• Title/Summary/Keyword: code reuse

Search Result 129, Processing Time 0.024 seconds

A Study on the Method and Tool Development for Extracting Objects from Procedure-oriented System (절차중심 시스템으로부터 객체추출 방법 및 도구개발에 관한 연구)

  • Kim, Jung-Jong;Son, Chang-Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.649-661
    • /
    • 1998
  • If there is redeveloping into the system applying the object-oriented paradigm, productivity Improvement of software through reuse would be accomplished and maintenance cost be reduced. When a procedure-oriented system is transformed to a type applying the object-oriented paradigm, various techniques are studied to extract objects from source code automatically or semi-automatically. However, it is not easy to extract conceptuat objects when those techniques are applied, This problem entails another problem which drops the conceptual integrity of the extracted objects. In this paper, we suggest an object extraction method and tool development to resolve the problem occurring at the time when thc pr"~r"m, dcveloped through procedure-oriented is transformed to an object-oriented system. The suggested method allow to extract the desired objects using object modeling for various application domains of the real world given source code and design recovery information. During the extraction process, functionality and global variables of the source code as well as its intcrface arc rigorously analyzed. This process can enhance the conceptual integrity of the objects and make easy to construct class hierarchies.

  • PDF

A Study on F77/J++ Code Generator for Integration Object Management Model (통합 객체 관리 모델을 위한 F77/J++ 생성기에 관한 연구)

  • Sun, Su-Kyun;Song, Yong-Jea
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3064-3074
    • /
    • 2000
  • Lately computing environment is changing into integrating open system Some corporations and research institutions are still using old codes and not dealing with the rapid canging environment actively. Also several software developers have difficulties with the problems of productivity and translating old codes. This paper proposes Integration Object Management Model to deal with the rapid changing environment effectively and to improe productivity about new software development. The model is divided into three layers the first layer classifies and displays information to users, the second layer controls function, the integrationand management layer, and the last layer manages data, the object management stroage later. So it designs and implenments F77/J++ Generator system(FORTRAN77/Java code generator) for Integrated Object Management Model. The generator helps to translate old codes into new codes in redesigning the business and promoting productivity. In consists of nine-stage strategies using reengineering. This might support agterward protolyping in maximizing the reuse of software, which is advanlage to the integrationof the system and in pro,oting its productivity.

  • PDF

Dynamic Verification Methodology of User Code in AddSIM Environment (AddSIM 환경에서의 사용자 코드 동적 검증 방법론)

  • Yang, Jiyong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.41-47
    • /
    • 2019
  • Defense simulation is actively used to test various weapon systems and evaluate their effectiveness. The AddSIM environment is a simulation framework designed to support the weapon systems dealt with in defense simulation from an integrated point of view and is designed for reuse and scalability. Models used in AddSIM require base model structure fidelity and verification of user code area. Therefore, this paper describes the dynamic verification method used for completeness of models used in AddSIM. For the dynamic verification of user code, the specification method and the verification algorithm are described. Also, we introduce the prototype of the dynamic verifier implemented based on verification specification method and algorithm. The case study analyzes the verification results based on the simulation example implemented in AddSIM environment.

A Study on Development of Code Reuse Attacks and Defenses (코드 재사용 공격과 방어의 발전에 관한 연구)

  • Ahn, Sunwoo;Lee, Younghan;Bang, Inyoung;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.275-278
    • /
    • 2017
  • 과거의 가장 흔한 공격이었던 코드 삽입 공격은 방어 기법이 발전함에 따라 점점 어려워지고 있다. 공격자는 코드를 삽입하지 않고도 공격할 수 있는 방법을 찾기 시작하였고, 공격 대상에 존재하는 코드를 연결하여 원하는 동작을 실행하게 만드는 코드 재사용 공격을 하기 시작했다. 코드 재사용 공격을 막는 방어 기법 역시 제안되었지만, 다시 이를 우회하는 발전된 코드 재사용 공격들도 나오면서 공격과 방어를 거듭하고 있다. 본 논문에서는 코드 재사용 공격의 전신인 return into libc 부터 Data Oriented Programming (DOP)까지의 공격과 방어를 정리하고, 코드 재사용 공격이 발전되는 과정을 살펴보는 것을 목표로 한다.

Java Native Method Generating System (자바 네이티브 메소드 생성 시스템)

  • 김도영;김상훈
    • The Journal of Information Technology
    • /
    • v.3 no.2
    • /
    • pp.13-21
    • /
    • 2000
  • Java native method is proposed for the efficient execution of time-critical code, running of platform dependent job, and reuse of established libraries. If the writing of the Java native method is the speedup of execution time, you must use a compiled language not java language to write native method. Also, you must know the usage of the Java native interface to use native method. To reduce these difficulties, we proposed java native method generator that changes java method into native method automatically. Also, NMG helps programmer to write C implementation for the native method because there Is no need for the concept of JNI.

  • PDF

A Field Study on the Maintainability of Mission Critical Object-Oriented Systems (기간계 객체지향 시스템의 유지보수성에 관한 현장연구)

  • Lim Joa Sang;Jeong Seung Ryul
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.3
    • /
    • pp.147-159
    • /
    • 2004
  • Empirical evidence on the maintainability of object-oriented systems is far from conclusive, partly due to lack of representativeness of the subjects and systems used in the study. The present research empirically examined this issue with the systems that are mission-critical. currently operational and maintained by professionals. It was found that the 00 group appeared to consume less time while maintaining more amount of software artifacts than the NOO counterpart. This economical utilization of time appeared evident regardless of software development life cycle. This was due to the usefulness of UML for impact analysis which contributed to effective comprehension and communication. Insufficient design specifications led to ambiguity and costly defects in transferring design solutions to development. Also. the encapsulation of 00 seemed to reduce mental loads at maintenance tasks and improved code reuse. However, the number of files to manage increased and thus. dependency management is required for the 00 systems.

  • PDF

An Approach for Error Detection in Ontologies Using Concept Lattices (개념격자를 이용한 온톨로지 오류검출기법)

  • Hwang, Suk-Hyung
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.271-286
    • /
    • 2008
  • The core of the semantic web is ontology, which supports interoperability among semantic web applications and enables developer to reuse and share domain knowledge. It used a variety of fields such as Information Retrieval, E-commerce, Software Engineering, Artificial Intelligence and Bio-informatics. However, the reality is that various errors might be included in conceptual hierarchy when developing ontologies. Therefore, methodologies and supporting tools are essential to help the developer construct suitable ontologies for the given purposes and to detect and analyze errors in order to verify the inconsistency in the ontologies. In this paper we propose a new approach for ontology error detection based on the Concept Lattices of Formal Concept Analysis. By using the tool that we developed in this research, we can extract core elements from the source code of Ontology and then detect some structural errors based on the concept lattices. The results of this research can be helpful for ontology engineers to support error detection and construction of "well-defined" and "good" ontologies.

Reuse of the Generated Code for JavaScript Just-in-Time Compiler (자바스크립트 적시 컴파일러를 위한 생성 코드 재사용)

  • Oh, Hyeong-Seok;Moon, Soo-Mook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.540-544
    • /
    • 2010
  • 모바일 환경에서 웹 브라우저 활용이 늘어나고 웹 페이지를 통한 다양한 서비스가 제공되면서 브라우저에서의 자바스크립트 성능이 중요한 요소가 되었다. 자바스크립트 엔진의 성능 개선을 위해 기존에 사용하던 인터프리터 대신에 머신 코드를 실행 시간에 생성하는 적시 컴파일러(JITC)가 도입되었다. 특히 모바일 환경에서 WebKit의 자바스크립트 엔진인 SquirrelFish Extreme(SFX)이 많이 사용되고 있다. 본 논문에서는 SFX의 성능 향상을 위하여 적시 컴파일러를 통해 생성된 머신 코드를 파일 시스템을 활용하여 파일에 저장하였다가 재사용하는 클라이언트 AOTC(ahead-of-time compilation) 방식을 제시하고 초기 실험 결과를 제시한다.

  • PDF

A Study on The Reengineering Tool From conventional System into Design Pattern (기존 시스템에서 설계 패턴으로의 재공학 툴에 관한 연구)

  • Kim, Haeng-Kon;Cha, Jung-Eun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2334-2344
    • /
    • 1998
  • Appliciltion systems focusing class units, as component abstraction based on source code, has insufficient benefit of independency and reuse of elements. Only few effects are acquired, because it is only inclined implementation. We need design pattern to represent not only the problem abstraction but also information and relationship between system elements for generic solutions of specific domain Also, it is essential to software reverse engineering to catch the correct system through examming the cxisting system and utilizing the acquired knowledges as reusable resource. Namely, software reverse engineering for extracting the design pattern is very important because it improves the understand ability for system analysis and design through extracting the design structure of object-oriented system, and provides rich and high leIel reusabilitv through grasping the standard idioms and relationships between components. In this paper, we defined the extraction algorithm for design patterns with standardized, packaged and quantitative measlIIul thruugh applying reyerse engineering into existing ubject Olicnted system. And we designed the reengineering toul including reverse engineering for autumatic extractiun of design patterns ami reuse fur retrieval. editing and rebuilding oi design patterns. Also we applied the algorithms into Java applications.

  • PDF

A New Component Model and Framework for Reuse of Components (컴포넌트 재사용을 지원하는 컴포넌트 모델 및 프레임워크)

  • Lim, Yoon-Sun;Kim, Myung;Jeong, Seung-Nam;Jeong, An-Mo
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1011-1020
    • /
    • 2007
  • It is difficult to assemble independently developed software components because of discrepancies between their interfaces. In order to resolve such problem, we propose a new component model, Active Binding Technology, in which each component has its own independently-defined interface for service request that is revealed in its metadata, instead of passively following the interface of a service-providing component. This model Includes the use of the glue component, an interface mediating place, whose template code is automatically generated by reading in the metadata of the components to be combined. We also propose a runtime framework that holds the pool of component instances, completes the assembly of components in the manner of dependency injection, and performs middleware services and real-time system monitoring through glue components. In order to test the practical value of Active Binding Technology, we have made a tool, which supports the development and assembly of Active Binding components.