Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1810295.1810343acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Flexible architecture conformance assessment with ConQAT

Published: 01 May 2010 Publication History

Abstract

The architecture of software systems is known to decay if no counter-measures are taken. In order to prevent this architectural erosion, the conformance of the actual system architecture to its intended architecture needs to be assessed and controlled; ideally in a continuous manner. To support this, we present the architecture conformance assessment capabilities of our quality analysis framework ConQAT. In contrast to other tools, ConQAT is not limited to the assessment of use-dependencies between software components. Its generic architectural model allows the assessment of various types of dependencies found between different kinds of artifacts. It thereby provides the necessary tool-support for flexible architecture conformance assessment in diverse contexts.

References

[1]
O. de Moor, M. Verbaere, E. Hajiyev, P. Avgustinov, T. Ekman, N. Ongkingco, D. Sereni, J. Tibble, and S. Limited. QL for source code analysis. In SCAM'07, 2007.
[2]
M. Eichberg, S. Kloppenburg, K. Klose, and M. Mezini. Defining and continuous checking of structural program dependencies. In ICSE'08, 2008.
[3]
S. Eick, T. Graves, A. Karr, J. Marron, and A. Mockus. Does code decay? Assessing the evidence from change management data. IEEE Transactions on Software Engineering, 27(1):1--12, 2001.
[4]
M. Feilkas, D. Ratiu, and E. Juergens. The loss of architectural knowledge during system evolution: An industrial case study. In ICPC'09, 2009.
[5]
E. Juergens, F. Deissenboeck, and B. Hummel. CloneDetective -- A workbench for clone detection research. In ICSE'09, 2009.
[6]
R. Koschke and D. Simon. Hierarchical reflexion models. In WCRE'03, 2003.
[7]
G. Murphy, D. Notkin, and K. Sullivan. Software reflexion models: Bridging the gap between source and high-level models. In FSE'95, 1995.
[8]
L. Passos, R. Terra, R. Diniz, M. T. Valente, and N. das Chagas Mendonca. Static architecture conformance checking -- an illustrative overview. IEEE Software, 99(1), 2009.
[9]
J. Rosik, A. Le Gear, J. Buckley, and M. Babar. An industrial case study of architecture conformance. In ESEM'08, 2008.
[10]
N. Sangal, E. Jordan, V. Sinha, and D. Jackson. Using dependency models to manage complex software architecture. In OOPSLA'05, 2005.
[11]
T. Zimmermann, S. Diehl, A. Zeller, et al. How history justifies system architecture (or not). In IWPSE'03, 2003.

Cited By

View all
  • (2024)Software Requirement Smells and Detection Techniques: A Systematic Literature ReviewCybernetics and Information Technologies10.2478/cait-2024-003724:4(78-107)Online publication date: 18-Dec-2024
  • (2024)Detection Strategies for Microservice Security TacticsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327648721:3(1257-1273)Online publication date: May-2024
  • (2023)Architecture Driven Modernization: A Review on Reverse Engineering Techniques based on Models’ ApproachWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2023.20.3220(293-302)Online publication date: 11-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '10: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
May 2010
554 pages
ISBN:9781605587196
DOI:10.1145/1810295
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ICSE '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Software Requirement Smells and Detection Techniques: A Systematic Literature ReviewCybernetics and Information Technologies10.2478/cait-2024-003724:4(78-107)Online publication date: 18-Dec-2024
  • (2024)Detection Strategies for Microservice Security TacticsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327648721:3(1257-1273)Online publication date: May-2024
  • (2023)Architecture Driven Modernization: A Review on Reverse Engineering Techniques based on Models’ ApproachWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2023.20.3220(293-302)Online publication date: 11-Oct-2023
  • (2023)A Visualization for Client-Server Architecture Assessement2023 IEEE Working Conference on Software Visualization (VISSOFT)10.1109/VISSOFT60811.2023.00010(1-11)Online publication date: 1-Oct-2023
  • (2022)Code Smell Prioritization with Business Process Mining and Static Code Analysis: A Case StudyElectronics10.3390/electronics1112188011:12(1880)Online publication date: 15-Jun-2022
  • (2022)Microservice Security Metrics for Secure Communication, Identity Management, and ObservabilityACM Transactions on Software Engineering and Methodology10.1145/353218332:1(1-34)Online publication date: 11-May-2022
  • (2022)Conformance Assessment of Architectural Design Decisions on the Mapping of Domain Model Elements to APIs and API Endpoints2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C)10.1109/ICSA-C54293.2022.00058(76-83)Online publication date: Mar-2022
  • (2022)Conformance assessment of Architectural Design Decisions on API endpoint designs derived from domain modelsJournal of Systems and Software10.1016/j.jss.2022.111433193:COnline publication date: 1-Nov-2022
  • (2020)Runtime Verification for Dynamic ArchitecturesJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2020.100618(100618)Online publication date: Oct-2020
  • (2019)Detecting Architectural Erosion using Runtime VerificationElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.304.7304(97-114)Online publication date: 12-Sep-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media