Automatically inferring concern code from program investigation activities
When performing a program evolution task, developers typically spend a significant amount of effort investigating and re-investigating source code. To reduce this effort, we propose a technique to automatically infer the essence of program investigation activities as a set of concern descriptions. T...
Saved in:
Published in | 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings pp. 225 - 234 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
Piscataway, NJ, USA
IEEE Press
06.10.2003
IEEE |
Series | ACM Conferences |
Subjects | |
Online Access | Get full text |
ISBN | 0769520359 9780769520353 |
ISSN | 1938-4300 |
DOI | 10.1109/ASE.2003.1240310 |
Cover
Loading…
Abstract | When performing a program evolution task, developers typically spend a significant amount of effort investigating and re-investigating source code. To reduce this effort, we propose a technique to automatically infer the essence of program investigation activities as a set of concern descriptions. The concern descriptions produced by our technique list methods and fields of importance in the context of the investigation of an object-oriented system. A developer can rely on this information to perform the change task at hand, or at a later stage for a change that involves the same concerns. The technique involves applying an algorithm to a transcript of a program investigation session. The transcript lists which pieces of source code were accessed by a developer when investigating a program and how the different pieces of code were accessed. We applied the technique to data obtained from program investigation activities for five subjects involved in two different program evolution tasks. The results show that relevant concerns can be identified with a manageable level of noise. |
---|---|
AbstractList | When performing a program evolution task, developers typically spend a significant amount of effort investigating and re-investigating source code. To reduce this effort, we propose a technique to automatically infer the essence of program investigation activities as a set of concern descriptions. The concern descriptions produced by our technique list methods and fields of importance in the context of the investigation of an object-oriented system. A developer can rely on this information to perform the change task at hand, or at a later stage for a change that involves the same concerns. The technique involves applying an algorithm to a transcript of a program investigation session. The transcript lists which pieces of source code were accessed by a developer when investigating a program and how the different pieces of code were accessed. We applied the technique to data obtained from program investigation activities for five subjects involved in two different program evolution tasks. The results show that relevant concerns can be identified with a manageable level of noise. When performing a program evolution task, developers typically spend a significant amount of effort investigating and reinvestigating source code. To reduce this effort, we propose a technique to automatically infer the essence of program investigation activities as a set of concern descriptions. The concern descriptions produced by our technique list methods and fields of importance in the context of the investigation of an object-oriented system. A developer can rely on this information to perform the change task at hand, or at a later stage for a change that involves the same concerns. The technique involves applying an algorithm to a transcript of a program investigation session. The transcript lists which pieces of source code were accessed by a developer when investigating a program and how the different pieces of code were accessed. We applied the technique to data obtained from program investigation activities for five subjects involved in two different program evolution tasks. The results show that relevant concerns can be identified with a manageable level of noise. |
Author | Murphy, Gail C. Robillard, Martin P. |
Author_xml | – sequence: 1 givenname: Martin P. surname: Robillard fullname: Robillard, Martin P. organization: Department of Computer Science, University of British Columbia, Vancouver, BC, Canada – sequence: 2 givenname: Gail C. surname: Murphy fullname: Murphy, Gail C. organization: Department of Computer Science, University of British Columbia, Vancouver, BC, Canada |
BookMark | eNqNkL1vwjAQxS2VSgXKXqlL1g6B81cSjwjRLyF1aDtbjn1GbkmMnBSJ_75B0L23vOG9d7r7TciojS0SckdhTimoxfJ9PWcAfE6ZAE7hikygLJRkwKUakTFVvMoFB7ghs677gmGElILzMXld_vSxMX2wZrc7ZqH1mFJot5mNrcXUDuow8yk22T7FbTLNkDlg14ftUIptZmwfDqEP2N2Sa292Hc4uOiWfj-uP1XO-eXt6WS03uWFC9bl16LkvmEdAyxxCUbiC1bISViKICqyzwjFhSy5dJZUrjXRWVdQaj0XJ-JTcn_cGRNT7FBqTjvry-uAuzq6xja5j_O40BX3CpAdM-oTpL6vrFIZbpuThvw3-C0rfalI |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ASE.2003.1240310 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 234 |
ExternalDocumentID | 1240310 |
GroupedDBID | 6IE 6IK 6IL AAJGR AAVQY ACM ADPZR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK GUFHI OCL RIB RIC RIE RIL 29I 6IF 6IH 6IM 6IN 6J9 AAWTH ABLEC ACREN ADYOE ADZIZ AFYQB AMTXH APO CHZPO IEGSK IPLJI M43 |
ID | FETCH-LOGICAL-a249t-cdef3f62fe0ec2de066d62b584c5e0480cdc4d24c735d859d7a5dc981cafe6723 |
IEDL.DBID | RIE |
ISBN | 0769520359 9780769520353 |
ISSN | 1938-4300 |
IngestDate | Tue Aug 26 17:20:29 EDT 2025 Wed Jan 31 06:43:03 EST 2024 Wed Jan 31 06:48:01 EST 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a249t-cdef3f62fe0ec2de066d62b584c5e0480cdc4d24c735d859d7a5dc981cafe6723 |
PageCount | 10 |
ParticipantIDs | acm_books_10_1109_ASE_2003_1240310_brief acm_books_10_1109_ASE_2003_1240310 ieee_primary_1240310 |
PublicationCentury | 2000 |
PublicationDate | 20031006 20030000 |
PublicationDateYYYYMMDD | 2003-10-06 2003-01-01 |
PublicationDate_xml | – month: 10 year: 2003 text: 20031006 day: 06 |
PublicationDecade | 2000 |
PublicationPlace | Piscataway, NJ, USA |
PublicationPlace_xml | – name: Piscataway, NJ, USA |
PublicationSeriesTitle | ACM Conferences |
PublicationTitle | 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings |
PublicationTitleAbbrev | ASE |
PublicationYear | 2003 |
Publisher | IEEE Press IEEE |
Publisher_xml | – name: IEEE Press – name: IEEE |
SSID | ssj0000455433 ssj0051577 |
Score | 1.7015096 |
Snippet | When performing a program evolution task, developers typically spend a significant amount of effort investigating and re-investigating source code. To reduce... When performing a program evolution task, developers typically spend a significant amount of effort investigating and reinvestigating source code. To reduce... |
SourceID | ieee acm |
SourceType | Publisher |
StartPage | 225 |
SubjectTerms | Access protocols Clustering algorithms Computer science Costs Database systems Documentation Graphical user interfaces Inference algorithms Noise level Scattering |
Title | Automatically inferring concern code from program investigation activities |
URI | https://ieeexplore.ieee.org/document/1240310 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT56qtmJ9sYgHDybdZvPaY5GWUqgIWugtbHYnINZUairor3dn8xBF0FseC0l2ksx8s_N9Q8ilwT0QyTBwmGTM8bXHnRgi5uhIagEqjKWPfOf5bThd-LNlsGyR64YLAwC2-Axc3LRr-XqttpgqGwxRPA75VDsGuJVcrSafYkKTwOfNX9i4adt10cQnseNzxkrILgIPNesq5Z16n9frl0wMRvdjqxLqVhdDr6Wev_Vesa5n0iHz-qbLipMnd1ukrvr4oef436faI70vkh-9a9zXPmlBfkA6dZcHWn30XTIbbYu1FXaVq9U7xeqtDSYDqULG4yanyIqnSFOhVbGXGdOId6xzitSJNyvc2iOLyfjhZupUHRgcaWBZ4SgNGc9CLwMGytNg4hMdeqkJWlQAyEZXWhn7-irigY4DYSwcaCXioZIZhJHHD0k7X-dwRGgayiEf-pJL5ZuoQIpIKC4MGGOZlEzwPrkw85wgtHhNLDJhIjHGwD6ZPKnmqE-u_h6UpJtHyPqki1OdvJSiHfXJ498Pn5BdW6VncyunpF1stnBmoo0iPbev2SekiMjm |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEB5ED3ryjesziAcPds026SNHEWV9rAgqeCtpMgVRu7J2Bf31ZrJtRRH01kegbabtfDOZ7xuAPRf3YKLjKOCa80DaUAQpJjywibYKTZxqSXznwVXcv5Pn99H9FBy0XBhE9MVn2KVNv5Zvh2ZMqbLDHonHEZ9qxvl9qSZsrTaj4sBJJEX7H3aO2vdddAglDaTgfBK0qygk1bpae6fZF80KJleHRzcnXie0W1-O_JZ5_tZ9xTuf03kYNLc9qTl57I6rvGs-fig6_ve5FmDli-bHrlsHtghTWC7BfNPngdWf_TKcH42roZd21U9P74zqt0aUDmSGOI-jkhEvnhFRhdXlXm5MK98xLBmRJ968dOsK3J2e3B73g7oHQ6BdYFYFxmIhijgskKMJLTqEYuMwd7DFREh8dGONs7A0iYhsGiln48galfaMLjBOQrEK0-WwxDVgeax7oie10EY6XKBVooxQLhzjhdZciQ7sunnOKLh4zXxswlXmjEGdMkVWz1EH9v8elOWjByw6sExTnb1MZDuak-u_H96B2f7t4DK7PLu62IA5X7PnMy2bMF2NxrjlsEeVb_tX7hNm_8w2 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+18th+IEEE+International+Conference+on+Automated+Software+Engineering&rft.atitle=Automatically+inferring+concern+code+from+program+investigation+activities&rft.au=Robillard%2C+Martin+P.&rft.au=Murphy%2C+Gail+C.&rft.series=ACM+Conferences&rft.date=2003-10-06&rft.pub=IEEE+Press&rft.isbn=0769520359&rft.spage=225&rft.epage=234&rft_id=info:doi/10.1109%2FASE.2003.1240310 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1938-4300&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1938-4300&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1938-4300&client=summon |