

Log InSign Up
- Log In
- Sign Up
- more
- About
- Press
- Papers
- Terms
- Privacy
- Copyright
- We're Hiring!
- Help Center
- less
A reverse-engineering approach to subsystem structure identification
infoInfo
keyboard_arrow_downkeyboard_arrow_up
Mehmet Orgun

S. Uhl

Hausi A MullerMehmet Orgun
and more and more

S. Uhl

Hausi A Muller

Mehmet Orgun

S. Uhl

Hausi A Muller
1993, Journal of Software Maintenance: Research and Practice
downloadDownload PDF
descriptionSee full PDF
visibility462
views
Related papers
arrow_back_iosA small primer on software reverse engineeringHausi A Muller
downloadDownload free PDF
Software Reverse engineeringMohammadreza Seifikar
downloadDownload free PDF
New Frontiers of Reverse Engineering New Frontiers of Reverse EngineeringOdra Qalbi
downloadDownload free PDF
Understanding Software Systems Using Reverse Engineering Technologykenny Wong
downloadDownload free PDF
New Frontiers of Reverse EngineeringKavita Patil-Pawar
downloadDownload free PDF
Software Reverse Engineering: Achievements and ChallengesLuigi Cerulo
downloadDownload free PDF
Reverse Engineering Methodology to Recover the Design Artifacts: AMuhammad Faizal
downloadDownload free PDF
Frontiers of reverse engineering: A conceptual modelGerardo Canfora
downloadDownload free PDF
Reverse engineering: a roadmapKenny Wong
downloadDownload free PDF
Empirical studies in reverse engineering: state of the art and future trendsMarco Torchiano
downloadDownload free PDF
Reverse Engineering and Abstraction of Legacy SystemsHeinz Schmidt
downloadDownload free PDF
A Generalized Process of Reverse Engineering in Software Protection & SecurityKrishan kumar
, Prabhpreet Kaur
downloadDownload free PDF
Understanding software systems using reverse engineering technology perspectives from the Rigi projectKenny Wong
downloadDownload free PDF
A Framework For Reverse Engineering Process1Samuel A Ajila
downloadDownload free PDF
arrow_forward_iosView more papers
keyboard_arrow_downAbstract
Reverse engineering is the process of extracting system abstractions and design information out of existing software systems. This process involves the identi cation of software artifacts in a particular subject system, the exploration of how these artifacts interact with one another, and their aggregation to form more abstract system representations that facilitate program understanding.
... Read moreRelated topics
Information SystemsSoftware
closeTitleAbstractIntroductionSubsystem Composition MethodologyCase StudyEncapsulating Data TypesRelated WorkConclusionsReferences
1 of 41
format_list_bulletedOutlineAll TopicsComputer ScienceInformation Systems
bookmark_borderSave
shareShare
Download research papers for free!
Join us!
arrow_forwardRelated papers
Software Reverse Engineering in the Domain of Complex Embedded Systems
Hausi A Muller
downloadDownload free PDF
Towards an effective approach for Reverse Engineering
Vinicius Garcia
downloadDownload free PDF
Introduction to the special issue on reverse engineering (WCRE 2008)
ahmed Hassan
downloadDownload free PDF
Reverse engineering is reverse forward engineering
Ira Baxter
downloadDownload free PDF
Reverse Engineering: An Essence for Software Re-Engineering and Program Analysis
Asit kumar gahalaut
downloadDownload free PDF
Reverse Engineering
Shlok Gandhi
downloadDownload free PDF
References (37)
Aho, A. V., Hopcroft, J. E. and Ullman, J. D. 1974 The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974.ANSI IEEE 1983 `IEEE Standard Glossary of Software Engineering Terminology', ANSI IEEE Standard 729 1983.Arnold, R. S. 1990 `Tutorial on Software Reengineering', Conference on Software Maintenance| 1990, San Diego, California, November 26 29, IEEE Computer Society Press Order number 2091.Belady, L. A. and Evangelisti, C. J. 1982 `System partitioning and its measure', Journal of Systems and Software, 21, pp. 23-29.Brandes, T. and Lewerentz, K. 1985 `GRAS: A non-standard database system within a software development e n vironment', Proceedings of the Workshop on Software Engi- neering Environments for Programming-in-the-large Harwichport, Mass., June 9 12, GTE Laboratories Inc., pp. 113-121.Breuer, P. T. and Lano, K. 1991 `Creating speci cations from code: reverse engineering techniques', Journal of Software Maintenance: Research and Practice, 33, pp. 145- 162.Chikofsky, E. J. and Cross II, J. H. 1990 `Reverse engineering and design recovery: a tax- onomy', IEEE Software 71, pp. 13 17.Choi, A. C. and Scacchi, W. 1990 `Extracting and restructuring the design of large soft- ware systems', IEEE Software, 71, pp. 66-71.Choi, A. C. and Scacchi, W. 1991 `SOFTMAN: environment for forward and reverse CASE', Information and Software T e chnology, 339, pp. 664-674.Corrie, B. 1990 A Workbench for Realistic Image Synthesis, M.Sc. Thesis, Department o f Computer Science, University of Victoria.Dunn, D. and Everitt, B. S. 1982 An Introduction to Mathematical Taxonomy, Cambridge University Press.Fletton, N. T. and Munro, M. 1988 `Redocumenting software systems using hypertext tech- nology', Proceedings of Conference on Software Maintenance 1988, Phoenix, Arizona, October 24-27, IEEE Computer Society Press Order Number 879, pp. 54-59.Forte, G. 1992 `Reverse engineering tools', CASE OUTLOOK, March-April, pp. 5-28.Garg, P. K. and Scacchi, W. 1990 `A hypertext system to manage software life-cycle doc- uments', IEEE Software, 73, pp. 90-98.Hutchins, D. H. and Basili, V. R. 1985 `System structure analysis: clustering with data bindings', IEEE Transactions on Software Engineering, SE-118, pp. 749-757.Kaiser, G. E. and Perry, D. E. 1987 `Workspaces and experimental databases: automated support for software maintenance and evolution', Proceedings of Conference on Soft- ware Maintenance 1987, Austin, Texas, September 21-24, IEEE Computer Society Press Order Number 800, pp. 108-114.Maarek, Y. S. and Kaiser, G. E. 1988 `Change management for very large software sys- tems', Proceedings of Phoenix Conference on Computers and Communications Scotts- dale, Arizona, March 16-18, pp. 280-285.Mata-Montero, M. 1990 Algorithms for Treewidth-Bounded G r aphs, Ph.D. Dissertation, Department of Computer Science, University of Victoria, Victoria, B.C.M uller, H. A. 1990 `Verifying software quality criteria using an interactive graph editor', Proceedings of the Eighth Annual Paci c Northwest Software Quality Conference Port- land, Oregon, October 29-31, pp. 228 241.M uller, H. A. and Klashinsky, K. 1988 `Rigi|A system for programming-in-the-large', Pro- ceedings of the 10th International Conference on Software Engineering ICSE Ra es City, Singapore, April 11-15, IEEE Computer Society Press Order Number 849, pp. 80-86.M uller, H. A., M ohr, J. R. and McDaniel, J. G. 1990 `Applying software re-engineering tech- niques to health information systems', Proceedings of the IMIA Working Conference on Software Engineering in Medical Informatics SEMI Amsterdam, October 8-10, 1990, Editor, T. Timmers and B. I. Blum, Elsevier Science Publishers, pp. 91 110.M uller, H. A., Tilley, S. R., Orgun, M. A., Corrie, B. D., and Madhavji, N. H. 1992 `A re- verse engineering environment based on spatial and visual software interconnection models', SIGSOFT'92: Proceedings of the Fifth ACM SIGSOFT Symposium on Soft- ware Development Environments Tyson's Corner, Virginia, December 9-11, ACM Software Engineering Notes, 175, pp. 88-98.M uller, H. A. and Uhl, J. S. 1990 `Composing subsystem structures using k;2-partite graphs', Proceedings of Conference on Software Maintenance 1990 San Diego, California, Novem- ber 26-29, IEEE Computer Society Press Order Number 2091, pp. 12-19.Myers, G. L. 1975 Reliable Software Through Composite Design, P etrocelli Charter, New York.Newbery, F. J. 1989 `Edge concentration: a method for clustering directed graphs', Pro- ceedings of the 2nd International Workshop on Software Con guration Management Princeton, New Jersey, October 24. ACM SIGSOFT Software Engineering Notes, 177, pp. 76-85.Newbery, F. J. and Tichy, W. F. 1990 `EDGE: an extendible graph editor', Software| Practice & Experience, 201, pp. 63-88.Ossher, H. L. 1984 `Grids: a new program structuring mechanism based on layered graphs', Proceedings of the Eleventh Annual Symposium on Principles of Programming Lan- guages Salt Lake City, Utah. January 15-18, ACM Order Number 549840, pp. 11-22.Perry, D. E. 1987 `Software interconnection models', Proceedings of the 9th International Conference on Software Engineering Monterey, CA, March 30 -April 2, IEEE Com- puter Society Press Order Number 767, pp. 61-69.Perry, D. E. and Kaiser, G. E. 1987 `Infuse: a tool for automatically managing and coor- dinating source changes in large systems', Proceedings of the ACM Fifteenth Annual Computer Science Conference St. Louis, Missouri, ACM Order Number 404870, pp. 292-299.Prieto-Diaz, R. and Neighbors, J. M. 1986 `Module interconnection languages', Journal of Systems and Software, 61986, pp. 307 334.Schwanke, R. W. and Plato , M. A. 1989 `Cross references are features', Proceedings of the 2nd International Workshop on Software Con guration Management Princeton, New Jersey, October 24. ACM SIGSOFT Software Engineering Notes, 177, pp. 86-95.Schwanke, R.W. 1991 `An intelligent tool for re-engineering software modularity', Proceed- ings of the 13th International Conference on Software Engineering ICSE Austin, Texas, May 13-17, IEEE Computer Society Press Order Number 2140, pp. 83-92.Tilley, S. R. 1992 `Management decision support through reverse engineering technology', Proceedings of CASCON'92 Toronto, Ontario, November 9-12, pp. 319-328.Tilley, S. R., M uller, H. A. and Orgun, M. A. 1992 `Documenting software systems With views', Proceedings of ACM SIGDOC'92 Ottawa, Ontario, October 13-16, ACM Or- der Number 613920, pp. 211-219.Selby, R. W. and Basili, V. R. 1988 `Error localization during software maintenance: gen- erating hierarchical descriptions from source code alone', Proceedings of Conference on Software Maintenance 1988 Phoenix, Arizona, October 24-27, IEEE Computer Society Press Order Number 879, pp. 192-197.Uhl, J. S. 1989 Discovering Structure i n L arge Software Systems, M.Sc. Thesis, Depart- ment of Computer Science, University of Victoria, Victoria, B.C.Wolf, A. L., Clarke, L. A. and Wileden, J. C. 1988 `A model of visibility control', IEEE Transactions on Software Engineering, SE-144, pp. 512-520.View more
arrow_downwardAll TopicsComputer ScienceInformation Systems

- Features
- Mentions
- Analytics
- PDF Packages
- Advanced Search
- Search Alerts
- Journals
- Academia.edu Journals
- My submissions
- Reviewer Hub
- Why publish with us
- Testimonials
- Company
- About
- Careers
- Press
- Help Center
- Terms
- Privacy
- Copyright
- Content Policy

580 California St., Suite 400San Francisco, CA, 94104© 2026 Academia. All rights reserved