Do Code Clones Matter?
|
|
|
- Chloe Nichols
- 10 years ago
- Views:
Transcription
1 Elmar Juergens, Florian Deissenboeck, Benjamin Hummel, Stefan Wagner Do Code Clones Matter? May 22 nd, st ICSE, Vancouver 1
2 Code Clone 2
3 Agenda Related Work Empirical Study Detection of inconsistent clones Conclusion 3
4 Related Work Indicating harmfulness [Lague97]: inconsistent evolution of clones in industrial telecom. SW. [Monden02]: higher revision number for files with clones in legacy SW. [Kim05]: substantial amount of coupled changes to code clones. [Li06], [SuChiu07] and [Aversano07], [Bakota07]: discovery of bugs through search for inconsistent clones or clone evolution analysis. Doubting harmfulness [Krinke07]: inconsistent clones hardly ever become consistent later. [Geiger06]: Failure to statistically verify impact of clones on change couplings [Lozano08]: Failure to statistically verify impact of clones on changeability. a Indication for increased maintenance effort or faults a Does not confirm increased maintenance effort or faults 4
5 Related Work (2) Limitations of previous studies Indirect measures (e.g. stability of cloned vs. non-cloned code) used to determine effect of cloning are inaccurate Analyzed systems are too small or omit industrial software This Work Manual inspection of inconsistent clones by system developers a No indirect measures of consequences of cloning Both industrial and open source software analyzed Quantitative data 5
6 Terminology Clone Sequence of normalized statements At least one other occurrence in the code Exact clone Edit distance between clones = 0 Inconsistent clone Edit distance between clones > 0 & below given threshold (Inconsistent) Clone Group Set of clones at different positions (with at least 1 inconsistent clone) Semantic relationship between clones 6
7 Research Questions RQ1: Are clones changed inconsistently? IC / C RQ2: Are inconsistent clones created unintentionally? UIC / IC RQ3: Can inconsistent clones be indicators for faults in real systems? Clone Groups C (exact and incons.) Inconsistent clone groups IC Unintentionally Inconsistent Clone Groups UIC Faulty clone Groups F F / IC, F / UIC 7
8 Study Design Clone group candidate detection Novel algorithm Tailored to target program False positive removal Manual inspection of all inconsistent and ¼ exact CCs Performed by researchers Assessment of inconsistencies All inconsistent clone groups inspected Performed by developers CC C, IC UIC, F Tool detected clone group candidates CC Clone groups C (exact and incons.) Inconsistent clone groups IC Unintentionally inconsistent clone groups UIC Faulty clone groups F 8
9 Detection of Inconsistent Clones Approach Token based for easy adaptation to new (incl. legacy) languages Suffix tree of normalized statements Novel edit-distance based suffix tree traversal algorithm Scalability: 500 kloc: 3m, 5.6 MLOC: 3h Implementation Detection steps implemented as pipeline Configurable for project-specific tailoring Implemented as part of ConQAT clone detection infrastructure 9
10 Study Objects System Organization Language Age (years) Size (kloc) A Munich Re C# B Munich Re C# C Munich Re C# D LV 1871 Cobol Sysiphus TUM Java Munich Re International reinsurance company, employees LV 1871 Munich-based life-insurance company, 400 employees Sysiphus: Open source collaboration environment for distributed SW development. Developed at TUM. 10
11 Results (1) Project A B C D Sysip. Sum CC Clone groups C Inconsistent CGs IC C IC Unint. Incons. UIC Faulty CGs F UIC F 11
12 Discovered Faults System-Crash or Data Loss 17 Exceptions Erroneous transaction handling Unexpected user-visible behavior 44 Wrong messages Inconsistent behavior in similar dialogs/forms Unexpected non-user visible behavior 46 Resource management Exception handling / log messages 12
13 Results (2) RQ1: Are clones changed inconsistently? RQ2: Are inconsistent clones created unintentionally? RQ3: Can inconsistent clones be indicators for faults? Can unintentionally incons. clones be indicators? System A B C D Sysip. Mean RQ1 IC / C 56% 56% 55% 43% 48% 52% RQ2 UIC / IC 32% 33% 37% 10% 29% 28% RQ3 F / IC 12% 20% 23% 3% 16% 15% F / UIC 37% 62% 64% 33% 55% 50% 13
14 External Do Code Clones Matter? Internal Construct Threats to Validity Threat Mitigation Analysis of latest version instead of evolution. All inconsistencies of interest, independent of creation time. Developer review error Conservative strategy only makes positive answers harder Clone Detector Configuration Validated during pre-study System selection not random 5 different dev. organizations (impact on transferability) 3 different languages Technically different 14
15 Study Replication Version of ConQAT used for the study (includes both detection and inspection tools) Source code and all results for Sysiphus Apache License ABAP, Ada, C#, C/C++, COBOL, Java, VB, PL/I IDE Integration, Visualizations, 15
16 Summary Clone detection Scalable algorithm for inconsistent clone detection. Open source implementation (ConQAT). Consequences of code cloning on program correctness Inconsistent clones constituted numerous faults in productive software. Every second unintentional inconsistency constitutes a fault. 16
17 Conclusion Code clones do matter. 17
Industrial Application of Clone Change Management System
Industrial Application of Clone Change Management System Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano Graduate School of Information Science and Technology, Osaka University,
Challenges of the Dynamic Detection of Functionally Similar Code Fragments
Challenges of the Dynamic Detection of Functionally Similar Code Fragments Florian Deissenboeck, Lars Heinemann, Benjamin Hummel, Stefan Wagner Technische Universität München CSMR 2012, Szeged, Hungary
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Does the Act of Refactoring Really Make Code Simpler? A Preliminary Study
Does the Act of Refactoring Really Make Code Simpler? A Preliminary Study Francisco Zigmund Sokol 1, Mauricio Finavaro Aniche 1, Marco Aurélio Gerosa 1 1 Department of Computer Science University of São
Incremental Origin Analysis of Source Code Files
Incremental Origin Analysis of Source Code Files Daniela Steidl [email protected] Benjamin Hummel [email protected] CQSE GmbH Garching b. München Germany Elmar Juergens [email protected] ABSTRACT The history
Finding Code Clones for Refactoring with Clone Metrics : A Case Study of Open Source Software
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. Finding Code Clones for Refactoring with Clone Metrics : A Case Study of Open Source Software Eunjong CHOI,
Why and How to Control Cloning in Software Artifacts. Elmar Juergens
Why and How to Control Cloning in Software Artifacts Elmar Juergens Institut für Informatik der Technischen Universität München Why and How to Control Cloning in Software Artifacts Elmar Juergens Vollständiger
Pattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic
Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic The challenge When building distributed, large-scale applications, quality assurance (QA) gets increasingly
Model Clone Detection in Practice
Model Clone Detection in Practice Florian Deissenboeck, Benjamin Hummel Elmar Juergens, Michael Pfaehler Technische Universität München Garching b. München, Germany Bernhard Schaetz fortiss ggmbh München,
Index-Based Code Clone Detection: Incremental, Distributed, Scalable
Index-Based Code Clone Detection: Incremental, Distributed, Scalable Benjamin Hummel Elmar Juergens Lars Heinemann Technische Universität München, Germany {hummelb,juergens,heineman}@in.tum.de Michael
Software Engineering. Introduction. Software Costs. Software is Expensive [Boehm] ... Columbus set sail for India. He ended up in the Bahamas...
Software Engineering Introduction... Columbus set sail for India. He ended up in the Bahamas... The economies of ALL developed nations are dependent on software More and more systems are software controlled
Sector vs. Hadoop. A Brief Comparison Between the Two Systems
Sector vs. Hadoop A Brief Comparison Between the Two Systems Background Sector is a relatively new system that is broadly comparable to Hadoop, and people want to know what are the differences. Is Sector
White Paper. Software Development Best Practices: Enterprise Code Portal
White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations
Apache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Load-balancing and Clustering Mark Thomas, 20 November 2014 Introduction Apache Tomcat committer since December 2003 [email protected] Tomcat 8 release manager Member of the Servlet, WebSocket
Towards a Big Data Curated Benchmark of Inter-Project Code Clones
Towards a Big Data Curated Benchmark of Inter-Project Code Clones Jeffrey Svajlenko, Judith F. Islam, Iman Keivanloo, Chanchal K. Roy, Mohammad Mamun Mia Department of Computer Science, University of Saskatchewan,
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Module 1. Introduction to Software Engineering. Version 2 CSE IIT, Kharagpur
Module 1 Introduction to Software Engineering Lesson 2 Structured Programming Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the important features of
Toward Improving Graftability on Automated Program Repair
Toward Improving Graftability on Automated Program Repair Soichi Sumi, Yoshiki Higo, Keisuke Hotta, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email:
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
Continuous Monitoring: Match Your Business Needs with the Right Technique
Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous
Testing Metrics. Introduction
Introduction Why Measure? What to Measure? It is often said that if something cannot be measured, it cannot be managed or improved. There is immense value in measurement, but you should always make sure
IEEE P1633 Software Reliability Best Practices. Nematollah Bidokhti Working Group Member
1 IEEE P1633 Software Reliability Best Practices Nematollah Bidokhti Working Group Member 2 Introduction and motivation Software reliability Fundamental prerequisite for virtually all modern systems Software
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
HP DevOps by Design. Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015. HP Software: Apps meet Ops 2015
HP Software: Apps meet Ops 2015 HP DevOps by Design Your Readiness for Continuous Innovation Rony Van Hove/ April 2 nd, 2015 HP Software: Apps meet Ops 2015 Build it, test it, and fix the things that go
Monitoring Best Practices for
Monitoring Best Practices for OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems like Magento,
Monitoring Best Practices for COMMERCE
Monitoring Best Practices for COMMERCE OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems
Modern practices 2.3.2015 02.03.2015 TIE-21100/21106 1
Modern practices 2.3.2015 1 Today s lecture Learn what some modern SW engineering topics are about A peek to some research topic of our department 2 3 4 5 6 How the lectures continue? 02.03 Modern practices
Definitions. Software Metrics. Why Measure Software? Example Metrics. Software Engineering. Determine quality of the current product or process
Definitions Software Metrics Software Engineering Measure - quantitative indication of extent, amount, dimension, capacity, or size of some attribute of a product or process. Number of errors Metric -
Introduction to Software Engineering. 8. Software Quality
Introduction to Software Engineering 8. Software Quality Roadmap > What is quality? > Quality Attributes > Quality Assurance: Planning and Reviewing > Quality System and Standards 2 Sources > Software
Manual. Ticket Center Manual. Ticket Center 2: 1.0 1.1. May 17, 2013. AdNovum Informatik AG. Released. AdNovum Informatik AG. All rights reserved.
DESCRIPTION: Ticket Center RELEASE: Ticket Center 2: 1.0 DOCUMENT VERSION: 1.1 DATE: May 17, 2013 AUTHORS: AdNovum Informatik AG STATUS: Released AdNovum Informatik AG. All rights reserved. Contents 1
Data Analytics for a Secure Smart Grid
Data Analytics for a Secure Smart Grid Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Ireland COE. Agenda APT modus operandi Data Analysis and Security SPARKS Data Analytics Module Anatomy
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
ClonePacker: A Tool for Clone Set Visualization
ClonePacker: A Tool for Clone Set Visualization Hiroaki Murakami, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan {h-murakm, higo, kusumoto}@ist.osaka-u.ac.jp
Project Management. Lecture 3. Software Engineering CUGS. Spring 2012 (slides made by David Broman) Kristian Sandahl
Project Lecture 3 Software Engineering CUGS Spring 2012 (slides made by David Broman) Kristian Sandahl Department of Computer and Information Science Linköping University, Sweden A Software Life-cycle
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes October 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making
Application Performance Monitoring of a scalable Java web-application in a cloud infrastructure
Application Performance Monitoring of a scalable Java web-application in a cloud infrastructure Final Presentation August 5, 2013 Student: Supervisor: Advisor: Michael Rose Prof. Dr. Florian Matthes Alexander
Model-based Quality Assurance of Automotive Software
Model-based Quality Assurance of Automotive Software Jan Jürjens 1, Daniel Reiss 2, David Trachtenherz 3 1 Open University (GB) and Microsoft Research (Cambridge) 2 Elektrobit (Germany) 3 TU Munich (Germany)
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
False Positives & Managing G11n in Sync with Development
Continuous Globalization False Positives & Managing G11n in Sync with Development From Lingoport: Adam Asnes Michael Asnes May 10, 2016 Agenda False positives background Static Analysis vs. Testing Intro
Lecture 9. Semantic Analysis Scoping and Symbol Table
Lecture 9. Semantic Analysis Scoping and Symbol Table Wei Le 2015.10 Outline Semantic analysis Scoping The Role of Symbol Table Implementing a Symbol Table Semantic Analysis Parser builds abstract syntax
Recovering Traceability Links between Requirements and Source Code using the Configuration Management Log *
IEICE TRANS. FUNDAMENTALS/COMMUN./ELECTRON./INF. & SYST., VOL. E85-A/B/C/D, No. xx JANUARY 20xx 1 PAPER Recovering Traceability Links between Requirements and Source Code using the Configuration Management
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
Software Project Audit Process
Software Project Audit Process Version 1.2 Information and Communication Technology Agency of Sri Lanka July 2013 Copyright 2011 ICTA Software Project Audit Process-v-1.2 Revision History Date Version
Wireless Sensor Network Performance Monitoring
Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007 Overview The problem we are trying
How To Improve Your Software
Driving Quality, Security and Compliance in Third- Party Code Dave Gruber Director of Product Marketing, Black Duck Keri Sprinkle Sr Product Marketing Manager, Coverity Jon Jarboe Sr Technical Marketing
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Are Comprehensive Quality Models Necessary for Evaluating Software Quality?
Are Comprehensive Quality Models Necessary for Evaluating Software Quality? Klaus Lochmann Technische Universität München Software & Systems Engineering Munich, Germany [email protected] Jasmin Ramadani,
Software Verification and System Assurance
Software Verification and System Assurance John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Verification
BUSINESS RULES MANAGEMENT AND BPM
KINGSTON & CROYDON BRANCH BUSINESS RULES MANAGEMENT AND BPM WHO'S MANAGING YOUR RULES? Paul Vincent Rules Specialist and Product Management Fair Isaac October 12, 2005 Agenda Business Rules Approach a
MASCOT Search Results Interpretation
The Mascot protein identification program (Matrix Science, Ltd.) uses statistical methods to assess the validity of a match. MS/MS data is not ideal. That is, there are unassignable peaks (noise) and usually
Global Delivery Excellence Best Practices for Improving Software Process and Tools Adoption. Sunil Shah Technical Lead IBM Rational
Global Delivery Excellence Best Practices for Improving Software Process and Tools Adoption Sunil Shah Technical Lead IBM Rational Agenda Organization s Challenges from a Delivery Perspective Introduction
Root Cause Analysis for Customer Reported Problems. Topics
Root Cause Analysis for Customer Reported Problems Copyright 2008 Software Quality Consulting Inc. Slide 1 Topics Introduction Motivation Software Defect Costs Root Cause Analysis Terminology Tools and
Continuous Integration on System z
Continuous Integration on System z A Proof of Concept at Generali Deutschland Informatik Services GmbH Enterprise Modernization GSE Frankfurt, 14th October 2013 Markus Holzem, GDIS-AS mailto: [email protected]
Chapter 9 Software Evolution
Chapter 9 Software Evolution Summary 1 Topics covered Evolution processes Change processes for software systems Program evolution dynamics Understanding software evolution Software maintenance Making changes
Redefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
Client Checklist for Migrations
Client Checklist for Migrations This checklist will walk you through how to randomly and non-randomly check your data once it has been imported. Keep in mind that the migration spreadsheet dictates what
Technical Report. Implementation and Performance Testing of Business Rules Evaluation Systems in a Computing Grid. Brian Fletcher x08872155
Technical Report Implementation and Performance Testing of Business Rules Evaluation Systems in a Computing Grid Brian Fletcher x08872155 Executive Summary 4 Introduction 5 Background 5 Aims 5 Technology
Early Software Product Improvement with Sequential Inspection Sessions: An empirical Investigation of Inspector Capability and Learning Effects
Early Software Product Improvement with Sequential Inspection Sessions: An empirical Investigation of Inspector Capability and Learning Effects Dietmar Winkler, Bettina Thurnher, Stefan Biffl Institute
The «SQALE» Analysis Model An analysis model compliant with the representation condition for assessing the Quality of Software Source Code
The «SQALE» Analysis Model An analysis model compliant with the representation condition for assessing the Quality of Software Source Code Jean-Louis Letouzey DNV IT Global Services Arcueil, France [email protected]
Lund, November 16, 2015. Tihana Galinac Grbac University of Rijeka
Lund, November 16, 2015. Tihana Galinac Grbac University of Rijeka Motivation New development trends (IoT, service compositions) Quality of Service/Experience Demands Software (Development) Technologies
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
Software Engineering. So(ware Evolu1on
Software Engineering So(ware Evolu1on 1 Software change Software change is inevitable New requirements emerge when the software is used; The business environment changes; Errors must be repaired; New computers
Configuration & Build Management
Object-Oriented Software Engineering Using UML, Patterns, and Java Configuration & Build Management Outline of the Lecture Purpose of Software Configuration Management (SCM) Some Terminology Software Configuration
Application of Next Generation Telecom Network Management Architecture to Satellite Ground Systems
Application of Next Generation Telecom Network Management Architecture to Satellite Ground Systems Author: P.Ramachandran Name: Date: Designation: March 2 nd, 2005 Date: February, 2004 0 Agenda Background
Supplement to Gaming Machine Technical Standards Consultation
Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to
A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management
International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management
A Practical Approach to Software Continuous Delivery Focused on Application Lifecycle Management Everton Gomede, Rafael Thiago da Silva and Rodolfo Miranda de Barros Department of Computer Science State
Appendix O Project Performance Management Plan Template
Appendix O Project Performance Management Plan Template Version 2 March 7, 2005 This page is intentionally left blank. Version 2 March 7, 2005 Title Page Document Control Panel Table of Contents List of
Software Analysis Visualization
28th International Conference on Software Engineering Software Analysis Visualization Harald Gall and Michele Lanza !oftware Visualiza"o# Tutorial F7 Software Evolution: Analysis and Visualization 2006
Using Data Mining and Machine Learning in Retail
Using Data Mining and Machine Learning in Retail Omeid Seide Senior Manager, Big Data Solutions Sears Holdings Bharat Prasad Big Data Solution Architect Sears Holdings Over a Century of Innovation A Fortune
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
1. Introduction. Annex 7 Software Project Audit Process
Annex 7 Software Project Audit Process 1. Introduction 1.1 Purpose Purpose of this document is to describe the Software Project Audit Process which capable of capturing different different activities take
Mining a Change-Based Software Repository
Mining a Change-Based Software Repository Romain Robbes Faculty of Informatics University of Lugano, Switzerland 1 Introduction The nature of information found in software repositories determines what
Design by Contract beyond class modelling
Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
IA Metrics Why And How To Measure Goodness Of Information Assurance
IA Metrics Why And How To Measure Goodness Of Information Assurance Nadya I. Bartol PSM Users Group Conference July 2005 Agenda! IA Metrics Overview! ISO/IEC 21827 (SSE-CMM) Overview! Applying IA metrics
ReLink: Recovering Links between Bugs and Changes
ReLink: Recovering Links between Bugs and Changes Rongxin Wu, Hongyu Zhang, Sunghun Kim and S.C. Cheung School of Software, Tsinghua University Beijing 100084, China [email protected], [email protected]
