233 research outputs found
Source File Set Search for Clone-and-Own Reuse Analysis
Clone-and-own approach is a natural way of source code reuse for software
developers. To assess how known bugs and security vulnerabilities of a cloned
component affect an application, developers and security analysts need to
identify an original version of the component and understand how the cloned
component is different from the original one. Although developers may record
the original version information in a version control system and/or directory
names, such information is often either unavailable or incomplete. In this
research, we propose a code search method that takes as input a set of source
files and extracts all the components including similar files from a software
ecosystem (i.e., a collection of existing versions of software packages). Our
method employs an efficient file similarity computation using b-bit minwise
hashing technique. We use an aggregated file similarity for ranking components.
To evaluate the effectiveness of this tool, we analyzed 75 cloned components in
Firefox and Android source code. The tool took about two hours to report the
original components from 10 million files in Debian GNU/Linux packages. Recall
of the top-five components in the extracted lists is 0.907, while recall of a
baseline using SHA-1 file hash is 0.773, according to the ground truth recorded
in the source code repositories.Comment: 14th International Conference on Mining Software Repositorie
A Lightweight Visualization of Interprocedural Data-Flow Paths for Source Code Reading
Program Comprehension (ICPC), 2012 IEEE 20th International Conference onDate of Conference:11-13 June 2012Conference Location :Passa
AMIDA : a Sequence Diagram Extraction Toolkit Supporting Automatic Phase Detection
ICSE Companion '08: Companion of the 30th international conference on Software engineeringLeipzig, GermanyMay 10 - 18, 200
Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique
Software Evolution, 2003. Proceedings. Sixth International Workshop on Principles ofDate of Conference:1-2 Sept. 200
Extraction of Product Evolution Tree from Source Code of Product Variants
Proceedings of the 17th International Software Product Line Conference SPLC '13 Proceedings of the 17th International Software Product Line Conferenc
Using High-Rising Cities to Visualize Performance in Real-Time
For developers concerned with a performance drop or improvement in their
software, a profiler allows a developer to quickly search and identify
bottlenecks and leaks that consume much execution time. Non real-time profilers
analyze the history of already executed stack traces, while a real-time
profiler outputs the results concurrently with the execution of software, so
users can know the results instantaneously. However, a real-time profiler risks
providing overly large and complex outputs, which is difficult for developers
to quickly analyze. In this paper, we visualize the performance data from a
real-time profiler. We visualize program execution as a three-dimensional (3D)
city, representing the structure of the program as artifacts in a city (i.e.,
classes and packages expressed as buildings and districts) and their program
executions expressed as the fluctuating height of artifacts. Through two case
studies and using a prototype of our proposed visualization, we demonstrate how
our visualization can easily identify performance issues such as a memory leak
and compare performance changes between versions of a program. A demonstration
of the interactive features of our prototype is available at
https://youtu.be/eleVo19Hp4k.Comment: 10 pages, VISSOFT 2017, Artifact:
https://github.com/sefield/high-rising-city-artifac
OGAN : Visualizing Object Interaction Scenarios Based on Dynamic Interaction Context
Program Comprehension, 2009. ICPC '09. IEEE 17th International Conference onDate of Conference:17-19 May 2009Conference Location :Vancouver, B
Aspect-Oriented Modularization of Assertion Crosscutting Objects
Software Engineering Conference, 2005. APSEC '05. 12th Asia-PacificDate of Conference:15-17 Dec. 200
Mining Application-Specific Coding Patterns for Software Maintenance
LATE '08 Proceedings of the 2008 AOSD workshop on Linking aspect technology and evolutio
- …