Moral dominance relations for program comprehension
Shaw, S.C.; Goldstein, M.; Munro, M.; Burd, E.
Professor Michael Goldstein email@example.com
Dominance trees have been used as a means for reengineering legacy systems into potential reuse candidates. The dominance relation suggests the reuse candidates which are identified by strongly directly dominated subtrees. We review the approach and illustrate how the dominance tree may fail to show the relationship between the strongly direct dominated procedures and the directly dominated procedures. We introduce a relation of generalized conditional independence which strengthens the argument for the adoption of the potential reuse candidates suggested by the dominance tree and explains their relationship with the directly dominated vertices. This leads to an improved dominance tree, the moral dominance tree, which helps aid program comprehension available from the tree. The generalized conditional independence relation also identifies potential reuse candidates that are missed by the dominance relation.
Shaw, S., Goldstein, M., Munro, M., & Burd, E. (2003). Moral dominance relations for program comprehension. IEEE Transactions on Software Engineering, 29(9), 851-863. https://doi.org/10.1109/tse.2003.1232289
|Journal Article Type||Article|
|Online Publication Date||Sep 1, 2003|
|Publication Date||Sep 1, 2003|
|Deposit Date||Oct 8, 2008|
|Publicly Available Date||Oct 8, 2008|
|Journal||IEEE Transactions on Software Engineering|
|Publisher||Institute of Electrical and Electronics Engineers|
|Peer Reviewed||Peer Reviewed|
Published Journal Article
©2003 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
You might also like
A Service Scheduling Security Model for a Cloud Environment
Evaluating a Cloud Service using Scheduling Security Model (SSM)
Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing
Regression test selection model: a comparison between ReTSE and pythia
An Overview of Regression Testing