An Assesment of Visualization of Representative Class Interaction Scenarios for Program Comprehension
|
|
- Andrew Fisher
- 5 years ago
- Views:
Transcription
1 An Assesment of Visualization of Representative Class Interaction Scenarios for Program Comprehension Satoshi Munakata, 1 Yui Watanabe, 1 Takashi Ishio 1 and Katsuro Inoue 1 In object-oriented programming, it is effective to visualize an execution trace of an instance of a class as behavior diagrams for understanding behaviors of the class. However, a class can create a large number of instances; it is hard for developers to read behavior diagrams for each instance. In this paper, we propose a method to classify instances into groups based on their behaviors, and visualize only representative behaviors of their instances. Users can select one of four categorization criteria depends on their purpose of investigation for program comprehension. As an assessment of the efficacy for program comprehension, we have applied our approach to six Java programs. 1. 9) 1 2),3),5),9),11) 7),8) UML 12) UML DOPG UML 4 GUI Graduate School of Information Science and Technology, Osaka University 1 c 2010 Information Processing Society of Japan
2 ) 2),3),5),9),11) Quante 1 DOPG(Dynamic Object Process Graph) 5) DOPG DOPG 8 (Read Write Call Entry Return Start Final Condition) 3 (Conditional Unconditional Invocation) Lange 4) ),8) Salah 8) Richner 7) ID ID ( ) Use(o) : o ( 1(a)) Used(o) : o ( 1(b)) Methods(o) : o ( 1(c)) Called(o) : o ( 1(d)) c 2010 Information Processing Society of Japan
3 1 Use Used Methods Called DOPG UML E use (o s,o k ) 2 o s,o k E use(o s,o k ) E use (o s,o k ) Use(o s )=Use(o k ) 1),6) 2 E use (o s,o k ) E used (o s,o k ) 2 o s,o k E used (o s,o k ) E used (o s,o k ) Used(o s )=Used(o k ) 2 E used (o s,o k ) E methods (o s,o k ) 2 o s,o k E methods (o s,o k ) E methods (o s,o k ) Methods(o s)=methods(o k ) 2 E methods (o s,o k ) E called (o s,o k ) 2 o s,o k E called (o s,o k ) E called (o s,o k ) Called(o s)=called(o k ) 2 E called (o s,o k ) E use (o s,o k ) O G use (O) ={G 1,,G l } G i G use (O) E methods G use,methods (G i)={g i1,,g im} E use,e methods DOPG UML 1 4. Amida-OGAN 2 GUI Explorer Metrics View Feature View Visualize View GUI Java c 2010 Information Processing Society of Japan
4 2 Software #Events #Classes #Objects Scheduler 8578 (12) JHotDraw 128,796 (97)185 6,286 Apache PMD 633,309 (67)105 8,431 MASU 3,198,125 (80)309 12,414 Apache FOP 3,657,813 (120)502 27,342 Antlr 7,305,687 (42)60 21,022 14,932,308 (418)1,178 77,468 2 Amida-OGAN ( 2 ) java javax sun com.sun %( 36%) (1) (2) (3) (1)(2) (3) 5.1 :Scheduler Scheduler ( ) GUI CalendarDate Scheduler java javax sun com.sun CalendarDate E use 3 {s 1,s 2,s 3 } s s 1 87 s s 1 CalendarMonth s 2 s 3 3 s 3 4 RegisterDialog CalendarDate s 1,s 2,s 3 DOPG. 1 DOPG 4 c 2010 Information Processing Society of Japan
5 3 CalendarDate {s 1,s 2,s 3} s 2 s 3 4 s3 CalendarDate CalendarMonth CalendarDate 18 s 2 s 3 s 2 DOPG DateCellRenderer DateCell CalendarDate s 2 UML s 2 s 3 DOPG s 2 3 s 2,s 3 s 3 DOPG RegisterDialog UML s 3 CalendarDate CalendarDate CalendarDate CalendarDate CalendarDate s 1 s 2 s 3 E use CalendarDate GUI 1 CalendarDate 731 CalendarDate 3 s 1,s 2,s CalendarDate CalendarDate DOPG DOPG 6 (1) (2)2 5 c 2010 Information Processing Society of Japan
6 :MASU MASU MASU Java C++ C# UnresolvedMethodIndo AST 84 E methods 4 AST 4 DOPG DOPG DOPG DOPG %( 2.4%) ( 1.6 ) 3 DOPG DOPG 4 3 Software #E use #E Used #E methods #E called # #DOPG Scheduler JHotDraw ,657 Apache PMD MASU ,188 Apache FOP ,928 Antlr ,091 2,291 1,634 1,785 1,658 2,525 11,421 5 E use 6 E used ,6,7,8 E use,e used,e methods,e called 5,6,7,8 5,6,7,8 9 E use 9 97% 50 82% E used 99% 95% E methods 99% 87% E called 99% 94% 6 c 2010 Information Processing Society of Japan
7 7 E methods 8 E called 9 E use E methods 10 E methods (a) (b) (a) MASU StateChangeEvent NamespaceInfo JHotDraw ResourceBundleUtil AttributeAction E use MASU StateChangeEvent 8344 E use E use E methods 9 E use E methods 9 E use E methods StateChangeEvent 8344 E methods 3 DOPG UML E use 9 7 c 2010 Information Processing Society of Japan
8 10 E methods ( ) 10 (b) 10 ( 1 ) (1) (2) Scheduler 3 3 (3) % 9 1 1) G.Arevalo, F.Buchli, and O.Nierstrasz. Detecting implicit collaboration patterns. In the 11th Working Conference on Reverse Engineering, pp , ) V.Dallmeier, C.Lindig, A.Wasylkowski, and A.Zeller. Mining object behavior with adabu. In the 4th International Workshop on Dynamic Analysis, pp , ) T. Gschwind and J. Oberleitner. Improving dynamic data analysis with aspectoriented programming. In the 7th European Conference on Software Maintenance and Reengineering, pp , ) D.B. Lange and Y.Nakamura. Interactive visualization of design patterns can help in framework understanding. In ACM SIGPLAN Notices, Vol.30, pp , ) J.Quante and R.Koschke. Dynamic object process graphs. In Journal of Systems and Software, Vol.81, pp , ) T.Richner and S.Ducasse. Recovering high-level views of object-oriented applications from static and dynamic information. In the 15th International Conference on Software Maintenance, pp , ) T. Richner and S. Ducasse. Using dynamic information for the iterative recovery of collaborations and roles. In the 18th International Conference on Software Maintenance, pp , ) M.Salah, T.Denton, S.Mancoridis, A.Shokoufandeh, and F.I. Vokolos. Scenariographer: A tool for reverse engineering class usage scenarios from method invocation sequences. In the 21st International Conference on Software Maintenance, pp , ) T.Systa. Understanding the behavior of java programs. In the 7th Working Conference on Reverse Engineering, pp , ) N. Wilde and R. Huitt. Maintenance support for object-oriented programs. In IEEE Transactions on Software Engineering, Vol.18, pp , ) T. Xie and D. Notkin. Automatic extraction of sliced object state machines for component interfaces. In the 3rd Workshop on Specification and Verification of Component-Based Systems, pp , ),,.. 163, 31, pp , : c 2010 Information Processing Society of Japan
Detecting Difference between the Execution Trace Extracted from Two Versions of a Program
1 1 1 1 2 JHotDraw Detecting Difference between the Execution Trace Extracted from Two Versions of a Program Yoshiro Ito, 1 Yui Watanabe, 1 Takashi Ishio 1 and Katsuro Inoue 1 It is necessary to confirm
More information3 3-gram. (causal difference graph) Relative Debugging[3] 2. (Execution Trace) [4] Differential Slicing[2] 2. 3-gram. Java. 3-gram 2. DaCapo.
3-gram 1,a) 1,b) 1,c) 2 Java 2 3 3-gram DaCapo 3-gram 1. (Execution Trace) 1 [1] 2 2 Differential Slicing[2] 2 1 Graduate School of Information Science and Technology, Osaka University, Suita, Osaka 565-0871,
More informationAnalysis of Coding Patterns over Software Versions
Information and Media Technologies 0(): - (05) reprinted from: Computer Software (): 0- (05) Analysis of Coding Patterns over Software Versions Hironori Date, Takashi Ishio, Makoto Matsushita, Katsuro
More informationTowards Locating a Functional Concern Based on a Program Slicing Technique
Towards Locating a Functional Concern Based on a Program Slicing Technique Takashi Ishio 1,2, Ryusuke Niitani 2, Katsuro Inoue 2 1 Department of Computer Science University of British Columbia 2366 Main
More informationOn Refactoring for Open Source Java Program
On Refactoring for Open Source Java Program Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 and Yoshio Kataoka 3 1 Graduate School of Information Science and Technology, Osaka University
More informationDynamic Protocol Recovery
Dynamic Protocol Recovery Jochen Quante, Rainer Koschke University of Bremen, Germany http://www.informatik.uni-bremen.de/st/ {quante,koschke}@informatik.uni-bremen.de Abstract Dynamic protocol recovery
More informationKeywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones
Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection of Potential
More informationOn Refactoring Support Based on Code Clone Dependency Relation
On Refactoring Support Based on Code Dependency Relation Norihiro Yoshida 1, Yoshiki Higo 1, Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 1 Graduate School of Information Science and Technology,
More informationCode Clone Detection Technique Using Program Execution Traces
1,a) 2,b) 1,c) Code Clone Detection Technique Using Program Execution Traces Masakazu Ioka 1,a) Norihiro Yoshida 2,b) Katsuro Inoue 1,c) Abstract: Code clone is a code fragment that has identical or similar
More informationRecovery of Design Pattern from source code
Recovery of Design Pattern from source code Amit Kumar Gautam and T.Gayen Software Engineering, IIIT Allahabad tgayen@iiita.ac.in, Ise2008004@iiita.ac.in Abstract. The approach for detecting design pattern
More informationRefactoring Support Based on Code Clone Analysis
Refactoring Support Based on Code Clone Analysis Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1 and Katsuro Inoue 1 1 Graduate School of Information Science and Technology, Osaka University, Toyonaka,
More informationRearranging the Order of Program Statements for Code Clone Detection
Rearranging the Order of Program Statements for Code Clone Detection Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email: {y-sabi,higo,kusumoto@ist.osaka-u.ac.jp
More informationExtracting a Unified Directory Tree to Compare Similar Software Products
Extracting a Unified Directory Tree to Compare Similar Software Products Yusuke Sakaguchi, Takashi Ishio, Tetsuya Kanda, Katsuro Inoue Graduate School of Information Science and Technology, Osaka University,
More informationCross-application Fan-in Analysis for Finding Application-specific Concerns
Cross-application Fan-in Analysis for Finding Application-specific Concerns Makoto Ichii Takashi Ishio Katsuro Inoue Graduate School of Information Science and Technology, Osaka University 1-3 Machikaneyama,
More informationAspect Refactoring Verifier
Aspect Refactoring Verifier Charles Zhang and Julie Waterhouse Hans-Arno Jacobsen Centers for Advanced Studies Department of Electrical and IBM Toronto Lab Computer Engineering juliew@ca.ibm.com and Department
More informationSoftware Architecture Recovery based on Dynamic Analysis
Software Architecture Recovery based on Dynamic Analysis Aline Vasconcelos 1,2, Cláudia Werner 1 1 COPPE/UFRJ System Engineering and Computer Science Program P.O. Box 68511 ZIP 21945-970 Rio de Janeiro
More informationJUnit A Study on Applying JUnit Framework to Document Knowledge of Object-Oriented Software Systems
JUnit A Study on Applying JUnit Framework to Document Knowledge of Object-Oriented Software Systems Email: {hsieh, s1669021}@ntut.edu.tw JUnit SyncFree 92 [16] SyncFree 1.0 [17] bug fixmerge CVS SyncFree
More informationImpact of Dependency Graph in Software Testing
Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,
More informationDependence Graph Considerering Resource for Automatic Sample Program Generation
1 2 2 2 ( ) Google Android Dependence Graph Considerering Resource for Automatic Sample Program Generation Yoshimasa Fujiura, 1 Hirotaka Ohkubo, 1 Hideto Kasuya 1 and Shinichiro Yamamoto 1 This paper propose
More informationUsing Run-Time Data for Program Comprehension
Using Run-Time Data for Program Comprehension Thomas Gschwind Johann Oberleitner Martin Pinzger Distributed Systems Group Technische Universität Wien Argentinerstraße 8/E1841 A-1040 Wien, Austria, Europe
More informationAssertion with Aspect
Assertion with Aspect Takashi Ishio, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue Graduate School of Engineering Science, PRESTO, Japan Science and Technology Agency Osaka University 1-3 Machikaneyama-cho,
More informationXRay Views: Understanding the Internals of Classes
XRay Views: Understanding the Internals of Classes Gabriela Arévalo, Stéphane Ducasse, Oscar Nierstrasz Software Composition Group University of Bern (Switzerland) {arevalo, ducasse, oscar}@iam.unibe.ch
More informationA PARSING APPROACH FOR SYSTEM BEHAVIOUR MODELING
IADIS International Conference Applied Computing 2007 A PARSING APPROACH FOR SYSTEM BEHAVIOUR MODELING Lau Sei Ping 1, Wee Bui Lin 2, Nurfauza bt Jali 3 Faculty of Computer Science and Information Technology
More informationCharacterizing the Functional Roles of Classes and Methods by Analyzing Feature Traces
Characterizing the Functional Roles of Classes and Methods by Analyzing Feature Traces Orla Greevy and Stéphane Ducasse Software Composition Group University of Bern, Switzerland {greevy, ducasse}@iam.unibe.ch
More informationA Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information
A Slicing Method for Object-Oriented Programs Using Lightweight Dynamic Information Fumiaki OHATA Ý, Kouya HIROSE Ý, Masato FUJII Ý and Katsuro INOUE Ý Ý Graduate School of Engineering Science, Osaka University
More informationIOSR Journal of Computer Engineering (IOSRJCE) ISSN: Volume 3, Issue 3 (July-Aug. 2012), PP
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 3 (July-Aug. 2012), PP 50-55 Modeling Object Oriented Applications by Using Dynamic Information for the Iterative Recovery
More informationUsing Dynamic Information for the Iterative Recovery of Collaborations and Roles
Using Dynamic Information for the Iterative Recovery of Collaborations and Roles Tamar Richner and Stéphane Ducasse Software Composition Group, Institut für Informatik (IAM) Universität Bern, Neubrückstrasse
More informationA Metric-based Approach for Reconstructing Methods in Object-Oriented Systems
A Metric-based Approach for Reconstructing Methods in Object-Oriented Systems Tatsuya Miyake Yoshiki Higo Katsuro Inoue Graduate School of Information Science and Technology, Osaka University {t-miyake,higo,inoue@istosaka-uacjp
More informationA Study on a Development Environment for Software Traceability Management
1,a) 1,b) 1,c) TERAS A Study on a Development Environment for Software Traceability Management NORITOSHI ATSUMI 1,a) TAKASHI KOBAYASHI 1,b) HIROAKI TAKADA 1,c) Abstract: Software traceability management
More informationReusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview
Reusing Reused Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan {t-ishihr,
More informationVisualization of Clone Detection Results
Visualization of Clone Detection Results Robert Tairas and Jeff Gray Department of Computer and Information Sciences University of Alabama at Birmingham Birmingham, AL 5294-1170 1-205-94-221 {tairasr,
More informationERAS-test Documentation
ERAS-test Documentation Release 0 Ezio May 01, 2013 CONTENTS 1 SWRS Template 3 1.1 Change Record.............................................. 3 1.2 Introduction...............................................
More informationComparative Evaluation of Programming Paradigms: Separation of Concerns with Object-, Aspect-, and Context-Oriented Programming
Comparative Evaluation of Programming Paradigms: Separation of Concerns with Object-, Aspect-, and Context-Oriented Programming Fumiya Kato, Kazunori Sakamoto, Hironori Washizaki, and Yoshiaki Fukazawa
More informationNullable Method Detection
Nullable Method Detection Don t Repeat The Mistakes Others Have Already Fixed Manuel Leuenberger Master thesis 13.12.2016 Problem Terms terms = fields.terms(field); TermsEnum termsenum = terms.iterator();
More informationAn Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension
An Approach for Detecting Execution Phases of a System for the Purpose of Program Comprehension Heidar Pirzadeh, Akanksha Agarwal, Abdelwahab Hamou-Lhadj Department of Electrical and Computer Engineering
More informationHow are Developers Treating License Inconsistency Issues? A Case Study on License Inconsistency Evolution in FOSS Projects
How are Developers Treating License Inconsistency Issues? A Case Study on License Inconsistency Evolution in FOSS Projects Yuhao Wu 1(B), Yuki Manabe 2, Daniel M. German 3, and Katsuro Inoue 1 1 Graduate
More informationReverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks
Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks Edward B. Duffy, Jason O. Hallstrom and Brian A. Malloy Computer Science Department Clemson
More informationExtracting Code Clones for Refactoring Using Combinations of Clone Metrics
Extracting Code Clones for Refactoring Using Combinations of Clone Metrics Eunjong Choi 1, Norihiro Yoshida 2, Takashi Ishio 1, Katsuro Inoue 1, Tateki Sano 3 1 Graduate School of Information Science and
More informationAn Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool
An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool SHINPEI OGATA Function Control System, Graduate School of Engineering Shibaura Institute of Technology 307
More informationA Technique to Detect Multi-grained Code Clones
Detection Time The Number of Detectable Clones A Technique to Detect Multi-grained Code Clones Yusuke Yuki, Yoshiki Higo, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka
More informationMulti-Project Software Engineering: An Example
Multi-Project Software Engineering: An Example Pankaj K Garg garg@zeesource.net Zee Source 1684 Nightingale Avenue, Suite 201, Sunnyvale, CA 94087, USA Thomas Gschwind tom@infosys.tuwien.ac.at Technische
More informationVANS: Visual Ad hoc Network Simulator
VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,
More informationWARE: a tool for the Reverse Engineering of Web Applications
WARE: a tool for the Reverse Engineering of Web Applications Anna Rita Fasolino G. A. Di Lucca, F. Pace, P. Tramontana, U. De Carlini Dipartimento di Informatica e Sistemistica University of Naples Federico
More informationToken based clone detection using program slicing
Token based clone detection using program slicing Rajnish Kumar PEC University of Technology Rajnish_pawar90@yahoo.com Prof. Shilpa PEC University of Technology Shilpaverma.pec@gmail.com Abstract Software
More informationDynamic Analysis and Design Pattern Detection in Java Programs
Dynamic Analysis and Design Pattern Detection in Java Programs Lei Hu and Kamran Sartipi Dept. Computing and Software, McMaster University, Hamilton, ON, L8S 4K1, Canada {hu14, sartipi}@mcmaster.ca Abstract
More informationBuilding Web Annotation Stickies based on Bidirectional Links
Building Web Annotation Stickies based on Bidirectional Links Hiroyuki Sano, Taiki Ito, Tadachika Ozono and Toramatsu Shintani Dept. of Computer Science and Engineering Graduate School of Engineering,
More informationDesign Pattern Detection in Eiffel Systems
Design Pattern Detection in Eiffel Systems Wei Wang and Vassilios Tzerpos York University Toronto, Ontario, Canada {weiw,bil}@cs.yorku.ca Abstract The use of design patterns in a software system can provide
More informationDetecting Implied Scenarios from Execution Traces
Detecting Implied Scenarios from Execution Traces Felipe Cantal de Sousa, Nabor C. Mendonça Mestrado em Informática Aplicada Universidade de Fortaleza Fortaleza, CE, Brazil felipecantal@gmail.com, nabor@unifor.br
More informationPAPER Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files
IEICE TRANS. INF. & SYST., VOL.E98 D, NO.2 FEBRUARY 2015 325 PAPER Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files Eunjong CHOI a), Nonmember, Norihiro YOSHIDA,
More informationDebugging Support for Aspect-Oriented Program Based on Program Slicing and Call Graph
Debugging Support for Aspect-Oriented Program Based on Program Slicing and Call Graph Takashi Ishio, Shinji Kusumoto, Katsuro Inoue Graduate School of Information Science and Technology, Osaka University
More informationLevel: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48)
Course Title: Software Engineering Course No. : ICT Ed 528 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3 (2+1) Semester: Second Teaching Hour: 80(32+48) 1. Course Description The
More informationClassification of Java Programs in SPARS-J. Kazuo Kobori, Tetsuo Yamamoto, Makoto Matsusita and Katsuro Inoue Osaka University
Classification of Java Programs in SPARS-J Kazuo Kobori, Tetsuo Yamamoto, Makoto Matsusita and Katsuro Inoue Osaka University Background SPARS-J Reuse Contents Similarity measurement techniques Characteristic
More informationObject Flow Analysis Taking an Object-Centric View on Dynamic Analysis
Object Flow Analysis Taking an Object-Centric View on Dynamic Analysis Adrian Lienhard 1, Stéphane Ducasse 2, Tudor Gîrba 1 1 Software Composition Group, University of Bern, Switzerland 2 LISTIC, University
More informationReliability of Software Fault Prediction using Data Mining and Fuzzy Logic
Reliability of Software Fault Prediction using Data Mining and Fuzzy Logic Vaibhav Agrawal Amity University Madhya Pradesh, Gwalior vagrawal@gwa.amity.edu Abstract: In this paper we proposed unsupervised
More informationJML OCL. Java. iterate
1 OCL JML OCL (Object Constraint Language) JML (Java Modelling Language) UML/OCL JML Java OCL JML iterate iterate Java OCL JML The paper presents a translation method from OCL (Object Constraint Language)
More informationAPIEvolutionMiner: Keeping API Evolution under Control
APIEvolutionMiner: Keeping API Evolution under Control André Hora, Anne Etien, Nicolas Anquetil, Stéphane Ducasse, Marco Tulio Valente RMoD team, Inria, Lille, France Email: firstname.lastname@inria.fr
More informationSOFTWARE MAINTENANCE: A
SOFTWARE MAINTENANCE: A TUTORIAL BY KEITH H. BENNETT 2008.10.13 소프트웨어 200310612 조보경 Software Engineering Field Main problem of software engineering Scale and Complexity of the software Goal of software
More informationSOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA ABSTRACT
SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA Bhaskar Raj Sinha, Pradip Peter Dey, Mohammad Amin and Hassan Badkoobehi National University, School of Engineering, Technology, and Media 3678 Aero
More informationVisualizing Feature Interaction in 3-D
Visualizing Feature Interaction in 3-D Orla Greevy 1, Michele Lanza 2 and Christoph Wysseier 1 1 Software Composition Group - University of Berne - Switzerland 2 Faculty of Informatics, University of Lugano
More informationAn Approach to Software Component Specification
Page 1 of 5 An Approach to Software Component Specification Jun Han Peninsula School of Computing and Information Technology Monash University, Melbourne, Australia Abstract. Current models for software
More informationDynamic Slice of Aspect Oriented Program: A Comparative Study
Dynamic Slice of Aspect Oriented Program: A Comparative Study Sk. Riazur Raheman, Amiya Kumar Rath, Hima Bindu M Dept. of CSE, Raajdhani Engineering College, Bhubaneswar, Odisha, 751017, India Professor
More informationASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS
ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may
More informationIDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE
International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.5, September 2018 IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE Simon Kawuma 1 and
More informationAutomatic Extraction of Abstract-Object-State Machines Based on Branch Coverage
Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage Hai Yuan Department of Computer Science North Carolina State University Raleigh, NC 27695 hyuan3@ncsu.edu Tao Xie Department
More informationKey Properties for Comparing Modeling Languages and Tools: Usability, Completeness and Scalability
Key Properties for Comparing Modeling Languages and Tools: Usability, Completeness and Scalability Timothy C. Lethbridge Department of Electrical Engineering and Computer Science, University of Ottawa
More informationIMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING
IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)
More informationUsing Geofencing for a Disaster Information System
Using Geofencing for a Disaster Information System Akira Suyama Graduate School of Engineering Tokyo Denki University Tokyo, Japan 16kmc16@ms.dendai.ac.jp Ushio Inoue Dept. of Information and Communication
More informationITSS Model Curriculum. - To get level 3 -
ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company
More informationSoftware Architecture Recovery based on Pattern Matching
Software Architecture Recovery based on Pattern Matching PhD Dissertation Synopsis Kamran Sartipi School of Computer Science, University of Waterloo Waterloo, ON. NL 3G, Canada ksartipi@math.uwaterloo.ca
More informationA Review of Milestones in the History of GUI Prototyping Tools
A Review of Milestones in the History of GUI Prototyping Tools IFIP WG 13.2 Workshop on User Experience and User-Centered Development Processes September 14 th 2015, Bamberg, Germany Thiago R. Silva, Jean-Luc
More informationUnderstanding and Automating Application-level Caching
Understanding and Automating Application-level Caching Jhonny Mertz and Ingrid Nunes (Advisor) 1 Programa de Pós-Graduação em Computação (PPGC), Instituto de Informática Universidade Federal do Rio Grande
More informationOptimization of Query Processing in XML Document Using Association and Path Based Indexing
Optimization of Query Processing in XML Document Using Association and Path Based Indexing D.Karthiga 1, S.Gunasekaran 2 Student,Dept. of CSE, V.S.B Engineering College, TamilNadu, India 1 Assistant Professor,Dept.
More informationSupport system for smartphone application development based on analysis of user reviews
1,a) 1 1 / Support system for smartphone application development based on analysis of user reviews Yuichi Sei 1,a) Yasuyuki Tahara 1 Akihiko Ohsuga 1 Abstract: A number of smartphone applications have
More informationRobusTest: Towards a Framework for Automated Testing of Robustness in Software
RobusTest: Towards a Framework for Automated Testing of Robustness in Software Ali Shahrokni, Robert Feldt Department of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden
More informationCORRELATING FEATURES AND CODE BY DYNAMIC
CORRELATING FEATURES AND CODE BY DYNAMIC AND SEMANTIC ANALYSIS Ren Wu Shanghai Lixin University of Commerce, Shanghai 201620, China ABSTRACT One major problem in maintaining a software system is to understand
More informationSoftware Metrics based on Coding Standards Violations
Software Metrics based on Coding Standards Violations Yasunari Takai, Takashi Kobayashi and Kiyoshi Agusa Graduate School of Information Science, Nagoya University Aichi, 464-8601, Japan takai@agusa.i.is.nagoya-u.ac.jp,
More informationEmploying Query Technologies for Crosscutting Concern Comprehension
Employing Query Technologies for Crosscutting Concern Comprehension Marius Marin Accenture The Netherlands Marius.Marin@accenture.com Abstract Common techniques for improving comprehensibility of software
More informationSpecification and Automated Detection of Code Smells using OCL
Specification and Automated Detection of Code Smells using OCL Tae-Woong Kim 1, Tae-Gong Kim 2 and Jai-Hyun Seu 3 School of Computer Engineering, Inje University, Obang-dong 607, Gimhae, Gyeong-Nam, Korea
More informationProject Plan. In this section the various tools used at different phases of the software life cycle will be described. 3.
Project Plan Subject: Project Plan Issue 1.0 Date: 09 June 2005 From: Daniel Calder Mark Marwil 1. Project Goal The project being developed is a library tool. Using various software tools that comply with
More informationStructural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques
Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,
More informationDrawing Bipartite Graphs as Anchored Maps
Drawing Bipartite Graphs as Anchored Maps Kazuo Misue Graduate School of Systems and Information Engineering University of Tsukuba 1-1-1 Tennoudai, Tsukuba, 305-8573 Japan misue@cs.tsukuba.ac.jp Abstract
More informationDESIGN patterns [16] have emerged to be an important
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 39, NO. 6, NOVEMBER 2009 1271 A Matrix-Based Approach to Recovering Design Patterns Jing Dong, Senior Member, IEEE, Yajing
More informationCode Clone Detection on Specialized PDGs with Heuristics
2011 15th European Conference on Software Maintenance and Reengineering Code Clone Detection on Specialized PDGs with Heuristics Yoshiki Higo Graduate School of Information Science and Technology Osaka
More informationIntroduction. O.Univ.-Prof. DI Dr. Wolfgang Pree. Universität Salzburg
OO Reengineering Patterns O.Univ.-Prof. DI Dr. Wolfgang Pree Universität Salzburg www.softwareresearch.net Introduction 2 Goals Convince you about the following: 3 Lehman s laws 4 What is a legacy system?
More informationApplying Semantic Analysis to Feature Execution Traces
Applying Semantic Analysis to Feature Execution Traces Adrian Kuhn, Orla Greevy and Tudor Gîrba Software Composition Group University of Bern, Switzerland {akuhn, greevy, girba}@iam.unibe.ch Abstract Recently
More informationDevelopment of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods
Development of a tool for the easy determination of control factor interaction in the Design of Experiments and the Taguchi Methods IKUO TANABE Department of Mechanical Engineering, Nagaoka University
More informationBackup and Recovery Scheme for Distributed e-learning System
Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the
More informationA method to speedily pairwise compare in AHP and ANP
ISAHP 2005, Honolulu, Hawaii, July 8-10, 2005 A method to speedily pairwise compare in AHP and ANP Kazutomo Nishizawa Department of Mathematical Information Engineering, College of Industrial Technology,
More informationConstructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow
Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flow Jang-Wu Jo 1 and Byeong-Mo Chang 2 1 Department of Computer Engineering Pusan University of Foreign Studies Pusan
More informationA Feature Model of Framework Applications
2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing A Feature Model of Framework Applications Izuru Kume Masahide Nakamura
More informationA Technique for Design Patterns Detection
A Technique for Design Patterns Detection Manjari Gupta Department of computer science Institute of Science Banaras Hindu University Varansi-221005, India manjari_gupta@rediffmail.com Abstract Several
More informationOverture Architecture & Status
Overture Architecture & Status Peter Gorm Larsen & Marcel Verhoef (updated 28 Nov 2006) OVERTURE ARCHITECTURE Overture versus VDMTools VDMTools (http://www.vdmtools.jp/en) Closed source, proprietary (available
More informationRun-Time Information Visualization for Understanding Object-Oriented Systems
Run-Time Information Visualization for Understanding Object-Oriented Systems Roland Bertuli I3S Laboratory Sophia-Antipolis, France bertuli@essi.fr Stéphane Ducasse Software Composition Group University
More informationWe manage the technology that lets you manage your business.
We manage the technology that lets you manage your. Stages of Legacy Modernization Metadata enablement of a four-stage approach end-to-end Modernization Stages of Legacy Modernization The speed of technology
More informationAP COMPUTER SCIENCE A: SYLLABUS
Curricular Requirements CR1 The course teaches students to design and implement computer-based solutions to problems. Page(s) 2,3-4,5,6-7,8-9 CR2a The course teaches students to use and implement commonly
More informationSELECTED TOPICS in APPLIED COMPUTER SCIENCE
A Tool for Detecting Detects on Class Implementation in Object Oriented Program on the Basis of the Law of Demeter: Focusing on Dependency between Packages RYOTA CHIBA, HIROAKI HASHIURA and SEIICHI KOMIYA
More informationAn Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems
An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information
More information情報処理学会研究報告 IPSJ SIG Technical Report Vol.2015-SE-187 No /3/13 Simulink 1,a) 1,b) 2 3 MATLAB/Simulink Simulink MATLAB/Simulink A Study of Qualit
Simulink 1,a) 1,b) 2 3 MATLAB/Simulink Simulink MATLAB/Simulink A Study of Quality Evaluation Method Using Division Determination by Simulink Model Metrics Minegishi Kengo 1,a) Ueda Yoshikazu 1,b) Hukazu
More informationSupport for Static Concept Location with sv3d
Support for Static Concept Location with sv3d Xinrong Xie, Denys Poshyvanyk, Andrian Marcus Department of Computer Science Wayne State University Detroit Michigan 48202 {xxr, denys, amarcus}@wayne.edu
More informationAn Approach for Mapping Features to Code Based on Static and Dynamic Analysis
An Approach for Mapping Features to Code Based on Static and Dynamic Analysis Abhishek Rohatgi 1, Abdelwahab Hamou-Lhadj 2, Juergen Rilling 1 1 Department of Computer Science and Software Engineering 2
More information