期刊文献+

基于资源访问规则与行为截获的软件封装方法

A software wrapping approach based on resource access rules and behavior interception
下载PDF
导出
摘要 在分析软件系统接口框架体系和软件资源访问接口特征之后,给出了一个通用资源定义模型及其描述语言和一个资源访问规则映射机制及其描述语言。在此基础之上,提出了一种面向二进制的基于资源访问抽象描述和软件行为截获的黑盒遗留软件封装方法,而且设计并实现了一个自动软件封装器原型TinyWrapper。对该方法在典型的软件重用场景中的作用进行了评估,结果表明,方法可以成功处理场景中的所有复用需求,同时验证了该方法的有效性,证明了该方法容易部署且对改造后的遗留软件产生的负载低。 After analyzing the software interface architecture and resource access interface characteristics, this study pro- posed a common resource definition model described by a resource description language and a resource mapping mechanism expressed by a resource mapping description language. On the basis of this, a binary-centric and black- box wrapping approach based on resource access abstract description and software behavior interception was presen- ted. Then, an automatic software wrapper prototype called TinyWrapper was designed and implemented. Moreover, the functions of the approach in a typical software reuse scenario were evaluated. The results show that the approach is effective and it can deal with all reuse requirements in the scenario, additionally, the approach is easy to deploy. The performance overhead caused by the approach is low.
出处 《高技术通讯》 CAS CSCD 北大核心 2012年第7期675-682,共8页 Chinese High Technology Letters
基金 863计划(2009AA043303)和中央高校基本科研业务费专项资金(YWF-11-03-Q-037)资助项目.
关键词 遗留软件 软件封装 资源特征 规则映射 软件行为分析 行为截获 legacy software, software wrapping, resource analysis, behavior interception characteristics, rule mapping, software behavior
  • 相关文献

参考文献15

  • 1Heineman G T, Council1 W T. Component-based Software Engineering: Putting the Pieces Together. Boston: Addi- son-Wesley Longman Publishing Co, 2001. 110-120.
  • 2Ravichandran T, Rothenberger M A. Software reuse strat- egies and component markets. Communications of the ACM-Program Compaction, 2003, 46(8) : 109-114.
  • 3杨芙清,梅宏,李克勤.软件复用与软件构件技术[J].电子学报,1999,27(2):68-75. 被引量:513
  • 4Seacord R C, Plakosh D, Lewis G A. Modernizing Lega- cy Systems: Software Technologies, Engineering Processand Business Practices. Boston: Addison-Wesley Long- man Publishing Co, 2003. 30-50.
  • 5詹剑锋,程虎.基于Mobile Agent技术的遗留系统再工程方法[J].软件学报,2002,13(12):2343-2348. 被引量:11
  • 6杨芙清,王千祥,梅宏,陈兆良.基于复用的软件生产技术[J].中国科学(E辑),2001,31(4):363-371. 被引量:110
  • 7Ning J Q, Engberts A, Kozaczynski W. Recovering reus- able components from legacy systems by program segmen- tation. In: Proceedings of Working Conference on Re- verse Engineering, Chicago, USA, 1993. 64-72.
  • 8Weiderman N H, Bergey J K, Smith D B, et al. Approa- ches to Legacy System Evolution: [ Technical Report ], CMU/SEI-97-TR-014, Carnegie Mellon University, 1997.
  • 9Bisbal J, Lawless D, Wu B, et al. Legacy Information Systems : Issues and Directions. IEEE Software, 1999, 16(5) : 103-111.
  • 10Parsa S, Ghods L. A new approach to wrap legacy pro- grams into web services. In: Proceedings of the 11th In- ternational Conference on Computer and Information Tech- nology, Khulna, Bangladesh, 2008. 442-447.

二级参考文献15

共引文献814

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部