SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Evaluating Key Statements Analysis David Binkley - Loyola College, USA Nicolas Gold, Mark Harman,

Slides:



Advertisements
Similar presentations
Etter/Ingber Engineering Problem Solving with C Fundamental Concepts Chapter 4 Modular Programming with Functions.
Advertisements

The Primary Geography Quality Mark
Fault Analysis in OSS Based on Program Slicing Metrics Steve Counsell, Kings College and Brunel University Tracy Hall, Brunel University Sue Black, University.
Aidan Tuohy Sr. Project Engineer NWPCC Flexibility Metric Roundtable April 2013 Metrics and Methods to Assess Power System Flexibility.
Developing Business Practice –302LON Critical thinking, reading and taking notes Unit: 4 Knowledgecast: 2.
Program Slice Program slice was a concept first discussed by Mark Weiser in the early 1980’s –He especially noticed that when people debug, they trace.
Computer Science Automated Test Data Generation for Aspect-Oriented Programs Mark Harman (King’s College London, UK) Fayezin Islam (T-Zero Processing Services,
Introduction to Program Slicing Presenter: M. Amin Alipour Software Design Laboratory
Amorphous Program Slicing through Partial Evaluation David Binkley & Kyle Sluder Loyola College in Maryland 4501 N. Charles St. Baltimore, MD
Tracy Hall, Brunel University David Bowes, University of Hertfordshire Andrew Kerr, University of Hertfordshire.
Apprenticeships in London Presented by Brontë Turner Negat Lodhi National Apprenticeship Service Business Development Team London & South East Division.
Centre for Research in Evolution, Search & Testing Welcome to CREST King’s College London Mark Harman Centre for Research in Evolution, Search & Testing.
Environment Restriction Slicing of EFSMs Kelly Androutsopoulos CREST (Center for Research in Evolution, Search and Testing) University College of London.
How are people using altmetrics now? The Snowball Metrics perspective 1 Dr Lisa Colledge Director of Research Metrics, Elsevier and Snowball Metrics Program.
Software Fault Prediction using Language Processing Dave Binkley Henry Field Dawn Lawrie Maurizio Pighin Loyola College in Maryland Universita’ degli Studi.
SPSS to DDI 3.0 Prepared for IASSIST 2006 Workshop – Hand’s-on DDI 3.0 – Concept, Structure, and Tools 23 May 2006 Wendy Thomas – University of Minnesota.
Evaluating Peterborough’s ‘no cold calling’ initiative using space-time Bayesian hierarchical modelling Guangquan Li *, Robert Haining +, Sylvia Richardson.
SOSoRNet History Pennine Group Pennine Forum Series Pennine Forum Series Identified need for convergence and sharing of problems, ideas, and solutions.
Software Metrics II Speaker: Jerry Gao Ph.D. San Jose State University URL: Sept., 2001.
Seminar I Problem Formulation Poul Thøis Madsen & Corrie Lynn S. McDougall.
Integrating Community & Scientific Sustainability Indicators to Facilitate Participatory Desertification Monitoring and Management in Botswana School of.
Integrating Community and Scientific Sustainability Indicators to Facilitate Participatory Desertification Monitoring and Sustainable Rangeland Management.
Unit 1 Assignment 4 P4.
Seventh IEEE International Working Conference on Source Code Analysis And Manipulation Closing remarks.
CRELLA DEVELOPING ASSESSMENT LITERACY Dr Lynda Taylor.
Margaret J. Cox King’s College London
CHAPTER 9 Capital Investment Decision Basics
Lesson 5 – Logical Framework Approach (LFA)
ECB Project Accountability Activities Overview Andrea Stewart ECB Communications Manager
System Optimization - I Multi-disciplinary Design Optimization
LIFETIME ENGINEERING of Buildings and Civil Infrastructures Thematic Network LIFETIME in figures: Working period: 1/6/ /5/2005 Participation: 96.
I NTERNATIONALISATION OF P EDAGOGY AND C URRICULUM IN H IGHER E DUCATION C ONFERENCE I NTERNATIONAL STUDENTS ’ PERCEPTIONS, PRACTICES AND IDENTITIES OF.
Investigation into evidence for economies of scale in the water and sewerage industry in England and Wales Presentation of Findings Water UK City Conference,
RESEARCH PROPOSAL Statement of problem Objectives of the study Scope of the study Review of Literature Methodology and theoretical back- ground Benefits.
Yue Jia, Mark Harman King’s College London CREST Constructing Subtle Faults Using Higher Order Mutation Testing Higher Order Mutation Testing.
Software Design Design is the process of applying various techniques and principles for the purpose of defining a device, a process,, or a system in sufficient.
AUSTIN: A TOOL FOR SEARCH BASED SOFTWARE TESTING And its Evaluation on Deployed Automotive Systems Kiran Lakhotia, Mark Harman and Hamilton Gross in.
1 Program Slicing Amir Saeidi PhD Student UTRECHT UNIVERSITY.
Research & Referencing support in HE and FE Peter Gledhill Learning and Information Services Sheffield Hallam University Rita Proctor Learning Resource.
CS4272 Hardware-Software Co-design Assignment 2 School of Computing National University of Singapore Guo Liang.
Presenting large scale forecast results in an intuitive way An industry case study. David Edison.
FYITS – Students Mktg Briefing Nov 2010 BSc (Hons) Engineering Management Nature of Course The course seeks to equip students with management knowledge.
Developing Business Practice –302LON Critical thinking, reading and taking notes Unit: 4 Knowledgecast: 1.
Chapter 2 Lesson 3 Subtracting Integers pgs What you will learn: Subtract Integers Evaluate expressions containing variables What you will learn:
Developing Business Practice –302BUS Writing Successfully for your Studies and in Business Unit: 3 Knowledgecast: 1.
Nationality and Identity Learning Objectives To define nationality To explain features of British identity To evaluate the importance of nationality.
Unit 2 University of Sunderland COMM80 Risk Assessment of Systems Change Overview and Introduction to Module COMM80 Risk Assessment of Systems Change osiris.sunderland.ac.uk/~cs0hed/comm80.html.
Lecture 12 Implementation Issues with Polymorphism.
Measuring Well-being October 2011 OSI Education Programme workshop Charles Seaford Head of the Centre for Well-being, new economics foundation.
Strategic Influencing What is it and how should we do it ? Sally Campalani.
The UN Practitioners Handbook for Peace Consolidation Benchmarking 1 Svein Erik Stave Fafo Institute for Applied International Studies Monitoring and Evaluation.
Information Processing Modules. 10 -level INF1030- Word Processing INF1050- Spreadsheets INF1060- Databases INF1070- Digital Presentation INF1910- Special.
How to Communicate Your Vision Module 4: Session 1.
Health and Wellbeing Impacts of Green and Blue Infrastructure: Critical Issues for Application of Cost Benefit Analysis for Policy Appraisal Dr Tim Taylor.
1 Week 7 Software Engineering Spring Term 2016 Marymount University School of Business Administration Professor Suydam.
Design Characteristics and Metrics
Autopsy of the Gunpowder Empires
Quality Seems to be the Hardest Word: How one UK Funder Uses Evaluation to Achieve Policy Change Dr Andrew Cooper Opener:
Matching: Matched Pairs Design
Monitoring and Assessment Assignment
More on Functions This lecture provides more ways of using functions
GOLD writing workshop: Reflecting on today as means of advancing your GOLD application Dr Danielle Tran.
Britain counters brain-drain worries
SPSS to DDI 3.0 Prepared for IASSIST 2006 Workshop –
Britain counters brain-drain worries
How good is our research? New approaches to research indicators
What’s the QUESTION? Do Now!
69EG6517 – Impacts & Models of Climate Change
Chapter 8: Design: Characteristics and Metrics
Presentation transcript:

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Evaluating Key Statements Analysis David Binkley - Loyola College, USA Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi CREST, King’s College London, UK

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Overview KSA Two metrics –Impact –Cohesion Research Questions Empirical study Results

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Key Statement Analysis (KSA) Identify key statements The statements that capture most impact with highest cohesion

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Why KSA Many analyses produce far too much e.g. slicing, chopping

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Framework Modules Functions Classes Concept bindings Principal Variables Key Statements

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Principal Variables (PV) Bieman and Ott’s Principal Variables PV G – a global variable assigned in F PV O – a variable used in an output statement in F PV G U PV O

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li void cylinder(int r, h) { D=2*r; perimeter=PI*D; undersurface=PI*r*r; sidesurface=perimeter*h; area=2*undersurface+sidesurface; volume=undersurface*h; printf(“\nThe Area is %d\n", ); printf(“\nThe Volume is %d\n", ); } r h area volume

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Metrics for KSA Impact: outward influence of the key statements Cohesion: inward connectedness of the key statements

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Cohesion

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Dependence Cluster

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li The worst case for KSA If all statements in a module are in a dependence cluster…

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Research Questions Size Impact Cohesion Large dependence cluster

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Analysis Subjects

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Tools CodeSurfer SPSS

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Impact

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Cohesion

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li Results Size –25% of the function size Impact –70% of impact of the function. Cohesion –More than 80% of cohesion Large Dependence Cluster –a clear and largely negative impact

SCAM’08 -- Evaluating Key Statements AnalysisZheng Li less is more