توضیحاتی در مورد کتاب Reuse and Software Quality: 20th International Conference on Software and Systems Reuse, ICSR 2022, Montpellier, France, June 15–17, 2022, Proceedings
نام کتاب : Reuse and Software Quality: 20th International Conference on Software and Systems Reuse, ICSR 2022, Montpellier, France, June 15–17, 2022, Proceedings
عنوان ترجمه شده به فارسی : استفاده مجدد و کیفیت نرم افزار: بیستمین کنفرانس بین المللی استفاده مجدد از نرم افزار و سیستم ها، ICSR 2022، مونپلیه، فرانسه، 15 تا 17 ژوئن 2022، مجموعه مقالات
سری : Lecture Notes in Computer Science, 13297
نویسندگان : Gilles Perrouin, Naouel Moha, Abdelhak-Djamel Seriai
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 152
ISBN (شابک) : 3031081285 , 9783031081286
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 6 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Organization
Contents
Code Recommendation and Reuse
Fine-Grained Analysis of Similar Code Snippets
1 Introduction
2 Characterizing Similar Code Snippets with Templates
2.1 Structural Code Templates
2.2 Similarity Between Templates
3 Structuring Templates by Similarity with Pattern Structure
3.1 Input
3.2 Building Process
4 Discussion
4.1 Leveraging Pattern Structures Properties
4.2 Use Cases
5 Case Study: Reusable Templates for Code Sophistication
5.1 Dataset
5.2 Implementation
5.3 Analysis by Exploration
6 Related Work
7 Conclusion and Future Work
References
DepMiner: Automatic Recommendation of Transformation Rules for Method Deprecation
1 Introduction
2 Deprewriter: Transforming Deprecations in Pharo
3 Why Do We Need to Support Library Developers?
4 DepMiner: Recommending Transforming Deprecations by Mining the Commit History
5 Evaluation
5.1 Evaluation Setup
5.2 Evaluation by Project Developers
6 Limitations of Our Approach
7 Related Work
8 Conclusion
References
Learning and Reuse
Scratching the Surface of ./configure: Learning the Effects of Compile-Time Options on Binary Size and Gadgets
1 Introduction
2 Background and Motivation
3 Research Questions
4 Experimental Protocol
4.1 Subject Systems
4.2 Baseline Configuration
4.3 The Conducted Experiment
5 Results
5.1 The Effect of Compile-Time Options on Binary Size ([RQ1]RQ1)
5.2 The Effect of Compile-Time Options on Attack Surface ([RQ2]RQ2)
5.3 Influential Compile-Time Options ([RQ3]RQ3)
6 Discussion
7 Threats to Validity
8 Related Work
9 Conclusion
References
Nemo: A Tool to Transform Feature Models with Numerical Features and Arithmetic Constraints
1 Introduction
2 Background
2.1 Propositional Formulas of Feature Models
2.2 Bit-Blasting
3 Bit-Blasting Basic Arithmetic Operations
4 Nemo
4.1 Prototype Overview
4.2 Numerical Feature Modeling in Nemo
4.3 Implementation of Smart Transformations
4.4 Nemo Optimizations by Pre-processing the NFM
5 Evaluation
6 Nemo Tool Scalability and Threats to Validity
7 Related Work
8 Conclusions and Future Work
References
Evolution and Reuse
Evolution Support for Custom Variability Artifacts Using Feature Models: A Study in the Cyber-Physical Production Systems Domain
1 Introduction
2 CPPS Case Studies
3 Method
4 Evolution Analysis Results
5 Conclusion
References
Prevalence and Evolution of License Violations in npm and RubyGems Dependency Networks
1 Introduction
2 Background and Related Work
2.1 Software Licenses
2.2 License Compliance
2.3 Studies on License Compliance in Dependency Networks
3 Research Method
4 Results
5 Discussion
6 Threats to Validity
7 Conclusion
References
Quality, Longevity and Reuse
Differential Testing of Simulation-Based Virtual Machine Generators
1 Introduction
2 Problem: Testing Simulation-Based VM Generators Frameworks
2.1 Example Context: The Slang VM Generator
2.2 Pharo VM Semantic Gaps by Example
2.3 Limits of Simulation-Based Testing
2.4 Problem Statement
3 Test Transmutation
3.1 Differential Testing of Test Cases
3.2 Test Case Variations with Non-Semantic-Preserving Mutations
4 Experimental Context of the Validation and Threats to Validity
5 Bug Detection Assessment
5.1 Memory Management Differences
5.2 Type Annotation Errors
5.3 Literal Type Errors
5.4 Name Conflicts and Name Mangling
5.5 Undefined Behavior
5.6 External Functions and Name-mangling
6 Empirical Results on the Pharo VM
6.1 Test Case Characterization
6.2 Prototype Results
6.3 Result Analysis
7 Related Work
8 Conclusion
References
SEED: Semantic Graph Based Deep Detection for Type-4 Clone
1 Introduction
2 Related Work
3 Proposed Method
3.1 Overview
3.2 Semantic Feature Extraction
3.3 Semantic Graph Construction
3.4 Code Clone Detection
4 Experiment
4.1 Experiment Setup
4.2 Answer to RQ1: Overall Performance
4.3 Answer to RQ2: Larger-scale Experiment
4.4 Answer to RQ3: Ablation Study
5 Threats to Validity
6 Conclusion
References
Barriers to Device Longevity and Reuse: An Analysis of Application Download, Installation and Functionality on a Vintage Device
1 Introduction
2 Background
3 Methods
3.1 App Selection Criteria and Collection
4 Results
4.1 Functional Supported Apps and Unsupported Apps
5 Conclusion
Appendix
References
Author Index