131 Hits in 2.6 sec

Automating the Removal of Obsolete TODO Comments [article]

Zhipeng Gao, Xin Xia, David Lo, John Grundy, Thomas Zimmermann
2021 pre-print
However, after performing the task developers sometimes neglect or simply forget to remove the TODO comment, resulting in obsolete TODO comments.  ...  and removed by the developers, demonstrating the practical usage of our approach.  ...  CONCLUSION AND FUTURE WORK This research aims to automatically detect and remove obsolete TODO comments from software repositories.  ... 
doi:10.1145/3468264.3468553 arXiv:2108.05846v1 fatcat:fo6eg463onhsnkeelgkjub3mfy

Wait For It: Identifying "On-Hold" Self-Admitted Technical Debt [article]

Rungroj Maipradit, Christoph Treude, Hideaki Hata, Kenichi Matsumoto
2019 arXiv   pre-print
We then design and evaluate an automated classifier which can identify these "on-hold" instances with an area under the receiver operating characteristic curve (AUC) of 0.83 as well as detect the specific  ...  Based on a qualitative study of 335 comments indicating self-admitted technical debt, we first identify one particular class of debt amenable to automated management: "on-hold" self-admitted technical  ...  Bug 47165 Argouml 77 // TODO: gone in UML 2.1 Columba 0 - EMF 1 // Note: Registry based authority is being removed ... which would obsolete RFC 2396.  ... 
arXiv:1901.09511v3 fatcat:bok7ins2ircrbojxes6jt6qnly

From Academia to Software Development: Publication Citations in Source Code Comments [article]

Akira Inokuchi, Yusuf Sulistyo Nugroho, Supatsara Wattanakriengkrai, Fumiaki Konishi, Hideaki Hata, Christoph Treude, Akito Monden, Kenichi Matsumoto
2020 arXiv   pre-print
On the other hand, the impact of academic publications on industry has been rarely studied.  ...  Academic publications have been evaluated in terms of their impact on research communities based on many metrics, such as the number of citations.  ...  From these comments, special characters ('\n', '/', '*', '\', '#', ' !') were removed as part of a preprocessing step.  ... 
arXiv:1910.06932v2 fatcat:pwpdfws4bvdbnkcnp6lmkufy54

Beyond the Code: Mining Self-Admitted Technical Debt in Issue Tracker Systems [article]

Laerte Xavier, Fabio Ferreira, Rodrigo Brito, Marco Tulio Valente
2020 arXiv   pre-print
We show that only 29% of the studied SATD-I instances can be tracked to source code comments.  ...  Besides, in 45% of the studied issues TD was introduced to ship earlier, and in almost 60% it refers to Design flaws.  ...  ACKNOWLEDGMENTS We thank the 30 developers who participated in our survey and shared their ideas and practices about technical debt payment.  ... 
arXiv:2003.09418v1 fatcat:75myxbqtqbbynn5yne6aq6iwcq

Listening to programmers — Taxonomies and characteristics of comments in operating system code

Yoann Padioleau, Lin Tan, Yuanyuan Zhou
2009 2009 IEEE 31st International Conference on Software Engineering  
We studied 1050 comments randomly sampled from the latest versions of Linux, FreeBSD, and OpenSolaris.  ...  Specifically, studying programmers' comments could help in the following aspects: (1) Programming language: Comments could motivate the design of new programming language extensions.  ...  Acknowledgments We greatly appreciate Julia Lawall, Darko Marinov, and the anonymous reviewers for their invaluable feedback and comments.  ... 
doi:10.1109/icse.2009.5070533 dblp:conf/icse/PadioleauTZ09 fatcat:3nbk33fyoncd3mloc426l6k66q

Understanding performance concerns in the API documentation of data science libraries

Yida Tao, Jiefang Jiang, Yepang Liu, Zhiwu Xu, Shengchao Qin
2020 Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering  
Researchers can be more assured of the advantages of integrating both the ocial and the crowd documentation to achieve a holistic view on the performance concerns in data science development.  ...  The development of ecient data science applications is often impeded by unbearably long execution time and rapid RAM exhaustion.  ...  ACKNOWLEDGMENTS We would like to thank the anonymous reviewers for their constructive suggestions and comments. This work was partially supported by the National Natural Science  ... 
doi:10.1145/3324884.3416543 fatcat:6toeyzeawrgzrdrjtgm7jov5oa

Stereo: Editing Clones Refactored as Code Generators

Nic Volanschi
2018 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)  
However, past studies have shown that clone removal is not always feasible due to the limited expressiveness of language abstractions, or not desirable because of the abstraction overhead or the risks  ...  The classic approaches to clone management are either clone removal, which consists in refactoring clones as an available language abstraction, or clone tracking, using a so-called linked editor, able  ...  Special thanks to Nicolas Anquetil and Stéphane Ducasse for their most useful comments on an earlier draft.  ... 
doi:10.1109/icsme.2018.00069 dblp:conf/icsm/Volanschi18 fatcat:5selktkfyfdtzelc4hqqcbwkgi


Lin Tan, Yuanyuan Zhou, Yoann Padioleau
2011 Proceeding of the 33rd international conference on Software engineering - ICSE '11  
Two of the key techniques that make the above contributions possible are: (1) using a hybrid approach to extract annotations from both code and comments written in natural language to achieve better coverage  ...  Detecting OS concurrency bugs is challenging due to the complexity of the OS synchronization, particularly with the presence of the OS specific interrupt context.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their priceless comments. This research is supported by NSF and NSERC. REFERENCES  ... 
doi:10.1145/1985793.1985796 dblp:conf/icse/TanZP11 fatcat:twly4numcnbyplpz5u53supune

Strategies for avoiding text fixture smells during software evolution

Michaela Greiler, Andy Zaidman, Arie van Deursen, Margaret-Anne Storey
2013 2013 10th Working Conference on Mining Software Repositories (MSR)  
An important challenge in creating automated tests is how to design test fixtures, i.e., the setup code that initializes the system under test before actual automated testing can start.  ...  Our findings indicate that setup management strategies strongly influence the types of test fixture smells that emerge in code, and that several types of fixture smells often emerge at the same time.  ...  For example, in Voldemort, developers added a test method that comprised only a few statements and a "todo" comment.  ... 
doi:10.1109/msr.2013.6624053 dblp:conf/msr/GreilerZDS13 fatcat:fypukjiiwjdo3kg3h6per2zbn4

Converting Parallel Code from Low-Level Abstractions to Higher-Level Abstractions [chapter]

Semih Okur, Cansu Erdogan, Danny Dig
2014 Lecture Notes in Computer Science  
Using a corpus of 880 open-source C# applications, we found that developers still use the old Thread and ThreadPool abstractions in 62% of the cases when they use parallel abstractions.  ...  ., it can harm performance and silence the uncaught exceptions. We present two automated migration tools, Taskifier and Simplifier that work for C# code.  ...  This comment indicates that the changes are tedious. We also asked the developers whether they are aware of the Parallel class.  ... 
doi:10.1007/978-3-662-44202-9_21 fatcat:qwvrmkx2qrfa5btfij2dxnlc4m

Why do Record/Replay Tests of Web Applications Break?

Mouna Hammoudi, Gregg Rothermel, Paolo Tonella
2016 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)  
Software engineers often use record/replay tools to enable the automated testing of web applications.  ...  Tests created in this manner can then be used to regression test new versions of the web applications as they evolve.  ...  ACKNOWLEDGEMENTS This work has been partially supported by the National Science Foundation through award IIS-1314365.  ... 
doi:10.1109/icst.2016.16 dblp:conf/icst/HammoudiRT16 fatcat:ig2d45c2o5ctrp76rmih4k3fxy

TINE as an accelerator control system at DESY

Piotr Bartkiewicz, Philip Duval
2007 Measurement science and technology  
The components of such systems have been frequently developed at different times, in different countries and use different standards and technologies.  ...  The control system of components or subsystems may use different computer hardware, operating systems, network protocols, hardware interfaces and field buses.  ...  Nonetheless, if obsolete servers are not removed from time to time, the equipment database can contain a lot of unnecessary information.  ... 
doi:10.1088/0957-0233/18/8/012 fatcat:bmxfpg3lsjhhpm6lafl3v7wuuu

Trustrace: Mining Software Repositories to Improve the Accuracy of Requirement Traceability Links

Nasir Ali, Yann-Gael Gueheneuc, Giuliano Antoniol
2013 IEEE Transactions on Software Engineering  
The results of Trustrace are up to 22.7% more precise and have 7.66% better recall values than those of the other techniques, on average.  ...  We apply Trustrace on four medium-size open-source systems to compare the accuracy of its traceability links with those recovered using state-of-the-art IR techniques from the literature, based on the  ...  This work is partly supported by the NSERC Research Chairs on Software Cost-effective Change and Evolution and on Software Patterns and Patterns of Software.  ... 
doi:10.1109/tse.2012.71 fatcat:gapqm4lpprfxveqso3gl5lunuq

Ipres 2017 Kyoto - Collaborative Notes

Michelle Lindlar, Joshua Ng, William Kilbride, Euan Cochrane, Jaye Weatherburn, Rachel Tropea
2018 Zenodo  
The document deposited here is considered version 1.0, captured on September 23rd 2018 with the last documented change in the Google Doc having been made on April 5th 2018.  ...  These are notes that were collabroatively taken during the 14th International Conference on Digital Preservation (iPRES), 25th - 29th September 2017 in Kyoto, Japan.  ...  from the archive (todo) -Deposit of source code bundles directly to the archive (todo) -Provenance lookup for all archived content (todo) -Full-text search on all archived source code files (todo) It is  ... 
doi:10.5281/zenodo.1433826 fatcat:jzzbpahxdbeflabrwjnwljnsg4

Reviving Purpose Limitation and Data Minimisation in Personalisation, Profiling and Decision-Making Systems [article]

Michèle Finck, Asia Biega
2021 arXiv   pre-print
between data minimisation on the one hand and accuracy or fairness on the other; (iii) the lack of practical means of removing personal data from trained models in order to ensure legal compliance; and  ...  Our analysis reveals that the two legal principles continue to play an important role in mitigating the risks of personal data processing, allowing us to rebut claims that they have become obsolete.  ...  Acknowledgements We thank Solon Barocas for discussions that helped ideate the interdisciplinary direction of this work, as well as Hal Daumé III, Fernando Diaz, Peter Potash, Samira Shabanian, and Divya  ... 
arXiv:2101.06203v1 fatcat:pefqawls2vahbnt7j7ckicaemy
« Previous Showing results 1 — 15 out of 131 results