Software reuse becomes more and more important in all fields of information management. It is influencing the creation of new tools and development environments as well as the modelling and development of applications and infrastructures. The report introduces this extensive field of software technology, points to important problems and explains typical terms. In this report, software reuse includes all activities realizing a repeated use of software projects. Particularly these are techniques which are named 'Re-use' and 'Re-engineering'. A special issue is the field 'Reverse-Engineering' because its methods on the one hand represent a part of Re-engineering and on the other hand they are independently used to rebuild documentation, design...
Software maintenance is the process of modifying software product either for correction, enhancement...
Object-oriented concepts seem to be useful concerning the reuse of existing software. Therefore a tr...
Quality gains through various ways of exploiting legacy systems have been described with several re-...
Today especially large organizations are not only faced with the problem of replacing their informat...
The term 'reuse' when used in a software environment covers a very large area. This document contain...
This report presents the results of a survey on existing reverse engineering techniques and how they...
In this report, we present an overview of the existing software re-engineering process and its relat...
icht und durch die Fakultät für Informatik am 20.11.2012 angenommen. Research in software engineerin...
ABSTRACT: Reuse of existing system has been regarded as a feasible solution to solve the problem of ...
Software reuse approaches, such as software product lines, can help to achieve considerable effort a...
Software productivity has been steadily increasing over the last 30 years, but not enough to close t...
This thesis concerns the technical problems of software reuse and the -related- problem of construct...
One of the major barriers to the introduction of reuse technology into the software development proc...
There are two ways for the principle of re-use software and the first way is the indirect method ind...
Software reuse has been considered as a means to help solve the software development crisis. This pa...
Software maintenance is the process of modifying software product either for correction, enhancement...
Object-oriented concepts seem to be useful concerning the reuse of existing software. Therefore a tr...
Quality gains through various ways of exploiting legacy systems have been described with several re-...
Today especially large organizations are not only faced with the problem of replacing their informat...
The term 'reuse' when used in a software environment covers a very large area. This document contain...
This report presents the results of a survey on existing reverse engineering techniques and how they...
In this report, we present an overview of the existing software re-engineering process and its relat...
icht und durch die Fakultät für Informatik am 20.11.2012 angenommen. Research in software engineerin...
ABSTRACT: Reuse of existing system has been regarded as a feasible solution to solve the problem of ...
Software reuse approaches, such as software product lines, can help to achieve considerable effort a...
Software productivity has been steadily increasing over the last 30 years, but not enough to close t...
This thesis concerns the technical problems of software reuse and the -related- problem of construct...
One of the major barriers to the introduction of reuse technology into the software development proc...
There are two ways for the principle of re-use software and the first way is the indirect method ind...
Software reuse has been considered as a means to help solve the software development crisis. This pa...
Software maintenance is the process of modifying software product either for correction, enhancement...
Object-oriented concepts seem to be useful concerning the reuse of existing software. Therefore a tr...
Quality gains through various ways of exploiting legacy systems have been described with several re-...