Visualizing live software systems in 3D
SoftVis '06 Proceedings of the 2006 ACM symposium on Software visualization
Analyzing software evolution through feature views: Research Articles
Journal of Software Maintenance and Evolution: Research and Practice
Aspect-orientation For Revitalising Legacy Business Software
Electronic Notes in Theoretical Computer Science (ENTCS)
ICDL '07 Proceedings of the 2007 international conference on Dynamic languages: in conjunction with the 15th International Smalltalk Joint Conference 2007
Advanced steps with standardized languages in the re-engineering process
Computer Standards & Interfaces
Self-reconfiguration in Highly Available Pervasive Computing Systems
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Execution trace analysis through massive sequence and circular bundle views
Journal of Systems and Software
Automatic identification of key classes in a software system using webmining techniques
Journal of Software Maintenance and Evolution: Research and Practice
Journal of Systems and Software
Towards anomaly comprehension: using structural compression to navigate profiling call-trees
Proceedings of the 5th international symposium on Software visualization
Identification of behavioural and creational design motifs through dynamic analysis
Journal of Software Maintenance and Evolution: Research and Practice
A metamodel for the compact but lossless exchange of execution traces
Software and Systems Modeling (SoSyM)
Clustering methodologies for software engineering
Advances in Software Engineering
Software health management with Bayesian networks
Innovations in Systems and Software Engineering
Hi-index | 0.00 |
Recovering behavioral design models from execution traces is not an easy task due to the sheer size of typical traces. In this paper, we describe a novel technique for achieving this. Our approach is based on filtering traces by distinguishing the utility components from the ones that implement high-level concepts. In the paper, we first define the concept of utilities; then we present an algorithm based on fan-in analysis that can be used for the detection of utilities. To represent the high-level behavioral models, we explore the Use Case Map (UCM) notation, which is a language used to describe and understand emergent behavior of complex and dynamic systems. Finally, we test the validity of our approach on an object-oriented system called TConfig.