36 th ieee international conference on software
play

36 th IEEE International Conference on Software Maintenance and - PowerPoint PPT Presentation

36 th IEEE International Conference on Software Maintenance and Evolution (ICSME 2020) Adelaide, Australia Air Travel Disruption from Earthquake, Port-au-Prince, Haiti Volcanic Eruption, Iceland ICSE 2010, South Africa, Cape Town Deadlines


  1. 36 th IEEE International Conference on Software Maintenance and Evolution (ICSME 2020) Adelaide, Australia

  2. Air Travel Disruption from Earthquake, Port-au-Prince, Haiti Volcanic Eruption, Iceland ICSE 2010, South Africa, Cape Town

  3. Deadlines sketched on the white board Boxes of papers on book shelves

  4. A fresh graduate from Vanderbilt U in 2010

  5. A sophomore in Math and ECE in 2010 Could you please Do you know how read this book to program? and let me know Do you know Java? your thoughts?

  6. A fresh graduate from U Maryland in 2010

  7. Analyses of Software Evolution - Evolution of Code Clones High-level changes are often systematic at a code level Automatic Inference of ∆ High-Level Change Descriptions - Rule-based Change Representations V1 V2 - Rule Learning Algorithms

  8. Changed Code - public class CmiRegistry implements NameService { File Name Status Lines + public class CmiRegistry extends New 20 lines DummyRegistry AbsRegistry implements NameService { - private int port = ... 133 lines New AbsRegistry - private String host = null Modified 123 lines JRMPRegistry - public void setPort (int p) { - if (TraceCarol. isDebug()) { ... Modified 52 lines JeremieRegistry - } 
 Modified 133 lines JacORBCosNaming - } - public int getPort() { Modified 50 lines IIOPCosNaming - return port; Modified 39 lines CmiRegistry - } - public void setHost(String host) Modified 197 lines NameService { .... Each rule represents systematic changes by relating NameServiceManager Modified 15 lines ... groups of change facts. These rules are automatically Total Change: 9 files, 723 lines inferred using inductive logic programming . ∀ m ∀ t past_method(m, “setHost”, t) ∧ past_subtype(“Service”, t) ⇒ deleted_calls(m, “SQL.exec”) [except t=“NameSvc” m=”NameSvc.setHost”]

  9. CodeQuest: Querying Source Code with DataLog Elnar Hajiyev 1 , Mathieu Verbaere 1 , Oege de Moor 1 and Kris de Volder 2 1 Programming Tools Group 2 Software Practices Lab University of Oxford University of British Columbia United Kingdom Vancouver, Canada elnar.hajiyev@comlab.ox.ac.uk, Navigating and Querying Code Without Getting Lost mathieu.verbaere@comlab.ox.ac.uk, kdvolder@cs.ubc.ca oege@comlab.ox.ac.uk Doug Janzen and Kris De Volder Department of Computer Science University of British Columbia 2366 Main Mall Vancouver BC Canada V6T 1Z4 dsjanzen,kdvolder@cs.ubc.ca Maintaining software through intentional source-code views † ∗ Kim Mens Tom Mens Michel Wermelinger Département INGI Programming Technology Lab Departamento de Informática Univ. catholique de Louvain Vrije Universiteit Brussel Universidade Nova de Lisboa Louvain-la-Neuve, Belgium Brussels, Belgium 2829-516 Caparica, Portugal Kim.Mens@info.ucl.ac.be Tom.Mens@vub.ac.be mw@di.fct.unl.pt

  10. Detecting Merging and Splitting using Origin Analysis Lijie Zou and Michael W. Godfrey UMLDiff: An Algorithm for Object-Oriented Software Architecture Group (SWAG) School of Computer Science, University of Waterloo Design Differencing lzou, migod @uwaterloo.ca Zhenchang Xing and Eleni Stroulia Computing Science Department Automated Detection of Refactorings in Evolving University of Alberta Edmonton AB, T6G 2H1, Canada Components {xing, stroulia}@cs.ualberta.ca Danny Dig, Can Comertoglu, Darko Marinov, and Ralph Johnson Department of Computer Science University of Illinois at Urbana-Champaign 201 N. Goodwin Ave. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 33, NO. 11, NOVEMBER 2007 725 Urbana, IL 61801, USA { dig,comertog,marinov,johnson } @cs.uiuc.edu Change Distilling: Tree Differencing for Fine- Grained Source Code Change Extraction Beat Fluri, Student Member , IEEE , Michael Wu ¨rsch, Student Member , IEEE , Martin Pinzger, Member , IEEE , and Harald C. Gall, Member , IEEE SpyWare: A Change-Aware Development Toolset Romain Robbes Michele Lanza Faculty of Informatics, University of Lugano Faculty of Informatics, University of Lugano

  11. Statistical Relational Structure Learning Inductive Logic Programming Genetic Programming Heuristic Search Infer too many “uninteresting” change rules � must encode inductive bias explicitly

  12. “Template-based Reconstruction of Complex Refactoring”

  13. Motivation: Refactoring-Aware Code Review • Developers can benefit from refactoring information when they investigate complex non-local edits during peer code reviews. • Problem: How can we automatically identify the locations and types of refactoring from two program versions?

  14. Challenges: Complex Refactoring Reconstruction • Must find pre-requisite refactorings to identify composite refactorings • Require information about changes within method bodies • Require the knowledge of changes to the control structure of a program

  15. Approach: Logic Query-based Refactoring Reconstruction • Step 1. Encode each refactoring type as a template logic rule • Step 2. Extract change-facts from two input program versions • Step 3. Refactoring identification via logic queries • Ref-Finder orders pre-requisite refactorings before composite refactorings

  16. Predicates LSdiff Predicates Extended Predicates package type methodbody conditional method field cast trycatch return fieldoftype throws variabledeclation typeintype accesses methodmodifiers fieldmodifiers similarbody( σ )* calls subtype parameter inheritedfield getter setter inheritedmethod addedparameter deletedparameter

  17. Fact-Level Differences Old Program before_* type(“Bus”,..) type(“Foo”,..) method(“Foo.main”,”main”,”Foo”) method(“Bus.start”,”start”,”Bus”) conditional(“date.before(SUMMER_START)...) access(“Key.on”,”Bus.start”) - methodbody(“Foo.main”, ...) method(“Key.out”,”out”,”Key”)... set difference New Program after_* type(“Foo”,..) method(“Foo.main”,”main”,”Foo”) method (“Foo.notSummer(Date)”, “notSummer”, “Foo”) = Differences ( ∆ FB ) added_* / deleted_* added_method(“Foo.summerCharge”, ...) added_method(“Foo.notSummer”, ...) deleted_conditional(“date.before(SUMMER_START). ..)

  18. Rule Syntax Example: collapse hierarchy refactoring—a superclass and its subclass are not very different. Merge them together. A rule’s consequent refers to a target refactoring to be inferred. (deleted_subtype(t1,t2) ∧ (pull_up_field(f,t2,t1) ∨ pull_up_method(m,t2,t1))) ∨ (before_subtype(t1,t2) ∧ deleted_type(t1,n,p) ∧ (push_down_field(f,t1,t2) ∨ push_down_method(m,t1,t2)) � collapse_hierarchy(t1,t2)

  19. Rule Syntax Example: collapse hierarchy refactoring—a superclass and its subclass are not very different. Merge them together. A rule’s antecedent may refer to pre-requisite A rule’s consequent refers to a target refactoring to be inferred. refactorings. (deleted_subtype(t1,t2) ∧ (pull_up_field(f,t2,t1) ∨ pull_up_method(m,t2,t1))) ∨ (before_subtype(t1,t2) ∧ deleted_type(t1,n,p) ∧ (push_down_field(f,t1,t2) ∨ push_down_method(m,t1,t2)) � collapse_hierarchy(t1,t2)

  20. Encoding Fowler’s Refactorings • We encoded 63 types but excluded a few because • they are too ambiguous, • require accurate alias analysis, or • require clone detection at an arbitrary granularity.

  21. Collapse Collapse Hierarchy Inference Pull Up Move deleted_field(f1, f, t1) T o find a move ∧ added_field(f2, f, t2) ∧ deleted_access(f1, m1) field refactoring ∧ added_access(f2, m1) � move_field(f, t1, t2) Fact-base before_subtype(“Chart”,”PieChart”) deleted_subtype(“Chart”,”PieChart”) deleted_field(“PieChart.color”, “color”, “PieChart”) added_field(“Chart.color”, “color”, “Chart”) deleted_access(“PieChart.color”, “Chart.draw”) added_access(“Chart.color”, “Chart.draw”)

  22. Collapse Collapse Hierarchy Inference Pull Up Move deleted_field(f1, f, t1) T o find a move ∧ added_field(f2, f, t2) ∧ deleted_access(f1, m1) field refactoring ∧ added_access(f2, m1) � move_field(f, t1, t2) Fact-base before_subtype(“Chart”,”PieChart”) deleted_subtype(“Chart”,”PieChart”) deleted_field(“PieChart.color”, “color”, “PieChart”) added_field(“Chart.color”, “color”, “Chart”) deleted_access(“PieChart.color”, “Chart.draw”) added_access(“Chart.color”, “Chart.draw”)

  23. Collapse Collapse Hierarchy Inference Pull Up Move � f1, � f, � t1, � t2, � f2, � m1, Invoke a move- deleted_field(f1, f, t1) field query ∧ added_field(f2, f, t2) ∧ deleted_access(f1, m1) ∧ added_access(f2, m1)? Fact-base before_subtype(“Chart”,”PieChart”) deleted_subtype(“Chart”,”PieChart”) deleted_field(“PieChart.color”, “color”, “PieChart”) added_field(“Chart.color”, “color”, “Chart”) deleted_access(“PieChart.color”, “Chart.draw”) added_access(“Chart.color”, “Chart.draw”)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend