Empirical Software Engineering at Microsoft Research

Total Page:16

File Type:pdf, Size:1020Kb

Empirical Software Engineering at Microsoft Research Empirical Software Engineering at Microsoft Research http://research.microsoft.com/en-us/projects/esm/ Christian Bird Brendan Murphy Nachiappan Nagappan Thomas Zimmermann [email protected] [email protected] [email protected] [email protected] Microsoft Research, Redmond, USA and Cambridge, UK (Authors are in alphabetical order.) ABSTRACT At a high level the goals of the ESE follows two guiding We describe the activities of the Empirical Software Engi- principles, neering (ESE) group at Microsoft Research. We highlight our research themes and activities using examples from our Empower software development teams research on socio technical congruence, bug reporting and To gain insight from product process, people triaging, and data-driven software engineering to illustrate and customers our relationship to the CSCW community. We highlight our by employing a qualitative and quantitative approach to the unique ability to leverage industrial data and developers and software development process. the ability to make near term impact on Microsoft via the results of our studies. We also present the collaborations In this paper we discuss three broad themes of the ESE our group has with academic researchers. group, Author Keywords Socio technical congruence; Software engineering, Socio technical congruence, bug Bug reporting and triaging; and tracking and triaging, data-driven software engineering Data-driven software engineering. ACM Classification Keywords In each of these sections our studies leverage techniques D.2.5 [Software Engineering]: Testing and Debugging; and methods from both the Software Engineering and D.2.7 [Software Engineering]: Distribution, Maintenance, CSCW communities to adapt case studies in practice from and Enhancement the empirical domain with the CSCW aspects as all soft- ACM General Terms ware systems which are built by teams inherently have a Human Factors, Management, Measurement significant collaborative aspect. We also present our collab- orations and discuss the uniqueness of our fit in the middle INTRODUCTION of these two communities. The Empirical Software Engineering (ESE) group at Mi- crosoft Research focuses on working in the intersection of SOCIO TECHNICAL CONGRUENCE the Software Engineering and CSCW communities. “Design and programming are human activities; forget that and all is lost” “Over the last decade, it has become clear that empirical studies – Bjarne Stroustrop are a fundamental component of software engineering research and practice: Software development practices and technologies As software projects grow in size and complexity, so do the must be investigated by empirical means in order to be under- teams of engineers that develop and maintain them. stood, evaluated, and deployed in proper contexts. This stems Brooks, in his seminal work, “The Mythical Man Month” from the observation that higher software quality and productivi- ty have more chances to be achieved if well-understood, tested [1] discussed coordination as one of the key problems of practices and technologies are introduced in software develop- running a software project with many developers. The co- ment. Empirical studies usually involve the collection and analy- ordination effort required to help each member of a team sis of data and experience that can be used to characterize, evalu- stay in sync and keep a project on schedule is enormous. ate and reveal relationships between software development de- liverables, practices, and technologies.” Socio Technical Congruence is a term that has emerged (Empirical Software Engineering journal, recently in the software engineering literature to describe http://www.springer.com/computer/swe/journal/10664) the relationship between the “social” side of development, meaning the developers, their relationships to each other, how they communicate, work together on software, etc. and Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are the “technical” side which encapsulates features of the not made or distributed for profit or commercial advantage and that copies software itself such as dependencies between components, bear this notice and the full citation on the first page. To copy otherwise, component complexity, and software quality. The idea or republish, to post on servers or to redistribute to lists, requires prior behind the term has its origins in Conway’s Law, originally specific permission and/or a fee. CSCW 2011, March 19–23, 2011, Hangzhou, China. presented in Conway’s paper “How Do Committees Invent” Copyright 2011 ACM 978-1-4503-0556-3/11/3...$10.00.. [2]. This is of importance to the CSCW community because Figure 1. A developer-module network characterizes the con- tributions of developers within a system. of the emphasis placed on understanding how, and under Figure 2. A socio-technical network between modules (circles) what circumstances, developers should work together on and developers (boxes). projects. Advanced centrality measures can improve the In an effort to aid the development effort at Microsoft and prediction of number of post-release failures. understand the effect of human factors, we have gathered data and investigated the relationship of software quality In summary, we found that a strong relationship exists be- with developer attributes such as collaboration behavior, tween the developers’ commit behavior and the software geographic location, position within the organization, and quality of modules within the system. work assignment. Below, we describe some of our key Adding Technical Relationships results. In later work, Christian and Nachi built upon this result by Contribution Behavior and Quality adding module dependencies to the developer-module net- Is a study of collaboration behavior, Nachi, in joint work work [4]. In previous work, Tom and Nachi found that with Martin Pinzger, developed a developer-module net- dependencies can predict failures in both modules [5] and work, which characterized the contributions of developers subsystems [6]. A network that incorporates both develop- to modules within a system [3]. Figure 1 shows an example er contributions and dependencies is a socio-technical net- developer-module network. Gray circles represent devel- work because edges may represent contributions from peo- opers and boxes represent modules within a system. Edges ple to modules or dependencies between modules within a connect developers to the modules that they have contribut- system. Figure 2 depicts a portion of a socio-technical net- ed to, with edge weights representing the number of source work. Circles represent modules and boxes are developers. code repository commits. Note that the developer-module Solid directed edges are dependencies, indicating that one network for Windows Vista is quite large, with thousands module may use functions or types defined in another, may of developers and thousands of binaries – executables make RPC calls to another, etc. Dashed lines indicate that a (.exe), shared libraries (.dll) and drivers (.sys). developer contributed to a module (we used weights in our analysis, but do not depict them in the figure). We found that topological properties of this network were highly related to post-release faults. For instance, modules By combining both types of relationships into one graph, that were more central, as defined by traditional social net- we were able to increase the power of fault predicting re- work analysis centrality measures, tended to have more gression models. Using principal component analysis, we faults than other modules. We also found that less complex found that models based on this network had higher recall measures, such as the number of distinct authors and num- than networks with only contribution edges (developer- ber of distinct commits were both significant predictors for module networks) or only dependency edges to a statistical- the probability of post-release failures. By using a host of ly significant degree in Vista (recall was similar to previous social network measures (we refer the reader to the original models). paper for details and descriptions) in conjunction with prin- To see if such models are specific to Microsoft or if they cipal component analysis, we were able to train a logistic are more generally applicable, we also applied the same regression module for predicting failure-prone modules that techniques to 6 major releases of the Eclipse Java IDE (2.0 achieved an average precision of 83% and recall of 89%. through 3.3) and achieved precision and recall rates of fail- We summarize our important results: ure-prone plug-ins ranging from 75% to 86%. Further, we Network centrality measures can predict failure- were able to train a regression model on one release of prone binaries in Windows Vista. Eclipse and achieve recall and precision values ranging Network centrality measures can predict the num- from 75% to 93% on the next release, showing that cross ber of post-release failures. release prediction works well for network based regression models. The key contributions of this work were: these metrics. Our results indicate that all eight measures are important because a step-wise regression retained every We found that using technical and contribution re- measure. We also created a predictor based on principal lationships together have more power than either component analysis (due to high correlation between some in isolation for predicting bugs.
Recommended publications
  • Online Visualization of Geospatial Stream Data Using the Worldwide Telescope
    Online Visualization of Geospatial Stream Data using the WorldWide Telescope Mohamed Ali#, Badrish Chandramouli*, Jonathan Fay*, Curtis Wong*, Steven Drucker*, Balan Sethu Raman# #Microsoft SQL Server, One Microsoft Way, Redmond WA 98052 {mali, sethur}@microsoft.com *Microsoft Research, One Microsoft Way, Redmond WA 98052 {badrishc, jfay, curtis.wong, sdrucker}@microsoft.com ABSTRACT execution query pipeline. StreamInsight has been used in the past This demo presents the ongoing effort to meld the stream query to process geospatial data, e.g., in traffic monitoring [4, 5]. processing capabilities of Microsoft StreamInsight with the On the other hand, the WorldWide Telescope (WWT) [9] enables visualization capabilities of the WorldWide Telescope. This effort a computer to function as a virtual telescope, bringing together provides visualization opportunities to manage, analyze, and imagery from the various ground and space-based telescopes in process real-time information that is of spatio-temporal nature. the world. WWT enables a wide range of user experiences, from The demo scenario is based on detecting, tracking and predicting narrated guided tours from astronomers and educators featuring interesting patterns over historical logs and real-time feeds of interesting places in the sky, to the ability to explore the features earthquake data. of planets. One interesting feature of WWT is its use as a 3-D model of earth, enabling its use as an earth viewer. 1. INTRODUCTION Real-time stream data acquisition has been widely used in This demo presents the ongoing work at Microsoft Research and numerous applications such as network monitoring, Microsoft SQL Server groups to meld the value of stream query telecommunications data management, security, manufacturing, processing of StreamInsight with the unique visualization and sensor networks.
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • WWW 2013 22Nd International World Wide Web Conference
    WWW 2013 22nd International World Wide Web Conference General Chairs: Daniel Schwabe (PUC-Rio – Brazil) Virgílio Almeida (UFMG – Brazil) Hartmut Glaser (CGI.br – Brazil) Research Track: Ricardo Baeza-Yates (Yahoo! Labs – Spain & Chile) Sue Moon (KAIST – South Korea) Practice and Experience Track: Alejandro Jaimes (Yahoo! Labs – Spain) Haixun Wang (MSR – China) Developers Track: Denny Vrandečić (Wikimedia – Germany) Marcus Fontoura (Google – USA) Demos Track: Bernadette F. Lóscio (UFPE – Brazil) Irwin King (CUHK – Hong Kong) W3C Track: Marie-Claire Forgue (W3C Training, USA) Workshops Track: Alberto Laender (UFMG – Brazil) Les Carr (U. of Southampton – UK) Posters Track: Erik Wilde (EMC – USA) Fernanda Lima (UNB – Brazil) Tutorials Track: Bebo White (SLAC – USA) Maria Luiza M. Campos (UFRJ – Brazil) Industry Track: Marden S. Neubert (UOL – Brazil) Proceedings and Metadata Chair: Altigran Soares da Silva (UFAM - Brazil) Local Arrangements Committee: Chair – Hartmut Glaser Executive Secretary – Vagner Diniz PCO Liaison – Adriana Góes, Caroline D’Avo, and Renato Costa Conference Organization Assistant – Selma Morais International Relations – Caroline Burle Technology Liaison – Reinaldo Ferraz UX Designer / Web Developer – Yasodara Córdova, Ariadne Mello Internet infrastructure - Marcelo Gardini, Felipe Agnelli Barbosa Administration– Ana Paula Conte, Maria de Lourdes Carvalho, Beatriz Iossi, Carla Christiny de Mello Legal Issues – Kelli Angelini Press Relations and Social Network – Everton T. Rodrigues, S2Publicom and EntreNós PCO – SKL Eventos
    [Show full text]
  • Denying Extremists a Powerful Tool Hany Farid ’88 Has Developed a Means to Root out Terrorist Propaganda Online
    ALUMNI GAZETTE Denying Extremists a Powerful Tool Hany Farid ’88 has developed a means to root out terrorist propaganda online. But will companies like Google and Facebook use it? By David Silverberg be a “no-brainer” for social media outlets. Farid is not alone in his criticism of so- But so far, the project has faced resistance cial media companies. Last August, a pan- Hany Farid ’88 wants to clean up the In- from the leaders of Facebook, Twitter, and el in the British Parliament issued a report ternet. The chair of Dartmouth’s comput- other outlets who argue that identifying ex- charging that Facebook, Twitter, and er science department, he’s a leader in the tremist content is more difficult, presenting Google are not doing enough to prevent field of digital forensics. In the past several more gray areas, than child pornography. their networks from becoming recruitment years, he has played a lead role in creating In a February 2016 blog post, Twitter laid tools for extremist groups. programs to identify and root out two of out its official position: “As many experts Steve Burgess, president of the digital fo- the worst online scourges: child pornogra- and other companies have noted, there is rensics firm Burgess Consulting and Foren- phy and extremist political content. no ‘magic algorithm’ for identifying terror- sics, admires Farid’s dedication to projects “Digital forensics is an exciting field, es- ist content on the Internet, so global online that, according to Burgess, aren’t common pecially since you can have an impact on platforms are forced to make challenging in the field.
    [Show full text]
  • Microsoft .NET Gadgeteer a New Way to Create Electronic Devices
    Microsoft .NET Gadgeteer A new way to create electronic devices Nicolas Villar Microsoft Research Cambridge, UK What is .NET Gadgeteer? • .NET Gadgeteer is a new toolkit for quickly constructing, programming and shaping new small computing devices (gadgets) • Takes you from concept to working device quickly and easily Driving principle behind .NET Gadgeteer • Low threshold • Simple gadgets should be very simple to build • High ceiling • It should also be possible to build sophisticated and complex devices The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer The three key components of .NET Gadgeteer Some background • We originally built Gadgeteer as a tool for ourselves (in Microsoft Research) to make it easier to prototype new kinds of devices • We believe the ability to prototype effectively is key to successful innovation Some background • Gadgeteer has proven to be of interest to other researchers – but also hobbyists and educators • With the help of colleagues from all across Microsoft, we are working on getting Gadgeteer out of the lab and into the hands of others Some background • Nicolas Villar, James Scott, Steve Hodges Microsoft Research Cambridge • Kerry Hammil Microsoft Research Redmond • Colin Miller Developer Division, Microsoft Corporation • Scarlet Schwiderski-Grosche‎, Stewart Tansley‎ Microsoft Research Connections • The Garage @ Microsoft First key component of .NET Gadgeteer Quick example: Building a digital camera Some existing hardware modules Mainboard: Core processing unit Mainboard
    [Show full text]
  • A Large-Scale Study of Web Password Habits
    WWW 2007 / Track: Security, Privacy, Reliability, and Ethics Session: Passwords and Phishing A Large-Scale Study of Web Password Habits Dinei Florencioˆ and Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA [email protected], [email protected] ABSTRACT to gain the secret. However, challenge response systems are We report the results of a large scale study of password use generally regarded as being more time consuming than pass- and password re-use habits. The study involved half a mil- word entry and do not seem widely deployed. One time lion users over a three month period. A client component passwords have also not seen broad acceptance. The dif- on users' machines recorded a variety of password strength, ¯culty for users of remembering many passwords is obvi- usage and frequency metrics. This allows us to measure ous. Various Password Management systems o®er to assist or estimate such quantities as the average number of pass- users by having a single sign-on using a master password words and average number of accounts each user has, how [7, 13]. Again, the use of these systems does not appear many passwords she types per day, how often passwords are widespread. For a majority of users, it appears that their shared among sites, and how often they are forgotten. We growing herd of password accounts is maintained using a get extremely detailed data on password strength, the types small collection of passwords. For a user with, e.g. 30 pass- and lengths of passwords chosen, and how they vary by site.
    [Show full text]
  • The World-Wide Telescope1 MSR-TR-2001-77
    The World-Wide Telescope1 Alexander Szalay, The Johns Hopkins University Jim Gray, Microsoft August 2001 Technical Report MSR-TR-2001-77 Microsoft Research Microsoft Corporation 301 Howard Street, #830 San Francisco, CA, 94105 1 This article appears in Science V. 293 pp. 2037-2040 14 Sept 2001. Copyright © 2001 by The American Association for the Advancement of Science. Science V. 293 pp. 2037-2040 14 Sept 2001. Copyright © 2001 by The American Association for the Advancement of Science 1 The World-Wide Telescope Alexander Szalay, The Johns Hopkins University Jim Gray, Microsoft August 2001 Abstract All astronomy data and literature will soon be tral band over the whole sky is a few terabytes. It is not online and accessible via the Internet. The community is even possible for each astronomer to have a private copy building the Virtual Observatory, an organization of this of all their data. Many of these new instruments are worldwide data into a coherent whole that can be ac- being used for systematic surveys of our galaxy and of cessed by anyone, in any form, from anywhere. The re- the distant universe. Together they will give us an un- sulting system will dramatically improve our ability to do precedented catalog to study the evolving universe— multi-spectral and temporal studies that integrate data provided that the data can be systematically studied in an from multiple instruments. The virtual observatory data integrated fashion. also provides a wonderful base for teaching astronomy, Already online archives contain raw and derived astro- scientific discovery, and computational science. nomical observations of billions of objects – both temp o- Many fields are now coping with a rapidly mounting ral and multi-spectral surveys.
    [Show full text]
  • Web Search As Decision Support for Cancer
    Diagnoses, Decisions, and Outcomes: Web Search as Decision Support for Cancer ∗ Michael J. Paul Ryen W. White Eric Horvitz Johns Hopkins University Microsoft Research Microsoft Research 3400 N. Charles Street One Microsoft Way One Microsoft Way Baltimore, MD 21218 Redmond, WA 98052 Redmond, WA 98052 [email protected] [email protected] [email protected] ABSTRACT the decisions of searchers who show salient signs of having People diagnosed with a serious illness often turn to the Web been recently diagnosed with prostate cancer. We aim to for their rising information needs, especially when decisions characterize and enhance the ability of Web search engines are required. We analyze the search and browsing behavior to provide decision support for different phases of the illness. of searchers who show a surge of interest in prostate cancer. We focus on prostate cancer for several reasons. Prostate Prostate cancer is the most common serious cancer in men cancer is typically slow-growing, leaving patients and physi- and is a leading cause of cancer-related death. Diagnoses cians with time to reflect on the best course of action. There of prostate cancer typically involve reflection and decision is no medical consensus about the best treatment option, as making about treatment based on assessments of preferences the primary options all have similar mortality rates, each and outcomes. We annotated timelines of treatment-related with their own tradeoffs and side effects [24]. The choice queries from nearly 300 searchers with tags indicating differ- of treatments for prostate cancer is therefore particularly ent phases of treatment, including decision making, prepa- sensitive to consideration of patients' preferences about out- ration, and recovery.
    [Show full text]
  • Microsoft Research Lee Dirks Dr
    Transforming Scholarly Communication Overview of Recent Projects from Microsoft Research Lee Dirks Dr. Camilo A. Acosta-Márquez Director, Education & Scholarly Communication Director Centro de Robótica e Informática Microsoft Research | Connections Universidad Jorge Tadeo Lozano Overview of Recent Projects from Microsoft Research Director, Education Director Centro de Robótica e Informática & Scholarly Communication Universidad Jorge Tadeo Lozano Microsoft Research | Connections | Outreach. Collaboration. Innovation. • • • • http://research.microsoft.com/collaboration/ The Scholarly Excel 2010 Windows Server HPC Collaboration Communication Windows Workflow Foundation SharePoint Lifecycle LiveMeeting Data Office 365 Collection, Research & Analysis Office OpenXML Office 2010: XPS Format Storage, •Word SQL Server & Archiving & Authoring •PowerPoint Entity Framework Preservation •Excel Rights Management •OneNote Data Protection Manager Tablet PC/UMPC Publication & Dissemination Discoverability FAST SharePoint 2010 Word 2010 + PowerPoint 2010 WPF & Silverlight “Sea Dragon” / “PhotoSynth” / “Deep Zoom” Data Curation Add-in for Microsoft Excel • California Digital Library’s Curation Center • • DataONE • • Support for versioning • Standardized date/time stamps • A “workbook builder” • Ability to export metadata in a standard format • Ability to select from a globally shared vocabulary of terms for data descriptions • Ability to import term descriptions from the shared vocabulary and annotate them locally • “Speed bumps” to discourage use of macros
    [Show full text]
  • User's Guide To
    User’s Guide to Garritan Jazz & Big Band—Version 3 1 User’s Guide to GARRITAN JAZZ & BIG BAND Version 3 Including the ARIATM Player This guide written by: Gary Garritan, Chuck Israels, Gary Lindsay and Tom Hopkins Produced by: Gary Garritan & Tom Hopkins Director of Programming: Tom Hopkins ARIA Engine Development: Plogue Art et Technologie Inc. Additional Programming: Eric Patenaude, Jeff Hurchalla Document Editing: The Extraordinary Team of Beta Testers MIDI Programming: Markleford Friedman Art Direction: James Mireau Project Management: Max Deland Software Development: Jeff Hurchalla Manual Layout: Adina Cucicov Sound Editing: Jeannot Welter Garritan Jazz & Big Band™ is a trademark of Garritan Corp. Use of the Garritan Jazz & Big Band library and the contents herein are subject to the terms and conditions of the license agreement distributed with the library. You should carefully read the license agreement before using this product. The sounds presented in Garritan Jazz & Big Band are protected by copyright and cannot be distributed, whether modified or unmodified. The Guide to Gar- ritan Jazz & Big Band and instrument lists contained herein are also covered by copyright. ARIA™ is a trademark of Garritan and Plogue Art et Technologie Inc., Finale is a trademark of MakeMusic, Steinway™ is a trademark of Steinway & Sons and any other trademarks of third-party programs are trademarks of their respective owners. No part of this publication may be copied, reproduced or otherwise transmitted or recorded, for any purpose, without prior written permission by Garritan Corporation. The information contained herein may change without notice and does not represent a commitment on the part of Garritan Corporation.
    [Show full text]
  • Musical Humility
    © Copyright 2018 William J. Coppola Musical Humility: An Ethnographic Case Study of a Competitive High School Jazz Band William J. Coppola A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2018 Reading Committee: Patricia Shehan Campbell, Chair Steven J. Morrison James A. Banks Shannon Dudley Program authorized to offer degree: Music University of Washington Abstract Musical Humility: An Ethnographic Case Study of a Competitive High School Jazz Band William J. Coppola Chair of the Supervisory Committee: Patricia Shehan Campbell School of Music In any form, musical participation is an intimately social activity. Yet, as musicians unflinchingly commit their fullest selves to shared musical collaborations, the natural human penchant for self-interest inevitably comes along for the journey, threatening to compromise collectivistic desires with more egocentric comportments. Undeniably, the ego plays an inextricable—and at times antagonistic—role in the negotiation of musicians’ performed identities. But as pervasive as the ego may be throughout various spheres of musical practice, it has yet to become a topic of empirical music research. In response to this gap in the literature, the purpose of the current study was to contribute an initial understanding of humility’s role in musical participation. This research utilized an ethnographic case study (including non-participant observation and interviews as the primary means of data collection) over the course of six months to examine the presence of prosocial and antisocial behaviors among the students and director of a competitive high school jazz band in the Pacific Northwest. First, three broad themes of musical egoism were identified: (a) seeking and desiring superiority, (b) displays of self-importance, self-promotion, and self-orientation, and (c) an inflated self- view.
    [Show full text]
  • Groove: Shared Time and Its Meanings
    Feeling the groove: shared time and its meanings for three jazz trios Abstract The notion of groove is fundamental to jazz culture and the term yields a rich set of understandings for jazz musicians. Within the literature, no single perspective on groove exists and many questions remain about the relationship between timing processes, phenomenal experience and musical structures in making sense of groove. In this account, the experience and meaning of groove is theorised as emerging from two forms of sharedness. Firstly, a primary intersubjectivity that arises through the timing behaviours of the players; this could be likened to the ‘mutual tuning-in’ described in social phenomenology. It is proposed that this tuning-in is accomplished through the mechanism of entrainment. The second form of sharedness is understood as the shared temporal models, the cultural knowledge, that musicians make use of in their playing together. Methodologically, this study makes use of detailed investigation of timing data from live performances by three jazz trios, framed by in-depth, semi-structured interview material and steers a new course between existing ethnographic work on jazz and more psychologically informed studies of timing. The findings of the study point towards significant social and structural effects on the groove between players. The impact of musical role on groove and timing is demonstrated and significant temporal models, whose syntactic relations suggest musical proximity or distance, are shown to have a corresponding effect on timing within the trios. The musician’s experience of groove is discussed as it relates to the objective timing data and reveals a complex set of understandings involving temporality, consciousness and communication.
    [Show full text]