CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Analysis of Risks in Re-Engineering Software Systems

by Nasir Rashid, Muhammad Salam, Raees Khan Shah Sani, Fakhre Alam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 11
Year of Publication: 2013
Authors: Nasir Rashid, Muhammad Salam, Raees Khan Shah Sani, Fakhre Alam
10.5120/12783-9851

Nasir Rashid, Muhammad Salam, Raees Khan Shah Sani, Fakhre Alam . Analysis of Risks in Re-Engineering Software Systems. International Journal of Computer Applications. 73, 11 ( July 2013), 5-8. DOI=10.5120/12783-9851

@article{ 10.5120/12783-9851,
author = { Nasir Rashid, Muhammad Salam, Raees Khan Shah Sani, Fakhre Alam },
title = { Analysis of Risks in Re-Engineering Software Systems },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 11 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number11/12783-9851/ },
doi = { 10.5120/12783-9851 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:47.645164+05:30
%A Nasir Rashid
%A Muhammad Salam
%A Raees Khan Shah Sani
%A Fakhre Alam
%T Analysis of Risks in Re-Engineering Software Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 11
%P 5-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Software re-engineering has become a vital field of computer science and an active research area. The nature of software re-engineering is to improve or transform existing software so it can be understood, controlled and reused as new software. Re-engineering is frequently challenged, because certain risks will threaten the project success. In this article we have described some risks and their classification what we believe to be the most important. From the analysis of risks, some mitigation techniques have been suggested from the existing literature that helps to make the re-engineering projects more beneficial.

References
  1. M. Solvin, and S. Malik. "Re-engineering to reduce system maintenance: A case study",Software Engineering, pp. 14-24,2011.
  2. Harry. M. Sneed, "Economics of Software re-engineering", Journal of Software Maintenance, Vol. 3, 1991, p. 163
  3. Moghaddas, Y. , & Rashidi, H. (2009). A novel approach for replacing legacy systems, Journal of Applied Sciences, 9(22), 4086–4090.
  4. J. Ransom, I. S. , I. Warren. A Method for Assessing Legacy Systems for Evolution. in Proceedings of the 2nd Euromicro Conference on Software Maintenance and Re-engineering ( CSMR'98). 1998.
  5. Detection strategies: Metrics-based rules for detecting design flaws. in Proceedings of ICSM 04 (International Conference on Software Maintenance). 2004. . IEEE Computer Society Press.
  6. Gerardo canfora, Aniello cimitile, "Software maintenance", Journal of Software Maintenance 13(1): 1-2 (2001)
  7. Byrne, E. J. , A Conceptual Foundation for Software Re-engineering, in Conference on Software Maintenance 1992.
  8. Tahvildari, L. , Kontogiannis, K. On the role of design patterns in quality-driven re-engineering. in Proceedings of the IEEE 6th European Conference on Software Maintenance and Re-engineering (CSMR). 2002. Hungary.
  9. G. Ar´evalo, S. D. , and O. Nierstrasz. Discovering unanticipated dependency schemas in class hierarchies. in In Proceedings of CSMR '05 (9th European Conference on Software Maintenance and Re-engineering). 2005. IEEE Computer Society Press.
  10. Tahvildari, L. , Kontogiannis, K. , Mylopoulos,. Requirements-driven software re-engineering. in Proceedings of the IEEE 8th International Working Conference on Reverse Engineering (WCRE). 2001. Germany.
  11. S. Ducasse, T. G. ?. , and J. -M. Favre, Modeling software evolution by treating history as a first class entity, in on Software Evolution Through Transformation 2004. p. 71–82.
  12. S. Ducasse, M. L. , and R. Bertuli. High-level polymetric views of condensed run-time information. in Proceedings of CSMR 2004 (Conference on Software Maintenance and Re-engineering). 2004.
  13. S. Tichelaar, S. D. , S. Demeyer, and O. Nierstrasz. A mmodel for Language-Independent Refactoring. in InProceedings of ISPSE '00 (International Conference on Software Evolution). IEEE Computer Society.
  14. Chia-chu chang "Software stability in software re-engineering". Information Reuse and Integration, 2007.
  15. Moghaddas, Y. , & Rashidi, H. (2009). A novel approach for replacing legacy systems. Journal of Applied Sciences, 9(22), 4086–4090.
  16. Jakub Miler, Janusz Górski. "Identifying Software Project Risks with the Process Model", ICSSEA2004.
  17. Moghaddas, Y. , & Rashidi, H. (2009). A novel approach for replacing legacy systems. Journal of Applied Sciences, 9(22), 4086–4090
Index Terms

Computer Science
Information Sciences

Keywords

Software re-engineering risks mitigation analysis