Sunday, December 8, 2013

Asod

Tracking Code Patterns over Multiple Softw atomic number 18 Versions with Herodotos Nicolas Palix DIKU University of Copenhagen Denmark Julia Lawall DIKU, University of Copenhagen INRIA-Regal Denmark/France Gilles Muller INRIA-Regal LIP6 France npalix@diku.dk julia@diku.dk Gilles.Muller@inria.fr ABSTRACT An primal element of understand a package code menage is to rank the repetitious designs of code it contains and how these evolve over time. round manikins are single-valued function upful to the software, and may be modularized. Others are baneful to the software, much(prenominal) as patterns that represent defects. In this case, it is useful to strike the occurrences of such patterns, to identify properties such as when and wherefore they are introduced, how long they persist, and the reasons why they are corrected. To enable studying pattern occurrences over time, we constitute a tool, Herodotos, that semi-automatically tracks pattern occur rences over manifold versions of a software project, independent of other changes in the come ?les. Guided by a user-provided con?guration ?le, Herodotos builds various graphs show the evolution of the pattern occurrences and computes some statistics. We have evaluated this approach on the history of a representative range of open consultation projects over the proceed three years.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
For each project, we track several(prenominal) kinds of defects that have been found by pattern matching. This tracking is through with(p) automatically in 99% of the occurrences. The results allow us to canvass the evolution of the selected projects and defect kinds over time! . 1. INTRODUCTION Patterns have been found to be useful in ?nding various types of defects or bad smells in software blood line code. Tools such as Coverity [9, 12], Flaw?nder [35], and Coccinelle [22] use pattern-based techniques to ?nd defects such as dereferences of NULL pointers, checks whether an unsigned measure is less than zero, and remembrance leaks. These tools have been applied to widely utilize infrastructure software...If you necessitate to get a full essay, stage it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.