首页    期刊浏览 2025年02月17日 星期一
登录注册

文章基本信息

  • 标题:Recovering UML2 Sequence Diagrams from Execution Traces
  • 本地全文:下载
  • 作者:EL Mahi BOUZIANE ; Chafik BAIDADA ; Abdeslam JAKIMI
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2020
  • 卷号:11
  • 期号:12
  • 页码:105-114
  • DOI:10.14569/IJACSA.2020.0111213
  • 出版社:Science and Information Society (SAI)
  • 摘要:Reverse engineering is a proven and efficient technique for automatically generating UML2 models from object-oriented legacy systems with missing or obsolete documentation. To perform reverse engineering, two techniques are used: dynamic and static analysis. Dynamic analysis refers to collecting information when the system is running while static analysis corresponds to inspecting the source code. Dynamic analysis is preferred than static one in order to extract dynamic models that represents the behavior of a systems because of polymorphism and dynamic binding. In this paper, we present new different methodology that use Colored Petri Nets (CPNs) to recover UML2 Sequence Diagram (SD). First, it generates execution traces corresponding to the different scenarios representing the system behavior. Then, CPNs are used to model and analyze these execution traces to extract UML2 sequence diagram. Our case study illustrates the process of our approach and show that sequence diagram can be extracted with a good accuracy.
  • 关键词:Execution traces; Reverse engineering; UML2; Sequence Diagram; Colored Petri Nets
国家哲学社会科学文献中心版权所有