Filters








15 Hits in 10.2 sec

Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions

Davy Landman, Alexander Serebrenik, Eric Bouwers, Jurgen J. Vinju
2015 Journal of Software: Evolution and Process  
Our conclusion is that the observed linear correlation between CC and SLOC of Java methods or C functions is not strong enough to conclude that CC is redundant with SLOC.  ...  We conducted an extensive literature study of the CC/SLOC correlation results. Next, we tested correlation on large Java (17.6 M methods) and C (6.3 M functions) corpora.  ...  EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN CC AND SLOC Table IV . IV Correlations for part of the tail of the independent variable SLOC. (a) Java methods Min.  ... 
doi:10.1002/smr.1760 fatcat:v52ttqffenhvvgybs6j4qlg5lu

Corrigendum: Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions published on 9 December 2015

Davy Landman, Alexander Serebrenik, Eric Bouwers, Jurgen Vinju
2017 Journal of Software: Evolution and Process  
between CC and SLOC in a large corpus of Java methods and C functions" [1] .  ...  INTRODUCTION During the preparation of the corresponding chapter in Davy Landman's PhD thesis, some minor graphical and statistical discrepancies were found in the paper "Empirical analysis of the relationship  ... 
doi:10.1002/smr.1914 fatcat:4q3ozyle4ff2jb35kjhetglhve

Introduction to the special issue on software maintenance and evolution

Leon Moonen, Lori Pollock
2016 Journal of Software: Evolution and Process  
Schneider, and Daqing Hou describes a technique for method call completion that uses the type name and context to search for method calls whose contexts match with that of the receiver object.  ...  The paper 'An Empirical Study on How Expert Knowledge Affects Bug Reports' by Da Huo, Tao Ding, Collin McMillan, and Malcom Gethers describes an empirical study of the textual difference between bug reports  ...  The paper 'Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods and C Functions' by Davy Landman, Alexander Serebrenik, and Jurgen Vinju describes an extensive literature  ... 
doi:10.1002/smr.1798 fatcat:3q3mmr6aafhbzjehokebua6nge

Understanding the syntactic rule usage in java

Dong Qiu, Bixin Li, Earl T. Barr, Zhendong Su
2017 Journal of Systems and Software  
Our corpus contains over 5,000 open-source Java projects, totalling 150 million source lines of code (SLoC).  ...  Method: We present our results on the first such study on Java, a modern, mature, and widely-used programming language.  ...  To this end, we perform a large-scale empirical study on a diverse corpus of over 5, 000 real-world Java projects to gain insight into how syntactic rules are used in practice.  ... 
doi:10.1016/j.jss.2016.10.017 fatcat:s3sxorvjjfhfzcevcbpke7fzfm

Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities

Eman AlOmar, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini
2019 Zenodo  
Method. We extract a large corpus of design-related refactoring activities that are applied and documented by developers during their daily changes from 3,795 curated open source Java projects.  ...  In particular, we extract a large-scale corpus of structural metrics and anti-pattern enhancement changes, from which we identify 1,245 quality improvement commits with their corresponding refactoring  ...  ACKNOWLEDGMENT We sincerely thank the authors of the refactoring mining tools that we have used in this study, for providing their tools open source and for allowing the community to benefit from them.  ... 
doi:10.5281/zenodo.3304796 fatcat:fcpimz3ivfab7h72hswyjurypa

Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities [article]

Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni, Marouane Kessentini
2019 arXiv   pre-print
Method. We extract a large corpus of design-related refactoring activities that are applied and documented by developers during their daily changes from 3,795 curated open source Java projects.  ...  In particular, we extract a large-scale corpus of structural metrics and anti-pattern enhancement changes, from which we identify 1,245 quality improvement commits with their corresponding refactoring  ...  ACKNOWLEDGMENT We sincerely thank the authors of the refactoring mining tools that we have used in this study, for providing their tools open source and for allowing the community to benefit from them.  ... 
arXiv:1907.04797v1 fatcat:ruan3lfawfhijkgamaqs7d2x6y

Toxic Code Snippets on Stack Overflow

Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixao, Giuseppe Bianco, Rocco Oliveto
2019 IEEE Transactions on Software Engineering  
Our clone detection found online clone pairs between 72,365 Java code snippets on Stack Overflow and 111 open source projects in the curated Qualitas corpus.  ...  We present a study of online code clones on Stack Overflow and their toxicity by incorporating two developer surveys and a large-scale code clone detection.  ...  Cristina Lopes and Di Yang from University of California, Irvine for their help in running SourcererCC clone detector and implementing a custom tokeniser for Stack Overflow snippets.  ... 
doi:10.1109/tse.2019.2900307 fatcat:wjnlucsfwvevpazvghafosiy6m

A Large-Scale Empirical Study of the Relationship between Build Technology and Build Maintenance

Shane McIntosh, Meiyappan Nagappan, Bram Adams, Audris Mockus, Ahmed E. Hassan
2014 Empirical Software Engineering  
We aim to understand the prevalence of different build technologies and the relationship between build technology and build maintenance by analyzing version histories in a corpus of 177,039 repositories  ...  However, build technology migrations tend to coincide with a shift of build maintenance work to a build-focused team, deferring the cost of build maintenance to them.  ...  In this paper, we do not propose a tool, but rather provide empirical evidence of the relationship between build technology and build maintenance.  ... 
doi:10.1007/s10664-014-9324-x fatcat:jjwlra6jnnhhhonmuq3juezlgm

DemoMatch: API discovery from demonstrations

Kuat Yessenov, Ivan Kuraj, Armando Solar-Lezama
2017 Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2017  
DEMOMATCH matches the demonstrations against a database of execution traces called SEMERU and generates code snippets explaining how to use the functionality.  ...  We introduce DEMOMATCH, a tool for API discovery that allows the user to discover how to implement functionality using a software framework by demonstrating the functionality in existing applications built  ...  We would like to thank in particular Suresh Jagannathan for his leadership of the MUSE program.  ... 
doi:10.1145/3062341.3062386 dblp:conf/pldi/YessenovKS17 fatcat:pndr5lupxnh5pf36plkhsmoxb4

On the Impact of Programming Languages on Code Quality [article]

Emery D. Berger, Celeste Hollenbeck, Petr Maj, Olga Vitek, Jan Vitek
2019 arXiv   pre-print
This paper is a reproduction of work by Ray et al. which claimed to have uncovered a statistically significant association between eleven programming languages and software defects in projects hosted on  ...  Next, we conduct a complete, independent reanalysis of the data and statistical modeling steps of the original study.  ...  We thank Baishakhi Ray and Vladimir Filkov for sharing the data and code of their FSE paper.  ... 
arXiv:1901.10220v2 fatcat:zi4obm7m4bfwti5cddbsp2engu

A Security Practices Evaluation Framework

Patrick Morrison
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
SOTM is a set of constructs and relationships that embody a theory of how security practices affect security outcomes.  ...  We found agreement between the researcher and team views of security practice use on the project, and evaluated the effectiveness of automated means of assessing practice adherence.  ...  C.2.2 Context Factors Drawing general conclusions from empirical studies in software engineering is difficult because the results of any process largely depend upon the specifics of the study and relevant  ... 
doi:10.1109/icse.2015.296 dblp:conf/icse/Morrison15 fatcat:oghtjdeecbednhf5bzrwy22f5i

Toward an effective automated tracing process

Anas Mahmoud
2012 2012 20th IEEE International Conference on Program Comprehension (ICPC)  
dependency relations among various software artifacts in a software system, in both a forwards and backwards direction, throughout the multiple phases of the project's life cycle.  ...  Motivated by these observations, and building upon a growing body of work in this area, in this dissertation we explore several research directions related to enhancing the performance of automated tracing  ...  For the implementation of VSM-POS we used SharpNLP 3 , a port of the Java OpenNLP library written in C#.  ... 
doi:10.1109/icpc.2012.6240502 dblp:conf/iwpc/Mahmoud12 fatcat:2vz2rn5rinezbhywiwpl3hj4oy

Software defect prediction using Bayesian networks

Ahmet Okutan, Olcay Taner Yıldız
2012 Empirical Software Engineering  
So, the kernel function can be defined as a function that returns the inner product between the images of two inputs in a feature space where the image function is shown with Φ in our representation.  ...  Some kernel functions used in the literature are: 1. Linear kernel: Linear kernel is the simplest kernel function and it is the dot product of two vectors x i and x j plus a constant vector c.  ...  We use the NOD metric together with the metrics listed in Table 6 .1 and LOCQ, to learn a Bayesian network for each data set and to extract its relationship  ... 
doi:10.1007/s10664-012-9218-8 fatcat:7zufn2i2mje6tlemi6l7zp26ea

Big Code Applications and Approaches

Francesca Del Bonifro
2022
Software defect prediction is a fundamental step in software development for improving quality and assuring the reliability of software products.  ...  The availability of a huge amount of source code from code archives and open-source projects opens up the possibility to merge machine learning, programming languages, and software engineering research  ...  This structure represents the flow for methods calls (callees) in the body of a given method (caller). The callee-caller relationships will determine the methods' embeddings.  ... 
doi:10.48676/unibo/amsdottorato/10255 fatcat:j2ftf7wfkba3hf7cwtlenq554q

Exploiting Abstract Syntax Trees to Locate Software Defects [article]

Thomas Joshua Shippey, UH Research Archive, UH Research Archive
2015
The aim of this dissertation is to study the relationship between short Java constructs and the faultiness of source code.  ...  The dissertation tries to find a relationship between the code snippets and faulty and non-faulty code.  ...  They used the model on a large Java telecommunications system which has over 110K SLOC.  ... 
doi:10.18745/th.16365 fatcat:e6pomfckrngojm7uiobwrofxhm