Codifying Hidden Dependencies in Legacy J2EE Applications. Hecht, G., Mili, H., El Boussaidi, G., Boubaker, A., Abdellatif, M., Gu�h�neuc, Y., Shatnawi, A., Privat, J., & Moha, N. In Washizaki, H. & Zhang, H., editors, Proceedings of the 25<sup>th</sup> Asia-Pacific Software Engineering Conference (APSEC), pages 305–314, December, 2018. IEEE CS Press. 10 pages. \awardBest paper.
Paper abstract bibtex J2EE applications tend to be multi-tier and multilanguage applications. They rely on the J2EE platform and containers that offer infrastructure and architectural services to ensure distributed, secure, safe, and scalable executions. These mechanisms hide many program dependencies, which helps development but hinders maintenance, evolution, and reengineering of J2EE applications. In this paper, we study (i) the J2EE specifications to extract a declarative specification of the dependencies that are inherent in the services offered and that are not visible in the user code that uses them. Then, we introduce (ii) a codification of the dependencies into rules, and (iii) a tool that supports the specification of those dependencies and their detection in a J2EE applications. We validate our approach and tool on a sample of 10 J2EE applications. We also compare our tool against JRipples, a state-of-the-art tool for change-impact analysis tasks. Results show that our tool adds, on average, 15\NOmore call dependencies, which would have been missed otherwise. On change impact analysis tasks, our tool outperforms JRipples in all 10 applications, especially for the early iterations of change propagation exploration
@INPROCEEDINGS{Hecht18-APSEC-CodifyingDependencies,
AUTHOR = {Geoffrey Hecht and Hafedh Mili and El Boussaidi, Ghizlane and
Anis Boubaker and Manel Abdellatif and Yann-Gael Gu�h�neuc and
Anas Shatnawi and Jean Privat and Naouel Moha},
BOOKTITLE = {Proceedings of the 25<sup>th</sup> Asia-Pacific Software Engineering Conference (APSEC)},
TITLE = {Codifying Hidden Dependencies in Legacy J2EE
Applications},
YEAR = {2018},
OPTADDRESS = {},
OPTCROSSREF = {},
EDITOR = {Hironori Washizaki and Hongyu Zhang},
MONTH = {December},
NOTE = {10 pages. \awardBest paper.},
OPTNUMBER = {},
OPTORGANIZATION = {},
PAGES = {305--314},
PUBLISHER = {IEEE CS Press},
OPTSERIES = {},
OPTVOLUME = {},
KEYWORDS = {Topic: <b>Code and design smells</b>,
Venue: <c>APSEC</c>},
URL = {http://www.ptidej.net/publications/documents/APSEC18.doc.pdf},
PDF = {http://www.ptidej.net/publications/documents/APSEC18.ppt.pdf},
ABSTRACT = {J2EE applications tend to be multi-tier and
multilanguage applications. They rely on the J2EE platform and
containers that offer infrastructure and architectural services to
ensure distributed, secure, safe, and scalable executions. These
mechanisms hide many program dependencies, which helps development
but hinders maintenance, evolution, and reengineering of J2EE
applications. In this paper, we study (i) the J2EE specifications to
extract a declarative specification of the dependencies that are
inherent in the services offered and that are not visible in the user
code that uses them. Then, we introduce (ii) a codification of the
dependencies into rules, and (iii) a tool that supports the
specification of those dependencies and their detection in a J2EE
applications. We validate our approach and tool on a sample of 10
J2EE applications. We also compare our tool against JRipples, a
state-of-the-art tool for change-impact analysis tasks. Results show
that our tool adds, on average, 15\NOmore call dependencies, which
would have been missed otherwise. On change impact analysis tasks,
our tool outperforms JRipples in all 10 applications, especially for
the early iterations of change propagation exploration}
}
Downloads: 0
{"_id":"ATfZ6iXgWJ4bHEGPA","bibbaseid":"hecht-mili-elboussaidi-boubaker-abdellatif-guhneuc-shatnawi-privat-etal-codifyinghiddendependenciesinlegacyj2eeapplications-2018","author_short":["Hecht, G.","Mili, H.","El Boussaidi, G.","Boubaker, A.","Abdellatif, M.","Gu�h�neuc, Y.","Shatnawi, A.","Privat, J.","Moha, N."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Geoffrey"],"propositions":[],"lastnames":["Hecht"],"suffixes":[]},{"firstnames":["Hafedh"],"propositions":[],"lastnames":["Mili"],"suffixes":[]},{"propositions":[],"lastnames":["El","Boussaidi"],"firstnames":["Ghizlane"],"suffixes":[]},{"firstnames":["Anis"],"propositions":[],"lastnames":["Boubaker"],"suffixes":[]},{"firstnames":["Manel"],"propositions":[],"lastnames":["Abdellatif"],"suffixes":[]},{"firstnames":["Yann-Gael"],"propositions":[],"lastnames":["Gu�h�neuc"],"suffixes":[]},{"firstnames":["Anas"],"propositions":[],"lastnames":["Shatnawi"],"suffixes":[]},{"firstnames":["Jean"],"propositions":[],"lastnames":["Privat"],"suffixes":[]},{"firstnames":["Naouel"],"propositions":[],"lastnames":["Moha"],"suffixes":[]}],"booktitle":"Proceedings of the 25<sup>th</sup> Asia-Pacific Software Engineering Conference (APSEC)","title":"Codifying Hidden Dependencies in Legacy J2EE Applications","year":"2018","optaddress":"","optcrossref":"","editor":[{"firstnames":["Hironori"],"propositions":[],"lastnames":["Washizaki"],"suffixes":[]},{"firstnames":["Hongyu"],"propositions":[],"lastnames":["Zhang"],"suffixes":[]}],"month":"December","note":"10 pages. \\awardBest paper.","optnumber":"","optorganization":"","pages":"305–314","publisher":"IEEE CS Press","optseries":"","optvolume":"","keywords":"Topic: <b>Code and design smells</b>, Venue: <c>APSEC</c>","url":"http://www.ptidej.net/publications/documents/APSEC18.doc.pdf","pdf":"http://www.ptidej.net/publications/documents/APSEC18.ppt.pdf","abstract":"J2EE applications tend to be multi-tier and multilanguage applications. They rely on the J2EE platform and containers that offer infrastructure and architectural services to ensure distributed, secure, safe, and scalable executions. These mechanisms hide many program dependencies, which helps development but hinders maintenance, evolution, and reengineering of J2EE applications. In this paper, we study (i) the J2EE specifications to extract a declarative specification of the dependencies that are inherent in the services offered and that are not visible in the user code that uses them. Then, we introduce (ii) a codification of the dependencies into rules, and (iii) a tool that supports the specification of those dependencies and their detection in a J2EE applications. We validate our approach and tool on a sample of 10 J2EE applications. We also compare our tool against JRipples, a state-of-the-art tool for change-impact analysis tasks. Results show that our tool adds, on average, 15\\NOmore call dependencies, which would have been missed otherwise. On change impact analysis tasks, our tool outperforms JRipples in all 10 applications, especially for the early iterations of change propagation exploration","bibtex":"@INPROCEEDINGS{Hecht18-APSEC-CodifyingDependencies,\r\n AUTHOR = {Geoffrey Hecht and Hafedh Mili and El Boussaidi, Ghizlane and \r\n Anis Boubaker and Manel Abdellatif and Yann-Gael Gu�h�neuc and \r\n Anas Shatnawi and Jean Privat and Naouel Moha},\r\n BOOKTITLE = {Proceedings of the 25<sup>th</sup> Asia-Pacific Software Engineering Conference (APSEC)},\r\n TITLE = {Codifying Hidden Dependencies in Legacy J2EE \r\n Applications},\r\n YEAR = {2018},\r\n OPTADDRESS = {},\r\n OPTCROSSREF = {},\r\n EDITOR = {Hironori Washizaki and Hongyu Zhang},\r\n MONTH = {December},\r\n NOTE = {10 pages. \\awardBest paper.},\r\n OPTNUMBER = {},\r\n OPTORGANIZATION = {},\r\n PAGES = {305--314},\r\n PUBLISHER = {IEEE CS Press},\r\n OPTSERIES = {},\r\n OPTVOLUME = {},\r\n KEYWORDS = {Topic: <b>Code and design smells</b>, \r\n Venue: <c>APSEC</c>},\r\n URL = {http://www.ptidej.net/publications/documents/APSEC18.doc.pdf},\r\n PDF = {http://www.ptidej.net/publications/documents/APSEC18.ppt.pdf},\r\n ABSTRACT = {J2EE applications tend to be multi-tier and \r\n multilanguage applications. They rely on the J2EE platform and \r\n containers that offer infrastructure and architectural services to \r\n ensure distributed, secure, safe, and scalable executions. These \r\n mechanisms hide many program dependencies, which helps development \r\n but hinders maintenance, evolution, and reengineering of J2EE \r\n applications. In this paper, we study (i) the J2EE specifications to \r\n extract a declarative specification of the dependencies that are \r\n inherent in the services offered and that are not visible in the user \r\n code that uses them. Then, we introduce (ii) a codification of the \r\n dependencies into rules, and (iii) a tool that supports the \r\n specification of those dependencies and their detection in a J2EE \r\n applications. We validate our approach and tool on a sample of 10 \r\n J2EE applications. We also compare our tool against JRipples, a \r\n state-of-the-art tool for change-impact analysis tasks. Results show \r\n that our tool adds, on average, 15\\NOmore call dependencies, which \r\n would have been missed otherwise. On change impact analysis tasks, \r\n our tool outperforms JRipples in all 10 applications, especially for \r\n the early iterations of change propagation exploration}\r\n}\r\n\r\n","author_short":["Hecht, G.","Mili, H.","El Boussaidi, G.","Boubaker, A.","Abdellatif, M.","Gu�h�neuc, Y.","Shatnawi, A.","Privat, J.","Moha, N."],"editor_short":["Washizaki, H.","Zhang, H."],"key":"Hecht18-APSEC-CodifyingDependencies","id":"Hecht18-APSEC-CodifyingDependencies","bibbaseid":"hecht-mili-elboussaidi-boubaker-abdellatif-guhneuc-shatnawi-privat-etal-codifyinghiddendependenciesinlegacyj2eeapplications-2018","role":"author","urls":{"Paper":"http://www.ptidej.net/publications/documents/APSEC18.doc.pdf"},"keyword":["Topic: <b>Code and design smells</b>","Venue: <c>APSEC</c>"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.yann-gael.gueheneuc.net/Work/Publications/Biblio/complete-bibliography.bib","dataSources":["8vn5MSGYWB4fAx9Z4"],"keywords":["topic: <b>code and design smells</b>","venue: <c>apsec</c>"],"search_terms":["codifying","hidden","dependencies","legacy","j2ee","applications","hecht","mili","el boussaidi","boubaker","abdellatif","gu�h�neuc","shatnawi","privat","moha"],"title":"Codifying Hidden Dependencies in Legacy J2EE Applications","year":2018}