The Community for Technology Leaders
2013 20th Working Conference on Reverse Engineering (WCRE) (1999)
Atlanta, Georgia
Oct. 6, 1999 to Oct. 8, 1999
ISSN: 1095-1350
ISBN: 0-7695-0303-9
pp: 224
Christopher Jermaine , Georgia Institute of Technology
The problem of producing modularizations of huge, legacy software systems which lack an obvious modular structure is an important one. Such modularizations allow maintenance and reuse of smaller, more manageable pieces of program source code, and also may provide insights into the overall structure of the software system.In this paper, we consider the application of an algorithm from graph theory known as the k-cut method to the domain of computing program modularizations. We describe the k-cut method, its associated algorithms, and the problem's application to reverse engineering of legacy systems. We also describe our experience in applying the method.
module, reverse engineering, k-cut
Christopher Jermaine, "Computing Program Modularizations Using the k-Cut Method", 2013 20th Working Conference on Reverse Engineering (WCRE), vol. 00, no. , pp. 224, 1999, doi:10.1109/WCRE.1999.806963
80 ms
(Ver 3.3 (11022016))