Automatic Generation and Assessment of Source Code Method Summaries

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Generation and Assessment of Source Code Method Summaries AUTOMATIC GENERATION AND ASSESSMENT OF SOURCE CODE METHOD SUMMARIES A dissertation submitted to Kent State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy by Nahla Abid April 2017 Dissertation written by Nahla Abid B.Sc., king abdulaziz university, Jeddah, Saudi Arabia, 2008 M.S., Bowling Green State University, USA, 2012 Ph.D., Kent State University, USA, 2017 Approved by _______________________________________ Dr. Jonathan Maletic, Doctoral Advisor, Department of Computer Science _______________________________________ Dr. Mikhail Nesterenko, Department of Computer Science _______________________________________ Dr. Gwenn L. Volkert, Department of Computer Science _______________________________________ Dr. Bonita Sharif, Department of Computer Science and Information Systems, Youngstown State University _______________________________________ Dr. Jocelyn R. Folk, Department of Psychological Sciences _______________________________________ Dr. Christopher Was, Department of Psychological Sciences Accepted by ______________________________________ Dr. Javed I. Khan, Professor, Chair, Department of Computer Science ______________________________________ Dr. James L. Blank, Professor, Dean, College of Arts and Sciences ii TABLE OF CONTENTS TABLE OF CONTENTS ............................................................................................... III LIST OF FIGURES ........................................................................................................ IX LIST OF TABLES .......................................................................................................... XI ACKNOWLEDGEMENTS ......................................................................................... XV CHAPTER 1 INTRODUCTION ..................................................................................... 1 1.1 Research Focus .......................................................................................................... 4 1.2 Research Goal ........................................................................................................... 5 1.3 Contributions ............................................................................................................. 5 1.4 Organization .............................................................................................................. 6 1.5 Publication Notes ...................................................................................................... 7 CHAPTER 2 BACKGROUND AND RELATED WORK ........................................... 8 2.1 Stereotype Description and Identification ................................................................. 8 2.2 Source-Code Summarization ................................................................................... 10 2.2.1 Natural-Language Processing (NLP) ............................................................ 11 2.2.2 Generating Summaries for Java Methods ..................................................... 12 2.2.3 Describing High-Level Action of Java Methods ........................................... 15 2.2.4 Describing the Formal Parameters of Java Methods ..................................... 18 2.2.5 Including Context of Methods Using Call Graph ......................................... 20 2.2.6 Determining Loop Actions ............................................................................ 22 2.2.7 Text Retrieval (TR) ....................................................................................... 25 2.2.7.1VSM and LSI .......................................................................................... 25 iii 2.2.7.2 Improving VSM Approach by Eye Tracking Study .............................. 28 2.2.8 Mining Human Descriptions ......................................................................... 30 2.2.9 Static Analysis and NLP ............................................................................... 31 2.3 Source-code Comprehension ................................................................................... 34 2.4 Eye Tracking in Software Engineering ................................................................... 38 2.4.1 Eye Tracking in Code Comprehension ................................................................... 38 2.4.2 Eye Tracking in Code Summarization .......................................................... 41 2.4.2.1 At Statement Level ................................................................................ 42 2.4.2.2 At Term Level ........................................................................................ 43 2.4.2.3 Reading Pattern ...................................................................................... 44 CHAPTER 3 METHOD DOCUMENTATION USING STREOTYPES .................. 46 3.1 The Approach .......................................................................................................... 46 3.2 Templates ................................................................................................................ 50 3.2.1 Short Description .......................................................................................... 50 3.2.2 Templates for Accessors ............................................................................... 51 3.2.3 Templates for Mutators ................................................................................. 55 3.2.4 Templates for Creational Methods. ............................................................... 58 3.2.5 External Objects ............................................................................................ 60 3.2.6 Data Members and Reference Parameters .................................................... 60 3.2.7 List of Calls and Stereotypes ......................................................................... 61 3.3 Conclusions ............................................................................................................. 62 CHAPTER 4 EVALUATION STUDY ......................................................................... 63 iv 4.1 Study Participants .................................................................................................... 64 4.2 Experimental Design and Procedure ....................................................................... 64 4.3 Data Collected ......................................................................................................... 66 4.4 Results and Discussion ............................................................................................ 67 4.4.1 Per System ..................................................................................................... 68 4.4.2 Accuracy ....................................................................................................... 69 4.4.3 Missing/Containing Important Information .................................................. 71 4.4.4 Including Unnecessary Information .............................................................. 74 4.5 Threats to Validity ................................................................................................... 75 4.6 Conclusions ............................................................................................................. 76 CHAPTER 5 IMPROVING AND EVALUATING THE IMPORTANCE OF THE FOUR DOCUMENTATION SECTIONS ........................................................ 77 5.1 Improving The Automated Approach ..................................................................... 77 5.2 Second Study ........................................................................................................... 78 5.2.1 Participants ...................................................................................................... 78 5.2.2 Experimental Design and Procedure ............................................................... 79 5.3 Results and Discussion ............................................................................................ 80 5.3.1 No short description. ....................................................................................... 82 5.3.2 No calls and stereotypes .................................................................................. 83 5.3.3 No data members read..................................................................................... 84 5.3.4 No list of objects ............................................................................................. 85 5.4 Threats to Validity ................................................................................................... 86 v 5.5 Conclusions ............................................................................................................. 86 CHAPTER 6 EYE TRACKING STUDY OF SUMMARIZING SOURCE CODE . 87 6.1 Study Participants .................................................................................................... 89 6.2 Study Systems and Method Selection ..................................................................... 89 6.3 Study Procedure and Instrumentation ..................................................................... 91 6.4 Eye Tracking Apparatus and Measures ................................................................... 92 6.5 Correctness .............................................................................................................. 93 6.6 Gaze Behavior Inside the Method ........................................................................... 93 6.6.1 Term locations Identification
Recommended publications
  • Sound Invariant Checking Using Type Modifiers and Object Capabilities
    Sound Invariant Checking Using Type Modifiers and Object Capabilities. Isaac Oscar Gariano Victoria University of Wellington [email protected] Marco Servetto Victoria University of Wellington [email protected] Alex Potanin Victoria University of Wellington [email protected] Abstract In this paper we use pre existing language support for type modifiers and object capabilities to enable a system for sound runtime verification of invariants. Our system guarantees that class invariants hold for all objects involved in execution. Invariants are specified simply as methods whose execution is statically guaranteed to be deterministic and not access any externally mutable state. We automatically call such invariant methods only when objects are created or the state they refer to may have been mutated. Our design restricts the range of expressible invariants but improves upon the usability and performance of our system compared to prior work. In addition, we soundly support mutation, dynamic dispatch, exceptions, and non determinism, while requiring only a modest amount of annotation. We present a case study showing that our system requires a lower annotation burden compared to Spec#, and performs orders of magnitude less runtime invariant checks compared to the widely used ‘visible state semantics’ protocols of D, Eiffel. We also formalise our approach and prove that such pre existing type modifier and object capability support is sufficient to ensure its soundness. 2012 ACM Subject Classification Theory of computation → Invariants, Theory of computation → Program verification, Software and its engineering → Object oriented languages Keywords and phrases type modifiers, object capabilities, runtime verification, class invariants Digital Object Identifier 10.4230/LIPIcs.CVIT.2016.23 1 Introduction Object oriented programming languages provide great flexibility through subtyping and arXiv:1902.10231v1 [cs.PL] 26 Feb 2019 dynamic dispatch: they allow code to be adapted and specialised to behave differently in different contexts.
    [Show full text]
  • Method Proxy-Based AOP in Scala
    Vol. 0, No. 0, Z Method Proxy-Based AOP in Scala Daniel Spiewak and Tian Zhao University of Wisconsin – Milwaukee, fdspiewak,[email protected] This paper describes a fully-functional Aspect-Oriented Programming framework in Scala – a statically typed programming language with object-oriented and func- tional features. This framework is implemented as internal domain-specific lan- guages with syntax that is both intuitive and expressive. The implementation also enforces some static type safety in aspect definitions. 1 INTRODUCTION Aspect-Oriented Programming (AOP) implementations such as AspectJ provide language extensions of pointcuts and advices to insert code of crosscutting concerns into the base program through bytecode transformation. In this paper, we describe a framework to implement an AOP extension to the Scala language [13] using higher-order functions as AOP proxies 1. This framework allows programmers to specify pointcuts and aspects using a Domain Specific Language (DSL) [5] embedded within Scala. Our technique uses Scala’s higher-order functions to intercept method calls with minimal syntactic overhead imposed on the base program. This framework allows developers to define pointcuts by specifying class types and method signatures. The framework also allows access to context variables, while aspects can insert advice code before or after the advised body. The rest of the paper is organized as follows: In Section2, we present the main idea using an example. Section3 explains the syntax of pointcuts and advices. Section4 ex- plains the implementation details. We discuss the benefits and tradeoffs of our framework in Section5. and related works are in Section6. 2 EXAMPLE AOP enables developers to write code that is modularized to a point beyond the capabil- ities of vanilla object-oriented design.
    [Show full text]
  • AP Computer Science Basic OOP — Implementing Classes
    AP Computer Science Basic OOP — Implementing Classes ORIENTATION Object-oriented programming (OOP) refers to the organization of data into classes, categories that represent a given type of “object.” An object can be a model of a real-life thing like a car, a six-sided die, or a person, or it can be a representation of something more abstract like a point in space, a menu item, or a digital clipboard. An object that belongs to a given class is called an instance of that class, and any instance of a class keeps track of its state using instance variables, or attributes. The object is created when its constructor is called, and can be interacted with by calling its methods, which may access data (accessor methods, or “getters”) or alter the object’s data (mutator methods, or “setters”). There are two important theoretical concepts in OOP: abstraction and encapsulation. Objects and the classes they belong to act as abstractions of the things they represent: a Java class called Person isn’t actually a person, of course, but a simplified representation of a person in terms of a limited number of qualities (name and age, perhaps). Other details such as hair color, nationality, and gender identity aren’t included in our abstraction of a person. Encapsulation refers to the way that a class and its methods hide away the details of a process. Someone using a QuadraticFormula class can call the hasSolutions() method to find out whether their equation has solutions without knowing what a discriminant is. The programmer and the class she has written have hidden that information away in a metaphorical “black box.” Basic OOP consists primarily of implementing classes: writing the JavaDocs, class header, constructors, attributes, and methods for an object as specified.
    [Show full text]
  • Learn Objective–C on The
    CYAN YELLOW SPOT MATTE MAGENTA BLACK PANTONE 123 C BOOKS FOR PROFESSIONALS BY PROFESSIONALS® Companion eBook Available Learn Objective-CLearn • Learn the native programming language for Mac OS X, Everything You Need to Know as well as the iPhone! to Become an Objective-C Guru • Get up and running quickly with Objective-C. We don’t waste time teaching you basic programming; instead, we focus on what makes Objective-C di!erent and cool. • Learn about sophisticated programming concepts, including object-oriented programming, the Open-Closed Principle, refactoring, key-value coding, and predicates. n this book, you’ll !nd a full exploration of the Objective-C programming Ilanguage, the primary language for creating Mac OS X and iPhone applica- tions. There are goodies here for everyone, whether you’re just starting out as a Mac developer or a grizzled programmer coming from another language. You’ll discover all of the object-oriented purity and Smalltalk heritage coolness of Objective-C—such as instantiation, protocols for multiple inheritance, dynamic typing, and message forwarding. Along the way, you’ll meet Xcode, the Mac development environment, and you’ll learn about Apple’s Cocoa toolkit. on the Nearly everyone wants to be able to develop for Mac OS X or the iPhone these days, and it’s no wonder. The Mac is a fun and powerful platform, and Objective-C is a wonderful language for writing code. You can have a great time programming the Mac in Objective-C. We do, and want you to join us! Mark Dalrymple is a longtime Mac and Unix programmer who has Mac code running all over the world.
    [Show full text]
  • An Empirical Study on Encapsulation and Refactoring in the Object-Oriented Paradigm
    Declaration of Authorship I certify that the work presented here is, to the best of my knowledge and belief, original and the result of my own investigations, except as acknowledged, and has not been submitted, either in part or whole, for a degree at this or any other University. Rajaa Najjar Date: 10 September 2008 An Empirical Study on Encapsulation and Refactoring in the Object-Oriented Paradigm by Rajaa Najjar A Thesis Submitted in Fulfilment of the Requirements for the Degree of Doctor of Philosophy in the University of London September, 2008 School of Computer Science and Information Systems Birkbeck, University of London 1 Abstract Encapsulation lies at the heart of the Object-Oriented (OO) paradigm by regulating access to classes through the private, protected and public declaration mechanisms. Refactoring is a relatively new software engineering technique that is used to improve the internal structure of software, without necessarily affecting its external behaviour, and embraces the OO paradigm, including encapsulation. In this Thesis, we empirically study encapsulation trends in five C++ and five Java systems from a refactoring perspective. These systems emanate from a variety of application domains and are used as a testbed for our investigations. Two types of refactoring related to encapsulation are investigated. The ‘Encapsulate Field’ refactoring which changes a declaration of an attribute from public to private, thus guarding the field from being accessed directly from outside, and the ‘Replace Multiple Constructors with Creation Methods’ refactoring; the latter is employed to remove code ‘bloat’ around constructors, improve encapsulation of constructors and improve class comprehension through the conversion of constructors to normal methods.
    [Show full text]
  • Pdf Merger Demo
    A-PDF MERGER DEMO Philadelphia University Faculty of Information Technology Lecturer: Dr. Nadia Y. Yousif Software Engineering Department Coordinator: Dr. Nadia Y. Yousif Examination Paper Internal Examiner: Dr. Murad Maouch ………………………………………………………………………………………………………… Object-Oriented Paradigms (721112) - Section: 3 First Exam Date: November 28, 2006 First Semester - 2006/2007 Time: 50 Minutes ………………………………………………………………………………………………………… Information for Candidates 1. This examination paper contains 3 questions totalling 15 marks 2. The marks for parts of questions are shown in square brackets: e.g. [2 marks]. Advice to Candidates 1. You should attempt ALL questions. You should write your answers clearly. ………………………………………………………………………………………………………… I. Basic Notions Objectives: The aim of the question in this part is to evaluate your required minimal knowledge and understanding skills in the fundamentals of object oriented programming. Question 1 (5 marks) This question contains 5 multiple choice questions with each question worth 1 mark. You should write the letter A, B, C, or D in your answer sheet to indicate your correct answer. 1) One of the following is NOT TRUE about Object-Oriented Paradigms (OOPs): A) OOP is a set of techniques and processes focusing on how to analyse and model a real world problem and to design a solution. B) The intended benefits of OOP are to solve the “software” crisis, break complexity into small manageable chunks, and make software maintenance easier. C) OOP allows reuse of components – plug and play D) OOP solves the entire problem in one program. 2) Which point is FALSE from the following? A) A class is an object B) A class is a template or prototype that defines the composition and the behavior of all objects of certain kinds.
    [Show full text]
  • Open Abrown Thesis May2012.Pdf
    The Pennsylvania State University The Graduate School Department of Computer Science and Engineering AN ENGINEERING APPROACH TO PERL AND RUBY OBJECT ORIENTED PROGRAMMING LANGUAGES A Thesis in Computer Science and Engineering by Angeline Brown © 2012 Angeline Brown Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science May 2012 ii The thesis of Angeline Brown was reviewed and approved* by the following: Mahmut Kandemir Professor of Computer Science and Engineering Thesis Advisor Yuan Xie Associate Professor of Computer Science and Engineering Raj Acharya Professor of Computer Science and Engineering Head of the Department of Computer Science and Engineering *Signatures are on file in the Graduate School iii ABSTRACT This study compares two object oriented programming languages, Perl and Ruby. Perl and Ruby are both extensively used scripting languages that are applied in a wide scope of modern software applications. Applications that use Perl are Amazon.com, TicketMaster.com, and Priceline.com. Applications that use Ruby are Twitter.com, YellowPages.com, and LivingSocial.com. The purpose of discussing these languages is two-fold. First, the available quantitative comparison of these languages is limited. This paper provides essential quantitative as well as qualitative analysis that can be used as a tool for future references. Secondly, this work was performed as a trade study for the implementation of a real world database application known as PennData SpecEd Application. PennData SpecEd is used to collect records of special education students from the Commonwealth of Pennsylvania student census. This comparative study focuses first on the performance and ease of programming software components using object oriented features of both Perl and Ruby.
    [Show full text]
  • Linkedlists.Mkr Page 838 Thursday, October 14, 1999 10:19 PM
    LinkedLists.mkr Page 838 Thursday, October 14, 1999 10:19 PM ¡ £ ¤ ¥ ¦ § ¨ © § ¢ list This section implements the STL list class discussed in Section 7.6. We will see lots of code, but most of the techniques were seen earlier in this chapter. // Incomplete class declarations for // the const_iterator, iterator, and list, // because all these classes refer to each other. template <class Object> class ConstListItr; template <class Object> class ListItr; template <class Object> class list; // The basic doubly-linked list node. // Everything is private, and is accessible // only by the iterators and list classes. template <class Object> class ListNode { Object data; ListNode *prev; ListNode *next; ListNode( const Object & d = Object( ), ListNode * p = NULL, ListNode * n = NULL ) : data( d ), prev( p ), next( n ) { } friend class ConstListItr<Object>; friend class ListItr<Object>; friend class list<Object>; }; ! " # $ % & ' ) * + + * , - - . ( ) * / * 0 1 2 , + 3 2 / 2 0 4 . / ( ) * + + . + ListNode ( LinkedLists.mkr Page 839 Thursday, October 14, 1999 10:19 PM ¡ < 5 6 7 6 . , 0 1 , 8 0 4 . 9 : ; ) list template <class Object> class list { public: typedef ListItr<Object> iterator; typedef ConstListItr<Object> const_iterator; list( ); ~list( ); list( const list & rhs ); const list & operator= ( const list & rhs ); iterator begin( ); const_iterator begin( ) const; iterator end( ); const_iterator end( ) const; int size( ) const; bool empty( ) const; Object
    [Show full text]
  • Arquitecturas De Microservicios Para Aplicaciones Desplegadas En Contenedores
    UNIVERSIDAD POLITÉCNICA DE MADRID Escuela Técnica Superior Ingeniería de Sistemas Informáticos TRABAJO FIN DE GRADO EN INGENIERÍA DEL SOFTWARE Arquitecturas de microservicios para aplicaciones desplegadas en contenedores Autor: Carlos Jiménez Aliaga Tutora: Ana Isabel Lías Quintero Diciembre 2018 A mis padres, por haberme guiado a lo largo de los años. A mi hermana, por estar siempre ahí y ayudarme a dar lo mejor de mí. Y a mi abuela, donde quiera que esté, que siempre estuvo orgullosa de que su nieto estudiara álgebra. i | RESUMEN El estado actual de las redes de comunicaciones y la evolución de los dispositivos electrónicos, cada vez más potentes, ligeros y portátiles, ha cambiado la forma en la se consumen los servicios en línea. Los dispositivos están siempre conectados y los clientes necesitan acceder a los datos desde cualquier lugar y de forma instantánea. Esta necesidad implica una rápida adaptación de los servicios así como replicar los datos geográficamente para que puedan estar accesibles globalmente con una latencia mínima. La cuestión es, ¿cómo se consigue desarrollar servicios que cumplan las necesidades actuales de una forma eficiente a la vez que sean capaces de adaptarse rápidamente a nuevos cambios? El propósito de este proyecto de fin de grado es presentar cómo definir arquitecturas basadas en microservicios, haciendo uso de buenas prácticas, para aplicaciones desplegadas en contenedores. Para ello se hace uso de tecnologías de código abierto y multiplataforma, en concreto .NET Core para el desarrollo y Docker como motor de los contenedores. Elegir dónde y cómo desplegar las aplicaciones es un factor determinante. Se presenta el uso los orquestadores para la gestión de los contenedores (Kubernetes específicamente, que es también de código abierto) y de las plataformas Cloud donde el orquestador, las aplicaciones y servicios adicionales (como las bases de datos) son desplegados y accesibles a nivel global.
    [Show full text]
  • Java Classes
    Java classes Savitch, ch 5 Outline n Objects, classes, and object-oriented programming q relationship between classes and objects q abstraction n Anatomy of a class q instance variables q instance methods q constructors 2 Objects and classes n object: An entity that combines state and behavior. q object-oriented programming (OOP): Writing programs that perform most of their behavior as interactions between objects. n class: 1. A program. or, 2. A blueprint of an object. q classes you may have used so far: String, Scanner, File n We will write classes to define new types of objects. 3 Abstraction n abstraction: A distancing between ideas and details. q Objects in Java provide abstraction: We can use them without knowing how they work. n You use abstraction every day. Example: Your portable music player. q You understand its external behavior (buttons, screen, etc.) q You don't understand its inner details (and you don't need to). 4 Class = blueprint, Object = instance Music player blueprint state: current song volume battery life behavior: power on/off change station/song change volume choose random song Music player #1 Music player #2 Music player #3 state: state: state: song = "Thriller" song = ”Feels like rain" song = "Code Monkey" volume = 17 volume = 9 volume = 24 battery life = 2.5 hrs battery life = 3.41 hrs battery life = 1.8 hrs behavior: behavior: behavior: power on/off power on/off power on/off change station/song change station/song change station/song change volume change volume change volume choose random song choose random
    [Show full text]
  • 5. Defining Classes and Methods Objectives Example: Automobile
    10/10/11 5. Defining Classes and Methods Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich http://seal.ifi.uzh.ch/info1 Objectives ! Describe and define concepts of class and object ! Describe use of parameters in a method ! Use modifiers public, private ! Define accessor, mutator class methods ! Describe purpose of javadoc ! Describe references, variables, parameters of a class type © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 2 Example: Automobile ! A class Automobile as a blueprint © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 3 1 10/10/11 Class and Method Definitions Objects that are instantiations of the class Automobile © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 4 Class and Method Definitions ! A class outline as a UML class diagram © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 5 Example: Automobile Code © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 6 2 10/10/11 Example: Species ! A class Species shall hold records of endangered species. ! Each object has three pieces of data: a name, a population size, and a growth rate. ! The objects have 3 behaviors: readInput, writeOutput, predictPopulation. ! Sample program class SpeciesFirstTry © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 7 Using a Class and Its Methods ! class SpeciesFirstTryDemo © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 8 Methods ! Two kinds of Java methods ! Return a single item, i.e. return type ! No return type: a void method ! The method main is a void method ! Invoked by the system ! Not by the program © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 9 3 10/10/11 Defining void Methods ! Consider method writeOutput ! Method definitions inside class definition ! Can be used only with objects of that class © 2008 Pearson Education, Inc., Walter Savitch and Frank Carrano 10 Methods That Return a Value ! Consider method getPopulationIn10( ) .
    [Show full text]
  • The Development of a Method to Assist in the Transformation
    THE DEVELOPMENT OF A METHOD TO ASSIST IN THE TRANSFORMATION FROM PROCEDURAL LANGUAGES TO OBJECT ORIENTED LANGUAGES WITH SPECIFIC REFERENCE TO COBOL AND JAVA by Jeanette Wendy Wing A Research dissertation submitted in complete fulfilment for the requirements of the degree of Master of Technology in Information Technology in the Department of Computer Studies, Durban Institute of Technology, Durban, South Africa. Durban, December 2002 APPROVED FOR FINAL SUBMISSION ________________________________ __________________ Mr. D. A. Hunter, M.Sc.(UND) DATE SUPERVISOR i ABSTRACT Computer programming has been a science for approximately 50 years. It this time there have been two major paradigm shifts that have taken place. The first was from “spaghetti code” to structured programs. The second paradigm shift is from procedural programs to object oriented programs. The change in paradigm involves a change in the way in which a problem is approached, can be solved, as well as a difference in the language that is used. The languages that were chosen to be studied, are COBOL and Java. These programming languages were identified as key languages, and the languages that software development are the most reliant on. COBOL, the procedural language for existing business systems, and Java the object oriented language, the most likely to be used for future development. To complete this study, both languages were studied in detail. The similarities and differences between the programming languages are discussed. Some key issues that a COBOL programmer has to keep in mind when moving to Java were identified. A transformation method is proposed. The transformation method identifies the creation of two distinct types of Java classes from one COBOL program.
    [Show full text]