683 research outputs found

    Ranking Significance of Software Components Based on Use Relations

    Full text link
    10 Selected PapersPaper in journals: this is the first page of a paper published in IEEE Transactions on Software Engineering.[IEEE Transactions on Software Engineering] 31,213-225 (2005

    Software Tag : Empirical Software Engineering Data for Traceability and Transparency of Software Project

    Full text link
    Proceedings Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2007)Nagoya, Japan, December 3, 2007Co-located with the 14th Asia-Pacific Software Engineering Conference (APSEC'07

    CCFinder : A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code

    Full text link
    10 Selected PapersPaper in joumals: this is the firsl page of a papar published in IEEE Trallsactions on Software Engineering. [IEEE Trallsactions on Software Engineering] 28, 654-670 (2002

    Source File Set Search for Clone-and-Own Reuse Analysis

    Get PDF
    Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version of the component and understand how the cloned component is different from the original one. Although developers may record the original version information in a version control system and/or directory names, such information is often either unavailable or incomplete. In this research, we propose a code search method that takes as input a set of source files and extracts all the components including similar files from a software ecosystem (i.e., a collection of existing versions of software packages). Our method employs an efficient file similarity computation using b-bit minwise hashing technique. We use an aggregated file similarity for ranking components. To evaluate the effectiveness of this tool, we analyzed 75 cloned components in Firefox and Android source code. The tool took about two hours to report the original components from 10 million files in Debian GNU/Linux packages. Recall of the top-five components in the extracted lists is 0.907, while recall of a baseline using SHA-1 file hash is 0.773, according to the ground truth recorded in the source code repositories.Comment: 14th International Conference on Mining Software Repositorie

    Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches

    Full text link
    D. Pizzolotto and K. Inoue, "Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches," 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), Adelaide, Australia, 2020, pp. 232-242, doi: 10.1109/ICSME46990.2020.00031

    Who Made This Copy? An Empirical Analysis of Code Clone Authorship

    Full text link
    Code clones are code snippets that are identical or similar to other snippets within the same or different files. They are often created through copy-and-paste practices during development and maintenance activities. Since code clones may require consistent updates and coherent management, they present a challenging issue in software maintenance. Therefore, many studies have been conducted to find various types of clones with accuracy, scalability, or performance. However, the exploration of the nature of code clones has been limited. Even the fundamental question of whether code snippets in the same clone set were written by the same author or different authors has not been thoroughly investigated. In this paper, we investigate the characteristics of code clones with a focus on authorship. We analyzed the authorship of code clones at the line-level granularity for Java files in 153 Apache projects stored on GitHub and addressed three research questions. Based on these research questions, we found that there are a substantial number of clone lines across all projects (an average of 18.5\% for all projects). Furthermore, authors who contribute to many non-clone lines also contribute to many clone lines. Additionally, we found that one-third of clone sets are primarily contributed to by multiple leading authors. These results confirm our intuitive understanding of clone characteristics, although no previous publications have provided empirical validation data from multiple projects. As the results could assist in designing better clone management techniques, we will explore the implications of developing an effective clone management tool.Comment: An extended version of the 17th International Workshop on Software Clones IWSC 2023 in Bogota, Colombi

    On a Use Case Points Measurement Tool for Effective Project Management

    Full text link
    Proceedings Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2007)Nagoya, Japan, December 3, 2007Co-located with the 14th Asia-Pacific Software Engineering Conference (APSEC'07

    Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique

    Full text link
    Software Evolution, 2003. Proceedings. Sixth International Workshop on Principles ofDate of Conference:1-2 Sept. 200

    A Lightweight Visualization of Interprocedural Data-Flow Paths for Source Code Reading

    Full text link
    Program Comprehension (ICPC), 2012 IEEE 20th International Conference onDate of Conference:11-13 June 2012Conference Location :Passa
    • …
    corecore