Reverse Engineering of Object Oriented Code phần 3 doc
... obtained by introducing object sensitivity was proposed in [57], where the possibility of parameterizing the degree of object sensitivity is also discussed. 3. 3 Containers 51 Fig. 3. 3. OFG for the binary ... propagation. 2.5 Object sensitivity 33 The effect of object sensitivity on the accuracy of the OFG consists of a finer grain edge construction, resulting in a more...
Ngày tải lên: 13/08/2014, 08:20
... identification of class in- stances (objects) in the code. The allocation points in the code are used to approximate the set of objects created by a program, while the OFG is used to determine the inter -object ... both on the User (call 4 .3) and on the Document (call 4.4) object. The effect of addLoan on the user (User or InternalUser) is the creation of a reverse link with t...
Ngày tải lên: 13/08/2014, 08:20
... Analysis 51 52 56 59 60 63 64 65 68 74 76 78 79 82 83 84 87 89 90 91 95 98 102 105 106 112 115 116 118 122 125 131 133 134 136 136 140 1 43 148 152 Object Diagram Recovery Object Sensitivity Dynamic Analysis Object Diagram Recovery Discussion Dynamic analysis Interaction ... Program Related Work Reverse Engineering of Object Oriented Code Introduction Reverse...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 4 ppsx
... accesses Document objects (through the association with Loan) inside methodprintInfo (line 32 3), where code and title of borrowed documents are printed (line 33 2). The related method calls (getCode ... kinds of data elements: objects of class A and objects of class B. Object Diagram 4 Object Diagram This chapter describes a technique to statically characterize the behavior...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 5 ppt
... of them during reverse engineering of a given Object Oriented system. 5.2 Interaction Diagram Recovery The static recovery of the interactions among objects is done in two steps: first, the objects ... attribute users of the object Library1 . Similarly, the addition of two books (objects Book1 , Book2 ) and of a journal (object Journal1 ) to the library changes the att...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 6 pptx
... temporary Loan object are obtained (calls 3. 1 and 3. 2), and a call to method removeLoan on both of them (calls number 3. 3 and 3. 4) deletes the associations of these two objects toward the Loan object ... these two objects of type User and Document (calls 4 .3 and 4.4). In this way, a bidirectional association is created between Loan object and User object, and between Lo...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 7 ppt
... with the aim of remodularizing them [4, 54, 99]. Some of such features apply to Object Oriented software as well, and can be used to derive a package diagram from the source code of the classes ... issued inside the code of the classes under analysis. A concept consists of a set of classes performing a set of same method calls, which are not simultaneously made by the c...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 8 pot
... survey of the exist- ing support and of the current practice in reverse engineering is also provided. Once an automated infrastructure for reverse engineering is in place, the process of software ... the association between an object of class User and an object of class Document, implemented by means of two attributes referencing the two classes being associated and by...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 9 ppt
... (doc. getCode() + " - " + doc. getTitle()); } } } file InternalUser.java 32 3 32 4 32 5 32 6 32 7 32 8 32 9 33 0 33 1 33 2 33 3 33 4 33 5 33 6 33 7 33 8 33 9 34 0 34 1 34 2 34 3 34 4 34 5 34 6 class InternalUser extends ... class for the eLib program 36 8 36 9 37 0 37 1 37 2 37 3 37 4 37 5 37 6 37 7 37 8 37 9 38 0 38 1 38 2 38 3 38 4 38 5...
Ngày tải lên: 13/08/2014, 08:20
Reverse Engineering of Object Oriented Code phần 10 pot
... eLib program, 36 , 80, 81 incremental construction of, 34 , 69 information propagated inside, 21, 30 nodes, 26 object insensitivity, 21, 33 , 71 object sensitivity, 21, 32 , 33 , 35 , 68, 72 object sensitivity ... on Software Engineering, pages 433 –4 43, 1997. P. Tonella and A. Potrich. Reverse engineering of the UML class diagram from C++ code in presence of weakly...
Ngày tải lên: 13/08/2014, 08:20