An Assesment of Visualization of Representative Class Interaction Scenarios for Program Comprehension

Size: px
Start display at page:

Download "An Assesment of Visualization of Representative Class Interaction Scenarios for Program Comprehension"

Transcription

1 An Assesment of Visualization of Representative Class Interaction Scenarios for Program Comprehension Satoshi Munakata, 1 Yui Watanabe, 1 Takashi Ishio 1 and Katsuro Inoue 1 In object-oriented programming, it is effective to visualize an execution trace of an instance of a class as behavior diagrams for understanding behaviors of the class. However, a class can create a large number of instances; it is hard for developers to read behavior diagrams for each instance. In this paper, we propose a method to classify instances into groups based on their behaviors, and visualize only representative behaviors of their instances. Users can select one of four categorization criteria depends on their purpose of investigation for program comprehension. As an assessment of the efficacy for program comprehension, we have applied our approach to six Java programs. 1. 9) 1 2),3),5),9),11) 7),8) UML 12) UML DOPG UML 4 GUI Graduate School of Information Science and Technology, Osaka University 1 c 2010 Information Processing Society of Japan

2 ) 2),3),5),9),11) Quante 1 DOPG(Dynamic Object Process Graph) 5) DOPG DOPG 8 (Read Write Call Entry Return Start Final Condition) 3 (Conditional Unconditional Invocation) Lange 4) ),8) Salah 8) Richner 7) ID ID ( ) Use(o) : o ( 1(a)) Used(o) : o ( 1(b)) Methods(o) : o ( 1(c)) Called(o) : o ( 1(d)) c 2010 Information Processing Society of Japan

3 1 Use Used Methods Called DOPG UML E use (o s,o k ) 2 o s,o k E use(o s,o k ) E use (o s,o k ) Use(o s )=Use(o k ) 1),6) 2 E use (o s,o k ) E used (o s,o k ) 2 o s,o k E used (o s,o k ) E used (o s,o k ) Used(o s )=Used(o k ) 2 E used (o s,o k ) E methods (o s,o k ) 2 o s,o k E methods (o s,o k ) E methods (o s,o k ) Methods(o s)=methods(o k ) 2 E methods (o s,o k ) E called (o s,o k ) 2 o s,o k E called (o s,o k ) E called (o s,o k ) Called(o s)=called(o k ) 2 E called (o s,o k ) E use (o s,o k ) O G use (O) ={G 1,,G l } G i G use (O) E methods G use,methods (G i)={g i1,,g im} E use,e methods DOPG UML 1 4. Amida-OGAN 2 GUI Explorer Metrics View Feature View Visualize View GUI Java c 2010 Information Processing Society of Japan

4 2 Software #Events #Classes #Objects Scheduler 8578 (12) JHotDraw 128,796 (97)185 6,286 Apache PMD 633,309 (67)105 8,431 MASU 3,198,125 (80)309 12,414 Apache FOP 3,657,813 (120)502 27,342 Antlr 7,305,687 (42)60 21,022 14,932,308 (418)1,178 77,468 2 Amida-OGAN ( 2 ) java javax sun com.sun %( 36%) (1) (2) (3) (1)(2) (3) 5.1 :Scheduler Scheduler ( ) GUI CalendarDate Scheduler java javax sun com.sun CalendarDate E use 3 {s 1,s 2,s 3 } s s 1 87 s s 1 CalendarMonth s 2 s 3 3 s 3 4 RegisterDialog CalendarDate s 1,s 2,s 3 DOPG. 1 DOPG 4 c 2010 Information Processing Society of Japan

5 3 CalendarDate {s 1,s 2,s 3} s 2 s 3 4 s3 CalendarDate CalendarMonth CalendarDate 18 s 2 s 3 s 2 DOPG DateCellRenderer DateCell CalendarDate s 2 UML s 2 s 3 DOPG s 2 3 s 2,s 3 s 3 DOPG RegisterDialog UML s 3 CalendarDate CalendarDate CalendarDate CalendarDate CalendarDate s 1 s 2 s 3 E use CalendarDate GUI 1 CalendarDate 731 CalendarDate 3 s 1,s 2,s CalendarDate CalendarDate DOPG DOPG 6 (1) (2)2 5 c 2010 Information Processing Society of Japan

6 :MASU MASU MASU Java C++ C# UnresolvedMethodIndo AST 84 E methods 4 AST 4 DOPG DOPG DOPG DOPG %( 2.4%) ( 1.6 ) 3 DOPG DOPG 4 3 Software #E use #E Used #E methods #E called # #DOPG Scheduler JHotDraw ,657 Apache PMD MASU ,188 Apache FOP ,928 Antlr ,091 2,291 1,634 1,785 1,658 2,525 11,421 5 E use 6 E used ,6,7,8 E use,e used,e methods,e called 5,6,7,8 5,6,7,8 9 E use 9 97% 50 82% E used 99% 95% E methods 99% 87% E called 99% 94% 6 c 2010 Information Processing Society of Japan

7 7 E methods 8 E called 9 E use E methods 10 E methods (a) (b) (a) MASU StateChangeEvent NamespaceInfo JHotDraw ResourceBundleUtil AttributeAction E use MASU StateChangeEvent 8344 E use E use E methods 9 E use E methods 9 E use E methods StateChangeEvent 8344 E methods 3 DOPG UML E use 9 7 c 2010 Information Processing Society of Japan

8 10 E methods ( ) 10 (b) 10 ( 1 ) (1) (2) Scheduler 3 3 (3) % 9 1 1) G.Arevalo, F.Buchli, and O.Nierstrasz. Detecting implicit collaboration patterns. In the 11th Working Conference on Reverse Engineering, pp , ) V.Dallmeier, C.Lindig, A.Wasylkowski, and A.Zeller. Mining object behavior with adabu. In the 4th International Workshop on Dynamic Analysis, pp , ) T. Gschwind and J. Oberleitner. Improving dynamic data analysis with aspectoriented programming. In the 7th European Conference on Software Maintenance and Reengineering, pp , ) D.B. Lange and Y.Nakamura. Interactive visualization of design patterns can help in framework understanding. In ACM SIGPLAN Notices, Vol.30, pp , ) J.Quante and R.Koschke. Dynamic object process graphs. In Journal of Systems and Software, Vol.81, pp , ) T.Richner and S.Ducasse. Recovering high-level views of object-oriented applications from static and dynamic information. In the 15th International Conference on Software Maintenance, pp , ) T. Richner and S. Ducasse. Using dynamic information for the iterative recovery of collaborations and roles. In the 18th International Conference on Software Maintenance, pp , ) M.Salah, T.Denton, S.Mancoridis, A.Shokoufandeh, and F.I. Vokolos. Scenariographer: A tool for reverse engineering class usage scenarios from method invocation sequences. In the 21st International Conference on Software Maintenance, pp , ) T.Systa. Understanding the behavior of java programs. In the 7th Working Conference on Reverse Engineering, pp , ) N. Wilde and R. Huitt. Maintenance support for object-oriented programs. In IEEE Transactions on Software Engineering, Vol.18, pp , ) T. Xie and D. Notkin. Automatic extraction of sliced object state machines for component interfaces. In the 3rd Workshop on Specification and Verification of Component-Based Systems, pp , ),,.. 163, 31, pp , : c 2010 Information Processing Society of Japan

Detecting Difference between the Execution Trace Extracted from Two Versions of a Program

Detecting Difference between the Execution Trace Extracted from Two Versions of a Program 1 1 1 1 2 JHotDraw Detecting Difference between the Execution Trace Extracted from Two Versions of a Program Yoshiro Ito, 1 Yui Watanabe, 1 Takashi Ishio 1 and Katsuro Inoue 1 It is necessary to confirm

More information

3 3-gram. (causal difference graph) Relative Debugging[3] 2. (Execution Trace) [4] Differential Slicing[2] 2. 3-gram. Java. 3-gram 2. DaCapo.

3 3-gram. (causal difference graph) Relative Debugging[3] 2. (Execution Trace) [4] Differential Slicing[2] 2. 3-gram. Java. 3-gram 2. DaCapo. 3-gram 1,a) 1,b) 1,c) 2 Java 2 3 3-gram DaCapo 3-gram 1. (Execution Trace) 1 [1] 2 2 Differential Slicing[2] 2 1 Graduate School of Information Science and Technology, Osaka University, Suita, Osaka 565-0871,

More information

Analysis of Coding Patterns over Software Versions

Analysis of Coding Patterns over Software Versions Information and Media Technologies 0(): - (05) reprinted from: Computer Software (): 0- (05) Analysis of Coding Patterns over Software Versions Hironori Date, Takashi Ishio, Makoto Matsushita, Katsuro

More information

Towards Locating a Functional Concern Based on a Program Slicing Technique

Towards Locating a Functional Concern Based on a Program Slicing Technique Towards Locating a Functional Concern Based on a Program Slicing Technique Takashi Ishio 1,2, Ryusuke Niitani 2, Katsuro Inoue 2 1 Department of Computer Science University of British Columbia 2366 Main

More information

On Refactoring for Open Source Java Program

On Refactoring for Open Source Java Program On Refactoring for Open Source Java Program Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 and Yoshio Kataoka 3 1 Graduate School of Information Science and Technology, Osaka University

More information

Dynamic Protocol Recovery

Dynamic Protocol Recovery Dynamic Protocol Recovery Jochen Quante, Rainer Koschke University of Bremen, Germany http://www.informatik.uni-bremen.de/st/ {quante,koschke}@informatik.uni-bremen.de Abstract Dynamic protocol recovery

More information

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection of Potential

More information

On Refactoring Support Based on Code Clone Dependency Relation

On Refactoring Support Based on Code Clone Dependency Relation On Refactoring Support Based on Code Dependency Relation Norihiro Yoshida 1, Yoshiki Higo 1, Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 1 Graduate School of Information Science and Technology,

More information

Code Clone Detection Technique Using Program Execution Traces

Code Clone Detection Technique Using Program Execution Traces 1,a) 2,b) 1,c) Code Clone Detection Technique Using Program Execution Traces Masakazu Ioka 1,a) Norihiro Yoshida 2,b) Katsuro Inoue 1,c) Abstract: Code clone is a code fragment that has identical or similar

More information

Recovery of Design Pattern from source code

Recovery of Design Pattern from source code Recovery of Design Pattern from source code Amit Kumar Gautam and T.Gayen Software Engineering, IIIT Allahabad tgayen@iiita.ac.in, Ise2008004@iiita.ac.in Abstract. The approach for detecting design pattern

More information

Refactoring Support Based on Code Clone Analysis

Refactoring Support Based on Code Clone Analysis Refactoring Support Based on Code Clone Analysis Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1 and Katsuro Inoue 1 1 Graduate School of Information Science and Technology, Osaka University, Toyonaka,

More information

Rearranging the Order of Program Statements for Code Clone Detection

Rearranging the Order of Program Statements for Code Clone Detection Rearranging the Order of Program Statements for Code Clone Detection Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email: {y-sabi,higo,kusumoto@ist.osaka-u.ac.jp

More information

Extracting a Unified Directory Tree to Compare Similar Software Products

Extracting a Unified Directory Tree to Compare Similar Software Products Extracting a Unified Directory Tree to Compare Similar Software Products Yusuke Sakaguchi, Takashi Ishio, Tetsuya Kanda, Katsuro Inoue Graduate School of Information Science and Technology, Osaka University,

More information

Cross-application Fan-in Analysis for Finding Application-specific Concerns

Cross-application Fan-in Analysis for Finding Application-specific Concerns Cross-application Fan-in Analysis for Finding Application-specific Concerns Makoto Ichii Takashi Ishio Katsuro Inoue Graduate School of Information Science and Technology, Osaka University 1-3 Machikaneyama,

More information

Aspect Refactoring Verifier

Aspect Refactoring Verifier Aspect Refactoring Verifier Charles Zhang and Julie Waterhouse Hans-Arno Jacobsen Centers for Advanced Studies Department of Electrical and IBM Toronto Lab Computer Engineering juliew@ca.ibm.com and Department

More information

Software Architecture Recovery based on Dynamic Analysis

Software Architecture Recovery based on Dynamic Analysis Software Architecture Recovery based on Dynamic Analysis Aline Vasconcelos 1,2, Cláudia Werner 1 1 COPPE/UFRJ System Engineering and Computer Science Program P.O. Box 68511 ZIP 21945-970 Rio de Janeiro

More information

JUnit A Study on Applying JUnit Framework to Document Knowledge of Object-Oriented Software Systems

JUnit A Study on Applying JUnit Framework to Document Knowledge of Object-Oriented Software Systems JUnit A Study on Applying JUnit Framework to Document Knowledge of Object-Oriented Software Systems Email: {hsieh, s1669021}@ntut.edu.tw JUnit SyncFree 92 [16] SyncFree 1.0 [17] bug fixmerge CVS SyncFree

More information

Impact of Dependency Graph in Software Testing

Impact of Dependency Graph in Software Testing Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,

More information

Dependence Graph Considerering Resource for Automatic Sample Program Generation

Dependence Graph Considerering Resource for Automatic Sample Program Generation 1 2 2 2 ( ) Google Android Dependence Graph Considerering Resource for Automatic Sample Program Generation Yoshimasa Fujiura, 1 Hirotaka Ohkubo, 1 Hideto Kasuya 1 and Shinichiro Yamamoto 1 This paper propose

More information

Using Run-Time Data for Program Comprehension

Using Run-Time Data for Program Comprehension Using Run-Time Data for Program Comprehension Thomas Gschwind Johann Oberleitner Martin Pinzger Distributed Systems Group Technische Universität Wien Argentinerstraße 8/E1841 A-1040 Wien, Austria, Europe

More information

Assertion with Aspect

Assertion with Aspect Assertion with Aspect Takashi Ishio, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue Graduate School of Engineering Science, PRESTO, Japan Science and Technology Agency Osaka University 1-3 Machikaneyama-cho,

More information

XRay Views: Understanding the Internals of Classes

XRay Views: Understanding the Internals of Classes XRay Views: Understanding the Internals of Classes Gabriela Arévalo, Stéphane Ducasse, Oscar Nierstrasz Software Composition Group University of Bern (Switzerland) {arevalo, ducasse, oscar}@iam.unibe.ch

More information

A PARSING APPROACH FOR SYSTEM BEHAVIOUR MODELING

A PARSING APPROACH FOR SYSTEM BEHAVIOUR MODELING IADIS International Conference Applied Computing 2007 A PARSING APPROACH FOR SYSTEM BEHAVIOUR MODELING Lau Sei Ping 1, Wee Bui Lin 2, Nurfauza bt Jali 3 Faculty of Computer Science and Information Technology

More information

Characterizing the Functional Roles of Classes and Methods by Analyzing Feature Traces

Characterizing the Functional Roles of Classes and Methods by Analyzing Feature Traces Characterizing the Functional Roles of Classes and Methods by Analyzing Feature Traces Orla Greevy and Stéphane Ducasse Software Composition Group University of Bern, Switzerland {greevy, ducasse}@iam.unibe.ch

More information

A Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information

A Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information A Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information Fumiaki OHATA Ý, Kouya HIROSE Ý, Masato FUJII Ý and Katsuro INOUE Ý Ý Graduate School of Engineering Science, Osaka University

More information

IOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 3, Issue 3 (July-Aug. 2012), PP

IOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 3, Issue 3 (July-Aug. 2012), PP IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 3 (July-Aug. 2012), PP 50-55 Modeling Object Oriented Applications by Using Dynamic Information for the Iterative Recovery

More information

Using Dynamic Information for the Iterative Recovery of Collaborations and Roles

Using Dynamic Information for the Iterative Recovery of Collaborations and Roles Using Dynamic Information for the Iterative Recovery of Collaborations and Roles Tamar Richner and Stéphane Ducasse Software Composition Group, Institut für Informatik (IAM) Universität Bern, Neubrückstrasse

More information

A Metric-based Approach for Reconstructing Methods in Object-Oriented Systems

A Metric-based Approach for Reconstructing Methods in Object-Oriented Systems A Metric-based Approach for Reconstructing Methods in Object-Oriented Systems Tatsuya Miyake Yoshiki Higo Katsuro Inoue Graduate School of Information Science and Technology, Osaka University {t-miyake,higo,inoue@istosaka-uacjp

More information

A Study on a Development Environment for Software Traceability Management

A Study on a Development Environment for Software Traceability Management 1,a) 1,b) 1,c) TERAS A Study on a Development Environment for Software Traceability Management NORITOSHI ATSUMI 1,a) TAKASHI KOBAYASHI 1,b) HIROAKI TAKADA 1,c) Abstract: Software traceability management

More information

Reusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview

Reusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview Reusing Reused Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan {t-ishihr,

More information

Visualization of Clone Detection Results

Visualization of Clone Detection Results Visualization of Clone Detection Results Robert Tairas and Jeff Gray Department of Computer and Information Sciences University of Alabama at Birmingham Birmingham, AL 5294-1170 1-205-94-221 {tairasr,

More information

ERAS-test Documentation

ERAS-test Documentation ERAS-test Documentation Release 0 Ezio May 01, 2013 CONTENTS 1 SWRS Template 3 1.1 Change Record.............................................. 3 1.2 Introduction...............................................

More information

Comparative Evaluation of Programming Paradigms: Separation of Concerns with Object-, Aspect-, and Context-Oriented Programming

Comparative Evaluation of Programming Paradigms: Separation of Concerns with Object-, Aspect-, and Context-Oriented Programming Comparative Evaluation of Programming Paradigms: Separation of Concerns with Object-, Aspect-, and Context-Oriented Programming Fumiya Kato, Kazunori Sakamoto, Hironori Washizaki, and Yoshiaki Fukazawa

More information

Nullable Method Detection

Nullable Method Detection Nullable Method Detection Don t Repeat The Mistakes Others Have Already Fixed Manuel Leuenberger Master thesis 13.12.2016 Problem Terms terms = fields.terms(field); TermsEnum termsenum = terms.iterator();

More information

An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension

An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension Heidar Pirzadeh, Akanksha Agarwal, Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering

More information

How are Developers Treating License Inconsistency Issues? A Case Study on License Inconsistency Evolution in FOSS Projects

How are Developers Treating License Inconsistency Issues? A Case Study on License Inconsistency Evolution in FOSS Projects How are Developers Treating License Inconsistency Issues? A Case Study on License Inconsistency Evolution in FOSS Projects Yuhao Wu 1(B), Yuki Manabe 2, Daniel M. German 3, and Katsuro Inoue 1 1 Graduate

More information

Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks

Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks Edward B. Duffy, Jason O. Hallstrom and Brian A. Malloy Computer Science Department Clemson

More information

Extracting Code Clones for Refactoring Using Combinations of Clone Metrics

Extracting Code Clones for Refactoring Using Combinations of Clone Metrics Extracting Code Clones for Refactoring Using Combinations of Clone Metrics Eunjong Choi 1, Norihiro Yoshida 2, Takashi Ishio 1, Katsuro Inoue 1, Tateki Sano 3 1 Graduate School of Information Science and

More information

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool SHINPEI OGATA Function Control System, Graduate School of Engineering Shibaura Institute of Technology 307

More information

A Technique to Detect Multi-grained Code Clones

A Technique to Detect Multi-grained Code Clones Detection Time The Number of Detectable Clones A Technique to Detect Multi-grained Code Clones Yusuke Yuki, Yoshiki Higo, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka

More information

Multi-Project Software Engineering: An Example

Multi-Project Software Engineering: An Example Multi-Project Software Engineering: An Example Pankaj K Garg garg@zeesource.net Zee Source 1684 Nightingale Avenue, Suite 201, Sunnyvale, CA 94087, USA Thomas Gschwind tom@infosys.tuwien.ac.at Technische

More information

VANS: Visual Ad hoc Network Simulator

VANS: Visual Ad hoc Network Simulator VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,

More information

WARE: a tool for the Reverse Engineering of Web Applications

WARE: a tool for the Reverse Engineering of Web Applications WARE: a tool for the Reverse Engineering of Web Applications Anna Rita Fasolino G. A. Di Lucca, F. Pace, P. Tramontana, U. De Carlini Dipartimento di Informatica e Sistemistica University of Naples Federico

More information

Token based clone detection using program slicing

Token based clone detection using program slicing Token based clone detection using program slicing Rajnish Kumar PEC University of Technology Rajnish_pawar90@yahoo.com Prof. Shilpa PEC University of Technology Shilpaverma.pec@gmail.com Abstract Software

More information

Dynamic Analysis and Design Pattern Detection in Java Programs

Dynamic Analysis and Design Pattern Detection in Java Programs Dynamic Analysis and Design Pattern Detection in Java Programs Lei Hu and Kamran Sartipi Dept. Computing and Software, McMaster University, Hamilton, ON, L8S 4K1, Canada {hu14, sartipi}@mcmaster.ca Abstract

More information

Building Web Annotation Stickies based on Bidirectional Links

Building Web Annotation Stickies based on Bidirectional Links Building Web Annotation Stickies based on Bidirectional Links Hiroyuki Sano, Taiki Ito, Tadachika Ozono and Toramatsu Shintani Dept. of Computer Science and Engineering Graduate School of Engineering,

More information

Design Pattern Detection in Eiffel Systems

Design Pattern Detection in Eiffel Systems Design Pattern Detection in Eiffel Systems Wei Wang and Vassilios Tzerpos York University Toronto, Ontario, Canada {weiw,bil}@cs.yorku.ca Abstract The use of design patterns in a software system can provide

More information

Detecting Implied Scenarios from Execution Traces

Detecting Implied Scenarios from Execution Traces Detecting Implied Scenarios from Execution Traces Felipe Cantal de Sousa, Nabor C. Mendonça Mestrado em Informática Aplicada Universidade de Fortaleza Fortaleza, CE, Brazil felipecantal@gmail.com, nabor@unifor.br

More information

PAPER Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files

PAPER Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files IEICE TRANS. INF. & SYST., VOL.E98 D, NO.2 FEBRUARY 2015 325 PAPER Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files Eunjong CHOI a), Nonmember, Norihiro YOSHIDA,

More information

Debugging Support for Aspect-Oriented Program Based on Program Slicing and Call Graph

Debugging Support for Aspect-Oriented Program Based on Program Slicing and Call Graph Debugging Support for Aspect-Oriented Program Based on Program Slicing and Call Graph Takashi Ishio, Shinji Kusumoto, Katsuro Inoue Graduate School of Information Science and Technology, Osaka University

More information

Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48)

Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) Course Title: Software Engineering Course No. : ICT Ed 528 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) 1. Course Description The

More information

Classification of Java Programs in SPARS-J. Kazuo Kobori, Tetsuo Yamamoto, Makoto Matsusita and Katsuro Inoue Osaka University

Classification of Java Programs in SPARS-J. Kazuo Kobori, Tetsuo Yamamoto, Makoto Matsusita and Katsuro Inoue Osaka University Classification of Java Programs in SPARS-J Kazuo Kobori, Tetsuo Yamamoto, Makoto Matsusita and Katsuro Inoue Osaka University Background SPARS-J Reuse Contents Similarity measurement techniques Characteristic

More information

Object Flow Analysis Taking an Object-Centric View on Dynamic Analysis

Object Flow Analysis Taking an Object-Centric View on Dynamic Analysis Object Flow Analysis Taking an Object-Centric View on Dynamic Analysis Adrian Lienhard 1, Stéphane Ducasse 2, Tudor Gîrba 1 1 Software Composition Group, University of Bern, Switzerland 2 LISTIC, University

More information

Reliability of Software Fault Prediction using Data Mining and Fuzzy Logic

Reliability of Software Fault Prediction using Data Mining and Fuzzy Logic Reliability of Software Fault Prediction using Data Mining and Fuzzy Logic Vaibhav Agrawal Amity University Madhya Pradesh, Gwalior vagrawal@gwa.amity.edu Abstract: In this paper we proposed unsupervised

More information

JML OCL. Java. iterate

JML OCL. Java. iterate 1 OCL JML OCL (Object Constraint Language) JML (Java Modelling Language) UML/OCL JML Java OCL JML iterate iterate Java OCL JML The paper presents a translation method from OCL (Object Constraint Language)

More information

APIEvolutionMiner: Keeping API Evolution under Control

APIEvolutionMiner: Keeping API Evolution under Control APIEvolutionMiner: Keeping API Evolution under Control André Hora, Anne Etien, Nicolas Anquetil, Stéphane Ducasse, Marco Tulio Valente RMoD team, Inria, Lille, France Email: firstname.lastname@inria.fr

More information

SOFTWARE MAINTENANCE: A

SOFTWARE MAINTENANCE: A SOFTWARE MAINTENANCE: A TUTORIAL BY KEITH H. BENNETT 2008.10.13 소프트웨어 200310612 조보경 Software Engineering Field Main problem of software engineering Scale and Complexity of the software Goal of software

More information

SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA ABSTRACT

SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA ABSTRACT SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA Bhaskar Raj Sinha, Pradip Peter Dey, Mohammad Amin and Hassan Badkoobehi National University, School of Engineering, Technology, and Media 3678 Aero

More information

Visualizing Feature Interaction in 3-D

Visualizing Feature Interaction in 3-D Visualizing Feature Interaction in 3-D Orla Greevy 1, Michele Lanza 2 and Christoph Wysseier 1 1 Software Composition Group - University of Berne - Switzerland 2 Faculty of Informatics, University of Lugano

More information

An Approach to Software Component Specification

An Approach to Software Component Specification Page 1 of 5 An Approach to Software Component Specification Jun Han Peninsula School of Computing and Information Technology Monash University, Melbourne, Australia Abstract. Current models for software

More information

Dynamic Slice of Aspect Oriented Program: A Comparative Study

Dynamic Slice of Aspect Oriented Program: A Comparative Study Dynamic Slice of Aspect Oriented Program: A Comparative Study Sk. Riazur Raheman, Amiya Kumar Rath, Hima Bindu M Dept. of CSE, Raajdhani Engineering College, Bhubaneswar, Odisha, 751017, India Professor

More information

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may

More information

IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE

IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.5, September 2018 IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE Simon Kawuma 1 and

More information

Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage

Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage Hai Yuan Department of Computer Science North Carolina State University Raleigh, NC 27695 hyuan3@ncsu.edu Tao Xie Department

More information

Key Properties for Comparing Modeling Languages and Tools: Usability, Completeness and Scalability

Key Properties for Comparing Modeling Languages and Tools: Usability, Completeness and Scalability Key Properties for Comparing Modeling Languages and Tools: Usability, Completeness and Scalability Timothy C. Lethbridge Department of Electrical Engineering and Computer Science, University of Ottawa

More information

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)

More information

Using Geofencing for a Disaster Information System

Using Geofencing for a Disaster Information System Using Geofencing for a Disaster Information System Akira Suyama Graduate School of Engineering Tokyo Denki University Tokyo, Japan 16kmc16@ms.dendai.ac.jp Ushio Inoue Dept. of Information and Communication

More information

ITSS Model Curriculum. - To get level 3 -

ITSS Model Curriculum. - To get level 3 - ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company

More information

Software Architecture Recovery based on Pattern Matching

Software Architecture Recovery based on Pattern Matching Software Architecture Recovery based on Pattern Matching PhD Dissertation Synopsis Kamran Sartipi School of Computer Science, University of Waterloo Waterloo, ON. NL 3G, Canada ksartipi@math.uwaterloo.ca

More information

A Review of Milestones in the History of GUI Prototyping Tools

A Review of Milestones in the History of GUI Prototyping Tools A Review of Milestones in the History of GUI Prototyping Tools IFIP WG 13.2 Workshop on User Experience and User-Centered Development Processes September 14 th 2015, Bamberg, Germany Thiago R. Silva, Jean-Luc

More information

Understanding and Automating Application-level Caching

Understanding and Automating Application-level Caching Understanding and Automating Application-level Caching Jhonny Mertz and Ingrid Nunes (Advisor) 1 Programa de Pós-Graduação em Computação (PPGC), Instituto de Informática Universidade Federal do Rio Grande

More information

Optimization of Query Processing in XML Document Using Association and Path Based Indexing

Optimization of Query Processing in XML Document Using Association and Path Based Indexing Optimization of Query Processing in XML Document Using Association and Path Based Indexing D.Karthiga 1, S.Gunasekaran 2 Student,Dept. of CSE, V.S.B Engineering College, TamilNadu, India 1 Assistant Professor,Dept.

More information

Support system for smartphone application development based on analysis of user reviews

Support system for smartphone application development based on analysis of user reviews 1,a) 1 1 / Support system for smartphone application development based on analysis of user reviews Yuichi Sei 1,a) Yasuyuki Tahara 1 Akihiko Ohsuga 1 Abstract: A number of smartphone applications have

More information

RobusTest: Towards a Framework for Automated Testing of Robustness in Software

RobusTest: Towards a Framework for Automated Testing of Robustness in Software RobusTest: Towards a Framework for Automated Testing of Robustness in Software Ali Shahrokni, Robert Feldt Department of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden

More information

CORRELATING FEATURES AND CODE BY DYNAMIC

CORRELATING FEATURES AND CODE BY DYNAMIC CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS Ren Wu Shanghai Lixin University of Commerce, Shanghai 201620, China ABSTRACT One major problem in maintaining a software system is to understand

More information

Software Metrics based on Coding Standards Violations

Software Metrics based on Coding Standards Violations Software Metrics based on Coding Standards Violations Yasunari Takai, Takashi Kobayashi and Kiyoshi Agusa Graduate School of Information Science, Nagoya University Aichi, 464-8601, Japan takai@agusa.i.is.nagoya-u.ac.jp,

More information

Employing Query Technologies for Crosscutting Concern Comprehension

Employing Query Technologies for Crosscutting Concern Comprehension Employing Query Technologies for Crosscutting Concern Comprehension Marius Marin Accenture The Netherlands Marius.Marin@accenture.com Abstract Common techniques for improving comprehensibility of software

More information

Specification and Automated Detection of Code Smells using OCL

Specification and Automated Detection of Code Smells using OCL Specification and Automated Detection of Code Smells using OCL Tae-Woong Kim 1, Tae-Gong Kim 2 and Jai-Hyun Seu 3 School of Computer Engineering, Inje University, Obang-dong 607, Gimhae, Gyeong-Nam, Korea

More information

Project Plan. In this section the various tools used at different phases of the software life cycle will be described. 3.

Project Plan. In this section the various tools used at different phases of the software life cycle will be described. 3. Project Plan Subject: Project Plan Issue 1.0 Date: 09 June 2005 From: Daniel Calder Mark Marwil 1. Project Goal The project being developed is a library tool. Using various software tools that comply with

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

Drawing Bipartite Graphs as Anchored Maps

Drawing Bipartite Graphs as Anchored Maps Drawing Bipartite Graphs as Anchored Maps Kazuo Misue Graduate School of Systems and Information Engineering University of Tsukuba 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract

More information

DESIGN patterns [16] have emerged to be an important

DESIGN patterns [16] have emerged to be an important IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 39, NO. 6, NOVEMBER 2009 1271 A Matrix-Based Approach to Recovering Design Patterns Jing Dong, Senior Member, IEEE, Yajing

More information

Code Clone Detection on Specialized PDGs with Heuristics

Code Clone Detection on Specialized PDGs with Heuristics 2011 15th European Conference on Software Maintenance and Reengineering Code Clone Detection on Specialized PDGs with Heuristics Yoshiki Higo Graduate School of Information Science and Technology Osaka

More information

Introduction. O.Univ.-Prof. DI Dr. Wolfgang Pree. Universität Salzburg

Introduction. O.Univ.-Prof. DI Dr. Wolfgang Pree.  Universität Salzburg OO Reengineering Patterns O.Univ.-Prof. DI Dr. Wolfgang Pree Universität Salzburg www.softwareresearch.net Introduction 2 Goals Convince you about the following: 3 Lehman s laws 4 What is a legacy system?

More information

Applying Semantic Analysis to Feature Execution Traces

Applying Semantic Analysis to Feature Execution Traces Applying Semantic Analysis to Feature Execution Traces Adrian Kuhn, Orla Greevy and Tudor Gîrba Software Composition Group University of Bern, Switzerland {akuhn, greevy, girba}@iam.unibe.ch Abstract Recently

More information

Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods

Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods IKUO TANABE Department of Mechanical Engineering, Nagaoka University

More information

Backup and Recovery Scheme for Distributed e-learning System

Backup and Recovery Scheme for Distributed e-learning System Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the

More information

A method to speedily pairwise compare in AHP and ANP

A method to speedily pairwise compare in AHP and ANP ISAHP 2005, Honolulu, Hawaii, July 8-10, 2005 A method to speedily pairwise compare in AHP and ANP Kazutomo Nishizawa Department of Mathematical Information Engineering, College of Industrial Technology,

More information

Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow

Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow Jang-Wu Jo 1 and Byeong-Mo Chang 2 1 Department of Computer Engineering Pusan University of Foreign Studies Pusan

More information

A Feature Model of Framework Applications

A Feature Model of Framework Applications 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing A Feature Model of Framework Applications Izuru Kume Masahide Nakamura

More information

A Technique for Design Patterns Detection

A Technique for Design Patterns Detection A Technique for Design Patterns Detection Manjari Gupta Department of computer science Institute of Science Banaras Hindu University Varansi-221005, India manjari_gupta@rediffmail.com Abstract Several

More information

Overture Architecture & Status

Overture Architecture & Status Overture Architecture & Status Peter Gorm Larsen & Marcel Verhoef (updated 28 Nov 2006) OVERTURE ARCHITECTURE Overture versus VDMTools VDMTools (http://www.vdmtools.jp/en) Closed source, proprietary (available

More information

Run-Time Information Visualization for Understanding Object-Oriented Systems

Run-Time Information Visualization for Understanding Object-Oriented Systems Run-Time Information Visualization for Understanding Object-Oriented Systems Roland Bertuli I3S Laboratory Sophia-Antipolis, France bertuli@essi.fr Stéphane Ducasse Software Composition Group University

More information

We manage the technology that lets you manage your business.

We manage the technology that lets you manage your business. We manage the technology that lets you manage your. Stages of Legacy Modernization Metadata enablement of a four-stage approach end-to-end Modernization Stages of Legacy Modernization The speed of technology

More information

AP COMPUTER SCIENCE A: SYLLABUS

AP COMPUTER SCIENCE A: SYLLABUS Curricular Requirements CR1 The course teaches students to design and implement computer-based solutions to problems. Page(s) 2,3-4,5,6-7,8-9 CR2a The course teaches students to use and implement commonly

More information

SELECTED TOPICS in APPLIED COMPUTER SCIENCE

SELECTED TOPICS in APPLIED COMPUTER SCIENCE A Tool for Detecting Detects on Class Implementation in Object Oriented Program on the Basis of the Law of Demeter: Focusing on Dependency between Packages RYOTA CHIBA, HIROAKI HASHIURA and SEIICHI KOMIYA

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-SE-187 No /3/13 Simulink 1,a) 1,b) 2 3 MATLAB/Simulink Simulink MATLAB/Simulink A Study of Qualit

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-SE-187 No /3/13 Simulink 1,a) 1,b) 2 3 MATLAB/Simulink Simulink MATLAB/Simulink A Study of Qualit Simulink 1,a) 1,b) 2 3 MATLAB/Simulink Simulink MATLAB/Simulink A Study of Quality Evaluation Method Using Division Determination by Simulink Model Metrics Minegishi Kengo 1,a) Ueda Yoshikazu 1,b) Hukazu

More information

Support for Static Concept Location with sv3d

Support for Static Concept Location with sv3d Support for Static Concept Location with sv3d Xinrong Xie, Denys Poshyvanyk, Andrian Marcus Department of Computer Science Wayne State University Detroit Michigan 48202 {xxr, denys, amarcus}@wayne.edu

More information

An Approach for Mapping Features to Code Based on Static and Dynamic Analysis

An Approach for Mapping Features to Code Based on Static and Dynamic Analysis An Approach for Mapping Features to Code Based on Static and Dynamic Analysis Abhishek Rohatgi 1, Abdelwahab Hamou-Lhadj 2, Juergen Rilling 1 1 Department of Computer Science and Software Engineering 2

More information