233 research outputs found

    Source File Set Search for Clone-and-Own Reuse Analysis

    Get PDF
    Clone-and-own approach is a natural way of source code reuse for software developers. To assess how known bugs and security vulnerabilities of a cloned component affect an application, developers and security analysts need to identify an original version of the component and understand how the cloned component is different from the original one. Although developers may record the original version information in a version control system and/or directory names, such information is often either unavailable or incomplete. In this research, we propose a code search method that takes as input a set of source files and extracts all the components including similar files from a software ecosystem (i.e., a collection of existing versions of software packages). Our method employs an efficient file similarity computation using b-bit minwise hashing technique. We use an aggregated file similarity for ranking components. To evaluate the effectiveness of this tool, we analyzed 75 cloned components in Firefox and Android source code. The tool took about two hours to report the original components from 10 million files in Debian GNU/Linux packages. Recall of the top-five components in the extracted lists is 0.907, while recall of a baseline using SHA-1 file hash is 0.773, according to the ground truth recorded in the source code repositories.Comment: 14th International Conference on Mining Software Repositorie

    A Lightweight Visualization of Interprocedural Data-Flow Paths for Source Code Reading

    Full text link
    Program Comprehension (ICPC), 2012 IEEE 20th International Conference onDate of Conference:11-13 June 2012Conference Location :Passa

    AMIDA : a Sequence Diagram Extraction Toolkit Supporting Automatic Phase Detection

    Full text link
    ICSE Companion '08: Companion of the 30th international conference on Software engineeringLeipzig, GermanyMay 10 - 18, 200

    Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique

    Full text link
    Software Evolution, 2003. Proceedings. Sixth International Workshop on Principles ofDate of Conference:1-2 Sept. 200

    Extraction of Product Evolution Tree from Source Code of Product Variants

    Full text link
    Proceedings of the 17th International Software Product Line Conference SPLC '13 Proceedings of the 17th International Software Product Line Conferenc

    Using High-Rising Cities to Visualize Performance in Real-Time

    Get PDF
    For developers concerned with a performance drop or improvement in their software, a profiler allows a developer to quickly search and identify bottlenecks and leaks that consume much execution time. Non real-time profilers analyze the history of already executed stack traces, while a real-time profiler outputs the results concurrently with the execution of software, so users can know the results instantaneously. However, a real-time profiler risks providing overly large and complex outputs, which is difficult for developers to quickly analyze. In this paper, we visualize the performance data from a real-time profiler. We visualize program execution as a three-dimensional (3D) city, representing the structure of the program as artifacts in a city (i.e., classes and packages expressed as buildings and districts) and their program executions expressed as the fluctuating height of artifacts. Through two case studies and using a prototype of our proposed visualization, we demonstrate how our visualization can easily identify performance issues such as a memory leak and compare performance changes between versions of a program. A demonstration of the interactive features of our prototype is available at https://youtu.be/eleVo19Hp4k.Comment: 10 pages, VISSOFT 2017, Artifact: https://github.com/sefield/high-rising-city-artifac

    OGAN : Visualizing Object Interaction Scenarios Based on Dynamic Interaction Context

    Full text link
    Program Comprehension, 2009. ICPC '09. IEEE 17th International Conference onDate of Conference:17-19 May 2009Conference Location :Vancouver, B

    Aspect-Oriented Modularization of Assertion Crosscutting Objects

    Full text link
    Software Engineering Conference, 2005. APSEC '05. 12th Asia-PacificDate of Conference:15-17 Dec. 200

    Mining Application-Specific Coding Patterns for Software Maintenance

    Full text link
    LATE '08 Proceedings of the 2008 AOSD workshop on Linking aspect technology and evolutio
    • …
    corecore