toward mining concept keywords from identifiers in large
play

Toward Mining Concept Keywords from Identifiers in Large Software - PowerPoint PPT Presentation

Toward Mining Concept Keywords from Identifiers in Large Software Projects Masaru Ohba and Katsuhiko Gondow Tokyo Institute of Technology What are concept keywords? Most programmers try to name identifiers meaningfully.


  1. Toward Mining “Concept Keywords” from Identifiers in Large Software Projects Masaru Ohba and Katsuhiko Gondow Tokyo Institute of Technology

  2. What are “concept keywords”? • Most programmers try to name identifiers meaningfully. • Concept keywords are defined terms that describe key concepts to aid in as program understanding. – e.g. read_dirent() : dirent is a concept keyword. dirent, root, PTE, tss, Concept keywords path, signal, yield Grouping words kbd , vga , FAT12 , sys , H, t Attributes, busy, byte, offset, name, less important concepts memory, end, int8, again read, set, is, move, wait, Generic verbs print, dump, make, init Human-selected concept keywords and other category words in udos

  3. Suggestion • We should use more “concept keywords” in program understanding tools . – concept keywords are concise and descriptive • Our solution: – provides a way to mine concept keywords. • ckTF/IDF methods / Identifier Exploratory Framework – could be used to build tools that support and utilize extracted concept keywords (future work).

  4. Future work • Applying concept keywords to a Bug Tracking System (BTS) to see the relationship between bug report and corresponding problem source code. fat12.c read_ dirent () { Bug-report no.1 return NULL; Overview: dirent } It could not read directories. task.c signal sys_ signal (){ sys_kill(); Bug-report no.3 } Overview: I could not catch system calls. Concept keyword can bridge the gap between bug-reports and source code.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend