US20010042067A1 - Dynamic semi-structured repository for mining software and software-related information - Google Patents

Dynamic semi-structured repository for mining software and software-related information Download PDF

Info

Publication number
US20010042067A1
US20010042067A1 US09/411,998 US41199899A US2001042067A1 US 20010042067 A1 US20010042067 A1 US 20010042067A1 US 41199899 A US41199899 A US 41199899A US 2001042067 A1 US2001042067 A1 US 2001042067A1
Authority
US
United States
Prior art keywords
reverse engineering
graph
information
repository
engineering system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/411,998
Other versions
US6339776B2 (en
Inventor
Homayoun Dayani-Fard
Igor Jurisica
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/411,998 priority Critical patent/US6339776B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAYANI-FARD, HOMAYOUN, JURISICA, IGOR
Publication of US20010042067A1 publication Critical patent/US20010042067A1/en
Application granted granted Critical
Publication of US6339776B2 publication Critical patent/US6339776B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/74Reverse engineering; Extracting design information from source code
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99932Access augmentation or optimizing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99935Query augmenting and refining, e.g. inexact access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing

Definitions

  • the present invention relates to computer aided software engineering and more particularly to a dynamic and semi-structured repository for reverse engineering software systems.
  • Reverse engineering is the process of understanding how an existing software system works. This process involves extracting data about the software system and creating higher-level abstractions that simplify understanding of the system.
  • reverse engineering involves mapping of the existing software artifact to a design specification and from there to a system specification. The mapping from specification to an implementation is one to many. Based on the knowledge of programming and the application domain, high-level abstractions are constructed. These abstractions represent different views of the system that capture only some essential properties of the software system. Some aspects of reverse engineering, such as data extraction, can be automated, while others cannot. It will be appreciated that reverse engineering even with the development of various reverse engineering tools remains a semi-automated process, which requires the involvement of human programmers.
  • Known reverse engineering tools provide support in the processes of extraction, analysis, and understanding of complex software systems during maintenance and evolution.
  • these tool sets include processes for parsing source code, grouping and filtering of the parsed code, representing derived information in textual and/or graphic forms, and browsing.
  • the Refine/CTM utility is a known extensible workbench for reverse engineering of existing C programs.
  • the Refine/CTM utility provides a C parser and a lexical analyzer and APIs for building customized analysis tools.
  • the RigiTM program which arose out of research at the University of Victoria, is another reverse engineering tool which is based on a graphical editor called rigiedit.
  • the RigiTM tool provides support for partial parsing of programs written in C, C++, PL/I, and COBOL.
  • the RigiTM tool also provides browsing and editing facilities for entities generated by parsing the source code.
  • the Imagix 4DTM program is a reverse engineering tool for C and C++ programs from the Imagix Corporation.
  • the Imagix 4DTM program provides parsing facilities for C and C++ programs as well as views of the program at different levels of abstractions. These views are presented in a 3D format that allows the user to focus on those of immediate interest.
  • reverse engineering inherently is an ill-defined problem due to the difference in levels of expertise of the programmers.
  • the process of reverse engineering has been characterized as exploratory.
  • Many approaches have been put forward for reverse engineering, each with a varying degree of success in industrial settings.
  • These approaches typically use one or more cognitive models of program understanding and support the reverse engineering process by providing a number of tools for extraction, analysis, visualization, and manual editing and browsing. In other words, all these approaches are tool-based.
  • reverse engineering is a time consuming endeavour. It typically takes months before a model of the software system being investigated is constructed, and these models are often inadequate in a number of ways.
  • Relational databases are used for intermediate storage of extracted information. Relational databases provide efficient facilities for querying databases. However, these relational databases are generally not suitable for interactive query of software repositories. As a result, relational databases are usually used during early stages for “off-line” querying. Once the higher-level abstractions are constructed, the relational database is no longer used. Thus, we need a combination of database and knowledge base technologies.
  • the present invention provides a repository-based system for reverse engineering software, particularly legacy software systems.
  • the repository-based system provides mechanisms for incremental building of models of the software system, filtering, grouping, manual manipulation, navigation and querying of software systems as well as history and replay facilities for recreation of models in lieu of changes to the software system.
  • the repository mechanisms are useable with different programming languages and provide the capability for integrating external software tools.
  • the present invention provides a repository-based system for reverse engineering software, and is particularly suited for legacy software systems.
  • the repository-based reverse engineering system combines database and knowledge base technologies which enable the user to capture historical information that is required for dealing with changes in the software system.
  • the repository-based reverse engineering system provides the capability to store extracted data without enforcing a predetermined model, to make incremental updates to the extracted data, to capture knowledge about programming and the software system, to provide analysis tools for finding structure in the extracted data, to interface to external tools such as visualization tools, and to support export and import of information.
  • the repository-based reverse engineering system complements existing technologies for data extraction, analysis, and visualization by providing uniform access to the data extracted from the software system and abstract models build from this data. Furthermore, historical data, in the form of records of operations of the data, would provide insight into the data extraction, generation of models, and the results of previous analyses performed on the software system.
  • the repository-based reverse engineering system features a software information infrastructure for managing the reverse engineering of computer programs in software systems.
  • the repository-based reverse engineering system provides the capability to integrate heterogeneous information sources, to integrate external visualization and analytical tools, and to integrate search and browsing utilities.
  • the storage of semi-structured information in the repository supports highly-evolving data management.
  • the repository-based reverse engineering system includes the following features: a mechanism for flexible graph-based storage of information; and mechanisms for creating multiple levels of information abstractions.
  • the repository-based system includes scalability support through connection to a conventional relational database such as DB2TM.
  • the repository-based system also features a flexible search and browse facility for heterogeneous data sources based on pattern matching, structural searching, fuzzy and incomplete searching, and similarity-based searching.
  • the repository-based reverse engineering system according to the present invention is implemented in the known JavaTM programming language.
  • XML is the specification language for the repository-based reverse engineering system.
  • the present invention provides a system for reverse engineering a computer program, the system includes: (a) means for extracting information related to source code in the computer program; (b)means for storing the extracted information in a semi-structured form; (c) means for creating a plurality of representations of the semi-structured information; and (d) means for updating the semi-structured information.
  • the present invention provides a method for reverse engineering a computer program, the method comprising the steps of: (a) extracting information related to source code in the computer program; (b) storing the extracted information in a semi-structured form; (c) creating a plurality of representations of the semi-structured information, wherein the representations provide means for analyzing the source code.
  • the present invention provides a Data storage media recorded with a computer program which, in combination with a general purpose computer configured for a system for reverse engineering a legacy computer program and said computer being equipped to read into memory and execute program data from the data storage media, constituting a method in accordance with the present invention.
  • FIG. 1 which shows in block diagram form a repository-based reverse engineering system for software systems according to the present invention.
  • FIG. 2 shows in diagrammatic form an edge-labelled tree for the repository-based system according to the present invention.
  • the present invention provides a dynamic semi-structured repository-based system for reverse engineering computer software and legacy systems.
  • the repository-based reverse engineering system utilizes data mining and knowledge discovery in the reverse engineering process. Both activities of data mining and knowledge discovery involve extracting data from software systems, analysis of the extracted data, and deriving new knowledge from existing data or knowledge.
  • the repository-based system provides a mechanism, i.e., an infrastructure, for managing information about a software system, including information storage, retrieval, manipulation, analysis and organization of heterogeneous data.
  • the repository-based reverse engineering system comprises a semi-structured approach based on a graph representation and manipulation to provide flexibility.
  • FIG. 1 shows a repository-based reverse engineering system according to the present invention for reverse engineering a software or legacy software system 1 .
  • the repository-based reverse engineering system 10 is indicated generally by 10 .
  • the repository-based reverse engineering system 10 comprises a relational database 11 , a graph-based repository 12 , a knowledge base subsystem 14 , an information retrieval subsystem 16 , and a history and replay facility module 18 .
  • the relational database 11 is intended primarily for long-term storage of extracted data from the software system 1 that provides access control as well as rudimentary query system.
  • the relational database 11 may be implemented using a conventional product such as DB2TM from IBM.
  • the graph-based repository 12 is a dynamic materialization of a portion of the relational database 11 that may be needed for understanding of the software system 1 .
  • the graph-based repository 12 comprises a complete graph-based view of the underlying database 11 or a projection of the database 11 based on a series of queries.
  • the graph-based representation provides an extension of the underlying relational database 11 and is used to abstract information in order to create dynamic views and models of the software system 1 . As shown in FIG.
  • multiple views 20 shown individually as 20 a , 20 b and 20 c , of the graph-based data repository 12 can be constructed using a conventional graph query system as will be within the understanding of one skilled in the art.
  • the views 20 are purely syntactic and present simple abstractions of the graph-based data repository 12 on the generating query.
  • the information retrieval subsystem 16 and the knowledge base subsystem 14 provide assistance in the refinement of the views 20 into abstract models 22 .
  • the models 22 are shown individually as Model 1 ( 22 a ) and Model 2 ( 22 b ) in FIG. 1.
  • the information retrieval subsystem 16 captures the vocabulary of the graph-based data repository 12 , and provides a thesaurus, and idioms of the software system 1 being investigated.
  • the knowledge base subsystem 14 captures semantic information about programming in general, the application domain, and the software system 1 being analyzed. It will be appreciated that the knowledge base subsystem 14 complements the syntactic information of the information retrieval subsystem 16 .
  • the notion of vocabulary and idioms have been investigated predominantly in the field of automatic programming as will be understood by those skilled in the art.
  • a human user utilizes the generated views 20 to construct the abstract models 22 , i.e. higher-level abstractions. It will be appreciated that the models 22 or abstractions are refinements of the views 20 and are based on input 24 from the human user, the information retrieval subsystem 16 , and the knowledge base subsystem 14 .
  • the models 22 can be further analyzed using external tools 26 , shown individually as 26 a and 26 b in FIG. 1.
  • the external tool 26 a may comprise a visualizing tool for manually editing the model 22 b .
  • the actions of the repository-based reverse engineering system 10 are recorded by the history and replay facility module 18 and are replayed to show the construction process of the models 22 .
  • the information captured in the history and replay facility module 18 may be used for evaluation of the evolution of the legacy software system 1 and also for reconstruction of the user-defined views 20 .
  • a change in the database 11 must propagate through the graph-based data repository 12 , the views 20 , and the abstract models 22 that have been created from the database 11 . It will be appreciated that such a feature is very useful since there will typically be a series of changes in the software system 1 and a user's understanding of the system 1 must reflect these changes.
  • the repository-based reverse engineering system 10 includes an external interface 30 .
  • the external interface 30 provides external tools with direct access to the relational database 11 through SQL queries, to the graph-based data repository 12 through the graph query language provided by the repository, and public application program interfaces or APIs.
  • the external interfaces 30 provide flexibility to users to integrate their preferred tools with the repository-based system 10 .
  • the repository-based reverse engineering system 10 is implemented in the well-known JavaTM programming language. This allows advantage to be taken of Web (i.e. Internet) technology.
  • information for the source code in the legacy software system 1 is extracted using the javap utility in the Java language.
  • information about files and directory structures can be extracted using shell scripts as will be within the understanding of one skilled in the art. Shell scripts are then used to construct the graph-based data repository 12 .
  • Other types of information, such as author names, are then manually annotated to the data repository 12 .
  • the repository-based system 10 uses XML for data transfer.
  • the graph-based data repository 12 is implemented with an edge-labelled tree, similar to that found in a UNIX directory structure.
  • each arc has a unique ID, a label, and a set of attributes.
  • the labels are strings of characters and need not be unique.
  • the ID uniquely identifies an arc in the tree.
  • the attribute set provides facilities for storing information about an arc. Nodes in the tree connect arcs in the tree, and contain no information except a reference to outgoing arcs.
  • the repository 10 also preferably includes a table of all labels in the tree with references to their corresponding arcs.
  • the graph-based data repository 12 supports soft links which allows arcs to connect different sub-trees in the tree. Using soft links allows the creation of cycles in the graph-based data repository 12 .
  • FIG. 2 shows a portion of an edge-labelled tree 100 for a graph-based data repository 12 in accordance with the present invention.
  • the tree 100 includes a soft link 101 .
  • the soft link 101 links an arc 102 with the label “author” (on the left side of the tree 100 ) to an arc 104 with the label “classes” (i.e. on the right side of the tree 100 ).
  • leaf nodes 110 may comprise simple values such as a number or a string.
  • the value stored at a node 110 may be interpreted by other tools, for example, as file names, offsets into a file, etc.
  • the graph-based data repository 12 provides facilities for constructing, adding, and deleting information.
  • the query engine integrated with the repository 12 provides both navigation and searching of the tree 100 using arc labels. Searching can be performed either on the entire structure, including the soft links (e.g. 101 ), or only on the tree portion 100 of the structure. If the searching includes soft links, then the query system utilizes a cycle detection mechanism.
  • a query on the data repository 12 is implemented as a search for a given path string, where a path string is a sequence of labels. For example, the query for “project/classes” identifies all paths from the root of the tree 100 with a first arc 112 having the label “project” and a second arc having the label “classes”. In the tree 100 , there are two such paths: the arc 104 and arc 114 .
  • the repository-based system 10 preferably includes a bookmarking facility.
  • a bookmark provides a relative point of reference for query paths. For example, if the arc 116 labelled “people” is bookmarked, then queries relative to this bookmark can be performed. In this case, the query “user/author” expresses all paths from the bookmark “people” with labels “user” and “author”.
  • the following types of queries can be performed with the tree 100 shown in FIG. 2: a simple query, a simple query with wild card labels, and a regular expression query.
  • the simple query specifies a set of paths in the tree 100 that match a given sequence of labels. For example, the query “project/people/user” results in two paths from the root to arcs labelled “user” through the sequence of arcs labelled “project” and “people”.
  • the simple query with wild card labels extends the sequence of labels with the use of wild characters such as “*” (zero or more characters), “?” (one character), or “+” (one or more characters).
  • the result of the query “project/peo*/user” is identical to the simple query “project/people/user” as described above.
  • the regular expression query allows a wild character to be used for a number of labels.
  • the character “*” refers to zero or more levels with any labels.
  • the character “?” refers to one level with any label, and the character “+” refers to one or more levels of any label.
  • the result of the query “project/people/*/name” is all paths from the root to arcs labelled “name” such that the first two levels are labelled “project” and “people” respectively.
  • the graph-based data repository 12 provides a simple and unstructured mechanism for storing information about the software system 1 .
  • the information can be incrementally added to the repository and a history of the operations performed can be recorded or logged in the history and replay facilities module 18 .
  • conventional syntactic query tools allow for further exploration of the graph-based data repository 12 .
  • the repository-based system 10 also keeps a dictionary in the information retrieval subsystem 16 of all labels in the data repository 12 that can possibly be used by external information retrieval tools.
  • the repository-based reverse engineering system 10 preferably includes the following features: support for the storage of large volumes of data gathered from various types of sources using various extraction tools; support for incremental building and updating of models; fast and reliable query facilities that can be used for manipulation of the data; facilities for representing software and programming knowledge that can be used for constructions of high-level query facilities; facilities by which users can define “metrics” (i.e. quantitative measures) on the data store; history and replay mechanisms that can be used for re- creation of user defined views; well-defined interfaces by which external tools can communicate with the repository.
  • metrics i.e. quantitative measures

Abstract

A repository-based reverse engineering system for software systems and particularly legacy software systems. The reverse engineering system includes a graph-based data repository which holds data extracted from the source code in the software system. The graph-based data repository holds the data in a semi-structured form. The reverse engineering system includes mechanisms for constructing views on top of the extracted data and mechanisms for creating model abstractions on top of the views. The graph-based data repository provides flexible search and browse capabilities including pattern matching, structural searching, fuzzy and incomplete searching, and similarity-based searching. The system further includes an interface facility for external tools. The repository-based reverse engineering system enables integration of heterogeneous information sources, integration of external visualization and analytical tools, and searching and browsing facilities.

Description

    FIELD OF THE INVENTION
  • The present invention relates to computer aided software engineering and more particularly to a dynamic and semi-structured repository for reverse engineering software systems. [0001]
  • BACKGROUND OF THE INVENTION
  • Software systems are business assets, and typically critical assets. Existing software systems have become increasingly larger and more complex with lifetimes that are much longer than planned. Systems, as a whole, continually change. These changes, in turn, must propagate to all subsystems including software systems. Changes in a software system can be due to changes in the requirement specification, for example a change in government regulations, or as a result of changes in the operating environment, for example a change in the operating system. Other common changes can be corrective and in response to the detection of “bugs”. Software systems are called legacy systems when they are mature, large in size, complex, and their documentation is limited. Generally such systems are business assets that cannot be replaced or retired easily. The existence of a large number of legacy systems has generated interest in building computer software tools that help understand the architecture and functionality of these systems. [0002]
  • The issue of change in software systems is often addressed under the title of maintenance or evolution. It is well known that software maintenance is both critical and time consuming. Reports of software maintenance research suggest that a large portion of the software life cycle (50% to 90%) is invested in maintenance. [0003]
  • A primary difficulty in maintaining software is coming to an understanding of the underlying source code. Software maintenance engineers are generally different than original designers, who are in most cases no longer available. Furthermore, many companies assign their newly hired programmers to the task of maintenance of software systems. The main source of understanding, in such cases, is the internal documentation which was prepared for the software. [0004]
  • Software documentation is generally incomplete, outdated, or simply non-existent. Under the competitive pressures of today's software industry, documenting programs is considered secondary and often treated as an afterthought. In cases where documentation is available and up-to-date, it still may provide little help since it is often written text, augmented with sketches that provide only one view of the software system. Thus, a large portion of maintenance time is spent on understanding the software system by investigating the actual source code and talking to programmers with more expertise (i.e., mentoring). [0005]
  • The problem of maintenance is exacerbated by the short turn around time of software professionals: on average two to three years. Programmers either change projects, take promotions, or move for employment elsewhere. The combination of program understanding difficulties and short turnaround time of programmers has resulted in higher costs of training and, in turn, higher costs for maintaining the software systems. [0006]
  • The proposed solution to the problems of maintaining existing software systems involves the use of reverse engineering techniques. [0007]
  • Reverse engineering is the process of understanding how an existing software system works. This process involves extracting data about the software system and creating higher-level abstractions that simplify understanding of the system. In simple terms, reverse engineering involves mapping of the existing software artifact to a design specification and from there to a system specification. The mapping from specification to an implementation is one to many. Based on the knowledge of programming and the application domain, high-level abstractions are constructed. These abstractions represent different views of the system that capture only some essential properties of the software system. Some aspects of reverse engineering, such as data extraction, can be automated, while others cannot. It will be appreciated that reverse engineering even with the development of various reverse engineering tools remains a semi-automated process, which requires the involvement of human programmers. [0008]
  • Known reverse engineering tools provide support in the processes of extraction, analysis, and understanding of complex software systems during maintenance and evolution. Typically these tool sets include processes for parsing source code, grouping and filtering of the parsed code, representing derived information in textual and/or graphic forms, and browsing. [0009]
  • The Refine/C™ utility is a known extensible workbench for reverse engineering of existing C programs. The Refine/C™ utility provides a C parser and a lexical analyzer and APIs for building customized analysis tools. The Rigi™ program, which arose out of research at the University of Victoria, is another reverse engineering tool which is based on a graphical editor called rigiedit. The Rigi™ tool provides support for partial parsing of programs written in C, C++, PL/I, and COBOL. The Rigi™ tool also provides browsing and editing facilities for entities generated by parsing the source code. [0010]
  • The Imagix 4D™ program is a reverse engineering tool for C and C++ programs from the Imagix Corporation. The Imagix 4D™ program provides parsing facilities for C and C++ programs as well as views of the program at different levels of abstractions. These views are presented in a 3D format that allows the user to focus on those of immediate interest. [0011]
  • Also of note are tools that were developed for the purpose of architectural discovery. An example of such a tool is the Dali™ program, which was developed by Software Engineering Institute. The Dali™ program is a combination of various tools. It uses existing parsers for extracting information, a relational database for storing the extracted information, and Rigi™ for viewing and editing the extracted information. Each of the tools mentioned here has been applied to moderate sized software systems with some success. [0012]
  • In view of the foregoing, it will be appreciated that reverse engineering inherently is an ill-defined problem due to the difference in levels of expertise of the programmers. As a result, the process of reverse engineering has been characterized as exploratory. Many approaches have been put forward for reverse engineering, each with a varying degree of success in industrial settings. These approaches typically use one or more cognitive models of program understanding and support the reverse engineering process by providing a number of tools for extraction, analysis, visualization, and manual editing and browsing. In other words, all these approaches are tool-based. Unfortunately, reverse engineering is a time consuming endeavour. It typically takes months before a model of the software system being investigated is constructed, and these models are often inadequate in a number of ways. First, owners of software systems generally do not have an ability to generate and investigate models of the existing software system. The models are mostly constructed by using specific tools and the creation of new models requires the construction of new tools or the modification of existing ones. Second, searching capabilities are limited. In some cases, relational databases are used for intermediate storage of extracted information. Relational databases provide efficient facilities for querying databases. However, these relational databases are generally not suitable for interactive query of software repositories. As a result, relational databases are usually used during early stages for “off-line” querying. Once the higher-level abstractions are constructed, the relational database is no longer used. Thus, we need a combination of database and knowledge base technologies. [0013]
  • Third, most conventional reverse engineering tools lack history and replay mechanisms. The process or reverse engineering, in other words, is once again in the minds of those involved in the initial process. Fourth, reverse engineering tools are centered around parsing engines. These tools rarely provide partial or incremental parsing, and as a result they are generally weak in incremental model building and reasoning in the presence of incomplete and unresolved references. Fifth, the tool-centric views of reverse engineering approaches do not provide sufficient support for integrating external tools. [0014]
  • The increase in size and complexity of software systems combined with their long lifetime has shifted the focus from design to maintenance and evolution. A key issue in maintaining legacy software systems is to understand them. Understanding large software systems involves abstracting away nonessential details and focussing on what is needed for the task at hand. For example, if changes in a software specification require integrating a new subsystem, it may only be necessary to understand the interfaces for the software system as opposed to details of the entire system. [0015]
  • Current reverse engineering technologies focus mainly on ad hoc tools that are designed for specific tasks: construction of data-flow graphs, control-flow graphs, call graphs, etc. The information captured by these tools, and the knowledge invested in construction of them are not readily usable by other systems. Further, software systems, as well as the personnel involved in maintaining them, continually change. There must be a way to understand software systems that can respond to continuous change. The challenge is to build tools that support knowledge interchange and work in dynamic environments. [0016]
  • Accordingly, in view of the shortcomings associated with existing reverse engineering techniques there still remains a need in the art. The present invention provides a repository-based system for reverse engineering software, particularly legacy software systems. The repository-based system according to the invention provides mechanisms for incremental building of models of the software system, filtering, grouping, manual manipulation, navigation and querying of software systems as well as history and replay facilities for recreation of models in lieu of changes to the software system. Advantageously, the repository mechanisms are useable with different programming languages and provide the capability for integrating external software tools. [0017]
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention provides a repository-based system for reverse engineering software, and is particularly suited for legacy software systems. [0018]
  • The repository-based reverse engineering system according to the present invention combines database and knowledge base technologies which enable the user to capture historical information that is required for dealing with changes in the software system. The repository-based reverse engineering system provides the capability to store extracted data without enforcing a predetermined model, to make incremental updates to the extracted data, to capture knowledge about programming and the software system, to provide analysis tools for finding structure in the extracted data, to interface to external tools such as visualization tools, and to support export and import of information. The repository-based reverse engineering system complements existing technologies for data extraction, analysis, and visualization by providing uniform access to the data extracted from the software system and abstract models build from this data. Furthermore, historical data, in the form of records of operations of the data, would provide insight into the data extraction, generation of models, and the results of previous analyses performed on the software system. [0019]
  • The repository-based reverse engineering system features a software information infrastructure for managing the reverse engineering of computer programs in software systems. [0020]
  • The repository-based reverse engineering system provides the capability to integrate heterogeneous information sources, to integrate external visualization and analytical tools, and to integrate search and browsing utilities. Advantageously, the storage of semi-structured information in the repository supports highly-evolving data management. [0021]
  • The repository-based reverse engineering system includes the following features: a mechanism for flexible graph-based storage of information; and mechanisms for creating multiple levels of information abstractions. The repository-based system includes scalability support through connection to a conventional relational database such as DB2™. The repository-based system also features a flexible search and browse facility for heterogeneous data sources based on pattern matching, structural searching, fuzzy and incomplete searching, and similarity-based searching. [0022]
  • In one embodiment, the repository-based reverse engineering system according to the present invention is implemented in the known Java™ programming language. In another embodiment, XML is the specification language for the repository-based reverse engineering system. [0023]
  • In a first aspect, the present invention provides a system for reverse engineering a computer program, the system includes: (a) means for extracting information related to source code in the computer program; (b)means for storing the extracted information in a semi-structured form; (c) means for creating a plurality of representations of the semi-structured information; and (d) means for updating the semi-structured information. [0024]
  • In another aspect, the present invention provides a method for reverse engineering a computer program, the method comprising the steps of: (a) extracting information related to source code in the computer program; (b) storing the extracted information in a semi-structured form; (c) creating a plurality of representations of the semi-structured information, wherein the representations provide means for analyzing the source code. [0025]
  • In yet another aspect, the present invention provides a Data storage media recorded with a computer program which, in combination with a general purpose computer configured for a system for reverse engineering a legacy computer program and said computer being equipped to read into memory and execute program data from the data storage media, constituting a method in accordance with the present invention.[0026]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Reference will now be made to the accompanying drawings which show, by way of example, preferred embodiments of the present invention, and in which: [0027]
  • FIG. 1 which shows in block diagram form a repository-based reverse engineering system for software systems according to the present invention; and [0028]
  • FIG. 2 shows in diagrammatic form an edge-labelled tree for the repository-based system according to the present invention.[0029]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention provides a dynamic semi-structured repository-based system for reverse engineering computer software and legacy systems. As will be described in more detail, the repository-based reverse engineering system utilizes data mining and knowledge discovery in the reverse engineering process. Both activities of data mining and knowledge discovery involve extracting data from software systems, analysis of the extracted data, and deriving new knowledge from existing data or knowledge. The repository-based system provides a mechanism, i.e., an infrastructure, for managing information about a software system, including information storage, retrieval, manipulation, analysis and organization of heterogeneous data. The repository-based reverse engineering system comprises a semi-structured approach based on a graph representation and manipulation to provide flexibility. [0030]
  • Reference is made to FIG. 1 which shows a repository-based reverse engineering system according to the present invention for reverse engineering a software or [0031] legacy software system 1. The repository-based reverse engineering system 10 is indicated generally by 10. As shown in FIG. 1, the repository-based reverse engineering system 10 comprises a relational database 11, a graph-based repository 12, a knowledge base subsystem 14, an information retrieval subsystem 16, and a history and replay facility module 18.
  • The [0032] relational database 11 is intended primarily for long-term storage of extracted data from the software system 1 that provides access control as well as rudimentary query system.
  • The [0033] relational database 11 may be implemented using a conventional product such as DB2™ from IBM. The graph-based repository 12 is a dynamic materialization of a portion of the relational database 11 that may be needed for understanding of the software system 1. The graph-based repository 12 comprises a complete graph-based view of the underlying database 11 or a projection of the database 11 based on a series of queries. The graph-based representation provides an extension of the underlying relational database 11 and is used to abstract information in order to create dynamic views and models of the software system 1. As shown in FIG. 1, multiple views 20, shown individually as 20 a, 20 b and 20 c, of the graph-based data repository 12 can be constructed using a conventional graph query system as will be within the understanding of one skilled in the art. The views 20 are purely syntactic and present simple abstractions of the graph-based data repository 12 on the generating query.
  • In the repository-based [0034] reverse engineering system 10, the information retrieval subsystem 16, and the knowledge base subsystem 14 provide assistance in the refinement of the views 20 into abstract models 22. The models 22 are shown individually as Model 1 (22 a) and Model 2 (22 b) in FIG. 1. The information retrieval subsystem 16 captures the vocabulary of the graph-based data repository 12, and provides a thesaurus, and idioms of the software system 1 being investigated. The knowledge base subsystem 14 captures semantic information about programming in general, the application domain, and the software system 1 being analyzed. It will be appreciated that the knowledge base subsystem 14 complements the syntactic information of the information retrieval subsystem 16. The notion of vocabulary and idioms have been investigated predominantly in the field of automatic programming as will be understood by those skilled in the art.
  • A human user utilizes the generated views [0035] 20 to construct the abstract models 22, i.e. higher-level abstractions. It will be appreciated that the models 22 or abstractions are refinements of the views 20 and are based on input 24 from the human user, the information retrieval subsystem 16, and the knowledge base subsystem 14. The models 22 can be further analyzed using external tools 26, shown individually as 26 a and 26 b in FIG. 1. For example, the external tool 26 a may comprise a visualizing tool for manually editing the model 22 b. The actions of the repository-based reverse engineering system 10 are recorded by the history and replay facility module 18 and are replayed to show the construction process of the models 22. The information captured in the history and replay facility module 18 may be used for evaluation of the evolution of the legacy software system 1 and also for reconstruction of the user-defined views 20. For example, a change in the database 11 must propagate through the graph-based data repository 12, the views 20, and the abstract models 22 that have been created from the database 11. It will be appreciated that such a feature is very useful since there will typically be a series of changes in the software system 1 and a user's understanding of the system 1 must reflect these changes.
  • The repository-based [0036] reverse engineering system 10 includes an external interface 30. The external interface 30 provides external tools with direct access to the relational database 11 through SQL queries, to the graph-based data repository 12 through the graph query language provided by the repository, and public application program interfaces or APIs. The external interfaces 30 provide flexibility to users to integrate their preferred tools with the repository-based system 10.
  • In terms of implementation, according to one embodiment, the repository-based [0037] reverse engineering system 10 is implemented in the well-known Java™ programming language. This allows advantage to be taken of Web (i.e. Internet) technology. For the Java™ implementation, information for the source code in the legacy software system 1 is extracted using the javap utility in the Java language. For example, information about files and directory structures can be extracted using shell scripts as will be within the understanding of one skilled in the art. Shell scripts are then used to construct the graph-based data repository 12. Other types of information, such as author names, are then manually annotated to the data repository 12. In another embodiment, the repository-based system 10 uses XML for data transfer.
  • According to one embodiment of the invention, the graph-based [0038] data repository 12 is implemented with an edge-labelled tree, similar to that found in a UNIX directory structure. In the edge-labelled tree, each arc has a unique ID, a label, and a set of attributes. The labels are strings of characters and need not be unique. The ID uniquely identifies an arc in the tree. The attribute set provides facilities for storing information about an arc. Nodes in the tree connect arcs in the tree, and contain no information except a reference to outgoing arcs. The repository 10 also preferably includes a table of all labels in the tree with references to their corresponding arcs.
  • The graph-based [0039] data repository 12 supports soft links which allows arcs to connect different sub-trees in the tree. Using soft links allows the creation of cycles in the graph-based data repository 12. Reference is made to FIG. 2 which shows a portion of an edge-labelled tree 100 for a graph-based data repository 12 in accordance with the present invention. The tree 100 includes a soft link 101. As shown in FIG. 2, the soft link 101 links an arc 102 with the label “author” (on the left side of the tree 100) to an arc 104 with the label “classes” (i.e. on the right side of the tree 100).
  • In the tree [0040] 100, leaf nodes 110, shown individually as 110 a, 110 b, 110 c, 110 d, 110 f, . . . ., may comprise simple values such as a number or a string. The value stored at a node 110 may be interpreted by other tools, for example, as file names, offsets into a file, etc.
  • According to this aspect, the graph-based [0041] data repository 12 provides facilities for constructing, adding, and deleting information. The query engine integrated with the repository 12 provides both navigation and searching of the tree 100 using arc labels. Searching can be performed either on the entire structure, including the soft links (e.g. 101), or only on the tree portion 100 of the structure. If the searching includes soft links, then the query system utilizes a cycle detection mechanism. A query on the data repository 12 is implemented as a search for a given path string, where a path string is a sequence of labels. For example, the query for “project/classes” identifies all paths from the root of the tree 100 with a first arc 112 having the label “project” and a second arc having the label “classes”. In the tree 100, there are two such paths: the arc 104 and arc 114.
  • To simplify query expressions and make navigation easier, the repository-based [0042] system 10 preferably includes a bookmarking facility. In known manner, a bookmark provides a relative point of reference for query paths. For example, if the arc 116 labelled “people” is bookmarked, then queries relative to this bookmark can be performed. In this case, the query “user/author” expresses all paths from the bookmark “people” with labels “user” and “author”.
  • In addition, the following types of queries can be performed with the tree [0043] 100 shown in FIG. 2: a simple query, a simple query with wild card labels, and a regular expression query. The simple query specifies a set of paths in the tree 100 that match a given sequence of labels. For example, the query “project/people/user” results in two paths from the root to arcs labelled “user” through the sequence of arcs labelled “project” and “people”. The simple query with wild card labels extends the sequence of labels with the use of wild characters such as “*” (zero or more characters), “?” (one character), or “+” (one or more characters). For example, the result of the query “project/peo*/user” is identical to the simple query “project/people/user” as described above. The regular expression query allows a wild character to be used for a number of labels. The character “*” refers to zero or more levels with any labels. The character “?” refers to one level with any label, and the character “+” refers to one or more levels of any label. For example, the result of the query “project/people/*/name” is all paths from the root to arcs labelled “name” such that the first two levels are labelled “project” and “people” respectively.
  • It will be appreciated that the graph-based [0044] data repository 12 according to this aspect of the invention provides a simple and unstructured mechanism for storing information about the software system 1. The information can be incrementally added to the repository and a history of the operations performed can be recorded or logged in the history and replay facilities module 18. Furthermore, conventional syntactic query tools allow for further exploration of the graph-based data repository 12. The repository-based system 10 also keeps a dictionary in the information retrieval subsystem 16 of all labels in the data repository 12 that can possibly be used by external information retrieval tools.
  • In summary, the repository-based [0045] reverse engineering system 10 according to the present invention preferably includes the following features: support for the storage of large volumes of data gathered from various types of sources using various extraction tools; support for incremental building and updating of models; fast and reliable query facilities that can be used for manipulation of the data; facilities for representing software and programming knowledge that can be used for constructions of high-level query facilities; facilities by which users can define “metrics” (i.e. quantitative measures) on the data store; history and replay mechanisms that can be used for re- creation of user defined views; well-defined interfaces by which external tools can communicate with the repository.
  • The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Therefore, the presently discussed embodiments are considered to be illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. [0046]

Claims (20)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A system for reverse engineering a computer program, said system comprising:
(a) means for extracting information related to source code in the computer program;
(b) means for storing said extracted information in a semi-structured form;
(c) means for creating a plurality of representations of said semi-structured information; and
(d) means for updating said semi-structured information.
2. The reverse engineering system as claimed in
claim 1
, wherein said means for storing said extracted information in a semi-structured form comprises a graph-based data repository.
3. The reverse engineering system as claimed in
claim 2
, further including means for searching said graph-based data repository.
4. The reverse engineering system as claimed in
claim 3
, wherein said means for searching includes means for performing a regular expression search on said graph-based data repository.
5. The reverse engineering system as claimed in
claim 4
, wherein said means for searching includes means for performing similarity-based retrieval searches on said graph-based data repository.
6. The reverse engineering system as claimed in
claim 2
, wherein said representations comprise one or more views of said semi-structured information contained in said graph-based data repository.
7. The reverse engineering system as claimed in
claim 6
, further including means for creating another level of representations on top of said views.
8. The reverse engineering system as claimed in
claim 1
, further including relational database means for storing said extracted information and relational query means for querying said extracted information stored in said relational database means.
9. The reverse engineering system as claimed in
claim 1
, further including an interface for interfacing external tools to provide access to said extracted information.
10. The reverse engineering system as claimed in
claim 9
, further including a knowledge subsystem for storing definitional data related to said extracted information.
11. The reverse engineering system as claimed in
claim 10
, further including a trace and replay subsystem for tracing and replaying operations associated with said extracted information.
12. The reverse engineering system as claimed in
claim 10
, wherein said knowledge subsystem comprises a dictionary of labels for use by external information retrieval systems.
13. A method for reverse engineering a computer program, said method comprising the steps of:
(a) extracting information related to source code in the computer program;
(b) storing said extracted information in a semi-structured form;
(c) creating a plurality of representations of said semi-structured information, wherein said representations provide means for analyzing said source code.
14. The method as claimed in
claim 13
, wherein said step of storing comprises storing said extracted information in a graph-based data repository.
15. The method as claimed in
claim 14
, further including the step of searching said graph- based data repository, said step of searching including performing a regular expression search or similarity-based search.
16. The method as claimed in
claim 15
, wherein said step of creating representations comprises constructing one or more views of said semi-structured information contained in said graph-based data repository.
17. The method as claimed in
claim 13
, further including the step of storing said extracted information in a relational database.
18. The method as claimed in
claim 17
, further including the step of performing relational queries on said extracted information stored in said relational database.
19. The method as claimed in
claim 18
, further including the step of extracting information from said relational queries and storing said extracted information in said graph-based data repository.
20. Data storage media recorded with a computer program which, in combination with a general purpose computer configured for a system for reverse engineering a legacy computer program and said computer being equipped to read into memory and execute program data from the data storage media, constituting a method in accordance with any of claims 13, 14, 15, 16, 17 or 18.
US09/411,998 1999-10-04 1999-10-04 Dynamic semi-structured repository for mining software and software-related information Expired - Fee Related US6339776B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/411,998 US6339776B2 (en) 1999-10-04 1999-10-04 Dynamic semi-structured repository for mining software and software-related information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/411,998 US6339776B2 (en) 1999-10-04 1999-10-04 Dynamic semi-structured repository for mining software and software-related information

Publications (2)

Publication Number Publication Date
US20010042067A1 true US20010042067A1 (en) 2001-11-15
US6339776B2 US6339776B2 (en) 2002-01-15

Family

ID=23631140

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/411,998 Expired - Fee Related US6339776B2 (en) 1999-10-04 1999-10-04 Dynamic semi-structured repository for mining software and software-related information

Country Status (1)

Country Link
US (1) US6339776B2 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050033733A1 (en) * 2001-02-26 2005-02-10 Ori Software Development Ltd. Encoding semi-structured data for efficient search and browsing
US20050050076A1 (en) * 2003-08-28 2005-03-03 International Business Machines Corporation System and method for carrying out legacy application transitions
US20060026157A1 (en) * 2004-06-29 2006-02-02 Rahul Gupta Methods, apparatus and computer programs for evaluating and using a resilient data representation
US20060265700A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for pattern-based system design analysis
US20060265697A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Pattern query language
US20060265698A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for tracking changes in a system
US20060265699A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for pattern-based system design analysis using a meta model
WO2006126989A1 (en) * 2005-05-20 2006-11-30 Sun Microsystems, Inc., Method and apparatus for pattern-based system design analysis
WO2006126991A1 (en) * 2005-05-20 2006-11-30 Sun Microsystems, Inc. Method and apparatus for generating components for pattern-based system design analysis using a characteristics model
US20070245320A1 (en) * 2006-02-10 2007-10-18 Make Technologies Inc. Legacy Software Modernization System
US7353221B1 (en) * 1999-03-09 2008-04-01 Siemens Aktiengesellschaft Method for the automatic retrieval of engineering data of systems
WO2008037656A2 (en) * 2006-09-25 2008-04-03 Robert Bosch Gmbh Computer-based tool and method for extracting the functional code of control appliances
US20080114812A1 (en) * 2004-11-19 2008-05-15 Bea Systems, Inc. Data object identification, tracking, filtering and monitoring using data object fingerprints in a repository
EP1970810A2 (en) * 2007-01-05 2008-09-17 Hitachi, Ltd. Program creation support
US7653898B1 (en) 2005-05-20 2010-01-26 Sun Microsystems, Inc. Method and apparatus for generating a characteristics model for a pattern-based system design analysis using a schema
US20120158791A1 (en) * 2010-12-21 2012-06-21 Microsoft Corporation Feature vector construction
WO2014064545A1 (en) * 2012-10-23 2014-05-01 International Business Machines Corporation Maintaining integrity of output of code generators
CN104133681A (en) * 2014-07-28 2014-11-05 浪潮(北京)电子信息产业有限公司 Ambari-web end architecture analysis method
US20160261466A1 (en) * 2014-09-17 2016-09-08 Siemens Aktiengesellschaft Method and Digital Tool for Engineering Software Architectures of Complex Cyber-Physical Systems of Different Technical Domains
CN106126225A (en) * 2016-06-22 2016-11-16 华东师范大学 A kind of object code reverse engineering approach based on program evolution model
US20170139685A1 (en) * 2014-06-25 2017-05-18 Chengdu Puzhong Software Limted Company Visual software modeling method to construct software views based on a software meta view
CN110347954A (en) * 2019-05-24 2019-10-18 北京因特睿软件有限公司 Service method towards complicated Web application

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001046798A2 (en) * 1999-12-20 2001-06-28 Headway Research Limited System and method for computer-aided graph-based dependency analysis
US6510434B1 (en) * 1999-12-29 2003-01-21 Bellsouth Intellectual Property Corporation System and method for retrieving information from a database using an index of XML tags and metafiles
US6581062B1 (en) * 2000-03-02 2003-06-17 Nimble Technology, Inc. Method and apparatus for storing semi-structured data in a structured manner
US7152062B1 (en) 2000-11-21 2006-12-19 Actuate Corporation Technique for encapsulating a query definition
US6449620B1 (en) * 2000-03-02 2002-09-10 Nimble Technology, Inc. Method and apparatus for generating information pages using semi-structured data stored in a structured manner
US7124144B2 (en) * 2000-03-02 2006-10-17 Actuate Corporation Method and apparatus for storing semi-structured data in a structured manner
US7707159B2 (en) * 2000-03-02 2010-04-27 Actuate Corporation Method and apparatus for storing semi-structured data in a structured manner
US7043457B1 (en) 2000-06-28 2006-05-09 Probuild, Inc. System and method for managing and evaluating network commodities purchasing
AU2001281023A1 (en) 2000-08-01 2002-04-08 Nimble Technology, Inc. Nested conditional relations (ncr) model and algebra
US6917937B1 (en) 2000-11-01 2005-07-12 Sas Institute Inc. Server-side object filtering
US7380239B1 (en) * 2001-05-31 2008-05-27 Oracle International Corporation Method and mechanism for diagnosing computer applications using traces
US7447687B2 (en) 2002-05-10 2008-11-04 International Business Machines Corporation Methods to browse database query information
US6947929B2 (en) * 2002-05-10 2005-09-20 International Business Machines Corporation Systems, methods and computer program products to determine useful relationships and dimensions of a database
US7512954B2 (en) * 2002-07-29 2009-03-31 Oracle International Corporation Method and mechanism for debugging a series of related events within a computer system
US7716167B2 (en) * 2002-12-18 2010-05-11 International Business Machines Corporation System and method for automatically building an OLAP model in a relational database
US7953694B2 (en) * 2003-01-13 2011-05-31 International Business Machines Corporation Method, system, and program for specifying multidimensional calculations for a relational OLAP engine
US7895191B2 (en) 2003-04-09 2011-02-22 International Business Machines Corporation Improving performance of database queries
US7315852B2 (en) * 2003-10-31 2008-01-01 International Business Machines Corporation XPath containment for index and materialized view matching
US20050120331A1 (en) * 2003-12-02 2005-06-02 International Business Machines Corporation Hosting environment abstraction agents
US7707143B2 (en) * 2004-06-14 2010-04-27 International Business Machines Corporation Systems, methods, and computer program products that automatically discover metadata objects and generate multidimensional models
US20050283494A1 (en) * 2004-06-22 2005-12-22 International Business Machines Corporation Visualizing and manipulating multidimensional OLAP models graphically
US7480663B2 (en) * 2004-06-22 2009-01-20 International Business Machines Corporation Model based optimization with focus regions
CA2500573A1 (en) * 2005-03-14 2006-09-14 Oculus Info Inc. Advances in nspace - system and method for information analysis
US8559605B2 (en) * 2005-02-07 2013-10-15 Avaya Inc. Extensible diagnostic tool
US7724880B2 (en) * 2005-02-07 2010-05-25 Avaya Inc. Networked voicemail
US7330537B2 (en) * 2005-02-07 2008-02-12 Adomo, Inc. Integrating messaging server directory service with a communication system voice mail message interface
US7564954B2 (en) * 2005-02-07 2009-07-21 Adomo, Inc. Form-based user interface for controlling messaging
US7346150B2 (en) * 2005-02-07 2008-03-18 Adomo, Inc. Controlling messaging actions using form-based user interface
US20060177011A1 (en) * 2005-02-07 2006-08-10 Jens Skakkebaek System and method for providing code on voicemail appliance
US7321655B2 (en) * 2005-02-07 2008-01-22 Adomo, Inc. Caching user information in an integrated communication system
US8175233B2 (en) * 2005-02-07 2012-05-08 Avaya Inc. Distributed cache system
US8233594B2 (en) * 2005-02-07 2012-07-31 Avaya Inc. Caching message information in an integrated communication system
US8059793B2 (en) * 2005-02-07 2011-11-15 Avaya Inc. System and method for voicemail privacy
US7808980B2 (en) * 2005-02-07 2010-10-05 Avaya Inc. Integrated multi-media communication system
US20060177024A1 (en) * 2005-02-07 2006-08-10 Heine Frifeldt Integrated voice mail user/email system user setup in integrated multi-media communication system
US9129038B2 (en) * 2005-07-05 2015-09-08 Andrew Begel Discovering and exploiting relationships in software repositories
US20070067756A1 (en) * 2005-09-20 2007-03-22 Trinity Millennium Group, Inc. System and method for enterprise software portfolio modernization
WO2007075146A2 (en) * 2005-12-26 2007-07-05 Chee Ying Josiah Goh Visual-based object oriented programming language and system
US20080028319A1 (en) * 2006-07-27 2008-01-31 Aaron Roger Cox Console-Integrated Updatable Terms
US8214807B2 (en) * 2007-01-10 2012-07-03 International Business Machines Corporation Code path tracking
US8064576B2 (en) 2007-02-21 2011-11-22 Avaya Inc. Voicemail filtering and transcription
US8107598B2 (en) * 2007-02-21 2012-01-31 Avaya Inc. Voicemail filtering and transcription
US8160212B2 (en) 2007-02-21 2012-04-17 Avaya Inc. Voicemail filtering and transcription
US8488751B2 (en) 2007-05-11 2013-07-16 Avaya Inc. Unified messenging system and method
US8086597B2 (en) * 2007-06-28 2011-12-27 International Business Machines Corporation Between matching
US7895189B2 (en) * 2007-06-28 2011-02-22 International Business Machines Corporation Index exploitation
US8181167B2 (en) 2008-01-09 2012-05-15 Kan Zhao Method and system for presenting and analyzing software source code through intermediate representation
US8015129B2 (en) * 2008-04-14 2011-09-06 Microsoft Corporation Parsimonious multi-resolution value-item lists
US8255875B2 (en) * 2008-09-30 2012-08-28 Rockwell Automation Technologies, Inc. Application builder for industrial automation
US9182981B2 (en) * 2009-11-23 2015-11-10 University Of Washington Systems and methods for implementing pixel-based reverse engineering of interface structure
US8712989B2 (en) 2010-12-03 2014-04-29 Microsoft Corporation Wild card auto completion
US8745572B2 (en) 2011-06-22 2014-06-03 Microsoft Corporation Software development automated analytics
WO2014000143A1 (en) 2012-06-25 2014-01-03 Microsoft Corporation Input method editor application platform
JP6420311B2 (en) 2013-03-15 2018-11-07 ベウラワークス,エルエルシー. System and method for facilitating data capture and user access to the data
WO2016018201A1 (en) 2014-07-28 2016-02-04 Hewlett-Packard Development Company, L.P. Searching relational and graph databases
US10452739B2 (en) 2014-10-16 2019-10-22 Adp, Llc Graph loader for a flexible graph system
CN106055343B (en) * 2016-06-22 2019-01-18 华东师范大学 A kind of object code reverse-engineering system based on program evolution model

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5495604A (en) * 1993-08-25 1996-02-27 Asymetrix Corporation Method and apparatus for the modeling and query of database structures using natural language-like constructs
US5862382A (en) * 1995-05-08 1999-01-19 Kabushiki Kaisha Toshiba Program analysis system and program analysis method
US5913214A (en) * 1996-05-30 1999-06-15 Massachusetts Inst Technology Data extraction from world wide web pages
US5999938A (en) * 1997-01-31 1999-12-07 Microsoft Corporation System and method for creating a new data structure in memory populated with data from an existing data structure
US5960425A (en) * 1997-05-28 1999-09-28 At&T Corp. Database access system with optimizable expressions
US5978790A (en) * 1997-05-28 1999-11-02 At&T Corp. Method and apparatus for restructuring data in semi-structured databases
US6076087A (en) * 1997-11-26 2000-06-13 At&T Corp Query evaluation on distributed semi-structured data

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7353221B1 (en) * 1999-03-09 2008-04-01 Siemens Aktiengesellschaft Method for the automatic retrieval of engineering data of systems
US20050033733A1 (en) * 2001-02-26 2005-02-10 Ori Software Development Ltd. Encoding semi-structured data for efficient search and browsing
US8489597B2 (en) * 2001-02-26 2013-07-16 Ori Software Development Ltd. Encoding semi-structured data for efficient search and browsing
US20050050076A1 (en) * 2003-08-28 2005-03-03 International Business Machines Corporation System and method for carrying out legacy application transitions
US7478111B2 (en) 2003-08-28 2009-01-13 International Business Machines Corporation System and method for carrying out legacy application transitions
US7254577B2 (en) * 2004-06-29 2007-08-07 International Business Machines Corporation Methods, apparatus and computer programs for evaluating and using a resilient data representation
US20060026157A1 (en) * 2004-06-29 2006-02-02 Rahul Gupta Methods, apparatus and computer programs for evaluating and using a resilient data representation
US20080114812A1 (en) * 2004-11-19 2008-05-15 Bea Systems, Inc. Data object identification, tracking, filtering and monitoring using data object fingerprints in a repository
US20060265698A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for tracking changes in a system
US7634766B2 (en) 2005-05-20 2009-12-15 Sun Microsystems, Inc. Method and apparatus for pattern-based system design analysis using a meta model
WO2006126990A1 (en) * 2005-05-20 2006-11-30 Sun Microsystems, Inc. Pattern query language
US7703074B2 (en) 2005-05-20 2010-04-20 Oracle America, Inc. Method and apparatus for tracking changes in a system
WO2006126989A1 (en) * 2005-05-20 2006-11-30 Sun Microsystems, Inc., Method and apparatus for pattern-based system design analysis
US7660802B2 (en) 2005-05-20 2010-02-09 Sun Microsystems, Inc. Method and apparatus for generating components for pattern-based system design analysis using a characteristics model
US20060265699A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for pattern-based system design analysis using a meta model
US7653898B1 (en) 2005-05-20 2010-01-26 Sun Microsystems, Inc. Method and apparatus for generating a characteristics model for a pattern-based system design analysis using a schema
US20060265697A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Pattern query language
US20060265700A1 (en) * 2005-05-20 2006-11-23 Sun Microsystems, Inc. Method and apparatus for pattern-based system design analysis
WO2006126991A1 (en) * 2005-05-20 2006-11-30 Sun Microsystems, Inc. Method and apparatus for generating components for pattern-based system design analysis using a characteristics model
US7672957B2 (en) * 2006-02-10 2010-03-02 Make Technologies, Inc. User interface configured to display mechanical fabric and semantic model of a legacy computer application generated, graphical view navigating links between mechanical nodes and semantic nodes based on relevant business rules
US20070245320A1 (en) * 2006-02-10 2007-10-18 Make Technologies Inc. Legacy Software Modernization System
WO2008037656A3 (en) * 2006-09-25 2008-05-22 Bosch Gmbh Robert Computer-based tool and method for extracting the functional code of control appliances
WO2008037656A2 (en) * 2006-09-25 2008-04-03 Robert Bosch Gmbh Computer-based tool and method for extracting the functional code of control appliances
EP1970810A2 (en) * 2007-01-05 2008-09-17 Hitachi, Ltd. Program creation support
EP1970810A3 (en) * 2007-01-05 2010-04-21 Hitachi, Ltd. Program creation support
US20120158791A1 (en) * 2010-12-21 2012-06-21 Microsoft Corporation Feature vector construction
WO2014064545A1 (en) * 2012-10-23 2014-05-01 International Business Machines Corporation Maintaining integrity of output of code generators
US9354870B2 (en) 2012-10-23 2016-05-31 International Business Machines Corporation Maintaining integrity of output of code generators
US20170139685A1 (en) * 2014-06-25 2017-05-18 Chengdu Puzhong Software Limted Company Visual software modeling method to construct software views based on a software meta view
CN104133681A (en) * 2014-07-28 2014-11-05 浪潮(北京)电子信息产业有限公司 Ambari-web end architecture analysis method
US20160261466A1 (en) * 2014-09-17 2016-09-08 Siemens Aktiengesellschaft Method and Digital Tool for Engineering Software Architectures of Complex Cyber-Physical Systems of Different Technical Domains
US9838264B2 (en) * 2014-09-17 2017-12-05 Siemens Aktiengesellschaft Method and digital tool for engineering software architectures of complex cyber-physical systems of different technical domains
CN106126225A (en) * 2016-06-22 2016-11-16 华东师范大学 A kind of object code reverse engineering approach based on program evolution model
CN110347954A (en) * 2019-05-24 2019-10-18 北京因特睿软件有限公司 Service method towards complicated Web application

Also Published As

Publication number Publication date
US6339776B2 (en) 2002-01-15

Similar Documents

Publication Publication Date Title
US6339776B2 (en) Dynamic semi-structured repository for mining software and software-related information
Laender et al. A brief survey of web data extraction tools
Ding et al. Ontology Library Systems: The key to successful Ontology Reuse.
Van Assem et al. A method for converting thesauri to RDF/OWL
Horqwitz et al. SODOS: a software documentation support environment—its definition
US6219831B1 (en) Device and method for converting computer programming languages
McGuinness et al. Infrastructure for web explanations
JP2000148461A (en) Software model and existing source code synchronizing method and device
Euzenat et al. Ontology alignments: an ontology management perspective
Chin et al. DECODE: A Co‐operative Program Understanding Environment
Aufaure et al. Metadata-and ontology-based semantic web mining
Washizaki et al. ProMeTA: a taxonomy for program metamodels in program reverse engineering
Nazarenko et al. Integrating written policies in business rule management systems
CA2284949C (en) Dynamic semi-structured repository for mining software and software-related information
Cox et al. Representing and accessing extracted information
Reutelshoefer et al. An extensible semantic wiki architecture
Dayani-Fard et al. Reverse engineering by mining dynamic repositories
Santos et al. An experimental analysis of tools for ontology evolution management
Misev Integrating SUMO and OMDoc
Iria et al. Integrating Information Extraction, Ontology Learning and Semantic Browsing into Organizational Knowledge Processes.
CA2334936A1 (en) Method and apparatus for collecting, organizing and analyzing data
Sutcliffe The Expansion, Modernisation, and Future of the TPTP World.
Laitio Semantic web data quality control
Berg CLASSLIB—class management and reuse support on a MVS mainframe
Estiévenart et al. Semi-Automated Extraction of Targeted Data fromWeb Pages

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DAYANI-FARD, HOMAYOUN;JURISICA, IGOR;REEL/FRAME:010380/0476

Effective date: 19990930

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20100115