4,768 research outputs found
A comparative evaluation of dynamic visualisation tools
Despite their potential applications in software comprehension, it appears that dynamic visualisation tools are seldom used outside the research laboratory. This paper presents an empirical evaluation of five dynamic visualisation tools - AVID, Jinsight, jRMTool, Together ControlCenter diagrams and Together ControlCenter debugger. The tools were evaluated on a number of general software comprehension and specific reverse engineering tasks using the HotDraw objectoriented framework. The tasks considered typical comprehension issues, including identification of software structure and behaviour, design pattern extraction, extensibility potential, maintenance issues, functionality location, and runtime load. The results revealed that the level of abstraction employed by a tool affects its success in different tasks, and that tools were more successful in addressing specific reverse engineering tasks than general software comprehension activities. It was found that no one tool performs well in all tasks, and some tasks were beyond the capabilities of all five tools. This paper concludes with suggestions for improving the efficacy of such tools
Recommended from our members
Empowering Expression for Users with Aphasia through Constrained Creativity
Creative activities allow people to express themselves in rich, nuanced ways. However, being creative does not always come easily. For example, people with speech and language impairments, such as aphasia, face challenges in creative activities that involve language. In this paper, we explore the concept of constrained creativity as a way of addressing this challenge and enabling creative writing. We report an app, MakeWrite, that supports the constrained creation of digital texts through automated redaction. The app was co-designed with and for people with aphasia and was subsequently explored in a workshop with a group of people with aphasia. Participants were not only successful in crafting novel language, but, importantly, self-reported that the app was crucial in enabling them to do so. We refect on the potential of technology-supported constrained creativity as a means of empowering expression amongst users with diverse needs
Improving the viability of mental models held by novice programmers
Recent research has found that many novice programmers often hold non-viable mental models of basic programming concepts such as assignment and object reference. This paper proposes a constructivist-based teaching model, integrating a cognitive conflict strategy with program visualization, with the aim of improving novice programmers’ mental models. The results of a preliminary empirical study suggest that, for the relatively straightforward concept of assignment, tight integration of program visualization with a cognitive conflict event that highlights a student’s inappropriate understanding can help improve students’ non-viable mental models. 14 out of 18 participants who held non-viable mental models of the assignment process successfully changed their model to be viable as a result of the proposed teaching model
MEGA: merger graphs of structure formation
When following the growth of structure in the Universe, we propose replacing merger trees with merger graphs, in which haloes can both merge and split into separate pieces. We show that this leads to smoother mass growth and eliminates catastrophic failures in which massive haloes have no progenitors or descendants. For those who prefer to stick with merger trees, we find that trees derived from our merger graphs have similar mass growth properties to previous methods, but again without catastrophic failures. For future galaxy formation modelling, two different density thresholds can be used to distinguish host haloes (extended galactic haloes, groups and clusters) from higher-density subhaloes: sites of galaxy formation
An empirical study evaluating depth of inheritance on the maintainability of object-oriented software
This empirical research was undertaken as part of a multi-method programme of research to investigate unsupported claims made of object-oriented technology. A series of subject-based laboratory experiments, including an internal replication, tested the effect of inheritance depth on the maintainability of object-oriented software. Subjects were timed performing identical maintenance tasks on object-oriented software with a hierarchy of three levels of inheritance depth and equivalent object-based software with no inheritance. This was then replicated with more experienced subjects. In a second experiment of similar design, subjects were timed performing identical maintenance tasks on object-oriented software with a hierarchy of five levels of inheritance depth and the equivalent object-based software. The collected data showed that subjects maintaining object-oriented software with three levels of inheritance depth performed the maintenance tasks significantly quicker than those maintaining equivalent object-based software with no inheritance. In contrast, subjects maintaining the object-oriented software with five levels of inheritance depth took longer, on average, than the subjects maintaining the equivalent object-based software (although statistical significance was not obtained). Subjects' source code solutions and debriefing questionnaires provided some evidence suggesting subjects began to experience diffculties with the deeper inheritance hierarchy. It is not at all obvious that object-oriented software is going to be more maintainable in the long run. These findings are sufficiently important that attempts to verify the results should be made by independent researchers
Marine flora and fauna of the eastern United States Mollusca: Cephalopoda
The cephalopods found in neritic waters of the northeastern
United States include myopsid and oegopsid squids, sepiolid
squids, and octopods. A key with diagnostic illustrations is provided to aid in identification of the eleven species common in the neritic waters between Cape Hatteras and Nova Scotia; included also is information on two oceanic species that occur over the continental shelf in this area and that can be confused with similar-looking neritic species. Other sections comprise a glossary of taxonomic characters used for identification of these species, an annotated systematic checklist, and checklists of the 89 other oceanic species and 18 Carolinian and subtropical neritic species that might occur occasionally off the northeastern
United States. (PDF file contains 30 pages.
Comparison of two sampling protocols and four home-range estimators using radio-tracking data from urban badgers Meles meles
Radio-telemetry is often the method of choice for studies of species whose behaviour is difficult to observe directly. However, considerable debate has ensued about the best way of deriving home-range estimates. In recent years, kernel estimators have become the most widely used method, together with the oldest and simplest method, the minimum convex polygon (MCP). More recently, it has been suggested that the local convex hull (LCH) might be more appropriate than kernel methods in cases where an animal’s home range includes a priori inaccessible areas. Yet another method, the Brownian bridge (BB), explicitly uses autocorrelated data to determine movement paths and, ultimately, home ranges or migration routes of animals. Whereas several studies have used simulation techniques to compare these different methods, few have used data from real animals. We used radio-telemetric data from urban badgers Meles meles to compare two sampling protocols (10-minute vs at least 30-minute inter-fix intervals) and four home-range estimators (MCP, fixed kernels (FK), LCH and BB). We used a multi-response permutation procedure and randomisation tests to compare overall patterns of fixes and degree of overlap of home ranges estimated using data from different sampling protocols, and a general linear model to compare the influence of sampling protocols and home-range estimator on the size of habitat patches. The shape of the estimated home ranges was influenced by sampling protocol in some cases. By contrast, the sizes and proportions of different habitats within home ranges were influenced by estimator type but not by sampling protocol. LCH performed consistently better than FK, and is especially appropriate for patchy study areas containing frequent no-go zones. However, we recommend using LCH in combination with other methods to estimate total range size, because LCH tended to produce smaller estimates than any other method. Results relating to BB are preliminary but suggest that this method is unsuitable for species in which range size is small compared to average travel speed.Marie-Curie Intra-European Fellowship (BSSUB - 24007); Defra WSC contract WM0304; Wildlife Biology granted the permit to upload the article to this repositor
Applying inspection to object-oriented software
The benefits of the object-oriented paradigmare widely cited. At the same time, inspection is deemed to be the most cost-effective means of detecting defects in software products. Why then, is there no published experience, let alone quantitative data, on the application of inspection to object-oriented systems? We describe the facilities of the object-oriented paradigm and the issues that these raise when inspecting object-oriented code. Several problems are caused by the disparity between the static code structure and its dynamic runtime behaviour. The large number of small methods in object-oriented systems can also cause problems. We then go on to describe three areas which may help mitigate problems found. Firstly, the use of various programming methods may assist in making object-oriented code easier to inspect. Secondly, improved program documentation can help the inspector understand the code which is under inspection. Finally, tool support can help the inspector to analyse the dynamic behaviour of the code. We conclude that while both the object-oriented paradigm and inspection provide excellent benefits on their own, combining the two may be a difficult exercise, requiring extensive support if it is to be successful
CIVIL PROCEDURE-RIGHT OF IMPLEADER UNDER MICHIGAN CONTRIBUTION STATUTE
Plaintiff, a resident of Michigan, brought a negligence action against defendant, an Illinois corporation, for personal injury in the Federal District Court for the Eastern District of Michigan. The defendant moved to implead a citizen of Michigan and a Michigan corporation as third party defendants on the theory that under the Michigan Contribution Statute as concurrent tortfeasors they would be liable to him for part of the judgment in the event that plaintiff recovered in the suit. The court granted the motion and the defendant filed its third party complaint. Plaintiff then moved to dismiss the third party complaint. Held: motion granted. The court reasoned that since the Michigan Contribution Statute was almost identical with that of New York and since the Michigan Supreme Court has never passed upon the right of impleader under it, the New York court\u27s interpretation of their statute denying impleader should govern. Buckner v. Foster (McLouth Steel Corp., ThirdParty Defendants), (D.C. Mich. 1952) 105 F. Supp. 279
- …