Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1852761.1852783acmotherconferencesArticle/Chapter ViewAbstractPublication PagespppjConference Proceedingsconference-collections
research-article

Visualization of software architecture graphs of Java systems: managing propagated low level dependencies

Published: 15 September 2010 Publication History

Abstract

The availability of up-to-date documentation of the architecture is crucial for software maintenance tasks, but it is often missing or differs from the implemented architecture. An increasingly popular and feasible way to get a clear picture of the architecture is to reconstruct it from the source code. The result of the reconstruction procedure is a graph with special, architecture-specific properties. Nowadays software systems are typically very large, so the reconstructed architecture contains a lot of details and is really difficult to interpret. It is important therefore to have efficient methods that help in understanding and managing the architecture graph. The purpose of these methods is to try to present the information so that it is comprehensible to the users. Two important methods are selective subtree collapsion and lifting low level dependencies of the system into higher, visible levels. These enable an architect to investigate the dependencies of system components at higher levels, without the need to deal with an enormous quantity of low-level details.
In this paper, first we overview the concepts related to lifting and present a conceptual framework that combines subtree collapsion with lifting to enable users to interactively explore and manipulate a software architecture graph. Then we define a set of algorithms that can be used to efficiently propagate dependency edges of a graph to higher levels. We also describe how the results can be integrated into SourceInventory, a software quality monitoring and visualization framework.

References

[1]
}}T. Bakota, Á. Beszédes, R. Ferenc, and T. Gyimóthy. Continuous software quality supervision using SourceInventory and Columbus. In Research Demonstrations of 30th International Conference on Software Engineering (ICSE'08), pages 931--932, May 2008.
[2]
}}Bauhaus Homepage. http://www.bauhaus-stuttgart.de.
[3]
}}Á. Beszédes, R. Ferenc, and T. Gyimóthy. Columbus: A Reverse Engineering Approach. In Proceedings of the 13th IEEE Workshop on Software Technology and Engineering Practice (STEP 2005), pages 60--69. IEEE Computer Society, Sept. 2005.
[4]
}}J. Celko. Trees and Hierarchies in SQL for Smarties. Morgan Kaufmann, 2004.
[5]
}}N. Erben and K. Lohr. Sab -- the software architecture browser. In VISSOFT '05: Proceedings of the 3rd IEEE International Workshop on Visualizing Software for Understanding and Analysis, page 7. IEEE Computer Society, 2005.
[6]
}}L. Feijs and R. De Jong. 3d visualization of software architectures. Commun. ACM, 41(12):73--78, 1998. ISSN 0001-0782.
[7]
}}L. Feijs, R. Krikhaar, and R. V. Ommering. A relational approach to support software architecture analysis. Software: Practice and Experience, 28(4):371--400, 1998. ISSN 1097-024X.
[8]
}}R. Ferenc, F. Magyar, Á. Beszédes, Á. Kiss, and M. Tarkiainen. Columbus -- Tool for Reverse Engineering Large Object Oriented Software Systems. In Proceedings of the 7th Symposium on Programming Languages and Software Tools (SPLST 2001), pages 16--27. University of Szeged, June 2001.
[9]
}}R. Ferenc, Á. Beszédes, and T. Gyimóthy. Fact Extraction and Code Auditing with Columbus and SourceAudit. In Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), page 513. IEEE Computer Society, Sept. 2004.
[10]
}}R. Koschke. Incremental reflexion analysis. In CSMR '10: Proceedings of the 14th European Conference on Software Maintenance and Reengineering, pages 1--10. IEEE Computer Society, 2010.
[11]
}}R. Koschke and D. Simon. Hierarchical reflexion models. In WCRE '03: Proceedings of the 10th Working Conference on Reverse Engineering, pages 36--45. IEEE Computer Society, 2003.
[12]
}}Rigi Homepage. http://www.rigi.csc.uvic.ca.
[13]
}}L. Schrettner, P. Hegedűs, R. Ferenc, L. J. Fülöp, and T. Bakota. Development of a methodology, software-suite and service for supporting software architecture reconstruction. In CSMR '10: Proceedings of The 14th European Conference on Software Maintenance and Reengineering. IEEE Computer Society, 2010.
[14]
}}Source-Navigator IDE Homepage. http://sourcenav.sourceforge.net.
[15]
}}M.-A. Storey, C. Best, and J. Michaud. Shrimp views: An interactive environment for exploring java programs. In 9th International Workshop on Program Comprehension (IWPC 2001), pages 111--112. IEEE Computer Society, 2001.

Cited By

View all
  • (2016)Automatically Extracting Threats from Extended Data Flow DiagramsProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_4(56-71)Online publication date: 6-Apr-2016
  • (2014)Anti-pattern detection with model queries: A comparison of approaches2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)10.1109/CSMR-WCRE.2014.6747181(293-302)Online publication date: Feb-2014
  • (2012)Abstract Runtime Monitoring with USEProceedings of the 2012 16th European Conference on Software Maintenance and Reengineering10.1109/CSMR.2012.73(549-552)Online publication date: 27-Mar-2012

Index Terms

  1. Visualization of software architecture graphs of Java systems: managing propagated low level dependencies

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PPPJ '10: Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java
    September 2010
    173 pages
    ISBN:9781450302692
    DOI:10.1145/1852761
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Technical University of Vienna

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 September 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. architecture reconstruction
    2. architecture visualization
    3. lifting
    4. nested set model
    5. software architecture

    Qualifiers

    • Research-article

    Conference

    PPPJ '10
    Sponsor:
    PPPJ '10: Principles and Practice of Programming in Java
    September 15 - 17, 2010
    Vienna, Austria

    Acceptance Rates

    Overall Acceptance Rate 29 of 58 submissions, 50%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Automatically Extracting Threats from Extended Data Flow DiagramsProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_4(56-71)Online publication date: 6-Apr-2016
    • (2014)Anti-pattern detection with model queries: A comparison of approaches2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)10.1109/CSMR-WCRE.2014.6747181(293-302)Online publication date: Feb-2014
    • (2012)Abstract Runtime Monitoring with USEProceedings of the 2012 16th European Conference on Software Maintenance and Reengineering10.1109/CSMR.2012.73(549-552)Online publication date: 27-Mar-2012

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media