATS will provide the range of data at the
Managing Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Automated Modeling of Legacy Systems Using the UML
Automated Modeling of Legacy Systems Using the UML by Pan-Wei Ng Software Engineering Specialist Rational Software Singapore Poor documentation is one of the major challenges of supporting legacy systems;
Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
Visionet IT Modernization Empowering Change
Visionet IT Modernization A Visionet Systems White Paper September 2009 Visionet Systems Inc. 3 Cedar Brook Dr. Cranbury, NJ 08512 Tel: 609 360-0501 Table of Contents 1 Executive Summary... 4 2 Introduction...
Predictive Analytics
Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is
An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs)
An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs) Rosziati Ibrahim, Siow Yen Yen Abstract System development life cycle (SDLC) is a process uses during the development of any
Fourth generation techniques (4GT)
Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some
Computer Training. NR Computer Learning Center 1835 W. Orangewood Ave #200 Orange CA 92868
Computer Training NR Computer Learning Center 1835 W. Orangewood Ave, #200 Orange, CA 92868 (714) 505-3475 www.nrclc.com NR Computer Learning Center 1835 W. Orangewood Ave #200 Orange CA 92868 (714) 505-3475
VISUALIZATION APPROACH FOR SOFTWARE PROJECTS
Canadian Journal of Pure and Applied Sciences Vol. 9, No. 2, pp. 3431-3439, June 2015 Online ISSN: 1920-3853; Print ISSN: 1715-9997 Available online at www.cjpas.net VISUALIZATION APPROACH FOR SOFTWARE
Systems Engineering with RUP: Process Adoption in the Aerospace/ Defense Industry
March 2004 Rational Systems Engineering with RUP: Process Adoption in the Aerospace/ Defense Industry Why companies do it, how they do it, and what they get for their effort By Dave Brown, Karla Ducharme,
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
An Open Framework for Reverse Engineering Graph Data Visualization. Alexandru C. Telea Eindhoven University of Technology The Netherlands.
An Open Framework for Reverse Engineering Graph Data Visualization Alexandru C. Telea Eindhoven University of Technology The Netherlands Overview Reverse engineering (RE) overview Limitations of current
MULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union W o r d p r o c e s s o r s What is a Word Processor used for? A. To analyse figures B. Creating and editing C. Storing information What hardware
Toad for Oracle 8.6 SQL Tuning
Quick User Guide for Toad for Oracle 8.6 SQL Tuning SQL Tuning Version 6.1.1 SQL Tuning definitively solves SQL bottlenecks through a unique methodology that scans code, without executing programs, to
1. Introduction. 2. User Instructions. 2.1 Set-up
1. Introduction The Lead Generation Plan & Budget Template allows the user to quickly generate a Lead Generation Plan and Budget. Up to 10 Lead Generation Categories, typically email, telemarketing, advertising,
BarTender Integration Methods. Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER
BarTender Integration Methods Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER Contents Introduction 3 Integrating with External Data 4 Importing Data
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
2009 ikeep Ltd, Morgenstrasse 129, CH-3018 Bern, Switzerland (www.ikeep.com, [email protected])
CSP CHRONOS Compliance statement for ISO 14721:2003 (Open Archival Information System Reference Model) 2009 ikeep Ltd, Morgenstrasse 129, CH-3018 Bern, Switzerland (www.ikeep.com, [email protected]) The international
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
Overview. The Knowledge Refinery Provides Multiple Benefits:
Overview Hatha Systems Knowledge Refinery (KR) represents an advanced technology providing comprehensive analytical and decision support capabilities for the large-scale, complex, mission-critical applications
Entity store. Microsoft Dynamics AX 2012 R3
Microsoft Dynamics AX 2012 R3 Entity store This document describes the primary scenarios and features of Entity store. Entity store is a database that is used for analytical scenarios such as near-real-time
BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Software Engineering 2
BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Software Engineering 2 General Comments The pass rate this year was significantly better than
Managing Agile Projects in TestTrack GUIDE
Managing Agile Projects in TestTrack GUIDE Table of Contents Introduction...1 Automatic Traceability...2 Setting Up TestTrack for Agile...6 Plan Your Folder Structure... 10 Building Your Product Backlog...
Key Requirements for a Job Scheduling and Workload Automation Solution
Key Requirements for a Job Scheduling and Workload Automation Solution Traditional batch job scheduling isn t enough. Short Guide Overcoming Today s Job Scheduling Challenges While traditional batch job
How To Understand Software Engineering
PESIT Bangalore South Campus Department of MCA SOFTWARE ENGINEERING 1. GENERAL INFORMATION Academic Year: JULY-NOV 2015 Semester(s):III Title Code Duration (hrs) SOFTWARE ENGINEERING 13MCA33 Lectures 52Hrs
Determining SQL Server 2014 Core Licensing Requirements at SA Renewal
Determining SQL Server 2014 Licensing Requirements at SA Renewal April 2014 Contents 2 Overview 2 How to Create a SQL Server 2014 Transition Report 4 Step 1: Be Ready with Properties and Inventory 4 Step
Object Oriented Databases. OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar
Object Oriented Databases OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar Executive Summary The presentation on Object Oriented Databases gives a basic introduction to the concepts governing OODBs
Intermediate PowerPoint
Intermediate PowerPoint Charts and Templates By: Jim Waddell Last modified: January 2002 Topics to be covered: Creating Charts 2 Creating the chart. 2 Line Charts and Scatter Plots 4 Making a Line Chart.
Good Call. A Guide to Driving Calls with AdWords
Good Call A Guide to Driving Calls with AdWords Introduction Some people want to talk to a real person when they re looking for information. In fact, 70% of mobile searchers have called a business directly
Dealing with Data in Excel 2010
Dealing with Data in Excel 2010 Excel provides the ability to do computations and graphing of data. Here we provide the basics and some advanced capabilities available in Excel that are useful for dealing
Traceability Method for Software Engineering Documentation
www.ijcsi.org 216 Traceability Method for Software Engineering Documentation Nur Adila Azram 1 and Rodziah Atan 2 1 Department of Information System, Universiti Putra Malaysia, Company Serdang, Selangor,
Software Design Document (SDD) Template
(SDD) Template Software design is a process by which the software requirements are translated into a representation of software components, interfaces, and data necessary for the implementation phase.
Software Engineering. Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti
Software Engineering Session 3 Main Theme Requirements Definition & Management Processes and Tools Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
An Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
Object Oriented Programming. Risk Management
Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling
Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing
Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition
Risk Mitigation, Monitoring and Management Plan
Risk Mitigation, Monitoring and Management Plan Introduction Scope and intent of RMMM activities The goal of the risk mitigation, monitoring and management plan is to identify as many potential risks as
Visual Analysis Tool for Bipartite Networks
Visual Analysis Tool for Bipartite Networks Kazuo Misue Department of Computer Science, University of Tsukuba, 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan [email protected] Abstract. To find hidden features
A Lightweight Semi-automated Acceptance Test-Driven Development Approach for Web Applications
A Lightweight Semi-automated Acceptance Test-Driven Development Approach for s Diego Clerissi, Maurizio Leotta, Gianna Reggio, Filippo Ricca Abstract: Applying Acceptance Test Driven Development (ATDD)
Arctic Network SQL Server Data Analysis Using Microsoft Access
Arctic Network Arctic Network Data Management Standard Operating Procedure Inventory & Monitoring Program U.S. Department of the Interior Data Management Standard Operating Procedure NPS/ARCN/DMSOP-2009-03
Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture
Systematization of Requirements Definition for Software Development Processes with a Business Modeling Architecture Delmir de Azevedo Junior 1 and Renato de Campos 2 1 Petrobras University, Republican
Implementation Workflow
Implementation Workflow Michael Fourman Introduction Implement the design in terms of components source code, scripts, binaries, executables, etc. Flesh out the architecture Plan system integrations in
Recovering Business Rules from Legacy Source Code for System Modernization
Recovering Business Rules from Legacy Source Code for System Modernization Erik Putrycz, Ph.D. Anatol W. Kark Software Engineering Group National Research Council, Canada Introduction Legacy software 000009*
Microsoft Dynamics NAV
Microsoft Dynamics NAV Maximizing value through business insight Business Intelligence White Paper November 2011 The information contained in this document represents the current view of Microsoft Corporation
CHAPTER 7 Software Configuration Management
CHAPTER 7 Software Configuration Management ACRONYMS CCB CM FCA MTBF PCA SCCB SCI SCM SCMP SCR SCSA SEI/CMMI SQA SRS USNRC INTRODUCTION Configuration Control Board Configuration Management Functional Configuration
Adaptive Enterprise Solutions
Reporting User Guide Adaptive Enterprise Solutions 8401 Colesville Road Suite 450 Silver Spring, MD 20910 800.237.9785 Toll Free 301.589.3434 Voice 301.589.9254 Fax www.adsystech.com Version 5 THIS USER
An Eclipse Plug-In for Visualizing Java Code Dependencies on Relational Databases
An Eclipse Plug-In for Visualizing Java Code Dependencies on Relational Databases Paul L. Bergstein, Priyanka Gariba, Vaibhavi Pisolkar, and Sheetal Subbanwad Dept. of Computer and Information Science,
Full-text Search in Intermediate Data Storage of FCART
Full-text Search in Intermediate Data Storage of FCART Alexey Neznanov, Andrey Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],
A Structured Methodology For Spreadsheet Modelling
A Structured Methodology For Spreadsheet Modelling ABSTRACT Brian Knight, David Chadwick, Kamalesen Rajalingham University of Greenwich, Information Integrity Research Centre, School of Computing and Mathematics,
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Final Year Projects at itm. Topics 2010/2011
Final Year Projects at itm Topics 2010/2011 Chair of Information Technology in Mechanical Engineering Prof. Dr.-Ing. B. Vogel-Heuser Prof. Dr.-Ing. Frank Schiller Prof. Dr.-Ing. Klaus Bender Technische
OWB Users, Enter The New ODI World
OWB Users, Enter The New ODI World Kulvinder Hari Oracle Introduction Oracle Data Integrator (ODI) is a best-of-breed data integration platform focused on fast bulk data movement and handling complex data
Software Reuse and Reengineering: With A Case Study
International Journal of Soft Computing and Engineering (IJSCE) Software Reuse and Reengineering: With A Case Study Prabhot Kaur Chahal, Amritpal Singh ABSTRACT: Reuse of existing system has been regarded
JRefleX: Towards Supporting Small Student Software Teams
JRefleX: Towards Supporting Small Student Software Teams Kenny Wong, Warren Blanchet, Ying Liu, Curtis Schofield, Eleni Stroulia, Zhenchang Xing Department of Computing Science University of Alberta {kenw,blanchet,yingl,schofiel,stroulia,xing}@cs.ualberta.ca
Key word: Reverse Engineering, Rigi, Imagix 4D
Volume 5. 5, August 2015 Study of Reverse Engineering and Assessment of RIGI and Imagix 4D 1. Jayanti Upadhyay #1, 2. Lalji Prasad #2 #1. Truba college of engineering,indore (M.P.), Dandia Bazar Vadodara,Gujrat,+91-9586800811,jayantirupad
Software Engineering. Software Testing. Based on Software Engineering, 7 th Edition by Ian Sommerville
Software Engineering Software Testing Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To discuss the distinctions between validation testing and defect t testing To describe the
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
Determining SQL Server 2012 Core Licensing Requirements at SA Renewal. June 2012
Determining SQL Server 2012 Core Licensing Requirements at SA Renewal June 2012 Table of Contents Overview...4 How to Create a SQL Server 2012 Transition Report...4 Step 1: Properties and Inventory...5
This activity will show you how to draw graphs of algebraic functions in Excel.
This activity will show you how to draw graphs of algebraic functions in Excel. Open a new Excel workbook. This is Excel in Office 2007. You may not have used this version before but it is very much the
BIG DATA & DATA SCIENCE
BIG DATA & DATA SCIENCE ACADEMY PROGRAMS IN-COMPANY TRAINING PORTFOLIO 2 TRAINING PORTFOLIO 2016 Synergic Academy Solutions BIG DATA FOR LEADING BUSINESS Big data promises a significant shift in the way
Query Organizer Tool for Oracle DBA Chennakeshava Ramesh Oracle DBA [email protected]
1 Organizer Tool for Oracle DBA Chennakeshava Ramesh Oracle DBA [email protected] 1. Abstract This paper presents the need and details of a SQL Organizer tool which organizes the queries in a specific
Huawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
Semantic Object Language Whitepaper Jason Wells Semantic Research Inc.
Semantic Object Language Whitepaper Jason Wells Semantic Research Inc. Abstract While UML is the accepted visual language for object-oriented system modeling, it lacks a common semantic foundation with
Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India [email protected]
A Comparison of Programming Languages for Graphical User Interface Programming
University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange University of Tennessee Honors Thesis Projects University of Tennessee Honors Program 4-2002 A Comparison of Programming
1.1 The Nature of Software... Object-Oriented Software Engineering Practical Software Development using UML and Java. The Nature of Software...
1.1 The Nature of Software... Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering Software is intangible Hard to understand
An Evaluation of Reverse Engineering Tool Capabilities
An Evaluation of Reverse Engineering Tool Capabilities BERNDT BELLAY and HARALD GALL Distributed Systems Group, Technical University of Vienna, A-1040 Vienna, Austria, Europe SUMMARY Reverse engineering
Journal of Information Technology Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION ABSTRACT
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION MAJED ABUSAFIYA NEW MEXICO TECH
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
Address IT costs and streamline operations with IBM service request and asset management solutions.
Service management solutions To support your IT objectives Address IT costs and streamline operations with IBM service request and asset management solutions. Highlights Help service desk technicians become
A Process is Not Just a Flowchart (or a BPMN model)
A Process is Not Just a Flowchart (or a BPMN model) The two methods of representing process designs that I see most frequently are process drawings (typically in Microsoft Visio) and BPMN models (and often
